text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
It’s almost Leap Year!! Here are tons of “froggy” inspired games, treats, and crafts to celebrate this special day that comes only once every 4 years. You will love these 9 leap year party games and printables. They are easy to make and fun activities for kids of all ages. Frog Hunt – Print out a bunch of these cute frogs and hide them around your house for the kiddos to find.Frog Bean Bag Craft – You could use this as a craft, in a game, and also as a party favor for each guest. It has a template all ready for you to print out. Pass the Toad Using a stuff animal frog, play this game like “Hot Potato”. Eliminating a player who has the frog when the music stops until there is one winner left. The project requires either sewing or hot glue skills. A child of age 9 or so could do the project with adult supervision. Frog Puppet ~ Make a fun frog puppet out of a paper plate and construction paper. Frog Cup Cakes – You could decorate these cute cupcakes as an activity or just have them ready for dessert. You could order one of these cute Frog shirts, or make your own! Consider making these for your kiddos or for each guest at the party. What are you doing to celebrate Leap Year?
<urn:uuid:775a79bd-b482-4676-8491-bcc17a5ad682>
CC-MAIN-2022-33
https://tipjunkie.com/leap-year-party/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.943913
287
2.234375
2
As wives and mothers, we often think about others well before we think about ourselves. What we don’t realize is that if we don’t take care of ourselves, we can’t adequately take care of the ones we love. Moms, it’s time to learn to pamper your inner soul! Do you even know how to pamper your inner soul? Here are some ideas of things you may want to try: * Take a bubble bath. Set aside an hour one evening or during the weekend. Fill up your bathtub with your favorite bubble bath and soak. Every woman knows that a long, hot bubble bath can soak away the cares of the day. Why not set aside the time and take one soon? * Go for a walk. Exercise can clear your mind and nourish your inner soul. It also does great things for your body. Whether the air is crisp and cool or warm and breezy, going for a leisurely walk can make the difference in how you feel. * Share the love. Nothing pampers your soul like getting the love and attention of your children or spouse. Bear hugs and sticky kisses can make even the worst day seem better. * Splurge and head to a day spa. Talk about being pampered. Go for the full treatment – facial and massage. Why not get the works? Remember that you’re worth the time and money you’ll be spending. * Listen to your favorite music. It has been said that “music sooths the savaged soul.” Pull out your favorite tunes and relax. You may even want to sing or dance along. * Hydrate yourself. Be sure to drink plenty of water. Dehydration can make you feel run down and inhibit clear thinking. Take a few minutes to drink a cold glass of water and you’ll pamper your mind as well as your soul. * Buy yourself a journal. Let out some of the feelings you may have been keeping bottled up inside. Don’t suppress tears if you feel them coming. It’s been said that crying is good for the soul; it may be time to let the tears fall. * While you have your journal out, list three things that you like about yourself. Quite often we’re guilty of not thinking well of ourselves. Take a few minutes and seriously think about things you admire about yourself and write them down. * Reach out and touch someone. Is there a friend you’ve lost touch with? Now would be a great time to reconnect. Talking with an old friend can be good for your soul. Who have you been missing? * Meditate or pray. Meditation and prayer can both be rejuvenating. It can also reach a part of your soul that nothing else will. You want to be a better wife and mother so you may want to take the time to pamper your inner soul. If you’re relaxed and at ease it will show through in the love you give, the time you spend, and how you make others feel.
<urn:uuid:2698c502-d616-44c1-a9e9-9430a5eabf0f>
CC-MAIN-2022-33
https://momintelligence.com/2010/09/pamper-your-inner-soul/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.949251
643
1.578125
2
In my last blog, I discussed how over the years, 12 airlines have been cut down to four due to mergers. It is my hypothesis that these mergers resulting in four remaining major airlines are having a negative impact on the consumer in regards to increase in fares and fees in excess of the rate of inflation; competition to where there is dominance by one or two airline at at the most trafficked airports; routing to less populated areas; purchase of newer planes; quality maintenance; baggage handling; and concern for their clients. The reduction of competition is a factor contributing to an increase in negative consumer experiences. There is an AP study regarding this subject which was released to the press around July 2015 which verifies these contentions. The Economist published this study on 7/14/15, titled, “AIRLINES IN AMERICA- NO CHOICE,” by B.R. and the following is their report. “Some flyers are suing the four big American carriers—American, United, Delta and Southwest—arguing that they colluded to keep ticket prices high.” “The Department of Justice was already looking for evidence that the same airlines were tacitly agreeing not to compete with one another on certain routes, thus giving them much higher pricing power. As he posted at the time, Gulliver’s hunch is that there is no shady agreement between the carriers. The more likely reason for the lack of competition is, well, the lack of competition—the result of the wave of airline mergers approved by regulators over the past few years that has halved the number of big players.” “A recent study by the Associated Press (AP), a media outfit, seems to back this hunch up. It found that the dwindling roster of large carriers has had a significant effect on choice at American airports. At 40 of the country’s 100 biggest hubs, AP reports that a single carrier now controls over 50% of the market, as measured by the number of seats for sale. This compares with 34 a decade ago. At 93 of the 100 either one or two airlines account for the majority of seats, up from 78 previously.”(according to AP’s analysis of data from Diio, an airline-schedule tracking service) “AP quotes Doug Parker, boss of American Airlines, rejecting the notion that consolidation has hurt travelers, saying: “We have increased flying out of each of our hubs. We want to expand. That’s good for consumers, not bad.” That seems to be willfully missing the point. The reason that American Airlines can expand at its hubs is because of all those slots freed up by former competitors that have been swallowed up. Contrary to Mr Parker’s claim, allowing a dominant carrier more control at an airport is worse for consumers, not better.” “It is only fair to point out that the fat profits America’s airlines are currently making—a combined $19.7 billion in the past two years—must be put into the context of some equally corpulent recent losses. And while AP found that prices have risen by 5% above inflation over the past decade, as the economy has improved there has also been more demand for air travel, so it is not particularly surprising. But against this, fuel costs have also plummeted. What is more, the small increases in the headline fares do not take into account the fact that airlines are pulling in a lot more from ancillary revenue. The top three American carriers reaped $13.8 billion in add-on charges in 2014. Across the world, it says, carriers’ ancillary revenue grew by 21% in the space of a year to $38.1 billion. To break this all down, it is interesting to see the effect that consolidation has had at individual airports. AP found that: The mergers have altered the competitive landscape at airports big and small. - • In Indianapolis, the two leading airlines controlled just 37 percent of the seats a decade ago, and domestic fares were 9 percent below the national average. Then the city’s main airline, ATA, went bankrupt and was bought by Southwest, and its No. 2 carrier, Northwest, was absorbed by Delta. Now two airlines control 56 percent of the seats, and airfares are 6 percent above the national average. - • The Dayton, Ohio, airport was served by 10 airlines in 2005, and fares were 5 percent below average. Today, just four airlines fly there and prices are almost 10 percent above average. - • Big hub airports aren’t immune. In 2005, US Airways controlled nearly 66 percent of the seats in Philadelphia. Now that US Airways has merged with American, the combined airline has 77 percent of the seats. Airfare has gone from 4 percent below average to 10 percent above it. - • Delta’s hold on Atlanta, the world’s busiest airport, increased during that same period from 78 percent of seats to just over 80 percent. At the same time, low-cost AirTran merged into Southwest and reduced flights there. Domestic airfares at the airport went from nearly 6 percent below average to 11 percent above. - • Some cities are actually seeing lower fares than they did a decade ago. Prices in Denver were once 5.6 percent higher than the national average. Now that United’s market share there has dropped to 41 percent from 56 percent, fares are almost 15 percent lower than the rest of the country. On 7/18/15 Jacksonville.com published their report on this AP study by David Koenig and Scott Maverowitz, titled: “AP study: Consumers pay for airline mergers. Here are some of their comments: “Airlines aren’t going at each other like they used to,” said Mike Boyd, an aviation consultant frequently hired by airports. “They have their turf, and they rarely go to the mattresses with one another.” “Overall, domestic fares climbed 5 percent over the past 10 years, after adjusting for inflation. And that doesn’t include the $25 checked bag fee and other add-on charges that many fliers now pay.” “To be sure, other factors have contributed to higher fares, among them a stronger economy, longer average flight distances and, for most of the past few years, some of the highest fuel prices in history. However, analysts believe consolidation freed airlines to charge more.” “The strategy is paying off: In the past two years, U.S. airlines made a record $19.7 billion in profits, even though air travel is growing only modestly.” “The airlines’ main trade group, Airlines for America, said the fare increases reflect stronger demand for travel and are not solely a result of the mergers. The group noted that airlines have used their profits to buy new jets and update airport facilities.” “The Justice Department notified the four largest airlines on June 30 that it is investigating whether they are colluding to drive up fares by limiting the availability of flights and seats (“capacity discipline”). Those four control more than 80 percent of the U.S. market.” “There was a time — before deregulation in 1978 — when fliers had even fewer choices and paid higher fares than they do now. Back then, the U.S. government controlled which airlines flew to which cities and how much they could charge. Competition intensified in the 1980s. As new airlines entered the market, fares dropped precipitously.” “After 9/11 and the recession that hit afterward, major airlines were in financial shambles. Several restructured through bankruptcy, and a wave of deals starting in 2008 led to the combinations of Delta and Northwest, United and Continental, Southwest and Air-Tran, and American and US Airways.” “Justice Department antitrust regulators let the deals go through but forced airlines in a few cases to give up some of their spots at key airports to try to encourage competition.” “Still, “the airline industry is less competitive now than it used to be,” said Seth Kaplan, managing partner of industry newsletter Airline Weekly. “Some of us used to have eight or nine airlines to choose from. Now we have maybe four or five, just as we have four or five cellphone companies to choose from.” “Recent deals indicate the big airlines intend to stick to a strategy of dominating one airport and forgoing marginal service elsewhere.” “For instance, United announced in June that it will abandon Kennedy Airport and move its dwindling number of JFK flights to New Jersey’s Newark airport, where it controls 68 percent of the seats.” “At the same time, if regulators go along, Delta will further shrink its small presence at Newark and take over United’s share at JFK, where Delta is already top dog.” “One of the few competitive battles is taking place in Seattle, where Delta is mounting a fierce challenge to longtime No. 1 Alaska Airlines. Delta is building Seattle into a gateway to Asia and adding flights on domestic routes long dominated by Alaska. Seattle-based Alaska has responded by adding service.” “The average fare at Seattle-Tacoma International Airport was $377 in the third quarter of 2014, $18 below the national average.”
<urn:uuid:3e3d8ea9-66bc-40a9-9871-b7cc4b6a953c>
CC-MAIN-2022-33
https://grondamorin.com/2016/01/27/airline-merger-mania-is-taking-its-toll-on-the-consumer/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.966772
1,973
1.875
2
Boris Johnson likes his Brexit breakthroughs to come with a bilateral love-in. Who can forget the honeymoon couple-esque photo shoot that accompanied Boris’s announcement that he and Irish Taoiseach Leo Varadkar had settled their differences over the Irish backstop? The worry is that this week’s visit by French President Emmanuel Macron is a precursor to a similar announcement. The photos are less romantic (as anyone affected by the lockdown ‘bonking ban’ knows, social-distancing and romance are not natural bedfellows), but according to Spectator columnist James Forsyth, they may herald a similar step towards a compromise. But, as BfB contributor Harry Western discusses in an important article for BfB this week, Brexiteers should be wary of any quick fixes at this stage. The compromise discussed by Forsyth, and which the Financial Times has since suggested really is government policy, bears uncomfortable similarities to the much-reviled Chequers deal. It would involve the UK being free to jettison regulations, but the EU free to punish any such regulatory divergence with tariffs. In reality, this would create enormous pressure for the UK to maintain regulatory alignment, while giving the EU carte blanche to introduce whatever new regulations it wanted and the power to threaten the UK with serious repercussions if it refused to fall in line. We hope the UK negotiators are not seriously pursuing this option, and that if they are, they will soon recognise the need to reconsider. We will all be watching this space. On the topic of watching and space, this week also brings news that the UK is revising plans for its independent satellite navigation system to replace Galileo, from which it was vindictively excluded by the EU following the Brexit referendum. New, lower cost, proposals being evaluated include backing the OneWeb satellite company. The US is pressing the UK to develop something technologically different from GPS to reduce the vulnerability of the five-eyes intelligence system. BfB contributor and Professor of Economics David Blake has written a piece for The Telegraph entitled ‘The EU must not be able to get away with using the UK as its dumping ground’. He argues that the EU is following a classic ‘beggar thy neighbour’ strategy, exploiting the Euro’s structural undervaluation to disadvantage the UK. The piece echoes an earlier piece Professor Blake wrote for BfB. On the website this week Brexiteers be alert for a ‘Chequers Mk.2’ deal, by Harry Western The Government may be mulling a Chequers mark-2 deal. Brexiteers need to remain alert. As economist Harry Western explains, if the Brexit trade deal outlined in James Forsyth’s recent piece for the Spectator accurately reflects UK government thinking, supporters of a genuine Brexit should be deeply alarmed. “The risk would be that huge pressures would be created for the UK to avoid diverging from EU rules, both the current rules and any the EU might choose to introduce in the future as divergences would trigger trade penalties.” We Need to Up Our Game on Aid, by Nick Busvine The merger between the Foreign office and DfID is a sensible move. Whether it will actually make any difference is another question. Nick Busvine, a member of the Foreign and Commonwealth Office from 1982-2011, discusses the challenge. “The only long-term escape route from poverty in the developing (not to mention the developed) world is economic growth. With the required preconditions in place, that growth has to come from enterprise, investment and trade.” We are also on Twitter, posting articles and retweeting the daily events that bring Brexit to the fore in the national news. Discussion also continues over on Facebook. How you can help There is much about Brexit still to be decided. Our MPs listen to their constituents. Do continue to send them links to our articles, especially on matters relevant to your constituency – for example, in rural areas, articles on the threat to British agriculture. Alternatively, make an appointment to speak to them at their next surgery. Let them know what you want post-Brexit Britain to look like. As Boris Johnson said in in his post-election address, it is also time for unity and reconciliation. Keep reading our posts and share links to our quality content to help others understand how leaving the EU will be good for the UK economy and for our own democratic governance. We aim to educate our critics to think differently and more positively about the long-term impact of Brexit. An Oxbridge PhD Student Dr Graham Gudgin Economist, Centre for Business Research, Judge Business School University of Cambridge Professor Robert Tombs Emeritus Professor of French History, University of Cambridge
<urn:uuid:e8140216-4dc9-40d5-8266-5eda9a32b03e>
CC-MAIN-2022-33
https://www.briefingsforbritain.co.uk/newsletter-21-june-2020/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.94082
1,014
1.757813
2
Projects successfully delivered by the Imperial Projects (IPROJ) team include... Imperial COVID-19 testing facility Imperial Projects is supporting Imperial's contribution to the Testing Alliance. The lab, based at our St Mary’s Campus, includes the UKAS accredited Molecular Diagnostic Unit (MDU), led by Professor Myra McClure, and Professor Paul Freemont’s high-throughput robotic platform for RNA extraction. This expansion created more than fifty new positions (some filled by graduates of Imperial’s MSc in Molecular Biology and Pathology of Viruses) and forms part of the Department of Health and Social Care's partnership with the London Testing Alliance, brought together by life science cluster MedCity in December 2020. Imperial's testing facility joins Health Service Laboratories in partnership with UCL, King’s Health Partners, and Queen Mary University of London to help increase COVID-19 testing capacity by 20,500 per day. Qatar Biobank was a multi-year project funded by the Qatar Foundation for Education, Science and Community Development and Qatar’s Supreme Council of Health. The biobank collected a wealth of medical data from volunteers and stored medical samples in a high-tech storage facility. Imperial’s participation in the project was led by Professor Elio Riboli and Professor Paul Elliott who are both from the School of Public Health. Imperial provided scientific direction to the project including protocol development, specification and development of standard operating procedures for the biobank. Phase IV of the project was successfully completed through Imperial Projects (IPROJ). Imperial College London Diabetes Centre The Imperial College London Diabetes Centre (ICLDC) is an out-patient facility that specialises in diabetes treatment, research, training and public health awareness. It was founded by the Mubadala Development Company in Abu Dhabi, in 2006, with educational and clinical support from Imperial - and today operates three branches across Abu Dhabi and Al Ain, touching the lives of more than one million people through patient-centric programmes and public health initiatives. Imperial’s academic team is led by Professor Sir Steve Bloom and Professor Karim Meeran from the Department of Medicine. Through Imperial Projects (IPROJ), the team continues to provide a range of technical services to ensure the centre's continued success. Transport Strategy Centre The Transport Strategy Centre (TSC) within Imperial’s Department of Civil and Environmental Engineering was established in 1992 as a centre of excellence serving the railway industry on strategic, economic and technology issues. TSC has since broadened its international group of research partners and strengthened its position as strategic advisors to public transport organisations around the globe. TSC is led by Richard Anderson (Managing Director) and Professor Dan Graham (Research Director) and the centre facilitates and manages programmes of international public transport benchmarking. This includes international benchmarking groups of metro systems, rail operators and bus companies. Imperial Projects (IPROJ) enables delivery of benchmarking groups on behalf of Imperial. International Phenome Centre Network The International Phenome Centre Network (IPCN) is an international research consortium working to transform healthcare globally and improve disease prevention, detection and treatment by understanding the dynamic interactions between our genes, environments, gut microbiomes, diets and lifestyles and their expression in diverse individuals and populations. IPCN is led by Professor Jeremy Nicholson, Head of the Department of Surgery and Cancer at Imperial and leading industry expert Brukers Corporation. Imperial Projects (IPROJ) oversees the network management, contractual and financial administration of the IPCN. Forensic Toxicology Service The Toxicology Unit at Imperial College London has provided an analytical service to Coroners in England and Wales for over 30 years. The unit is led by Dr Susan Paterson, who has extensive experience with the Crown Court and Coroner’s Court as well as an international reputation in the field of forensic toxicology. The unit also carries out internationally recognised research in the field of forensic toxicology and offers the distinct service of hair analysis to Coroners, in addition to routine sample analysis. Imperial Projects (IPROJ) provides contractual and financial administration for the Forensic Toxicology Services. Gut Hormone Testing Services The Gut Hormone team led by Professor Sir Steve Bloom carries out tests on plasma samples from hospitals all over the world as well as 250 hospitals & NHS trusts in the UK. Using assays developed by Professor Bloom’s team it is possible to identify patients with gastrointestinal tumours, allowing early intervention and often cure. At present several more assays are being developed for other conditions. This group’s extensive research has also led to the discovery that oxyntomodulin reduces appetite offering a potential new treatment for obesity. Imperial Projects (IPROJ) oversees the contractual and financial management of Gut Hormone Testing Services.
<urn:uuid:3e3bc823-4281-44d1-87c9-c8473b238492>
CC-MAIN-2022-33
https://www.imperial.ac.uk/research-and-innovation/support-for-staff/imperial-projects/project-successes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.930154
997
1.539063
2
The ATP6V0A2 gene provides instructions for making one part, the a2 subunit, of a large protein complex (a group of proteins that work together). This protein complex is known as a vacuolar H+-ATPase (V-ATPase). A V-ATPase acts as a pump to move positively charged hydrogen atoms (protons) across cell membranes. V-ATPases are embedded in the membranes surrounding cells, where they transport protons into and out of cells. This movement of protons helps regulate the relative acidity (pH) of cells and their surrounding environment. Tight control of pH is necessary for most biological reactions to proceed properly. Within cells, V-ATPases help regulate the pH of particular cell compartments. These compartments include endosomes and lysosomes, which digest and recycle materials that the cell no longer needs. Studies suggest that V-ATPases are also involved in the movement (trafficking) of small sac-like structures called vesicles. Vesicles transport many types of molecules within cells. V-ATPases also play a key role in a complex process called glycosylation, in which proteins are modified by adding sugar molecules. Glycosylation is necessary for the normal function of many different kinds of proteins. V-ATPases regulate the pH of a cellular structure called the Golgi apparatus, where glycosylation occurs. Health Conditions Related to Genetic Changes More than 40 variants (also known as mutations) in the ATP6V0A2 gene have been identified in people with cutis laxa. ATP6V0A2 variants cause a form of the disorder called autosomal recessive cutis laxa type 2A (ARCL2A), which is characterized by loose, sagging skin; distinctive facial features; and larger than normal spaces (fontanelles) between the skull bones that close later than usual. Some affected individuals also have delayed development, intellectual disability, seizures, or problems with movement that can worsen over time. Variants in this gene also cause a related condition called wrinkly skin syndrome, which typically has milder features. Variants in the ATP6V0A2 gene prevent the cell from producing a functional a2 subunit, which disrupts the normal function of V-ATPases. It is unclear how these genetic changes cause the signs and symptoms of cutis laxa. Researchers suspect that changes in V-ATPase function may disrupt the normal glycosylation of proteins, including several that are involved in the assembly and maintenance of elastic fibers. Elastic fibers are slender bundles of proteins that provide strength and flexibility to connective tissue (tissue that supports the body's joints and organs). People with cutis laxa have a reduced density of elastic fibers, which weakens connective tissue in the skin, lungs, and other organs. These defects in connective tissue underlie many of the major features of the disorder. Because problems with glycosylation underlie ARCL2A, the condition is classified as a congenital disorder of glycosylation.More About This Health Condition Other Names for This Gene - ATPase, H+ transporting, lysosomal V0 subunit a2 Additional Information & Resources Tests Listed in the Genetic Testing Registry Scientific Articles on PubMed Catalog of Genes and Diseases from OMIM - Guillard M, Dimopoulou A, Fischer B, Morava E, Lefeber DJ, Kornak U, Wevers RA. Vacuolar H+-ATPase meets glycosylation in patients with cutis laxa. Biochim Biophys Acta. 2009 Sep;1792(9):903-14. doi: 10.1016/j.bbadis.2008.12.009. Epub 2009 Jan 8. Review. Citation on PubMed - Hucthagowder V, Morava E, Kornak U, Lefeber DJ, Fischer B, Dimopoulou A, Aldinger A, Choi J, Davis EC, Abuelo DN, Adamowicz M, Al-Aama J, Basel-Vanagaite L, Fernandez B, Greally MT, Gillessen-Kaesbach G, Kayserili H, Lemyre E, Tekin M, Türkmen S, Tuysuz B, Yüksel-Konuk B, Mundlos S, Van Maldergem L, Wevers RA, Urban Z. Loss-of-function mutations in ATP6V0A2 impair vesicular trafficking, tropoelastin secretion and cell survival. Hum Mol Genet. 2009 Jun 15;18(12):2149-65. doi: 10.1093/hmg/ddp148. Epub 2009 Mar 25. Citation on PubMed or Free article on PubMed Central - Kornak U, Reynders E, Dimopoulou A, van Reeuwijk J, Fischer B, Rajab A, Budde B, Nürnberg P, Foulquier F; ARCL Debré-type Study Group, Lefeber D, Urban Z, Gruenewald S, Annaert W, Brunner HG, van Bokhoven H, Wevers R, Morava E, Matthijs G, Van Maldergem L, Mundlos S. Impaired glycosylation and cutis laxa caused by mutations in the vesicular H+-ATPase subunit ATP6V0A2. Nat Genet. 2008 Jan;40(1):32-4. Epub 2007 Dec 23. Citation on PubMed - Marshansky V, Futai M. The V-type H+-ATPase in vesicular trafficking: targeting, regulation and function. Curr Opin Cell Biol. 2008 Aug;20(4):415-26. doi: 10.1016/j.ceb.2008.03.015. Epub 2008 May 27. Review. Citation on PubMed - Marshansky V. The V-ATPase a2-subunit as a putative endosomal pH-sensor. Biochem Soc Trans. 2007 Nov;35(Pt 5):1092-9. Review. Citation on PubMed - Morava E, Lefeber DJ, Urban Z, de Meirleir L, Meinecke P, Gillessen Kaesbach G, Sykut-Cegielska J, Adamowicz M, Salafsky I, Ranells J, Lemyre E, van Reeuwijk J, Brunner HG, Wevers RA. Defining the phenotype in an autosomal recessive cutis laxa syndrome with a combined congenital defect of glycosylation. Eur J Hum Genet. 2008 Jan;16(1):28-35. Epub 2007 Oct 31. Citation on PubMed
<urn:uuid:91c50cba-fdd8-4b24-b05b-ecb6eb58b8a0>
CC-MAIN-2022-33
https://medlineplus.gov/genetics/gene/atp6v0a2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.817333
1,522
3.453125
3
CFD trading platform in Nigeria Contracts for Difference are relatively recent, dating back to the 1990s. Originally, they were focused exclusively on stocks, but nowadays their underlying asset can be stock indices, currency pairs, cryptocurrencies and other underlying financial instruments. Selling or buying a financial instrument through a CFD does not entail documenting the rights to it (i.e., you certainly have the right to the concluded contract, but not the rights to the subject of that contract). For example, if you have a CFD contract for the purchase of 1000 Microsoft shares, you will not own the shares and you will not own them. So why would you do such a deal? The truth is very simple - the deal is done only to get the difference in price. It is done for speculative purposes. It is easier to buy a couple of CFD contracts on the same stocks, and when the price goes up, close them with profit which is the difference of closing and opening price minus a small commission from the broker. The contract for difference (CFD) is a common derivative instrument, in which the asset on which the CFD is based is the difference in price. With a CFD trading platform in Nigeria, you can make more money in a limited period of time by buying cheaper and selling dearer. Trading platform capabilities for trading CFDs in Nigeria? Overall, trading on the best CFD trading platform in Nigeria has certain advantages that have greatly increased the popularity of this type of financial instrument during the last few years. Pros of CFD trading platform Huge choice of instruments. CFDs are available for almost all financial instruments. It is the best choice for diversification lovers. Hedging. Hedging can also be used for profit. If the movement of two financial instruments is very similar, you may open a long position in one instrument and a short position in another. Profit will be made by the difference in the movements of these instruments or by a positive swap. Large leverage. CFDs provide the opportunity to work with much higher leverage (up to 1:500) than the stock market. This ensures low margin requirements starting at 2%. Depending on the underlying asset (e.g. stocks), the margin requirement can be as high as 20%, but no more. This allows traders with little capital to access markets previously inaccessible to them. Access to all markets from a single platform. The CFD trading platform offers instruments from all world markets. This means that the trader can easily trade all the world's markets from a single trading platform. There are no restrictions on short positions. Some markets have rules that prohibit short trades at certain times or require that a trader borrow an asset before opening a short position. The CFD market generally has no limitations on short positions, and you can open a short position at any time without incurring additional costs. Execution without commission. As mentioned above, trades are executed instantly and often without any commissions. No restrictions on trading. While some markets do have limitations on the capital available for trading, the CFDs do not. Disadvantages of CFD trading platform Not suitable for scalpers. All costs are embedded in the spread, which basically does not allow you to make quick trades and earn on the smallest fluctuations. Weak regulation. CFDs are not as regulated as the stock market, so only trusted brokers with good reviews. Choosing a CFD trading platform, every trader needs to weigh the pros and cons. The main thing in a trader's work is profit, no matter what financial instrument it is earned with. That is what we wish you! During the years of using the CFD trading platform in Nigeria a lot of different indicators have been created, which help traders to carry out complex analysis of the market. Technical analysis is mathematical functions based on price or volumes. They can not only help to analyse the market, but also give trading signals directly. Some indicators work well in a trend, some work well in a flat, some are universal. Popular indicators on the best CFD trading platform include: - Moving Average (MA). Moving averages are an indicator of the average price movement. They are tools of computer analysis, which smooth price fluctuations by averaging over a certain time period. - Moving Average Convergence-Divergence (MACD). It is a combination of three exponentially smoothed moving averages. It looks like a histogram with a signal line overlaying it. - Relative Strength Index (RSI). Relative Strength Index. An oscillator which measures the relative market strength by comparing the absolute amounts of market growth and decline. - Bollinger Bands (BB). The Bollinger Bands help identify the moment of transition from a quiet market to an active one, and vice versa. The indicator is plotted on the price chart and formed by three moving averages with specified deviations. - Stochastic Oscillator. Stochastic indicator. It uses the condition that in case of ascending trend the closing price tends to the maximums of the period, and in case of descending trend the closing price tends to the minimums. - Ichimoku Kinko Hyo (Ichimoku). It is a complex indicator, consisting of five lines, three of which are moving averages and two are their derivatives. Ishimoku does not only define the presence of a trend, but also gives information about the support and resistance zones. - Fibonacci lines (Fibonacci lines). On the price chart there are indicative correction levels built on the basis of the famous mathematician's sequence of numbers. Technical analysis is the minimum knowledge base required to seriously engage in trading. Knowledge of basics of technical analysis will help you in future to master the market and create your own trading system. How to make money trading CFDs in Nigeria? Over the life of the stock market, investors have developed many trading strategies. But almost every CFD trading platform in Nigeria strategy employs one of two ways to make money on price differences. A quote, in trading, is the value of a financial instrument at the current moment in time. A quote consists of two prices. These are the Bid price (at which you can sell the financial instrument) and the Ask price (at which you can buy). The Ask price is always higher than the Bid price, the difference between the two is called the spread. One of the key terms in exchange trading is "long" - "short". Or, to put it another way, long and short. The long position (or long) refers to the traditional situation where an investor buys an asset with the expectation that its value will rise. Investors resort to this type of trading when they expect the price to rise. The idea of a long position is to buy a stock when it is cheap, and sell it when it is up. The long position is one of the most popular trades on the stock market. It is the easiest to understand, and that is why newcomers to the stock market typically start there. A short position (or short) is opened by an investor in the hope of profiting from a fall in the market quotations. It means that the investor borrows from a broker, which is becoming cheaper, and sells it in order to buy it back later, but at a lower price and, accordingly, to gain profit again. In this case, he borrows the securities from the broker, sells them at the current price and later, when the security really fell in price, he buys them back at a lower price and fixes his profit. A lot of people do not understand the first steps in opening a short position on a CFD trading platform. Namely, how you can sell something that you do not have. Here the trader implements a margin trading scheme. Margin trading refers to trades that sell assets that have been provided against a stipulated amount (margin). In this scheme a commodity is sold in order to buy and return a similar one after some time. Such a sale without cover is called a short, short position. The scheme allows making profit when prices are falling. If a security loses value, the trader buys it at a lower price and returns it to the broker, keeping the profit. In the beginning, when trading on a CFD trading platform, it is not recommended for novice traders to trade on borrowed funds. Such trading is associated with risk. By the way, the principles of margin trading are also valid for long positions on the CFD trading platform in Nigeria. In this case we mean the situation when a broker provides the trader with additional funds to enable the latter to buy more assets, and thus increase profit. Risks are inevitable, but they are minimized by the fact that the broker also creates a list of marketable securities, for which it is reasonable to open a long position. There are also limits on the trader's own funds, with which he is going to buy assets. In addition, the broker fixes the minimum value of the asset, upon reaching which in case of a negative trend reversal the long position will be closed automatically. If the trend is positive, the asset will gradually increase in value, the trader sells it at a certain moment and fixes the profit. It should be understood that long positions can be opened using margin trading techniques, and only with investor's personal funds. Short positions are possible only with borrowed funds. How to start CFD trading in Nigeria? Online services facilitate the process of buying assets by using technology and offering new forms of investing. Essentially, the best CFD trading platform in Nigeria is used by investors to place bets on whether the price of the underlying asset or security will rise or fall. If after reading this article you are seriously interested in trading CFDs in Nigeria, the first thing you need to do to get started is to open an account with a CFD trading platform. To do this, you need to register with your personal details (name, email address) and confirm the registration process. It is important to do this so that you always have access to the best CFD trading platform and trading accounts available. Before you open your first trade, you will need to fund your brokerage account. It is simple and free! This is usually done as follows: you go to your broker's website, and click on the "Deposit" or "Deposit" button, and you are offered one of the payment systems. Depending on the deposit method you choose, the money will take anywhere from 5 minutes to 5 days to arrive. If you are new to the CFD trading platform, we recommend that you first open a Demo account. There you will get familiar with the appearance of the charts, the system and the instruments. All the operations on it are conducted with virtual money only, while the quotes and the trading process are identical to the real market. Try it and you will succeed!
<urn:uuid:8c1a4f34-a159-401c-8b63-4b456e732617>
CC-MAIN-2022-33
https://brainytrading.ng/cfd-trading-platform
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.947062
2,222
1.515625
2
FOXP2(redirected from CAG repeat protein 44) FOXP2A gene on chromosome 7q31 that encodes a member of the forkhead/winged-helix family of transcription factors, which is expressed in foetal and adult brain, lung and gut. It is evolutionarily conserved, and binds hundreds of different gene promoters to regulate the expression of their cognate genes. FOXP2 is required for proper development of speech and language areas of the brain during embryogenesis, and is involved in pathways that influence language development. FOXP2 mutations cause speech-language disorder type 1 (autosomal dominant speech and language disorder with orofacial dyspraxia). Segen's Medical Dictionary. © 2012 Farlex, Inc. All rights reserved.
<urn:uuid:fd6c1566-8e43-4efe-b80b-865ed7e97854>
CC-MAIN-2022-33
https://medical-dictionary.thefreedictionary.com/CAG+repeat+protein+44
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.895817
168
2.046875
2
Dharamshala, India — Central Tibetan Administration celebrated the 61st Tibetan Democracy Day in Dharamshala. Speaking at the ceremony, Sikyong said, "democracy is the most important resource to keep our freedom struggle alive and combine our capabilities. When Tibet regains its freedom, democracy is indispensable for its political, economic and cultural development." On September 2, 2021, The Central Tibetan Administration(CTA) held an official ceremony to celebrate the 61st anniversary of Tibetan Democracy Day at Sikyong hall in Gangchen Kyishong, Dharamshala, HP, India. Tibetans worldwide also marked 61st Tibetan Democracy Day on Thursday by organizing various programs across the world. The ceremony was attended by top officials, heads of autonomous bodies, and secretaries and senior staff of the Central Tibetan Administration. After singing the Tibetan national anthem, the ceremony began with a performance of the Tibetan democracy song by the Tibetan Institute of Performing Arts (TIPA). The ceremony also featured a screening of His Holiness the Dalai Lama's speech on the importance of strengthening the democratic institution, delivered at the first Tibetan General Meeting on August 31, 2010. During the ceremony, Sikyong Penpa Tsering presented awards and certificates to this year's class 12 Sikyong Scholarship winners, class 10 Sikyong Excellence winners, Sikyong Professional Scholarship winners, and Gaden Phodrang winners. On the occasion of the 61st Tibetan Democracy Day, the Kashag issued a statement describing the evolution of Tibetan democracy under the visionary leadership of His Holiness the Dalai Lama. "Today, we are gathered here to commemorate the sixty-first founding anniversary of the Tibetan Parliament in 1960 following the arrival of His Holiness the Dalai Lama and 80,000 Tibetans in exile," the president said as he read out the statement from Kashag. "On 3 February 1960, barely ten months after arriving in exile, the representatives of Tibetans in exile gathered for the first time in India’s sacred land of Bodhgaya and took Na-gyen Chenmo (great oath) pledging utmost dedication and sacrifice to forge unity and cooperation under the guidance of His Holiness the Dalai Lama. His Holiness said, “Unlike the past system in Tibet, it is extremely important to establish a democratic form of governance based on harmonious blend of spiritual and political values. Hence, a popularly elected body of people’s representatives is needed. After you return to your respective places, select from the general public nominees who are educated, capable, patriotic and trustworthy. For the time being, elect one representative from the four schools of Tibetan Buddhism and three representatives from the three traditional provinces.” Accordingly, elections were duly held and 13 representatives were elected and thus began the first Commission of the Tibetan People’s Deputies. They took their oath on 2 September 1960. In 1975, the Kashag declared to commemorate 2 September as the founding day of Tibetan democracy. "In the challenging environment faced on arrival in exile, His Holiness took the bold step of instituting the election of people’s representatives and making structural reforms in the exile Tibetan polity to encourage and steer it towards genuine democracy and rule of law. Because of far-reaching vision of His Holiness, today the Tibetan administration in exile represents all the Tibetan religious faiths, and has jurisdiction not only over areas administered by the Gaden Phodrang government but also the whole of Tibet’s three traditional provinces of U-tsang, Kham and Amdo. The unprecedented consciousness among the Tibetans in exile of belonging to a single Tibetan nationality could also be considered as a fruit of His Holiness the Dalai Lama’s democratisation efforts. "Furthermore, on 10 October 1961, a draft Constitution for Future Tibet was announced followed by the promulgation of the Constitution on 10 March 1963. It paved way for the formation of three pillars of democracy, and creation of fundamental rights and responsibilities of the people. Moreover, to have genuine democracy His Holiness even provided a clause in the constitution allowing for his own impeachment. Similarly, the use of hereditary titles and prerogatives in Tibet were withdrawn. "As the Tibetan Parliament had no secretariat till 3 May 1966, the deputies were attached to various departments of the Central Tibetan Administration. However, it was the Tibetan Parliament which proposed to His Holiness the nominees for the civil servants during the reorganization of the five main departments and four branch offices in 1960. "During that time, the Chinese government pursued its policy of brutal suppression of Tibetan people’s peaceful protests and thrust upon them its so-called democratic reform. How China’s policies brought tragedy in Tibet as it literally experienced hell on earth is evident in the 10th Panchen Lama Choekyi Gyaltsen’s 70,000-character petition to the Chinese government. As a result, the Panchen Lama was sentenced to 14 years in prison and he had to suffer far more cruel treatment during the Cultural Revolution. "Along with establishment of the Tibetan Parliament, the system of six monthly work meeting of the Kashag, Parliament, civil servants and heads of the institutions were started, and till 1969, 17 such meetings were organised. In 1969 it was decided to call an Annual General Meeting. Till 1989, 16 annual general meetings were held with the participation of almost entire section of the local communities. These meetings made significant contribution during the course of the Tibetan democracy. As per His Holiness’s advice, the election of Garthue (local deputies) began from 1964. In 1965, His Holiness also advised that the Tibetan people should elect their settlement officers. In 1972, Tibetans from Varanasi spearheaded an initiative to seek public support for the administration and consequently Tibetan Freedom Movement Subcommittee was set up in Tibetan settlements. "It is not that the process of democratization in exile was carried out unimpeded. It is needless to say that the establishment of democratic governance had negatively affected the interest of those in power to cling to the old system. And those who lack understanding of democracy created various obstacles to the progress of democracy. However, because of his unwavering commitment to follow the democratic system, His Holiness succeeded in smoothly carrying out the reforms in accordance with the changing times. "Since 1974, the Tibetan Youth Congress proposed that the deputies to the Assembly be elected by the combined electorate of the people of all the three provinces. The high-level Standing Committee of the Assembly accepted the proposal and amended the rules. However, during the election of 8th ATPD in 1982, the deputies from Dotoe province and Nyingma school resigned during the primary round and entrusted His Holiness to appoint all the deputies. His Holiness was entrusted to appoint the deputies of the 9th Assembly due to the refusal of Dotoe province to take part in the election. Due to lack of required nominee from Dotoe and Nyingma in the primary election of the 10th Assembly, the high-level Standing Committee was compelled to pass a resolution, calling for the previous Assembly members to continue as the new members. "Similarly, since early 1977, His Holiness advised the Kashag and Standing Committee to make necessary improvements in the appointment of head of the Kashag, election of Kalons and the setting of their term limits. During the 16th National General Assembly held in 1989, His Holiness emphasised the need for more democratic reforms including election of a head of the CTA. However, the Tibetan leaders and people could not come up with a common action plan to act as per His Holiness’s advice. "His Holiness dissolved the Kashag and Parliament in 1990, and in May convened a special conference with 369 participants from members of the Parliament, CTA, former Kalons, representatives of NGOs and institutes, and religious schools and recently arrived Tibetans from Tibet. During the conference His Holiness appointed the Constitution Review Committee. On 14 June 1991, the 11th Tibetan Parliament adopted the Charter bearing the hallmark of democracy, i.e., the three pillars of democracy and autonomous bodies. In order to further the process of democratization, the system of direct election of Kalon Tripa was started in 2001 and His Holiness took semi-retired position. The most significant democratic development took place in 2011 with the devolution of His Holiness’s political authority to the democratically-elected leader of the Central Tibetan Administration through the 25th amendment of the charter. "The essence of democracy is encapsulated by former US president Abraham Lincoln who said democracy is of the people, by the people and for the people. It should be guaranteed by the rule of law and the constitution on which all the laws are based to ensure that the workings of the government should be within the ambit of the laws and that fundamental rights of the people are not affected. The constitution reflects the aspirations of the people, and those in authority are forbidden to act in contravention of it and manipulate the constitution. For this reason the new Kashag declared that the rule of law is the essence of its commitment to equality and justice. "Democracy is the most important resource to keep alive our freedom struggle and combine our capabilities. When Tibet regains its freedom, democracy is indispensable for its political, economic and cultural development. "Today, as we commemorate the 61st democracy day, we extend our heartfelt greetings to our compatriots in Tibet. No matter how much China’s propaganda machinery make false claims of development during the 70 years of so-called peaceful liberation of Tibet in its recent White Papers, Tibetans inside Tibet have maintained indomitable courage and determination in the face of China’s continued policy to exterminate the Tibetan identity, and they have been making all round efforts to protect Tibet’s religion, culture, language and tradition, for which we remain deeply grateful. It is this strength that unites the Tibetans in exile and keeps alive the freedom struggle. It is the common wish in our heart to reunite in Tibet and we would like to appeal to our brethren in Tibet not to lose their determination. "The present Kashag has been carrying out its administrative works without any negligence. However, the inability of the parliament to convene its session has been preventing it from carrying out its legislative functions. The parliament is also not able to make use of the opportunities to plan activities and campaigns in accordance with the changing situation in China and the international community. The Kashag has been informed of several instances of the Chinese government exploiting this issue to spread falsehood inside Tibet, create division in the exile Tibetan community and misuse it at the international platforms. It has created great concern and apprehension among the governments, parliaments and Tibet supporters who genuinely support us. Tibetans inside Tibet said they would stop their activities for the Tibetan cause if the problem is not resolved immediately. As all of us know that there are people in our small community who are just venting emotions without careful thinking. "The present Kashag will extend its cooperation and support to any means that are within the Charter. We would like to stress that it is high time that the concerned people should seriously weigh the advantages and disadvantages if the situation lingers on, and make no mistake in their consideration by taking responsibility in the highest interest of our cause. If the impasse drags on due to their intransigence, it will only lead to the collapse of Tibetan administration. Neither will any Tibetan like to see such a result, nor will it benefit any Tibetan. The Kashag is ready and firmly committed to work with the parliament as mandated by the Charter and make concerted efforts in working towards the greater cause of Tibet and welfare of the Tibetan people. "In conclusion, the Kashag extends its warm greetings to India, the United States and all the countries and Tibet Support Groups around the world for supporting the just cause of Tibet. We pray for the flourishing of the meritorious works of His Holiness the Dalai Lama and the spontaneous fulfillment of all his wishes. May Tibetan democracy continue to flourish," he concluded.
<urn:uuid:a2a388c4-c3f0-4fe2-b2c4-9aa9a702c6e7>
CC-MAIN-2022-33
https://thetibetpost.com/en/news/3-exile/7100-democracy-is-the-most-important-resource-to-keep-our-freedom-struggle-alive-sikyong
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.961779
2,462
1.851563
2
Western Oregon University will become an even safer and healthier place to study and work. As of September 18, campus will become fully tobacco free. This means no one (student, employee or visitor) can use tobacco anywhere on campus, including parking lots and residence hall areas. The City of Monmouth supported this decision and agreed that campus sidewalks will also be tobacco-free zones. This initiative was created by the Student Health Advisory Committee in 2011. Since then, students have tirelessly dedicated their time since then to gather data, create educational materials and make presentations around campus. Some students even spent nearly all of their time at WOU working on this project. Those behind this movement conducted a great deal of research both on and off campus. They found that as of this year, 1,514 American campuses are smoke-free and two-thirds of those are fully tobacco free. In Oregon, Oregon State University and University of Oregon already had similar policies in place. Campus feedback was an integral part of this process. The students, employees and community members behind the initiative sought out campus feedback often. Craig Wimmer, assistant director of wellness education, said, “I think because we spent so much time making campus aware of this initiative it didn’t come as a surprise when the policy was formally proposed. He said the group made presentations to numerous campus boards for feedback – and ultimately – support, such as the Residence Hall Association General Assembly, Faculty Senate, Staff Senate, Administrative Support Council. They also held multiple general forums for anyone to attend and voice their opinion. In order to inform students, faculty, staff and visitors of the policy and offer ways to stop smoking and using tobacco, numerous educational programs will be implemented beginning in the fall. While it is hoped the WOU community will self-police this policy, violators can also be reported to student conduct, Campus Public Safety, or Human Resources depending on their campus status of student, visitor, or employee respectively.
<urn:uuid:159eceec-d353-4b54-ad32-bd1e8c47e4fd>
CC-MAIN-2022-33
https://today.wou.edu/2015/09/01/wou-goes-tobacco-free-sept-18/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.973477
398
1.890625
2
Once praised as the carbon-free energy source of the future, now mainly discredited for producing radioactive waste and having rendered entire regions uninhabitable, nuclear power plants have been a topic for discussion for a long time. This post tries to approach the topic soberly, explaining the physical basics of nuclear power. From Electron Arrangements… Put simply, we obtain most of the energy we need in our everyday lives by optimizing the arrangements of electrons in atoms . This is how a fire works: given enough heat, the atoms in oxygen and the fuel form new covalent bonds, optimizing their electron arrangements. Such processes typically release heat on the order of per reaction ( roughly corresponds to of the energy in a chocolate bar ). This may sound like little, but since usually a vast number of molecules react every second, the total heat output can be considerable. A fire for example can easily throw enough energy quanta at you to get you killed. … to Nucleon Arrangements But what if we still tried to optimize this? If instead of fidling around with electrons we would start trying to optimize the arrangements of protons and neutrons – collectively called nucleons – in atoms? A fascinating question, yet dangerous at the same time. Processes in which the arrangement of nucleons are changed are better known as nuclear reactions. Following this logic, it would actually make sense to call normal chemical reactions “shell reactions”, but nobody does that. What makes neutrons and protons fundamentally different from electrons is that they are able to interact via the nuclear force. The nuclear force is a residual effect of the so-called strong force which is – unnecessary pause to build up tension – very strong. As a result, nucleon-nucleon bonds are much stronger than nucleon-electron bonds. While electrons have binding energies on the order of (as discussed before), the binding energies of nucleons are on the order of (see diagram below). So, a reaction optimizing the arrangements of nucleons in atoms and releasing a part of their binding energy would be a million times more powerful than a combustion reaction. But how would such a reaction look like? The answer lies in the diagram above. The average binding energy per nucleon depends on the total number of nucleons present in the atom. The curve shown on above diagram peaks at and drops both for smaller and larger s. Now, let’s consider a large atom, for example one with . Its total binding energy is roughly . If this atom could somehow divide itself into two smaller atoms, for example with each, it could enhance its total binding energy: now each of the nucleons in the two daughter atoms would feel a binding energy of roughly , giving in total. The fission of the large atoms would therefore yield released in the form of heat. These principles apply directly to the nuclear fission of Uranium employed in nuclear power plants. When a Uranium atom () captures a free-flying neutron (), it enters an excited state with internal vibrations (): In above formula, the notation was used, where is the abbreviation of the atom (Uranium), is the number of protons in the atom, the number of neutrons and the total number of nucleons (). The excitation is marked by the asterisk. The vibrations in the excited state can be strong enough to cause the Uranium atom to divide into two smaller atoms: and are the two daughter atoms. They are not always the same. It could be and , but many other combinations are possible too. means that on average, 2.43 neutrons are released per decay. Of course the actual number is always a positive integer. Finally, is the heat that is released in the decay. It is this heat that nuclear power plants use. On average, it amounts to per Uranium fission, of which are useable (some of the energy is carried away by neutrinos). Where does this energy come from? I’m sure you guessed it: the optimization of nucleon arrangements. Since the daughter atoms and have smaller s, their binding energies per nucleon are larger than the one of (see Figure 2). It is exactly this difference in binding energy that is released in the form of heat. It is not surprising that a reaction 200 million times more powerful than a combustion comes with hazards. These have to be well contained to avoid serious harm. The first hazard is that of a chain reaction. As discussed above, a free-flying neutron is required to start the fission reaction of . In order to guarantee continuous operation in a power plant, the right amount of free neutrons therefore needs to be available inside the reactor at all times. The emphasis is on right amount here. Of the 2.43 neutrons that are released in a reaction on average, only one should stick around to induce another fission. If it’s more, the number of fissions increases – necessary pause to build up tension – exponentially! For example, let’s assume that two of the released neutrons are able to induce new reactions. Then one fission induces two fissions, which induce four fissions, which induce eight fissions, which induce… you get the point. After a very short time so many fissions take place at the same time that an insane amount of energy is released – the reactor blows up. Nobody in their right mind could want such a chain reaction. On the other hand, if less than one neutron sticks around, the reactor shuts down. After one generation, only half as many fissions are induced, then a quarter, then an eighth, and so on. Therefore, continuously operating a nuclear reactor critically depends on having one – and exactly one – neutron per fission that is able to induce another fission. In order to ensure this in practice, a fascinating solution is employed in power plants, which I will discuss in another post soon to follow. The second hazard is nuclear radiation. The problem with optimizing nucleon arrangements in atoms is that the optimization doesn’t simply stop. The daughter atoms continue to optimize their nucleon arrangements in spontaneous decays. The most famous one is probably the alpha decay, where two protons and two neutrons are released. But there are others, such as the beta decay, where the decaying atom releases a free electron or the gamma decay, where a photon is emitted. An overview over the different spontaneous decays is given in Figure 5. These spontaneous decays happen naturally around us all the time, but since earth has been around for a while now, the number of decays taking place in a given time interval is usually quite small. Unstable atoms have had ample time to decay into more stable forms. But by combining with an additional neutron, thus causing it to divide artificially, daughter atoms are created that need not be stable. They continue to decay spontaneously and to release radiation – for centuries to come. This radiation is harmful for humans. Not because of its composition, but because of its energy. Let’s consider gamma radiation for example. “Gamma radiation” is a fancy word for light with a lot of energy, it consists of nothing other than energetic photons. But while photons with energies in the range (for example emitted by a fire) stimulate our retinas and enable us to see , photons in the range (“gamma particles”) can directly kill our cells or knock out parts of our DNA, possibly leading to cancer and gene mutations. I feel like I can’t end this post without having given my opinion on whether we should use nuclear power plants. My short answer is: in the current form, no. Even if we could ensure safe operation of the reactors, it is simply irresponsible to produce nuclear waste that will emit deadly radiation for centuries to come. However, I agree with Switzerland’s policy to use the existing nuclear power plants until their target expiration date, if the remaining time is used to build up the reusable energy infrastructure to replace them. In addition, I believe that we should still invest resources into nuclear power plant research. Given the global energy crisis that we’re facing, it seems a good idea to try out all possible solutions. Furthermore, we desperately need good solutions to deal with the nuclear waste that already exists and to dismantle the existing power plants. Ceasing to research into nuclear power plants because “nuclear” sounds bad certainly is a terrible idea. We have to make sure that we, as a society, are in the role of the sorcerer – having knowledge of the things we set in motion –, instead of the apprentice: Deep and deeper grows the water On the stairs and in the hall, Rushing in with roar and clatter – Lord and master, hear me call! Ah, here comes the master – Sore, sir, is my strait; I raised this spirit faster Far than I can lay’t. “Broom, avaunt thee!from The Sorcerer’s Apprentice by Johann W. v. Goethe (translation by W.E. Aytoun and T. Martin) To thy nook there! Lie, thou spook, there! When for mine own ends I want thee, I, the master necromancer!” Many of the facts presented in this post were taken from the lecture notes of the lecture “Einführung in die Kern- und Teilchenphysik”, ETH Zürich. Unfortunately, I am not allowed to share them. But videos of the lectures are available here: video.ethz.ch. Source featured image: energisch.ch
<urn:uuid:9bdeb9ef-6b58-4506-9181-64487d8b2828>
CC-MAIN-2022-33
https://blog.lucschnell.ch/the-basics-of-nuclear-power-plants/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.934563
2,053
4.03125
4
Thus Leandro Vergara-Camus' new book, which comparatively analyses the two movements, is very important. From my point of view I found it particularly interesting at a time when the question of peasant struggles and rural movements has receded somewhat from discussion among Marxist activists. Both the MST and the Zapatistas are important because they are both contemporary movements and their struggles and strategies may offer insights into wider peasant movements in more revolutionary times. Much of the authors' work is based on years of research which included extended periods living with, and interviewing both MST and Zapatista activists. The MST is a movement of landless workers that attempts through a process of occupations to win land for those who don't have it. It begins with a preparatory period prior to land occupation, followed by a hopefully successful occupation, then by entrenchment of a new community. The Zapatistas, while aiming to control rural space as well, have tended to protect established communities, expelling Mexican state forces and, where necessary, being prepared to mobilise peasants and their own military forces to protect this control. "The land struggles of the MST and the EZLN are not struggles demanding that elites live up to their mortal obligations towards their subordinates. On the contrary, both movements seek to fundamentally transform or even transcend that relationship by empowering their membership through the creation of 'autonomous rural communities'.... These... allow their members to secure and protect their access to land and hence resist the full commodification of land and monetarization of relations of production." Vergara-Camus suggests that for the Zapatistas this has not meant the expansion of commercial agriculture, by which he means an integration into a wider capitalist economy, but instead what can be seen is a "'retreat movement' towards subsistence agriculture and activities. More and more peasants, particularly in indigenous regions of the jungle, the highlands and the north, are retreating as much as possible, from commercial relations - dedicating only a minimal portion of their activity to this purpose." While MST communities are often more integrated into the wider economy, he continues, "the majority of Zapatistas are subsistence peasants and fewer can be found within the ranks of market-dependent indigenous peasants." While there are similarities between the two movements, Vergara-Camus notes important differences. "Even though both are facing the historical process of so-called primitive accumulation, they are confronted by different phases of this process. The militants of the MST are responding to the development of fully capitalist social relations in the countryside, while the Zapatista communities are fighting the mere establishment of the conditions for the development of fully capitalist relations." Vergara-Camus explicitly moves away from this position, arguing that the "subsistence focus" of both the Zapitistas and the MST is a consequence of both "socio-economic" positions and (particularly in the case of the Zapitistas) because the indigenous approach to production emphasises the question of subsistence farming. Writing about the MST, Vergara-Camus suggests that once settlement has occurred, "subsistence remains a focus because market conditions do not allow them to compete with more productive farmers. More importantly, MST settlers are not subject to the full imperative of competition because their land is, most of the time, not commodified." While it is undoubtedly true that both MST settlers and Zapitista communities are physically and economically isolated from wider capitalist relations, I don't think that this necessarily means they are completely cut off from capitalism. This is not simply about whether or not they buy goods such as pesticides or clothing from external companies, though this is important, it is about whether or not the communities are entirely able to break with the realities of capitalism itself. One example of this is the question of gender roles within both the MST and the Zapatistas. The collective action of the peasants has helped to break down the subordinate role of women. This is precisely because the involvement of women directly in the struggle has challenged traditional roles and "temporarily blurred the boundaries between private and public spaces". However it is notable that neither movement seems to have attempted to fundamentally challenge these gender roles through, for instance, collective arrangements for food production and child care. Clearly in both examples, while men and women's traditional roles have sometimes changed, they haven't been transformed. Notably, Vergara-Camus points out, that while in the MST preparatory phase, women and men's roles change radically, once land occupation has taken place, they often revert to more traditional positions. This is not always the case, and the author quotes some inspiring examples of how fundamentally things have changed, while noting that this had to be fought for, as one activist remembered "The participation of women was fought for. It was conquered. It had to confront many stereotypes. Today, it has changed a lot. There are many women who have achieved the division of domestic chores." But, the author notes "what seems to be the rule is that during moments of increased mobilisation and tension, women assume the role of protagonists and thus break with their traditional gender role; but they then often retreat to a modified version of that traditional gender role." One of the truisms of the revolutionary left, is that people change in struggle, and that is clearly the case here. But when the struggle diminishes, or fundamental change fails to occur than things can revert back to how they were. Precisely because neither the MST or the Zapatista movement can break from capitalist relations they risk things reverting back. A second and more fundamental question is that neither of the MST or the Zapatista strategies challenges the power of the state. While it has been fashionable for some leftist scholars to suggest that it is possible for radical movements to not challenge state power, for peasants in Brazil and Mexico, the existence of a hostile state which remains supportive of large landowners can mean death squads, military intervention or simply barriers to selling produce in the wider market. The importance of this debates lies in whether it is possible for others to emulate this strategy and create anti-capitalist islands within a wider capitalist sea. While the creation of communes or co-operatives is often doomed to failure in the face of the logic of the market, because peasant communities can reproduce themselves through subsistence farming it is possible for them to exist in economic relations outside of the capitalist mainstream. But the long term limitations lie precisely because capitalism itself, with its inherent need to expand, will eventually come into conflict with these spaces. This makes the wider links between the MST and the Zapatista movements with their respective nation states even more important. The MST has famously developed over years close links with Brazil's ruling party the Workers' Party (PT). The PT was elected with a mandate to bring change, but has ended up introducing neo-liberal politics and certainly hasn't provided the rural reforms that many in the MST would have hoped for. Indeed, some of their changes have strengthened the larger agricultural corporations and landowners that the MST is in conflict with. In Mexico the Zapatista has bravely stood its ground against extremely aggressive state action. Vergara Camus analyses in some detail the attempts, particularly by the MST to build wider coalitions. These haven't been successful, and it remains to be seen how the MST and the Zapatistas will move forward. But the key question must be the way that both groups have inspired and encouraged wider social movements. Vergara-Camus points out how, in 1994, in the aftermath of the Zapatista uprising communities throughout Chiapas took the opportunity to occupy private land. The MST too, has through its occupations and its colleges and other institutions given land to those who most needed it, and helped encourage the new settlers to make best use of it. Tens of thousands of people have had their lives transformed as a result. In an era when neo-liberal policies have run rough-shod over wider rural relations this is in itself both inspiring and hopeful. Vergara-Camus notes that the "principal political advantage" of the MST and Zapatistas is "their capacity to organise and mobilise entire communities around autonomous structures of popular power" and "their maintenance of a subsistence fall back strategy that provides an opportunity to partially delink from the market". While often using the language of revolution, neither organisation is revolutionary in the sense that they wish to bring fundamental social change through the destruction of the capitalist order. Vergara-Camus notes that "by developing popular structures of power" the MST and the Zapatistas do alter the relationship between rulers and ruled. But he also realizes that "power relations do not dissolve through this process" - as we have seen with the examples of changing gender roles in both the MST and Zapatistas. Vergara-Camus suggests that the only other option is a "political strategy", but he equates this with engaging in the existing capitalist political structures on the terms of those who already have power. I fear that this is inadequate and will expose the weakest flank of these movements to co-option or destruction. The alternative is a strategy of developing and furthering links with wider social forces, particularly the working class of the Mexican and Brazilian cities that have enormous social power. Here lies the potential to destroy capitalism and allow the rural areas to develop unhindered by the wider capitalist sea. This has been a somewhat critical review of what is an important book. At times it is not an easy read. The chapters discussing the politics and economics of the peasantry seemed needlessly academic and the authors' use of Gramscian metaphors seemed shoe-horned in. I was also disappointed that more of the author's material from interviews with the activists of the MST and Zapatistas was not included. Nonetheless, despite my disagreements with key issues in Land and Freedom the debates within are ones crucial to both the future of the peasantry and those who seek to fundamentally change society. This book deserves be widely read and to be the focus of extensive debate. Sader - The New Mole: Paths of the Latin American Left Galeano - The Open Veins of Latin America Sader & Silverstein - Without Fear of Being Happy: Lula, the Workers Party and Brazil
<urn:uuid:dbbed86c-2375-4b65-8fc6-c59d64f06b90>
CC-MAIN-2022-33
http://resolutereader.blogspot.com/2014/12/leandro-vergara-camus-land-and-freedom.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00673.warc.gz
en
0.960071
2,135
2.640625
3
There's a fatal flaw in the plan to end poverty and save the planet The most ambitious internationally agreed plan to make this world a better place are the 17 Sustainable Development Goals (SDGs). But during their annual review, nobody dared to admit that the SDG that calls for sustained economic growth is fatally flawed, undermining the possibility to achieve the other SDGs. Agreed by all nations back in 2015, the SDGs set a course of action until 2030. However, just the word ‘Development’ implies there is a single good path of change for all countries. Great minds like Arturo Escobar, Wolfgang Sachs, Gustavo Esteva and many others have argued against this idea for at least 30 years. That makes the Sustainable Development Goals slightly problematic by name. But there is a bigger problem with one of the 17 goals: SDG 8. This goal calls on all nations to go for sustained economic growth. That’s neither desirable nor sustainable. SDG 8 is the fatal flaw within the SDGs. By taking this trojan horse in, the other SDGs will not be achieved. During the recent High-Level Political Forum (HLPF) at the United Nation’s (UN) headquarters in New York this was clear for all who were willing to see it, but very few dared to face this inconvenient truth. SDGs: No climate of change The most obvious incompatibility is between SDG 8 and SDG 13. The latter aims to ‘combat climate change’. The concentration of carbon dioxide in the atmosphere due mostly to the burning of dirty fuels continues to grow steadily (see Figure 1). The Kyoto (1997), Copenhagen (2009) and Paris (2015) agreements nor the first 4 years of the SDGs “2030 Agenda” register as a trend change on the Keeling curve. Fig. 1 The Keeling curve. Let’s be clear. The link between burning fossil fuels, rising CO2 concentrations in the air and rising temperatures on the ground was made in 1896, by Svante Arrhenius. By the 1970’s companies like Exxon knew that burning fossil fuels causes dangerous climate disruption, but they decided to manufacture doubt. International commitments to prevent the climate chaos we are already in were made in the 1990s and ever since there has been only one year in which global emissions declined: 2009. That was also the only year in decades in which GDP declined. Decoupling economic growth from environmental harm is a fairy-tale The concept of green, sustainable or ‘decoupled’ economic growth is based on the belief that expansion of the economy is possible without an accompanying increase in environmental harm. This idea gained political acceptance in the past decade. However, all data show that there is no evidence supporting the existence of a decoupling of economic growth from environmental pressures on anywhere remotely close to the scale needed. This is one conclusion of the new report ‘Decoupling Debunked: Evidence and arguments against green growth as a sole strategy for sustainability’, produced by 6 scientists for the European Environmental Bureau. It is far from the only study that comes to this conclusion but it puts an unprecedented challenge to those who claim that decoupling justifies a continuation of the pursuit of GDP growth, even in a ‘green’ variety. The authors write that there are at least 7 reasons why sufficient decoupling is extremely unlikely to ever happen: rising energy expenditures, rebound effects, problem shifting, the underestimated impact of services, limited recycling potential, insufficient and inappropriate technological change, and cost shifting. They give enough and convincing arguments for each of these 7 reasons to justify their Loch Ness monster on the cover of their report: sufficient decoupling as a mythical creature of the mind. The objective of SDG 8 is to “sustain per capita economic growth in accordance with national circumstances and, in particular, at least 7 per cent gross domestic product growth per annum in the least developed countries.” This is supposed to magically happen by “improving progressively, through 2030, global resource efficiency in consumption and production and endeavour to decouple economic growth from environmental degradation ….” Never mind that whatever efficiency gains humanity made so far did not resulted in any decrease in total fossil fuels consumption. Fake solution for real problem As policymakers clearly fail to stop the rise of burning dirty fuels, they have tried to ‘make up’ by finding additional carbon dioxide sinks. This resulted in things like REDD (Reducing Emissions from Deforestation and forest Degradation) schemes that usually displace peasants and tribal peoples under the banner of being a climate solution. These ‘solutions’ are new problems. They don’t stop the march towards the commodity extraction frontiers to get hold of energy and materials sources that should be called “unburnable” and “unextractable”. Even a non-growing industrial economy would continue to be untenable because most energy is not recyclable and the circularity of the global economy is only 6% or 9%, depending on how you measure. The industrial economy is not circular but entropic, as explained by Nicholas Georgescu-Roegen already in 1971. The law of physics are immune to our framing, mind-games and psychological weaknesses, such as the urge for never-ending growth. The victims of the growth model Who are the first victims of this never-ending growth model? In the EJAtlas (Atlas of Environmental Justice, www.ejatlas.org) we have gathered 2850 documented cases of environmental conflict as of July 2019. The cases in the EJAtlas are only a sample of a broader, unknown number of environmental conflicts happening in the world. About 12 per cent of those involve mortal victims and the number of murdered environmental defenders has quadrupled in a decade. While indigenous peoples are only 5% of the world population, they represent 15% of the world’s poorest people and even more striking: they are involved in 40% of all environmental conflicts globally. But the push for growth of Gross Domestic Product (GDP) is coming not only at their expense. Study after study shows that on average, the poor, people of colour and indigenous peoples live closer to extraction sites, highly polluted areas, flood-prone areas and other risky or degraded sites. GDP growth already leads to unequally distributed extra environmental harm which in turn deepens existing social inequalities. It should not come as a surprise that at the HLPF, experts agreed that we are far off track to address inequalities, which is SDG 10. They are also rising, instead of declining. No less than 56 people contributed to a state of the art report exposing the failure to deal with this crisis in ‘Falling through the cracks. Exposing inequalities in the EU and beyond.’ The UN bubble vs. the real world At the UN’s 2019 High Level Political Forum in New York, the annual review of the progress on achieving the SDGs, the one refrain issued by almost all delegates from all governments who spoke in the review of SDG 8 was: “we need more economic growth”. Delegates from Israel and Switzerland were priding themselves on their growth rates and even the delegates from countries like Sweden and Costa Rica only talked about sustainable or decoupled growth, not postgrowth or degrowth. Greenhouse gas emissions will continue to rise together with economic growth, no matter what the adjective is that politicians put before it, depending on what’s in vogue. Even remaining at the present level would imply a continued carnage at the “commodity extraction frontier” until so little is left that eternal warfare and collapse are inevitable. Anyone who has studied our planet and is intellectually honest knows that there is only one way to prevent a total collapse of both our life support systems and our civilisation: a socially just, well organised degrowth of the global economy.
<urn:uuid:d8441e3c-d6c4-4e5f-8b57-81da8e2165af>
CC-MAIN-2022-33
https://www.alternet.org/2019/07/theres-a-fatal-flaw-in-the-plan-to-end-poverty-and-save-the-planet/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.944835
1,640
3.140625
3
Mesa County must replace its election machines following a data breach, the Colorado secretary of state ordered on Thursday. According to the order, Mesa County election officials must replace 41 voting machines after an investigation revealed that software passwords were taken by a non-employee and posted on social media. The replacement must be completed by August. Secretary of State Jena Griswold said that the breach occurred during a limited access trusted build installation in Mesa County on May 25. This process is a routine update to election systems. All attendees must take a background check, Griswold added. The breach did not impact the results of any elections, and there is no reason to believe it impacted any other counties, she continued. Griswold said that Mesa County District Attorney Daniel Rubenstein is leading a criminal investigation into the matter. Mesa County Clerk Tina Peters is accused of actively working to undermine election integrity and aiding the individual who took the passwords. “The video surveillance from the trusted build is not continuous and cannot confirm the chain of custody,” Griswold said during a press conference. “This is inconsistent with my office’s understanding of the normal course of business in Mesa County.” Griswold’s office on Monday called on Peters to turn over records and other relevant material showing that the passwords were in the proper chain of custody at all times. Peters’ office did not immediately respond, prompting Griswold’s office to send investigators to Mesa County to collect the records. During the investigation, Griswold said the agents discovered that Mesa County’s surveillance system had been turned off ahead of the May 25 installation. Griswold said her office will “continue to provide support to Mesa County so they can provide a safe, and secure election for their citizens.” This article was originally posted on Colorado SOS orders Mesa County to replace election machines after data breach
<urn:uuid:85243fb3-4009-4da6-b48f-0c494a4474ba>
CC-MAIN-2022-33
https://www.americandailyrecord.com/colorado-sos-orders-mesa-county-to-replace-election-machines-after-data-breach/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00673.warc.gz
en
0.956369
405
1.5
2
MATHEMATICS & SCIENCE SCORES – GLOBAL U.S. RANKING Students in the U.S. fall behind those in China, Europe, and Canada in math and science. A global comparison of Program for International Student Assessment (PISA) scores from 2015 shows the average score for the U.S. was lower than that of many other countries for both math and science. While the average science literacy score of 496 was somewhat better than the average score of 470 for the PISA Math assessment, the overall U.S. scores were well below those of top performers like Singapore, Japan, and China* (see GRAPH 3.14). With the scientists and engineers of tomorrow currently in school, the U.S. needs to strengthen its education system to support the development of domestic science and engineering talent The United States is lagging in the output of bachelor’s degrees in science and engineering fields. The U.S. continues to trail the top eight countries in the E.U., as measured by the total number of bachelor’s degrees in science and engineering (S&E) awarded since 2000, and has also been eclipsed by China. China’s output of S&E bachelor’s degrees has increased by over 360 percent since 2000.
<urn:uuid:d0ae4f6b-bfae-45f6-b8d9-6636c1fed4b0>
CC-MAIN-2022-33
https://politicalreportcards.com/doubting-science/mathematics-science-scores-global-u-s-ranking/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.961133
270
2.84375
3
The COVID-19 crisis has fundamentally impacted travel, both domestically and internationally in unprecedented ways. In early 2021, commercial flights worldwide are at half of the pre-pandemic levels, according to the OAG Aviation Worldwide. Passenger volumes are not expected to return to 2019 levels until 2024, with domestic markets recovering faster than international. When we look specifically at business travel, we are starting to see increases in activity in our clients’ travel behaviours (monitored in our Tracker tool). Global domestic travel volumes in March 2021 have risen to approximately a fifth of their pre-pandemic levels. International arrivals have shown increases in certain locations too. For example, business trips to Qatar in 2021 are already at 20% of their pre-pandemic levels. Travel has also become undoubtedly more complicated – in Europe alone, we have seen in eight-fold increase in the number of cases per 100 trips1. Where travellers and their managers commonly seek our advice to help navigate the complexity of country restrictions and, of course, managing the threats of the disease itself. Airlines and passengers need to take all the preventive measures for any necessary travel plans to adapt to the situation. Although many airlines were reducing the capability onboard or blocking the middle seat at early stages of the pandemic, most of the them have now abandoned this and are utilising other preventive measures. Although no universal agreement has been made on vaccine health passports, the world's first 'COVID-19 passports' are being launched to enable people to travel without having to quarantine. Passengers will voluntarily upload their COVID-19 test results from a validated laboratory onto a digital health pass, such as the AOKPass, up to 72 hours before departure. Airlines and border officials will be able to scan the digital data to confirm that passengers are free of the virus, allowing them to reduce quarantine time. The goal is to create a standardised global testing system in which governments and airlines can trust passengers' results because they are from reputable laboratories and on a recognised health passport. Additionally, people may voluntarily sign up to a service that tracks their movements via their phone, alerting them if they had been close to known infected people or disease hot spots. This type of advanced digital contact tracing could become a requirement to enter large venues, buildings, airports or public transport hubs. There has been a reluctance in Europe to download contact tracing apps and citizens are concerned that tracing their movements will affect personal privacy. However, if access to flights and entertainment venues is restricted to those who have downloaded the relevant app, there will be an incentive to comply. Some countries are worried that this might stigmatize and discriminate certain groups. We expect that privacy protections will be built into the apps and communicated as part of the promotion campaigns. Until 1996 it wasn’t necessary to present identification when flying, and travellers often flew under each other’s names for frequent flyer programmes. Prior to 9/11 airport screening was very lax and inconsistent. We quickly adjusted to presenting our ID’s, taking off our shoes and keeping our boarding passes on our phones. Similarly, we believe behaviour patterns (including the adoption of AOKPass or usage of contact tracing apps) could change. Travel infrastructure will also evolve to adapt to the situation as crowded and poorly ventilated spaces are increasingly recognised as posing a risk of contagion. New facilities will be built and older facilities will likely be gradually retrofitted with better ventilation and air-disinfection systems. Our experts’ predictions: - Domestic travel in China has been doing extremely well. They are leading the recovery and have already recovered to pre-crisis levels. - We are hopeful that the vaccination rollout will allow for greater travel during the western-hemisphere's summer. The US will likely have a fairly good season should the numbers continue in the direction they are in. - Globally, as explored in our Risk Outlook, the pandemic will continue to exacerbate security issues driven by economic turbulence, fuelling protests, crime, and geopolitical tensions, amongst others. Systemic issues, around the proliferation of mis and disinformation – again heightened during and as a result of the pandemic – will also fuel societal tensions, and a variety of negative security trends, which may impact travel and require mitigation. - In Europe, leisure and low-cost airlines are hoping to see a boost. Travel search sites showed a boost in searches when the vaccine started getting deployed, but lock downs and border restrictions continue. - Companies will need to keep in mind that to travel out of the country their workforce will likely still need proof of a negative COVID-19 test or to quarantine for some time. Eventually they will likely need proof of a vaccination. This requirement is not going away anytime soon. Our experts’ top recommendations 1. Remain informed The pandemic has impacted the security, medical and global logistical environments severely. As the pandemic and its second and third order consequences impact on locations’ underlying security dynamics, for example, they may give rise to situations that require enhanced evacuation, or relocation, for which enhanced preparedness is key. Logistically, in these constantly changing times, it is crucial to remain well informed of the latest restrictions, regulations and travel requirements. Even within the same country, regulations can change from one region to another and can impact your workforce’s domestic travels significantly. Make sure you access and communicate reliable and up-to-date security intelligence and analysis, in addition to logistical information to your people for them to comply with local regulations. On-the-ground experts are often best placed to provide with real-time and actionable intelligence for your workforce to access accurate and timely information and get fully prepared. 2. Educate your people for safe travels Before any travel, an organisation should assess the medical, security and logistical situation in the destination country and ensure that, based on profile and itinerary-specific threats, an appropriate risk assessment is carried out. This likely vary based on both traveller profile and destination country, factoring in the ambient security and medical threats, for example. More broadly, we recommend to only maintain essential travel where all the preventive measures should be adopted including regular hand washing or sanitizing, maintained social distancing as much as possible and wearing masks. Ensure your workforce is aware of the specific local requirements on masks, social distancing, potential security threats and the local COVID-19 situation. They must also be familiar with the associated travel restrictions (quarantine requirements, screening at the airports and other procedures) both at their destination and home country. When flying, we also suggest sitting in the front of the aircraft and boarding last if possible. The reason is while an aircraft cabin has air filtration systems, those systems are not running while parked at the gate during boarding and disembarking. Last on first off is a good rule to follow. 3. Mitigate the risks From implementing a new travel policy to building a COVID-19 vaccination programme, your return-to-travel journey can be a complex process to put in place where every step has to be thought through strategically. Ensure to capture all the elements with a comprehensive and integrated approach, considering both health and security risks. - International SOS Assistance Centre Case Data
<urn:uuid:3fba57b3-fdbb-4db8-bd0e-c865338f2f0f>
CC-MAIN-2022-33
https://www.internationalsos.com/magazine/navigating-through-the-new-travel-environment
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.956262
1,473
1.96875
2
Srinagar- Jammu & Kashmir has registered a noted improvement in the implementation of innovative projects in the last two years. It was revealed by a latest report by NITI Aayog—Government of India’s apex public policy think-tank—and the Institute for competitiveness. As per the report, J&K has achieved 12.83 score in the India Innovation Index (III). Out of the nine UTs, J&K ranks 6 in the “UT and City states” category of III, the report adds. While Chandigarh is the best performer with a score of 27.88, J&K’s overall indicators have substantially improved. Karnataka has retained the top spot in the ‘Major States’ category, followed by Telangana and Haryana. Pertinently, this is the third edition of the report which presents an evaluation of the innovation readiness of states and UTs and highlights potential challenges that deter the government, businesses and individuals from fully realizing their potential. The number of indicators has also increased from 36 in III-2020, to 66 in III-2021. “Innovation is critical in promoting the country’s resilience and self-reliance,” said Neeraj Sinha, NITI Aayog senior adviser. “The index points to the decentralization of innovation across all Indian states.” As per III-2019 report, J&K’s overall score was 11.07, which saw a considerable increase in 2020 and 2021. In 2019, J&K’s score in the Enabler category was 16.45 and in 2020, the score increased to 26.83. As per Niti Aayog, J&K’s score in Enabler category was 17.35 in 2021. The data also suggests that in 2019, in the performance category, J&K’s score was 5.68 and in 2020, the score increased to 10.41. In 2021, the score was recorded at 8.30. The latest report further added that J&K’s ‘Distance to Frontier’ (DTF) score has improved by 8.84 in 2021. “J&K alongwith Pondicherry and Lakshadweep could not push the bar upwards since their performance increased marginally over the previous year and was largely restricted to the human capital pillar,” the report observed. “Although these UTs have their own start-up and innovation polices like Aspiring Pondicherry-Innovation & Start-up Policy 2019, J&K Start-up Policy 2018, these UTs need to pedal faster to match the growth of other UTs and not let their climatic or geographical factors hamper their growth.” J&K’s efficiency ratio, the report notes, was recorded to be 0.478 and GSDP per capita (2019-20) was Rs 85219. Further, in 2021, J&K’s Human Capital was 22.70, Investment 5.7, Knowledge Workers 5.82, Business Environment 24.21, Safety and Legal Environment 28.28, Knowledge Diffusion 4.66 and Knowledge Output 11.94. “The index also draws some international parallels, which will add to India’s learning and how we can be on a par with our counterparts,” Dr. Amit Kapoor, Chairman Institute for Competitiveness said. Pertinently, in school education category, J&K’s total Percentage of school functional computer facility is 23.68, NAS scores 31.60, Expenditure on school education as a % of GSDP 6.92, NER in school education 74.20, Accolades in STEM Activities/ 1000 Students 10.36, Pupil-Teacher ratio: Primary & Secondary 12, Percentage of schools having ATL labs 0.16 and Secondary school level completion rate 90. However, to conclude, the report asserted that the scores and rankings are not directly comparable from one year to another. “Several factors affect the scores each year. A missing value for one state affects the index score of other states/UTs. It’s affected by missing values, reference year, normalization factor and consistent data collection,” reads the report. In this backdrop, distance to frontier becomes a useful tool to assess improvement in states over the next iterations of the report, it added. Be Part of Quality Journalism Quality journalism takes a lot of time, money and hard work to produce and despite all the hardships we still do it. Our reporters and editors are working overtime in Kashmir and beyond to cover what you care about, break big stories, and expose injustices that can change lives. Today more people are reading Kashmir Observer than ever, but only a handful are paying while advertising revenues are falling fast.
<urn:uuid:c8adaedf-7ea2-4a5c-9882-82c61d6844b4>
CC-MAIN-2022-33
https://kashmirobserver.net/2022/08/06/despite-pandemic-jks-innovative-index-improved-in-last-two-years/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.938132
1,066
1.65625
2
Table of Contents The difficulties and challenges of rapid digital growth, cloud adoption, and sprawling public internet space create a bonanza of opportunities for attackers. Organizations are unable to accurately identify their rapidly changing attack surface and vulnerabilities. Compounding this problem is the lack of visibility into the risks presented by the dynamic nature of the attack surface. In response, attack surface management (ASM) provides value through continuous discovery and insight into an organization’s attack surface. Before going further, it is important to define a few key concepts that allow us to better understand ASM. The “attack surface” includes all of your public-facing services, APIs, applications, IPs, domains, certificates, and infrastructure regardless of the host type (VM, container, bare metal) or location (on-premises or cloud). ASM takes the attack surface (“AS”) and builds a proper management process (“M”) around it. This includes automated asset discovery and tracking of asset details. Adding this “M” to the “AS” gives us ASM. An organization’s attack surface is a dynamic object. It can change daily, if not more often. Tracking these changes in an automated fashion is key for an ASM solution. But simply knowing the entirety and composition of the attack surface is not sufficient. Enumerating the types of assets in your attack surface and the severity of those risks, then helping teams prioritize and remediate those risks efficiently, rounds out the value proposition that an ASM solution creates. How to Read this Report This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports: Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions. GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector. Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product. 2. Market Categories and Deployment Types For a better understanding of the market and vendor positioning (Table 1), we assess how well solutions for ASM are positioned to serve specific market segments. - Small enterprise: In this category, we assess solutions on their ability to meet the needs of organizations ranging from small businesses to medium-sized companies. Solutions in this category will provide simplified cost structures that make ASM achievable for small security budgets. - Mid-market and large enterprise: Here, offerings are assessed on their ability to support large and business-critical projects. Optimal solutions in this category will have a strong focus on flexibility, performance, data services, and features that improve security and data protection. Scalability is another big differentiator, as is the ability to deploy the same service in different environments. In addition, we recognize just one deployment model for solutions in this report: cloud-only. - Cloud-only solutions: Available only in the cloud. Often designed, deployed, and managed by the service provider, they are available only from that specific provider. Because the data collected during ASM operations is taken entirely from the attacker’s perspective, ASM solutions do not have an on-premises, private cloud, or other required component. Table 1. Vendor Positioning |Small Enterprise||Mid-Market and Large Enterprise||Cloud-Only Solutions| |Palo Alto Networks| |Exceptional: Outstanding focus and execution| |Capable: Good but with room for improvement| |Limited: Lacking in execution and use cases| |Not applicable or absent| 3. Key Criteria Comparison Building on the findings from the GigaOm report, “Key Criteria for Evaluating ASM,” Table 2 summarizes how each vendor included in this research performs in the areas that we consider differentiating and critical in this sector. Table 3 follows this summary with insight into each product’s evaluation metrics—the top-line characteristics that define the impact each of them will have on the organization. The objective is to give the reader a snapshot of the technical capabilities of available solutions, define the perimeter of the market landscape, and gauge the potential impact on the business. Table 2. Key Criteria Comparison |Flexible Asset Discovery||Active Assessment||False Positive Management||Investigation Functionality||Risk Scoring||Asset Categorization| |Palo Alto Networks| |Exceptional: Outstanding focus and execution| |Capable: Good but with room for improvement| |Limited: Lacking in execution and use cases| |Not applicable or absent| Table 3. Evaluation Metrics Comparison |Extensibility||Frequency of Discovery||Licensing||User Experience| |Palo Alto Networks| |Exceptional: Outstanding focus and execution| |Capable: Good but with room for improvement| |Limited: Lacking in execution and use cases| |Not applicable or absent| By combining the information provided in the tables above, the reader can develop a clear understanding of the technical solutions available in the market. 4. GigaOm Radar This report synthesizes the analysis of key criteria and their impact on evaluation metrics to inform the GigaOm Radar graphic in Figure 1. The resulting chart is a forward-looking perspective on all the vendors in this report, based on their products’ technical capabilities and feature sets. The GigaOm Radar plots vendor solutions across a series of concentric rings, with those set closer to the center judged to be of higher overall value. The chart characterizes each vendor on two axes–Maturity versus Innovation, and Feature Play versus Platform Play–while providing an arrow that projects each solution’s evolution over the next 12 to 18 months. Figure 1. GigaOm Radar for Attack Surface Management As you can see in the Radar chart in Figure 1, the space is dominated by feature players, or vendors that are primarily focused on delivering ASM solutions. There are two vendors, BishopFox and Cyberint, that offer the ASM capabilities as part of a larger solution portfolio that aims to provide a comprehensive set of solutions to address the various risks created by public internet exposures. Focusing on the mature feature players, we can see many top vendors in this quadrant, including Censys, ImmuniWeb, Palo Alto Networks (formerly Expanse), and RiskIQ. ImmuniWeb delivers its ASM solution via a simple interface with a simple licensing model based on a per-organization cost. This simplicity most likely will be attractive to smaller teams or smaller business units because of the ease with which the solution can be acquired and managed. Censys is another pure ASM player with a mature delivery of service. Leveraging its bespoke discovery capabilities, paired with a per-asset license type, Censys offers benefits for organizations that value integration and interoperability. Moving closer to the center, Palo Alto Network’s acquisition of Expanse has developed quickly (and continues to develop) into a solution that recognizes the attack surface doesn’t end at the perimeter, and so it offers the ability to gather data from inside the perimeter as well. RiskIQ, acquired by Microsoft in mid-2021, is a strong ASM solution that we expect will be integrated into Microsoft’s larger portfolio of service offerings in the coming months. Dropping down into the Innovation Feature quadrant, we have two vendors: LookingGlass (formerly AlphaWave) and CyCognito. Innovation through acquisition has been a powerful force in this field as of late, demonstrated again by AlphaWave recently being acquired by LookingGlass Cyber Solutions. This acquisition will pave the way for the integration of LookingGlass threat feeds into the former AlphaWave ASM solution, rebranded as LookingGlass scoutINSPECT, in the coming months. CyCognito helps organizations answer the question of “What do I do with ASM data to improve my security posture?” It answers this question by automatically combining attack surface insights, business context, and threat intelligence to prioritize the vulnerabilities and security issues that must be fixed first based on what is likely to be exploited. Moving into the Innovation Platform quadrant, FireCompass takes an alternative approach and leverages thousands of playbooks that can be used during all phases of the attack surface management process, from validation of findings to thorough analyses of risks. In addition to this, FireCompass offers other solutions that can integrate into their ASM to assist risk reduction efforts. Inside the GigaOm Radar The GigaOm Radar weighs each vendor’s execution, roadmap, and ability to innovate to plot solutions along two axes, each set as opposing pairs. On the Y axis, Maturity recognizes solution stability, strength of ecosystem, and a conservative stance, while Innovation highlights technical innovation and a more aggressive approach. On the X axis, Feature Play connotes a narrow focus on niche or cutting-edge functionality, while Platform Play displays a broader platform focus and commitment to a comprehensive feature set. The closer to center a solution sits, the better its execution and value, with top performers occupying the inner Leaders circle. The centermost circle is almost always empty, reserved for highly mature and consolidated markets that lack space for further innovation. The GigaOm Radar offers a forward-looking assessment, plotting the current and projected position of each solution over a 12- to 18-month window. Arrows indicate travel based on strategy and pace of innovation, with vendors designated as Forward Movers, Fast Movers, or Outperformers based on their rate of progression. Note that the Radar excludes vendor market share as a metric. The focus is on forward-looking analysis that emphasizes the value of innovation and differentiation over incumbent market position. 5. Vendor Insights Founded in 2005, US-based Bishop Fox spent most of its existence providing security services to a large portion of the Fortune 100. In 2018 Bishop Fox raised $25 million to develop its Cosmos platform, an offensive set of security solutions sold as a single, homogeneous platform. To comprehend how Bishop Fox’s solution differs from competitors, it’s essential to understand the table stakes fully. The Cosmos solution demonstrates excellence in its ability to discover a diverse set of assets in your attack surface continuously. Additionally, Cosmos can inventory and provide attribution for your attack surface assets. Finally, because Cosmos blends human-driven analyses of discovery results with AI components such as machine learning (ML), the quantity of false-positive results is effectively zero (in practice, they claim to have delivered zero false positives to clients). Diving deeper into the Cosmos solution and analyzing the key criteria for the ASM platforms (as defined in the GigaOm Key Criteria report for ASM), we find great flexibility involving the discovery engine’s ability to identify various assets. As mentioned previously, false positives are rare, but should a false positive make it to you, Bishop Fox provides remediation through your account’s service delivery manager. Cosmos sets itself apart from the competition through its high-touch delivery methodology. For instance, while most ASM vendors have a human-in-the-loop for the discovery phase of the ASM solution, Cosmos has the human element in the discovery phase, the assessment of risk phase, and the remediation planning phases. For example, as risks are identified, a member of its adversarial operations team will attempt to leverage the vulnerability (or misconfiguration) to provide the most accurate assessment of the risk presented. Once the risk has been identified and actively assessed, the Cosmos solution provides a step-by-step remediation plan and direct access to the adversarial operations team so that clients can facilitate timely remediation. While the Cosmos platform provides accurate attribution of assets to asset-owners, which reduces the amount of manual effort for the client, it does not include additional investigation functionality beyond that. Asset categorization, or grouping assets together, is not yet available but is due in 2022. This missing feature could be problematic for organizations that need to bundle assets together for various business reasons. The Cosmos platform is API-first, meaning everything that can be performed or collected through the GUI can be achieved by leveraging the API. The RESTful API is fully documented and provided to the public, which will facilitate integration into various third parties. Depending on the asset type, discovery is performed monthly, weekly, or daily. For instance, domains, which typically don’t change often, are discovered monthly; while ephemeral assets, like open ports, change frequently and are discovered daily. Regarding licensing, the Cosmos platform is priced relative to the size of your attack surface. If your surface is of unknown size, Bishop Fox is able to perform a brief discovery to provide numbers used in the sales conversation. Finally, if you’re considering the Cosmos platform, it’s important to remember that it’s a bundled service (not just ASM). If your organization needs assistance verifying risks and creating remediation plans, this service will provide great value. On the other hand, if these are steps that you would prefer to leave in-house, the Cosmos platform is sold in a tiered model where an organization can select the capabilities they desire. Strengths: Strong discovery capabilities. “Human-in-the-loop” provides expert insights during critical stages of ASM. Active and passive assessment capabilities. Challenges: Minimal features that support in-depth investigation inside of the platform. Lacks asset categorization, making management of very large asset pools potentially burdensome. Censys, founded in Ann Arbor, Michigan, in 2017, initially launched with service reminiscent of Shodan. It perpetually scanned the internet, identifying assets, services, and SSL connections. Shortly after launch, Censys found the optimum use case for its technology: attack surface management. The Censys ASM solution delivers a very comprehensive, robust discovery capability. The discovery algorithm that searches the internet is completely automated from beginning to end, which is a departure from some other vendors in this space that integrate a human-in-the-loop during some aspect of the discovery process. Regardless, the output of the Censys discovery process has extremely low false positives and yet is very thorough. Censys defines anything that could present or create a risk to an organization as an asset. This universe includes common objects like servers, load balancers, applications, and services, and some less common things like login screens and S3 buckets. Because of this definition, Censys can provide a more granular risk assessment. This granularity plays into its risk scoring method, which leverages default severity rankings (like High or Critical) that can be customized by users if desired. While this is a good feature, some other vendors in this space are able to integrate meta-data or contextual information that provides an even clearer picture of the risk, thus allowing for easier prioritization of work. However, the information given to practitioners when reviewing risks is an important benefit. While some vendors state a risk and assign priority, Censys ventures to provide remediation steps (both primary and secondary) for every risk found in your attack surface. This practical guidance offers a dramatic reduction in time-to-remediate. Regarding false positive management, Censys goes to extraordinary lengths to ensure false positivity rates are kept low. For example, before a new feature is added to the ASM solution, Censys performs thorough tests, measuring the feature’s impact on the false positive rate. If clients find a false positive, they can remove it from the portal or API, where it’s still tracked but not included in reporting or visuals. Regarding investigation capabilities, Censys enables enterprise customers to offload the tracking of investigative actions to a service desk, either through an out-of-the-box integration or a custom integration using its API, and work within the portal to accommodate teams of any size. Censys finds that users prefer to work in their portal while investigating risks because the depth and quality of data found in the portal accelerate investigation times. Strengths: Possibly the highest quality discovery capability, easily understood asset attribution, and very low false-positive rate. Additionally, it provides a good value, is highly extensible with a fully documented API, and offers some out-of-the-box integrations. Challenges: Lacks active assessment capabilities, offers minimal investigation functionality, and risk scoring doesn’t integrate context or other data to prioritize risks. Cyberint, founded in Israel in 2010, delivers the Argos Edge platform, which is its flagship service. Argos Edge, the ASM solution, is integrated with its other services, like social media monitoring, which could create the opportunity to grow beyond typical ASM scenarios and into the digital reputation protection (DRP) arena. Argos Edge provides discovery like most other vendors in this space. A single piece of organizational data (like your organization’s primary URL) is provided to Cyberint, and it starts the discovery process. While some vendors leverage an industry-standard discovery infrastructure like Shodan, Cyberint has developed its own discovery infrastructure (named Porto Certo), which performs scans more frequently. This frequent scanning, in turn, offers greater detail about your organization’s often-changing attack surface. As mentioned previously, the availability of other services from Cyberint makes it possible to integrate data sources into your ASM, which provides a level of DRP other ASM vendors cannot provide. However, expansion of data sources for DRP can grow quickly beyond the scope of ASM, and for that reason, won’t be reviewed in this report. While Argos Edge performs frequent, thorough discovery of an organization’s internet and cloud assets, a key consideration when selecting an ASM vendor is the completeness of the solution. One aspect of a comprehensive solution is the inclusion of active assessments. Active assessments provide the greatest level of certainty when determining the risk presented by an issue. Argos Edge performs passive assessments and offers active assessments through its professional services organization (for an additional fee). False positives are managed effectively by AI during the discovery phase, which results in a simplified onboarding process for clients. As with any vendor, though, false positives are possible and should be sought out. Asset categorization is another crucial component of ASM solutions; this feature reduces the administrative burden by logically grouping assets. This feature could, for example, be used to separate administrative workloads into appropriate teams and enable more granular tracking of compliance to security processes within an organization. Cyberint deviates from the norm in the way it licenses its product. While it’s common to sell ASM solutions based on either a flat fee per organization or per the number of assets, Cyberint offers clients the opportunity to exclude specific assets from the licensing. This option could be useful for large organizations, wherein each team or department is responsible for its own security operations and budget. The ability to determine the scope of the ASM practice is a feature not found in other solutions. Finally, let’s consider this solution’s UX and extensibility. Cyberint has focused on providing a simplified user experience for Argos Edge solution operators. This focus has been carried through from the initial setup to the ongoing management, and it prioritizes simplicity. Additionally, the solution offers numerous integrations with SIEM/SOAR, the details of which can be found on their website. Strengths: Simplified user experience, AI-managed false-positive enumeration, and licensing can be adjusted to match the scope of the ASM process. Challenges: Lacks active assessment capabilities, no method to categorize or group assets together, and modest extensibility. CyCognito, with roots in the famed Israeli IDF 8200 (cyber operations) unit, was founded in 2017 in Palo Alto, California. Starting with a seed round of funding in 2018, CyCognito has experienced rapid growth and today is a company of 160 employees spread around the globe. Unknown or under-managed assets on the internet are a common vector for attackers to use to gain entry into an organization, so the CyCognito platform approaches the challenges created by ASM the same way an attacker approaches your organization. Starting with a piece of seed data about your organization, CyCognito leverages ML, specifically graph data models, to discover the AS rapidly. In a divergence from the standard discovery phase, CyCognito grants its clients the ability to influence the discovery logic to fine-tune the discovery process. This tweaking by the client is necessary because the discovery phase of ASM determines the scope of work for all tasks that follow. During the discovery phase, an orchestrated network of testing bots surveys the attack surface to discover CVEs, zero-days, and misconfigurations. This data is then fed into another automated process that they call the prioritization engine. This approach results in a very low false positivity rate, as well as contextual prioritization based on the discoverability and attractiveness of an asset and exploitability of the vulnerability. CyCognito has focused heavily on the development of automating processes, while other vendors have looked for opportunities to blend in the human element wherever possible. For CyCognito, automation resulted in a platform that can rapidly discover inventory and assess the attack surface. This acceleration continues into the assessment phase of the ASM solution. While leveraging both passive and active assessment methods, the CyCognito platform assesses all issues to determine the level of risk presented more accurately. This process includes passive methods, such as TCP fingerprinting, and active methods, such as launching a script via Metasploit to emulate attacker behavior. Investigation functionality inside the CyCognito solution is adequate but should not be used as a standalone case management solution. Instead, integrations should be established with your organization’s service desk or ticketing platforms using the RESTful API. An important factor for API and extensibility is the number of third parties with whom CyCognito can interact. This platform can integrate easily into most organizations’ existing processes, with major vendor integrations spanning the collaboration, security operations, SIEM and SOAR, GRC, vulnerability scanner, and ITSM space. Lastly, let’s touch on licensing. This solution is packaged into different capability tiers, each tier providing more extensive testing and analysis capabilities aligned with the maturity of an organization’s attack surface management strategy. If your organization wants to get started in ASM, then the ability to select a basic feature set with a lower cost will appeal to you. A key capability tied to licensing is the frequency of discovery. Higher frequency discoveries are found in the higher cost tiers. Unless you are transitioning from another ASM vendor, it’s unlikely you will know how large your AS is. For this reason, CyCognito will run a basic discovery to ascertain the size of your AS for the sales discussion. Strengths: The heavily automated solution results in rapid results, offers active and passive assessment capabilities (including leveraging Metasploit), and tiered licensing makes it easy to try ASM. Challenges: Investigation capability is basic. Discovery frequency isn’t adjustable and is tied to license type. FireCompass was founded in 2019. It’s a software as a service (SaaS) platform for continuous automated red teaming (CART) and ASM. A core tenet of the Firecompass ASM solution is continuous discovery and testing. Starting with a single piece of information about an organization, Firecompass uses its scanning infrastructure to discover an organization’s AS continuously. It leverages common sources such as the internet and OSINT sources from the deep web and dark web. But the discovery process can introduce false positives if not managed appropriately. To this end, Firecompass leverages playbooks to identify and remove false positives during its discovery process. The playbooks number in the thousands, and if a particular playbook does not exist, operators of the ASM solution can create their own. Before moving further into the analysis of this ASM solution, it’s important to point out that Firecompass offers a separate platform for CART that’s very tightly integrated with the ASM solution. If purchased, the CART solution enables true attacker behavior emulation and multi-stage attack emulation. The results of these attacks are then used by the ASM solution to further enhance the ASM process. Alone, the ASM solution provides both passive and active assessment capabilities. Advanced active assessment and attacker emulation is available only in the CART solution. While Firecompass has focused on building out its extensive library of playbooks and the CART integration, the risk scoring capabilities of the solution subscribe to standard methods. For example, if a risk (vulnerability) has a CVSS score associated with it, the score will determine the criticality label assigned in the ASM solution. The primary drawback with this approach is that context isn’t integrated into the risk score, thereby shifting the onus to a human analyst to make decisions. Additionally, if built-in investigation capabilities are a must-have for your organization, the Firecompass solution may not be the best choice because the investigation features are basic. Firecompass provides out-of-the-box integrations with other tech stacks like vulnerability scanners, AWS, and Azure. For integrations that don’t yet have an out-of-the-box solution, the Firecompass API is fully documented to meet those requirements. This documentation demonstrates moderate to advanced levels of extensibility. The solution is sold by asset count, a common licensing model in the ASM space. Finally, a novel function that’s not found with other vendors, but solves a common challenge, is how Firecompass integrates with threat intelligence feeds. Threat intelligence is a critical component of an organization’s security program; however, most threat feeds are consumed manually, or integrations are left up to vendors to figure out how to use them best. Firecompass offers the ability to integrate threat feeds into its playbooks, then the playbooks that impact your assets are selected and run automatically. This approach, in turn, delivers a timely and accurate assessment of organizational risk found in the AS by leveraging up-to-date threat intelligence. Strengths: ASM with available CART provides a complete solution, provides native integration with AWS and Azure, threat intel feeds are integrated with playbooks, and the API is well-documented for rapid integration. Challenges: Lacks built-in investigation features and risk scoring follows CVSS scoring, which can slow identification of critical risks. ImmuniWeb, based in Geneva, Switzerland, is an application security service provider that offers a suite of services focused on securing the internet-facing components of your organization. The ImmuniWeb Discovery is a SaaS that delivers the ASM solution. Discovery is a part of the ImmuniWeb AI Platform, where all work is performed, and the operator portal is accessed. The solution offers an effortless setup; all that is needed is your organization’s name. The rest is handled by the ImmuniWeb ML algorithm, with assistance from its team of security analysts as needed. The initial setup and discovery are not instantaneous as it does take a few days for your dashboard to become available in your portal. It’s important to understand that the discovery portion of this service is performed in the same manner an attacker would discover your internet assets. The solution leverages multiple open-source intelligence tools (OSINT) and data from the dark web to build a comprehensive view of your organization’s internet-facing assets. ImmuniWeb Discovery does not leverage network-scanning (like NMAP) or fuzzing of services to gather information, which provides a level of safety in your production applications and services. The solution offers comprehensive asset discovery capabilities, including discovering assets hosted on-premises and across infrastructure as a service (IaaS), platform as a service (PaaS), and SaaS. This includes the unique ability to discover data in locations like Github, Docker hub, CVS, and so forth. Because of how asset discovery is performed, it achieves a low false-positive rate. Additionally, assets can be grouped based on custom criteria by the operator of the solution. For example, groups can be created according to compliance requirements (GDPR, for example) or responsible business units. A key differentiating factor is the “Incidents” tab in the ImmuniWeb portal, culminating all traces of attacker behavior found in OSINT and dark web sources. This tab is where an organization will find leaked usernames, emails, passwords, and indicators of previous compromises within the organization’s assets. The ability to track and manage investigations inside the solution is lacking, so organizations need to identify how the event data from ImmuniWeb integrates into their incident response and/or other security processes. Additionally, because ImmuniWeb Discovery opts to use non-intrusive discovery methods, there is no active assessment capability delivered. Active assessments can be a useful feature that helps validate security findings, and without it, manual assessment will be needed. A final note on ImmuniWeb Discovery concerns its pricing model. Each organization has unlimited asset tracking and discovery capability for a flat monthly price of $2000 USD. ImmuniWeb clients have unlimited access to its security analysts to assist with findings in the Discovery platform. Strengths: Very simple setup, robust discovery, and an uncomplicated pricing model. Challenges: Lacks active assessment capabilities and integrated investigation management features. LookingGlass Cyber Solutions Founded in 2019 in the United States, AlphaWave ASM was acquired by LookingGlass Cyber Solutions during the summer of 2021. LookingGlass is a threat intelligence vendor that produces unique threat intelligence sources, which will provide an interesting mashup of technology once both platforms are fully integrated. This integration is slated for production release in Q3 2022, so for the time being, the solution rebranded as scoutINSPECT will continue to function in much the same way it has pre-acquisition. Starting with discovery capabilities, scoutINSPECT performs its discovery similarly to other ASM solutions. Starting with just your organization’s name or URL, they leverage ML and human analysis to sift through open sources of intelligence and passive reconnaissance data to map out the attack surface. Of note is the depth to which scoutINSPECT goes to discover web services. They tend to go a layer deeper into the webstacks than other ASM vendors do. scoutINSPECT also offers a unique capability in the discovery phase. Simple integration with AWS (and soon Azure and GCP), enables it to map external assets to AWS assets. This feature greatly reduces the manual effort required to identify internet-facing assets with vulnerabilities. Building on this idea, LookingGlass has indicated that additional third-party integrations designed to add more context for each asset will be added soon. LookingGlass concludes that the best information about your attack surface will be found in your existing tooling, such as cloud providers, DevOps platforms, and so forth. Once discovery is complete, assets are inventoried, and available contextual information is added automatically. At this stage, some vendors offer the ability to assess identified risks actively, leveraging either a human or automation to perform penetration test-like analyses of risks. LookingGlass does not offer this capability but indicates this feature will be available in the future. scoutINSPECT currently provides a useful feature by which a link to a specific asset and issue can be shared with users outside of the platform via a read-only link. This feature can be very handy when coordinating remediation efforts with other business units, teams, or other organizations. Pricing follows a flat fee model with a few variables, including the frequency of scans, retention period for data, and the number of integrations you desire. This pricing structure is predictable and suits most organizations because it won’t grow as your attack surface grows. Instead, it will increase only as your organization’s ability to use more advanced features comes online. Strengths: Complete discovery capabilities, with emphasis on web stacks. AWS integration creates the most complete picture of ASM. Future LookingGlass intelligence integrations will enhance capabilities. Challenges: No active vulnerability assessment methods, passive only. Asset categorization capabilities are basic. Palo Alto Networks Palo Alto Networks’s acquisition of Expanse, completed in December 2020, marked the moment it expanded its robust lineup of security services and platforms to include an ASM. With Expanse as its ASM, Palo Alto Networks is now placed solidly in the platform play segment of the market landscape. Since December 2020, the Expanse ASM solution has been integrated seamlessly into the Palo Alto Networks lineup. The analysis of the Palo Alto Networks solution, named Expander, starts with a deep dive into the methods of discovery used and how discovery results are leveraged as a part of the ASM platform. Expander offers what is likely to be the most comprehensive and frequent scanning results among all of the ASM vendors surveyed in this report. At first glance, its approach involving both ML and human analysis is like that of most other vendors in this space. However, a key differentiation is found in how it executes the discovery process. Expanse leverages two types of scanning infrastructure: one attributed to Expanse and one that is obfuscated, whereby Expanse delivers results that stalwarts of the internet scanning industry, like Shodan, are unable to. This advantage is possible for the following reasons. As scans of internet assets are performed, often the sources are blocked to stop the scanning. If the infrastructure performing the scans remains unchanged (thus blocked), then over time, a portion of the internet will become invisible to this scanner. That will result in blind spots for organizations in their ASM. Expanse overcomes this problem through its employment of obfuscated, ephemeral scanning infrastructure. In addition, Expander performs protocol-level handshakes to determine service types, which is a nice feature that increases the certainty of results as the analysis progresses. The discovery results are analyzed using policies that are built and maintained by the Palo Alto Networks Expander team. These policies sift through the results, looking for indicators that point to possible vulnerabilities, misconfigurations, or compliance issues. Importantly, clients of the Expander ASM solution cannot create custom policies themselves. However, they can request the creation of specific policies by the Expander team. Expander policies are updated weekly. The value that most organizations get from any security solution, ASM vendors included, is usually derived from reports and dashboards inside the platform. While Palo Alto Networks’s solution is no different in that respect, there is room for improvement. Expanse found its success in the Fortune 500 market, so that is where it has spent most of its development time. A strip-down version of the current solution with a periodic data refresh will make the platform more consumable for smaller organizations. Palo Alto Networks indicates this version will be available in Q1 or Q2 of 2022. As with other Palo Alto Networks acquisitions, the integration into the Palo Alto Networks ecosystem has been prioritized, and it provides a clear advantage. Organizations that already have deployed Cortex XDR, Prisma Cloud, and other Palo Alto Networks solutions can integrate with Expander to combine solution capabilities. The resulting combination provides unique capabilities, such as the ability to correlate data collected inside of your organization’s network with data found through the ASM solution and discover risks that would be otherwise very difficult to identify manually or using another ASM vendor. This correlation of internal and external risk data will become more popular in the ASM space as other vendors and clients realize its utility. Looking at Expander’s other features, it’s clear that the platform’s extensibility is very mature. While some security solutions provide integrations that only deposit or extract data, Expanders integrations appear to be based on use cases designed to increase its utility. For example, because Expander does not offer active assessment capabilities, integration with popular vulnerability scanners has been created, allowing Expander discovered assets to be sent to the vulnerability scanner where a more thorough analysis is performed. While various licensing methods are found in the ASM vendor landscape, Expander uses a simple per-asset approach. To determine the cost, the Expander team performs a basic discovery of your AS and then uses this data for the sales conversation. Strengths: Comprehensive discovery capabilities, policy-driven actions that reduce operator burden, numerous integrations with third parties, and very deep integrations with other Palo Alto Networks solutions. Challenges: Reporting and dashboards could use improvements. RiskIQ is a company that focuses on providing digital threat management solutions, with its primary solution being the ASM platform called Illuminate. RiskIQ is one of the older companies in this space, founded in 2009. Significantly, RiskIQ was acquired by Microsoft in mid-2021. The analysis of the RiskIQ Illuminate solution that follows is based on RiskIQ before the acquisition. It’s possible and even likely that RiskIQ Illuminate will soon undergo substantial changes. The Illuminate platform is a SaaS solution, delivered in the same manner other solutions are delivered. Illuminate demonstrates great flexibility in asset discovery capabilities, particularly its ability to “chain” assets together using patented technology. This chaining of assets enables accelerated owner identification, a vital component in the remediation process. The Illuminate platform also provides a novel risk scoring method that takes the standard CVE scores as a base for risk assessment and combines it with important contextual information like frequency of vulnerability exploitation and popularity with attackers. This process results in a tailored risk score, prioritizing risks that are commonly exploited. While the Illuminate platform offers integrations with other RiskIQ products in the ecosystem, they are not a part of the ASM solution without additional licensing costs. This may pose a problem for the investigation functionality. By default, Illuminate offers only very basic investigation capabilities. RiskIQ offers another solution with tight integrations into Illuminate that offers robust investigation capabilities. But again, this option carries with it an additional cost. Illuminate’s incomplete assessment capabilities are another shortcoming. While Illuminate offers passive assessment capabilities, active assessment capabilities are not offered. This active capability is often avoided because of the potential for harm if poorly implemented, but other vendors have found ways to mitigate these risks. The solution’s extensibility is its strong suit. With native “tight” integrations into upstream and downstream technologies like SOAR, SIEM, XDR, WAF, and firewalls, the Illuminate solution offers the ability to adjust organizations’ defensive strategies proactively in response to observed attacker behavior. Traditional integrations into service desks for ticketing exist, as well as a documented API for custom integrations as needed. The RiskIQ Illuminate solution offers a simple interface designed around the concept of cards. Each card contains easily understood information about a specific set of vulnerabilities or risks. This method of data presentation creates an intuitive experience. Strengths: Asset discovery capabilities are among the best, the integration of risk meta-data into risk scoring is very useful, and the vendor offers proactive defense capabilities when integrated with other solutions. Challenges: Built-in investigation capability is basic and no active risk assessment exists. 6. Analyst’s Take When traditional vulnerability management processes were presented as a solution to the ever-expanding digital footprint of the modern organization, nearly all organizations ran into the same problems. Lack of insight into the known attack surface limited the efficacy of vulnerability management. Once assets were discovered, associating assets with owners was a time-consuming process because of the abstracted nature of internet and cloud-based assets. Finally, legacy vulnerability scanners are not equipped to discover modern cloud misconfigurations that pose the greatest threat to organizations today. The ASM solutions surveyed in this report resolve those issues. Because ASM vendors recognize that most organizations can’t keep up with the rapid changes within their attack surface, robust discovery is a ubiquitous feature of all ASM solutions. From the discovery phase through the risk identification phase, leveraging both active and passive assessment methods, and moving onto the reporting and alerting phases, it’s clear that this field has matured rapidly to fill the gaps created by legacy vulnerability management. Looking back at the radar chart in Figure 1, you can see most players in this space are feature players. Born of a single purpose, these vendors are relatively young organizations that have worked to solve the problems identified. It’s important to remember that while ASM is the focus of this report, ASM is not the only method used to secure an organization’s digital footprint on the internet. Digital reputation protection, data exposure identification, and continuous automated red teaming are equally important tools. Two of the platform plays identified in the Radar address these needs (BishopFox and Cyberint), while two or more are likely to do so in the next 12 to 18 months (Palo Alto Networks and RiskIQ). 7. About Chris RayChris Ray Chris Ray is a veteran of the cyber security domain. He has a collection of experiences ranging from small teams to large financial institutions. Additionally, Chris has worked in healthcare, manufacturing & tech. More recently he has acquired an extensive amount of experience advising and consulting with security vendors, helping them find product-market fit as well as deliver cyber security services. 8. About GigaOm GigaOm provides technical, operational, and business advice for IT’s strategic digital enterprise and business initiatives. Enterprise business leaders, CIOs, and technology organizations partner with GigaOm for practical, actionable, strategic, and visionary advice for modernizing and transforming their business. GigaOm’s advice empowers enterprises to successfully compete in an increasingly complicated business atmosphere that requires a solid understanding of constantly changing customer demands. GigaOm works directly with enterprises both inside and outside of the IT organization to apply proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation. Research methodologies include but are not limited to adoption and benchmarking surveys, use cases, interviews, ROI/TCO, market landscapes, strategic trends, and technical benchmarks. Our analysts possess 20+ years of experience advising a spectrum of clients from early adopters to mainstream enterprises. GigaOm’s perspective is that of the unbiased enterprise practitioner. Through this perspective, GigaOm connects with engaged and loyal subscribers on a deep and meaningful level.
<urn:uuid:bd99e396-a1e7-44cf-8b27-0d9f4b166c0f>
CC-MAIN-2022-33
https://research.gigaom.com/reprint/gigaom-radar-for-attack-surface-management-bishop-fox/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.922228
9,158
1.859375
2
The Cryptocurrency Vision If you took us back to November 2017 you would hear many claiming by the end of 2018 blockchain technology would be beginning to come into our every day way of life. Fast forward to today; August 2018, and we have a very different picture. The visions of decentralised networks for sending money, buying houses, and creating smart contracts have gone to the way side and have been left replaced with the reality of building our vision. And that is exactly what the run up to $20,000 Bitcoin was in November; a vision. Having the vision to see the future is what makes entrepreneurs great. Even in the face of adversity and challenges and nay-sayers they keep going because they can see the bigger picture. Blockchain technology and cryptocurrencies as a whole will shape our future but only when the visionaries have built it. The dramatic difference between the emerging blockchain technology and previous emerging technologies is in the ability for the technology to function without widespread adoption. Until widespread adoption is reached blockchain technology will not reach its full potential. Gone are the days of a MVP showing how I can send money via a website to someone else’s email (Paypal.) Instead the MVP for a blockchain technology (Request Network) is showing how a network of computers hosted by independent users can send money and verify that transaction of money quickly and easily. Request Network is already banking on the massive assumption the user is already comfortable with Bitcoin been considered “money”. The difference in vision needed to see the potential of the two is clear. The price action of the cryptocurrency markets has reflected this the past 6 months. As we have seen more interest from the outside world and more sophisticated investors enter the space there is an understanding a lot of these networks and projects will not hold value without the widespread adoption and actual use of the network that may one day occur. So how do we get create usage without usefulness ? That’s a debate for another article but I believe the movement will be lead from those projects creating intermediary uses of their networks with existing FIAT currencies and companies focusing on onboarding to digital currency; ATMs, exchanges, merchants. Thanks for reading give me a follow on Twitter! Look forward to hearing from you !
<urn:uuid:140ecff5-442b-4105-a172-e9b73661584c>
CC-MAIN-2022-33
https://chris-knight.medium.com/the-cryptocurrency-vision-effd92a62be3?source=user_profile---------9----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.95128
456
1.8125
2
Founder / Executive Director, Molly combines her passion for people and the planet with her experience in design thinking, business development, and scientific research to understand and transform complex systems, manage diverse teams, and communicate ideas and processes through broadly-accessible media that brings people together. Molly is an Ashoka Fellow (2018). Molly was the Chief Cartographer for the first global data-based maps of the Catholic Church and has exhibited these on numerous occasions in the Vatican. Molly has an M.S. in Ecological Design from the Conway School, where she was her class’ Sustainable Communities Initiative Fellow, and a B.A. in Philosophy from Canisius College. She worked in a yeast genetics lab and has designed and developed professional graphic and web media for over ten years, some of which been featured in publications such as Landscape Architecture Magazine, Nucleic Acids Research, and the Association for Advancement of Artificial Intelligence proceedings. She co-founded GroOperative, Inc. 5(a), an indoor-vertical farming worker-owned cooperative in Buffalo, NY, USA in 2013. She has been involved with the Vatican Youth Symposium, Vatican Arts and Technology Council, United Nations Youth Assembly, the Buckminster Fuller Catalyst program and is an Echoing Green Fellowship finalist. She has also been an invited speaker at numerous conferences and institutions, including but not limited to Harvard University, Yale University, Esri, the Pontifical Academy of Sciences, and ICT4D Services Director (volunteer) Christine Wacta is an African born, French Architect D.P.L.G. from Paris La-Défense School of Architecture (France). She also holds a Master’s Degree in Architecture from the University of Minnesota (2001). Christine is finishing her PhD in advance GeoSpatial Sciences for Architecture, Urban Design and History preservation at the University Of Paris Sorbonne-Paris Cité & Paris Diderot [graduation spring 2019]. Christine worked as intern Architect in Dresden (Germany), Paris France and Ellerbe Becket Architects in Minneapolis. MN, before deciding to go into teaching in 2002. She taught Interior Design at the Art institutes international MN for two years, then accepted a job at SCAD Savannah as a professor of Architecture where she taught for the last 13 years before joining GoodLands. Her interest for intelligent city and resilience for future planning has grown to where she recently started a GeoDesign student Chapter at SCAD. Christine has worked on developing a minor in GeoDesign/GeoBIM at SCAD. Christine believes that there is an emerging NEW discipline alongside Architecture and Urban Design, a discipline that emerges as a STRONG LINK to all other disciplines on a single, collaborative TRANS/CROSS-disciplinary platform. The GeoDesign concept and its broad application, its use of BIG DATA, sciences and communications provide a platform that augments architects, planners and stakeholders ability to make better decisions in the creation of more RESILEINT futures. Her vision is one of the city as research and testing laboratory for simulating scenarios using real data in form of a game with Geolocation and temporal component. Gamifying the city? AR/VR becomes an important part of intelligent planning for regeneration. Liz Hanna (MA, MT-BC) is a singer, composer, music therapist, and writer specializing in interweaving creative and contemplative practices to facilitate relational wellbeing. A graduate of Berklee College of Music (Music Therapy) and Yale Divinity School (Religion & Ecology), Liz integrates experience in performance, clinical work, sacred music, and contemplative ecology to explore mutuality, healing, and spiritual life. With a particular focus on reconciliation, Liz’s work aims to help reawaken a more holistic sense not only of human interdependence with all life, but of the human capacity to co-create restorative relationship. In addition to administrative and collaborative work with GoodLands, Liz sings professionally in the tri-state area, teaches private lessons, and serves as Spiritual Programs and Retreats Coordinator for Kairos Earth, facilitating workshops in contemplative ecology. Director of Development and Partnerships (volunteer) Elias Crim is the founder and publisher at Solidarity Hall, a group blog focused on community regeneration. He was a founding board member of the Lumen Christi Institute (University of Chicago) and New City Press (Focolare–U.S.). He has served in management positions at the Chicago Board of Trade, Accenture, and with several dot-com startups. Services and Projects Lead Physicist by day, computer scientist by night. Jon Mrowczynski is a highly dedicated problem solver, challenge seeker, and tech zealot. He has written software to assist with the analysis of particle collisions at the Thomas Jefferson National Accelerator Facility, redeveloped a wearable, wireless medical technology from scratch to improve physical therapy for Parkinson’s disease sufferers, and designed an AI that determines people’s emotional states based on their facial expressions. On his time off, he enjoys optimizing complex systems, automating menial tasks, upgrading existing technology, and playing his oboe. Services and Projects Lead Tayler Schweigel holds a BS (University of Rochester) and MS (University at Buffalo) in Geological Science. The first year of her master’s program was spent in Italy at the Universita degli Studi di Milano Bicocca. As a geology student she digitized published data from older maps, checking for inconsistencies and creating a repository of structural, sedimentological, and core data that she used to update structural domains related to the tectonic history of the Mohawk Valley. The presentation of her graduate research won the 2015 Outstanding Graduate Poster prize at the Northeastern section meeting of the Geological Society of America and the top prize at the 2017 Buffalo Association of Professional Geologists student poster competition. Tayler has been involved in outreach activities to engage elementary and middle school students in the study of geology and science in general. As part of her involvement in citizen science projects, Tayler is a volunteer with Buffalo-Niagara Waterkeeper’s Riverwatch program In addition to working with Goodlands, Tayler is a volleyball coach in the Buffalo Public Schools Arts and Technology Associate Barry Threw is curator, technologist, designer, cultural producer & strategist with over 15 years of experience developing innovative & influential platforms, products, teams, and businesses across art, built environments, and experiential & immersive media. He served on the Executive Steering Committee for Arts and Technology for the Vatican, an advisory group for the Vatican Secretariat of Communications, and was a core contributor to its strategic plan. He is Cofounder of Fabricatorz, Director of #NEWPALMYRA, on the Board of Gray Area and is based in San Francisco, CA. Services and Projects Lead Debra Burhans is an Associate Professor of Computer Science at Canisius College. She has over 30 years of experience in data modeling, data extraction, and software development. Her areas of current research include bioinformatics data analysis, technology ethics, analysis of sensor data in real-time, and the integration of art and technology. Dr. Burhans has served as the Academic Mentor for an inner-city high-school STEP Program in Buffalo for the past 15 years. Advisor, Catholic Parks Network (volunteer) Keith Zaltzberg is a founding principal of Regenerative Design Group. He aims to connect sustainable agriculture, urban planning, green infrastructure, restoration, and social justice in his work. Keith’s approach is grounded in understanding the potential of a place, rigorous analysis, and systematic assessment. He combines this process with energetic creativity and a ground-level perspective gleaned from a decade working as an organic farmer, homesteader, and green builder. He is a popular lecturer and instructor on permaculture design, urban agriculture, community resilience planning, and food systems. Keith holds faculty positions at The Conway School and Smith College, where he teaches masters and undergraduate students digital design tools such as GIS and CAD. He is a certified Permaculture Designer, and holds a BS in Environmental Design from the Department of Landscape Architecture and Regional Planning at UMass-Amherst. We have a broad reaching network of technology subcontractors around the world who are not listed due to proprietary relations. For companies interested in partnering with us for our services or initatives, please contact [email protected] Andrea Hattler Bramson President, Lloyola Foundation; Former Technical Intelligence Officer Andrea’s background and experiences as an artist and native Spanish speaker, coupled with her experiences as a Technical Intelligence Officer provided a unique perspective from which to draw for Technical Hiring Requirements for the Central Intelligence Agency (CIA) – allowing her to truly bring the ‘a’ to STEaM. Andrea’s background as a creative person also put her in a natural position to propose, develop, and implement innovative solutions to often intractable clandestine technical operational challenges. Jerry Pucillo, has spent over 30 years in direct service to the goal of participating in the creation of real estate projects that have inherent meaning beyond the physical bricks and mortar. This journey led to the creation of over 1000 apartments for low income seniors along with the creation of “elder life corp” which brought the residents of the developments together in a mutually supportive environment. This entity was later incorporated into the local Catholic Charities office of the Archdiocese of Boston. He also developed a unique mixed income condo/coop for families facing displacement due to gentrification. Engagement in non-profit Board work led to the establishment of a home for those in alcohol recovery, as well as another home for persons struggling with AIDS, addiction, and single parented households, and the creation of a support system to help these residents be successful in the pursuit of their dreams for themselves and their children. On the corporate side, it led to one of the first LEED platinum rated office buildings in the US, and a corporate engineering center designed to encourage employee participation and engagement, all in a sustainability designed building. It also led to the position of creating and implementing programs as the Director of Sustainability initiatives for a private equity Fund that has invested over $1B in real estate projects. Recent initiatives include the conceptualization, planning and roll out of a national initiative on behalf of a private foundation that will include the design and development of a network of buildings serving the local communities in which they exist as well as the design of a state of the art assisted living community that focused on local community engagement and had a goal of reaching near passive house building standards. Jerry also has pushed the boundaries of new technological advances in pursuit of more cost effective solutions to building programs and in that regard did one of the first geo-thermal applications in Boston, one of the larger modular housing developments done up to that time, and was engaged in the business planning for a manufactured housing plant Assoc. Dean of Technology, Harvard GSD, Geodesign Leader Stephen M. Ervin is Assistant Dean for Information Technology at the Harvard Design School, Director of Computer Resources, and lecturer in the Department of Landscape Architecture, at the Harvard Graduate School of Design. His current interests include Geodesign, innovation in digitally enabled design teaching and learning, and algorithmic design. He is a pioneer in applications of computing in landscape architecture, planning and design Professor (Yale, UPenn), Dana Tomlin currently serves on the faculty of University of Pennsylvania and the Yale School of Forestry and Environmental Studies. Tomlin’s teaching and research focus on the development and application of geographic information systems (GIS). He is Founder and Co-Director of Penn’s Cartographic Modeling Laboratory, originator of Map Algebra, and a member of the GIS Hall of Fame.</p> We are seeking experienced: Land and Conservation Lawyers Real Estate Developers Music and Art Agents and Producers If you are interested in exploring joining our board email [email protected] 3D Solutions Engineer, Esri Geoff Taylor is a Solutions Engineer for 3D markets at Esri. He was a founding partner at HewittNassar Studio, and is a GIS Systems Engineer at Clemson University Land Assets. He was a second Professional Masters of Landscape Architecture, GIS, Advanced Technology, BIM, Spatial Analysis, Internet Applications, Social Interactions from Clemson University. His Bachelors degree is in Landscape Architecture, Urban Design, Horticulture, Advanced 3d Modeling, GIS, and Spanish and Clemson University. CEO Community Solutions Rosanne Haggerty is the President and Chief Executive Officer of Community Solutions. She is an internationally recognized leader in developing innovative strategies to end homelessness and strengthen communities. In 1990, Rosanne founded Common Ground Community, a pioneer in the development of supportive housing and research-based practices that end homelessness. To have greater impact, she and her senior team launched Community Solutions in 2011 to help communities solve the problems that create and sustain homelessness. Rosanne is a MacArthur Foundation Fellow, Ashoka Senior Fellow and Hunt Alternative Fund Prime Mover. In 2012, she was awarded the Jane Jacobs medal for New Ideas and Activism from the Rockefeller Foundation. She serves on the boards of the Alliance for Veterans, Citizens Housing and Planning Council and Iraq-Afghanistan Veterans of America. She is a Life Trustee of Amherst College. Ecological Design/Greenway Expert Paul Cawood Hellmund is principal and president of Hellmund Associates. He is an ecological designer and conservation planner with more than thirty years of professional experience. A Harvard-educated landscape architect and planner, he was born and raised in the Republic of Panama. He is an experienced facilitator, speaker, and writer on sustainability, conservation, and ecological design topics . For ten years he was president of the Conway School in Massachusetts and director of its graduate program in sustainable landscape planning and design. He currently serves as Visiting Fellow at the School of Global Environmental Sustainability at Colorado State University. Stephen Thor Johnston President, North American Land Trust Stephen Thor Johnson is the President of North American Land Trust. He has a long career in conservation as a scientist, state government official, land trust executive, real estate development professional and as a consultant. John A. Mundell, P.E., L.P.G. President, Mundell and Associates John has over 38 years of experience in civil engineering and environmental remendiation. He is the principle at Mundell and associates. He has a B.S. and M.S. in Civil Engineering from Purdue University (M.S. focus on Geotechnical Engineering) and Doctoral Studies (abd) in Civil Engineering, University of Notre Dame. His areas of expertise include: Hydrogeology, Site Characterization, Groundwater and Contaminant Modeling, Geochemistry, Risk Assessment, Plume Stability Evaluation, Remediation Design, Regulatory Negotiation, Environmental Construction Oversight, Brownfield Redevelopment and Expert Testimony/Litigation Support, Superfund, RCRA Investigation/Remediation, LUST Investigations, Indiana VRP Programs Award Winning CIO, Tech Wrangler, Sensory Interactive Steven Snyder has more than 35 years of experience deploying technology in event venues and other public environments, with a focus on the use of innovative software and hardware to achieve critical business objectives. He has managed projects with budgets reaching into the tens of millions of dollars and has overseen large and diverse teams, including the group responsible for technological innovation at one of the world’s most advanced convention centers. Before joining Sensory Interactive in 2017, Steve spent nearly 14 years with the Massachusetts Convention Center Authority (MCCA), which owns and operates facilities that include the Boston Convention & Exhibition Center, the Hynes Convention Center, and the MassMutual Center in Springfield. As the MCCA’s Chief Technology Officer and Chief Information Officer, Steve was responsible for a 60-member, multidisciplinary in-house team. In addition to creating and maintaining the award-winning ShowBiz event-management software, this team managed the systems, infrastructure, vendors, and personnel required to deliver technology services to more than 360 events every year. Steve received CIO Magazine’s CIO 100 Award in 2014, was named a Computerworld Top 100 Premier Leader in IT in 2013, and was selected as a Boston Business Journal and Mass High Tech CIO of the Year in 2012. In 2016, he led MCCA to a ninth-place ranking – just ahead of NASA’a Jet Propulsion Laboratory – on InformationWeek’s Elite 100 listings. Steve’s early career included serving as a Vice President of Information Services, consultant, and company founder for successful businesses providing technology services across a broad range of industries. Steve also spent six years in the Navy as a SONAR technician on nuclear submarines and is a private pilot.
<urn:uuid:45830240-d978-4e1c-b228-9e39ea3bd38e>
CC-MAIN-2022-33
https://good-lands.org/team/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.943315
3,665
1.6875
2
Your buddy’s words might come out loud, soft, or through tears, but you hear the message. He’s getting a divorce, and you want to help him through it. You might have seen it coming or you’re completely stunned. Either way, his life, and, in a way yours, has changed. He could be sad, depressed, caustic, or some shifting combination. Even if it was his decision, he could still be any of the above because he’s facing shared custody and being alone half the time. Some changes he’ll know. Others he’ll sense, some he’ll wonder about, and through it all, he’s left with a stigma and a new thought that won’t leave. “The hardest part of divorce is you have to accept you can’t trust your own judgment,” says Mitch Abrams, clinical psychologist in Tinton Falls and Fords, New Jersey. So, how can you support a friend going through a divorce? Part of your job is easy, because it requires being his friend. Part of it is harder, because this isn’t a quick process and, during the experience, he’ll be a complex web of conflicting feelings. There are things to do and not do. Hint: It means more listening, less advising. Mostly, through your words and actions, it’s letting your buddy know that you’re not going anywhere. Maintain Your Dynamic There’s a lot to be said for being present, because his world is a question mark. “The guy is seeing how friendships are shaking out,” says Carl Hindy, clinical psychologist in Newmarket, New Hampshire and author of If This is Love, Why Do I Feel So Insecure? Couples are taking sides. He has to deal with lawyers. And his divorce kicks up anxiety in everyone else. People are looking at their marriages with, “Not us. No way,” or, “Am I really happy? Should I consider it?” Whatever the reaction, the common move is to pull back under the guise of neutrality, when it’s really fear talking. There’s also this. “Your friend is worried about what is being said about him to his kids, and wondering if his kids will be angry and unavailable to him,” says Nina K. Thomas, psychologist in New York City and Morristown, New Jersey. There’s nothing to do or counter-balance that. It just falls into the Something to Be Aware Of category. But you still want to do something. The best thing is to maintain your dynamic. If you take runs, talk baseball, or give each other a hard time, then continue on. It’s normalcy, something he doesn’t have a ton of at the moment, and it says, “I’m here,” without saying the words. You can also say those exact works, and throw in, “I’m loyal to you.” And while you want to keep things the same, they’re not. You’re going to have to gin up patience, because divorce is a slog, and it’s not unlike a death, Abrams notes. Your buddy needs to grieve and go through all the firsts: birthdays, Father’s Day, Thanksgiving, recitals. Eventually, there will be fewer, but there’s no shortcutting the process. No, You Shouldn’t Be There All The Time That thing you said about, “I’m here for you,” is true but comes with the unspoken addendum of, “just not all the time.” You can’t be, or it would burn you out. Plus, it wouldn’t help him. It’s like with your kids where you want to swoop in at the first sign of pain, but they need to struggle in order to become resilient. It’s the same for your friend, Abrams says. It’s as important to take care of yourself by doing things and being with people “that don’t focus on what’s wrong with a relationship,” Thomas says. When you’re with him, you’ll want to take his side, but it’s good to not jump at that because you can never know every detail. He’ll express anger and then love for his ex, making you want to jump even more. But … “Forget whatever opinions you may have had about his spouse and just plain listen,” she says. “No one in the midst of unraveling a relationship feels only one way about a person.” Offering advice seems obvious, especially since you have something really, really insightful. One problem. “Nobody wants advice,” Hindy says. For one, it carries the undertone of, “How did you not know that?” It can also make him feel guilty if he doesn’t heed your words, and your friend has enough negative energy running through him. All he wants is to be understood. That comes from giving him the floor. If you see an opening for advice, couch it with, “You know what works for me? …” Abrams says. Hindy adds to follow whatever you share with, “Is it like that?” Thomas says that you can also just ask, “Are you looking for suggestions?” It beats guessing every time and gives him control he hasn’t been feeling. If he says “yes”, still walk, don’t barge in, by starting with, “I’m no expert but here are some thoughts,” she says. Your goal is to not take over the situation but instead identify with him. Slaying the Proverbial Elephant Anger towards his ex might be below or right on top of the surface, making things uncomfortable. This is especially true if your kids remain friends and you have regular contact. It’s a fair conversation to initiate, Abrams says. Repeat your loyalty but ask, “How should I interact with your ex?,” adding, “I understand the tension and don’t want to inflame things, but I care about your kids and this is their parent.” It’s a two-fold “solution”. You don’t have to worry about seeing or avoiding someone. You’re also getting your friend to think about what he wants. It’s no sudden transformation, but it introduces that a future with his former partner needs to exist in some form. If you get your friend to move a little, consider it a bonus. But at the end of the day, remember, you’re not his therapist or coach. You’re a friend, one who doesn’t have to be an expert on anything. It’s good to get that out early with, “I’ll try to help but I don’t know if I have the right answers.” That gives you cover if you have to walk something back, but it also shows vulnerability that he might be feeling but can’t muster up yet. “It’s modeling coping,” Abrams says. “It gives permission to make mistakes.”
<urn:uuid:39f6abf2-94af-426f-a116-bead2d1c3a40>
CC-MAIN-2022-33
https://www.fatherly.com/love-money/how-to-help-a-friend-going-through-a-divorce
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.969894
1,585
1.695313
2
Documents record two Friedrich Emerichs affiliated with the colony of Biberstein. Their relationship to each other, if any, needs further research. (1) Friedrich Emerich, a single man, arrived from Lübeck at the port of Oranienbaum on 15 September 1766 aboard a ship under the command of Skipper Hans Karholm. Friderich Emmerich [sic] is recorded on the list of colonists being transported from St. Petersburg to Saratov in 1767. Friedrich Emerich, a single stocking weaver (Strumpfwirker), is recorded on an appendix to the 1767 census of Nieder-Monjou in Household No. 53 along with a note that he relocated to the Volga German colony of Biberstein in 1768. The 1767 census records that Friedrich Emerich came from the German village of Rothein [?]. (2) Friedrich Emrich [sic], a 12-year-old orphan, is recorded on an appendix to the 1767 census of Boisroux in Household No. 71 along with a note that he relocated to the colony of Biberstein in 1768. The 1767 census records that this Friedrich Emrich came from the German region of Dresden. There are no known surviving male lines of either of these Emerich families among the Volga German colonies. - Pleve, Igor. Einwanderung in das Wolgagebiet 1764-1767 Band 1 (Goettingen: Der Göttinger Arbeitskreis, 1999): 174. - Pleve, Igor. Einwanderung in das Wolgagebiet 1764-1767 Band 3 (Goettingen: Der Göttinger Arbeitskreis, 2005): 215. - Pleve, Igor. Lists of Colonists to Russia in 1766 (Saratov: State Technical University, 2010): #7135. - Rauschenbach, Georg. Deutsche Kolonisten auf dem Weg von St. Petersburg nach Saratow: Transportlisten von 1766-1767 (Moscow: G.V. Rauschenbach, 2017): #3993.
<urn:uuid:d019a7c0-4ed9-4c2d-9e32-b08e980bef31>
CC-MAIN-2022-33
http://volga.domains.unf.edu/surnames/emerich-biberstein
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.767096
478
2.03125
2
A connection that exhibitors want to use to avoid the cable and a laptop or other computer connection to a monitor is the direct USB to Television direct port connection that you find on most larger television monitors. They will have a PowerPoint presentation or video downloaded to a USB memory stick and want to plug it directly into the monitor. There is a big caution that you need to understand about this USB input port. More often than not the monitor refuses to play what is on the USB memory stick and there can be many reasons why. - The USB port is just a service port. - The information on the memory stick is not in the correct format. - USB port is only made for JPEG photo or music files. - Port is only available as a power outlet. - The media is not compliant with DLNA interoperability guidelines. Bottom line – just because the monitor has a USB port does not mean you can play information from a USB memory stick the way you can plug a memory stick into your computer. A monitor is not a computer. It does not have programs like PowerPoint stored to open and play files like a computer. PowerPoint files are a great example. In order to play a PowerPoint file you would need to convert the files to a video format and put it on a USB memory device. Then you would need to run the video file through a solid state digital media player. The player we use at Exhibit Edge is a Micca full HD 1080P digital media player. It is a black small box that can be easily velcroed to the back of the monitor and will accept USB memory sticks or SD Flash cards. Yes – It is a great idea to bypass all the cables and computers for simple continuous loop videos but be very careful about thinking that a USB port on a monitor works the same way that it does on a computer. Monitors are not computers and cannot open files or presentations the same way a computer can. Always check format and compatibility before you get to the show floor when using a USB device connected directly to a monitor. As always, please respond with your questions or comments and let others know about EXHIBITOR LOUNGE.COM. We will see you next week. Until then, I am your host Michael Gray telling you to RELAX in the Exhibitor Lounge.
<urn:uuid:8c519640-a986-4468-9cb0-ebb87fdc7eff>
CC-MAIN-2022-33
https://www.exhibitedge.com/usb-to-television/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.924213
472
2.21875
2
Neuroscience of Leadership Psychology Area of Emphasis Neuroscience of Leadership Psychology Embark on an interdisciplinary understanding of neuroscience and leadership The Neuroscience of Leadership Psychology area of emphasis provides students with an interest in how neuroscience is informing leadership and organizational behavior the opportunity to examine what is known about brain functions and the nervous system and apply this to leadership and organizational contexts for a new perspective and understanding. This is an interdisciplinary area of emphasis focusing on Leadership Psychology and Neuropsychology. A specialization in the Neuroscience of Leadership prepares professionals to complete neuroscience based research to make their own contribution to the current research and to consult to organizations and leaders based on what is known about the functions of the brain and nervous system and linked behavioral responses in applicable ways to bring new and valuable insight to leaders across industries. Students who choose the Neuroscience of Leadership Psychology Area of Emphasis will take the following two courses.
<urn:uuid:9c5b8dcc-63e1-4b81-8edd-7f07f65809d1>
CC-MAIN-2022-33
https://www.williamjames.edu/academics/concentrations/neuroscience-of-leadership-psychology.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.917721
186
2.40625
2
Bases of the coeducational micro-stories contest "BREAKING GLASS CEILINGS" VI EDITION. ORGANIZES : GENDER EQUALITY EDUCATIONAL PROJECT THROUGH THE IMAGE OF IES EDUARDO JANEIRO, FUENGIROLA. BOARD OF ANDALUSIA. MINISTRY OF EDUCATION. CURS0: 2020/21. SUBSIDIZES : FDAPA. COLLABORATE : DELEGATION OF EDUCATION OF MÁLAGA 1.-Theme : PREVENTION AND FIGHT AGAINST GENDER VIOLENCE. 2.- Participants : They will be able to participate all THE STUDENTS OF ESO, HIGH SCHOOL AND CYCLES that want it, OF PUBLIC CENTERS AND CONCERTED DEPENDENTS OF THE DELEGATION OF EDUCATION OF MALAGA. Only one work can be submitted per participant. Participation in the contest will be free and implies acceptance of these rules. Failure to any of the bases will lead to the exclusion of the user of this competition. The data will be checked at end the contest being invalidated those that are verified to be incorrect or that are not authentic. 3.- Format : The works will have a maximum extension from 15 lines (without count the title, which will have to appear in the presented text), written in Castilian, in Arial font size 12 (Word format). It will only be admitted one work per participant. We ask that at the time of fill in the form with your data do it carry the appropriate accentuation marks and are written correctly, orthographically in a very clear way, it is that is to say, that the names of the participants begin in capital letters. 4.- Form of presentation : Sending 1) the story in PDF file together with 2) the form that The interested parties will find at the end of the bases of this contest, the following address of mail: [email protected] , indicating in subject: GEMA OTERO CONTEST plus the Name of the participating student. 5.- It will be excluded any work that has been awarded in another contest or contest. Nor will those stories that focus solely and exclusively on physical violence or justify it with factors such as, for example, the abuser's alcoholism or do not correctly identify what we understand as gender violence will be accepted. 6.- Submission deadline : papers can be sent from FEBRUARY 1 to 22, 2021 to the email address indicated above. 7.- The jury It will be made up of specialists in equality and gender and literature linked to THE GENDER EQUALITY EDUCATIONAL PROJECT THROUGH THE IMAGE. The winners will be announced publicly (on MARCH 8, 2021 on the web and privately (all selected people will receive an e-mail and phone call with the appropriate information, so please check your Spam folder / spam to make sure of this) also informing the board of the educational center to which the participating student belongs. INFORMATIVE NOTE : Since some of our participants may receive the emails of the results of the contests in their spam / junk mail, we recommend that you write down the date of the contest failure - March 8, 2021 - in your agenda, mobile phone, calendar ... so that you can check the results on our website or through the informative emails that we will send (CHECKING THE INBOX AND THE SPAM / UNWANTED MAIL TRAY 8.- The jury's decision will be final. 9.- Awards: the selected micro-stories will be published on THE GENDER EQUALITY EDUCATIONAL PROJECT WEBSITE THROUGH THE IMAGE AND ON ITS EQUALITY FACEBOOK. The first author of the winning short story will receive a check for an economic value of 200 euros, the second selected will receive it for 150 euros and the third for 100 euros. In addition, all of them will receive an honorable mention from the GENDER EQUALITY EDUCATIONAL PROJECT, FDAPA and the PROVINCIAL DELEGATION OF EDUCATION, CULTURE AND SPORTS OF MALAGA. The rest of the selected stories will become part of an anthology that will also be published on the web. The awards ceremony will take place from March 12, 2021 at 12.00 in the morning, being the Educational and FDAPA Personalities present, plus the members of the Jury, those in charge of delivering them. The venue will be in the capital Malaga, with the assembly hall in which this act will take place to be determined. 10.-The participants are responsible for compliance with current legal provisions on intellectual property and the right to their own image , declaring, responsibly that the dissemination or reproduction of the work within the framework of this contest will not injure or harm any right of the participant or third parties. 11.- INFORMATION CLAUSE In accordance with the provisions of Organic Law 15/1999, on the Protection of Personal Data, we inform you that the personal data provided will be processed for the purpose of participating in the contest, as well as informing, by email or ordinary, of future activities organized by THE GENDER EQUALITY EDUCATIONAL PROJECT THROUGH THE IMAGE, unless otherwise indicated when requesting participation. However, THE GENDER EQUALITY EDUCATIONAL PROJECT THROUGH IMAGE will always be able to make public the works presented, indicating the name of their author. Participants may exercise their rights of access, rectification, cancellation and opposition recognized by the LOPD by communicating it in writing to the address of the Gender Equality Educational Project, IES Eduardo Janeiro, calle Los enebros, s / n, 29640, Fuengirola (Málaga) and attaching in your request, a copy of your ID or other suitable identity document, and indicating "Data protection" or through the email [email protected] 12.-The interpretation of these bases and the solution to the doubts that their application could raise will correspond to the Jury appointed by THE GENDER EQUALITY EDUCATIONAL PROJECT THROUGH THE IMAGE of the Eduardo Janeiro de Fuengirola IES. 13.-Acceptance of the rules : Participation in the Contest implies full acceptance. In Fuengirola, January 8, 2021 Mercedes Sánchez Vico, Coordinator of the Educational Project for Gender Equality.
<urn:uuid:9f46939c-015b-406b-bcc5-3aa0936ceb78>
CC-MAIN-2022-33
https://en.coeducandoenred.com/bases-del-concurso
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.879397
1,353
1.539063
2
Biodynamic agriculture is a special form of organic agriculture developed by the famous Austrian philosopher, scientist and writer Rudolf Steiner in the early 20th century. Interestingly, Rudolf Steiner was born in the Croatian settlement of Donji Kraljevec in Međimurje, in the then Austrian Empire. His basic theory was the existence of life force in agricultural crops and land. These forces are reduced and lost by the application of pesticides and fertilizers and are encouraged by such cultivation of plants and animals that follow established natural flows. This type of agriculture includes reliance on the lunar sowing calendar, as well as the use of specifically made means on a natural basis, which affect the accelerated improvement of soil fertility as well as increased microbiological activity. Also, natural fertilizers and composts are used in cultivation, to which certain natural preparations are added that improve their action. Thus, plants grown on such land become stronger and more resistant to diseases, pests, as well as to adverse climatic conditions. Thanks to its positive effects, biodynamic production has spread all over the world, and in Croatia, it is still in its infancy. The owner of OPG Hunjadi, Natalija Peter Hunjadi, is one of the main advisors for biodynamic production in the Croatian Advisory Service, which transfers positive experiences from neighbouring Slovenia and other countries and educates our farmers about this type of production. Return of cattle to pastures, milk without chemicals and hormones, manure that contains everything the country needs to grow healthy crops… In this harmony with nature, with the knowledge of the dynamic properties of each plant individually, the harmony we have long ago disturbed is achieved.
<urn:uuid:6ea7b00d-e85c-4cf2-996a-8e8c3477d7e4>
CC-MAIN-2022-33
https://www.veemee.eu/en/proizvodac/opg-hunjadi-dean/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.964816
341
2.640625
3
By Bob Bain, OER Project Expert “There are two questions you must ask your students to evaluate your courses,”or so Mortimer Adler, the philosopher and founder of the Great Books Program, told me as I drove him to the Cleveland airport in 1988. The drive to the airport ended my 24 hours hosting Dr. Adler's visit to Cleveland and my high school. And it happened after he and I co-taught one of my high school classes on an auditorium stage in front of an audience of about a thousand students and Cleveland-area educators. Among his many memorable comments during the visit, his answer to my question about assessing teaching has had the most enduring effect. It challenged me to rethink instructional goals, demanding I see beyond the end of the class and encouraging me to figure out ways to help my students make the history they learned usable. “The first question to ask students must be, ‘Do you understand more now than you did when you began this course?’” Adler added, “Notice, I did not say know more but rather understand more!” For Adler, “knowing more” and “understanding more” are critical but distinctive goals for teaching. What is the distinction? Knowing more is about being informed, as Adler has explained in his writing. It involves recognizing that something is or is not the case. To understand, however, demands more. It requires meaning-making, considering why something is or is not the case, building connections to other "stuff," seeing the parts in terms of the whole, and integrating ideas, facts, and experiences into our thinking and lives. Understanding history makes what you know about the past more valuable, practical, and usable. 2019 Climate Strike outside White House, Washington, DC. © Sarah Silbiger/Stringer/Getty Images. While I share Adler’s thinking about the importance of teaching for understanding, his course evaluation question has added a wrinkle and a challenge to my courses. The wrinkle? Of course, good history courses grow students’ understanding. But, in addition, good teaching must help students “understand” how and where their understanding has changed. Self-awareness of what they learned and the skills needed to connect or apply that learning to the present and the future makes knowledge valuable and usable. The challenge? How to engage students in such metacognitive reflection in a world where schools only test knowledge? Two tweaks to end-of-course activities have helped me manage this challenge. First, I’ve added a few questions to typical review assignments that ask students to reread opening free writes,[*] journal entries, projects, and course materials. In OER Project courses, this is easy since the introductory and frame videos, Driving Question/Era and Unit Problem Notebooks, cognitive tools, and readings all live online. To these activities, I added a few questions hoping to stimulate metacognitive purpose: - In what areas or on what topics has your thinking changed? In what areas have you changed your thinking the most? The least? - What surprised you most about what you studied this year? - What do you think is worth remembering from what you studied this year? - What thinking practices—reading, writing, reasoning—do you think you changed the most? The least? Which are the most important to continue developing? Second, in the last month of a class, I added two “Memos to My Future Self” assignments. In one prompt, I focus students on the conceptual “stuff,” such as critical events or concepts studied, including thresholds in BHP, and graphic biographies and frames in WHP. For homework, students have to identify what they think were the most important concepts and events they studied and why. Sometimes it helps to give students a minimum number of concepts or events to discuss (seven or so, for example). Then, I have students use these to write a letter to their future selves explaining what was important, why it was important, and how they imagined each would connect to their life beyond school. In short, the activity asks students to locate the history they learned outside the classroom context. Students cross a road as they head to school after participating in a joint 'school human chain rally' in Hong Kong on September 12, 2019. © Nicolas Asfouri/AP/Getty Images. The second memo focuses students’ attention on the disciplinary practices they studied, such as reading primary and secondary sources, reasoning about causes and consequences, evaluating significance, making historical arguments, and working effectively at different scales of time and space. Again, students review previous activities and cognitive tools to reconsider these practices and how their skills have grown. Then, they write a letter to their future selves identifying what makes each important, why each should be memorable, and how they imagine each connects to their life once the course ends. I collect and read both memos, adding only a handful of comments before returning them to the students. A few times, I’ve given students envelopes to self-address and have then mailed their memos to them in late August, a practice I wish I’d done more often. Someone once said that education is what remains once you’ve forgotten what you learned in school. The tweaked review assignments and future memos foreshadowed the wisdom of that adage. In both activities, students focus their attention on big ideas, concepts, or skills. They rarely reference factual details unless it’s a fact that has shaken their previous thinking. The memos give me a glimpse into what students think is important and how they imagine they will translate their learning into the present and their future. In addition to encouraging me to create activities to help transform students’ knowledge into usable understanding, Dr. Adler's conversation stimulated me to build my course evaluations around his two questions. Oh, the second question? “You must also ask students if they enjoyed the course.” Adler paused before adding, “When done well, all study will yield both understanding and pleasure.” Simple, concise, and essential questions to ask students: Do you understand more now than you did at the beginning of the course? Did you have fun? And these are great questions to ask ourselves. So, my OER Project colleagues: Did your understanding of teaching and learning grow this year? Has it become more useful and usable? And did you enjoy teaching the courses and have some fun? Hoping everyone can answer with a resounding and enthusiastic “Yes.” [*] I open all my courses with a free-write asking students in my world history course to write a history of the world, or in my teacher education classes, to design a lesson for a history class. Initially, I used these to capture students’ prior knowledge. In addition, I now return these at the end of a course, to enable students to see changes in their previous thinking. About the author: Bob Bain is associate professor in the School of Education and in the Departments of History and Museum Studies at the University of Michigan. Bob is the Chair of Secondary Teacher Education and the director of U-M’s World History and Literature Initiative. He has worked on both the Big History Project and World History Project since their inception. Before coming to the U-M in 1998, he taught high school history and social studies for 26 years. Bain’s research centers on teaching and learning history and the social sciences in the classroom, online, in museums, and at home. Cover image: Children coloring a mural of the globe. © FatCamera/Getty Images.
<urn:uuid:db2564fd-c0ab-4f7b-9e82-d6ba6d6a3ba0>
CC-MAIN-2022-33
https://community.oerproject.com/b/blog/posts/from-knowledge-to-usable-understanding
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00673.warc.gz
en
0.963361
1,595
2.875
3
September 22, 2021 Yesterday we received several updates and changes to the COVID quarantine guidelines. In order to address these changes, the district will need to make significant changes to the way it deals with both close contact tracing and quarantine. Moving forward, students will no longer be placed in quarantine for close contact. However, student will continue to be excluded when they have tested positive for COVID, or they are exhibiting COVID type symptoms. This will be done using the following guidelines: The district will continue to exclude students who are showing symptoms of COVID or have presented with a positive COVID test. Students who present with symptoms will be excluded for 10 days or until they show a negative test result. The current COVID table of symptoms shown below will be used to determine exclusion. Students who are COVID positive will be excluded for 10 days All positive cases will be reported to the DOH for their evaluation. 1 or more symptoms Fever (100°F or higher) New lack of smell or taste Shortness of breath 2 or more symptoms Nausea or Vomiting Again, this means that only students with symptoms and/or a positive test results will be excluded from school. Any families that choose to self-quarantine due to COVID concerns should contact their school nurse. They will be able to help with times and attendance concerns. If your child is currently under quarantine, a school nurse will be contacting you with information and direction on how to move forward.
<urn:uuid:fc0601a4-1f63-42ad-a970-6b4138d49129>
CC-MAIN-2022-33
https://www.jcsdk12.org/page/updated-quarantine-information
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.924721
365
2.046875
2
As the size of your organization increases, the size of your network infrastructure grows with it. This is why it's no longer sufficient to use a silo-based approach where each network function is monitored by an individual tool for network infrastructure monitoring. A typical network infrastructure is comprised of multiple processes, and it's vital to have a unified infrastructure monitoring tool to unite all of these individual silos and collectively monitor them to achieve overall efficiency. 1. Infrastructure component monitoring Infrastructure components can be broadly classified into physical and virtual components and have to be properly incorporated into your IT infrastructure. These new components need to be carefully configured, and the ones already existing in your infrastructure need to be monitored for health and availability. They also have to be updated with the latest configuration to prevent out-of-sync issues with new devices. To ensure efficient system performance, the various metrics of these components such as CPU utilization, memory utilization, process monitors, system monitors, etc. are monitored for in-depth analysis. This greatly assists with capacity planning and reducing energy consumption. 2. Security and firewall management Firewalls are the first line of defense against malware, hackers, viruses, and other cyber threats. Almost every organization is equipped with a firewall because not only does it safeguard your sensitive data, a competent firewall will generate security standards reports that will assist you in complying with security compliance laws such as PCI DSS, ISO 2700, NIST, SANS, NERC-CIP, etc. Firewalls operate by scrutinizing log activities and monitoring for any spike in activity, identifying and eliminating rogue devices, addressing access point vulnerabilities, and more. Firewalls extend their protection to remote devices via VPNs for a secure work environment away from office. 3. Compliance and configuration management Security breaches are becoming increasingly common, and even large-scale organizations are struggling to secure their data and prevent data theft. This is why organizations invest in configuration and compliance management tools. Not only will it help you with maintaining compliance with leading standards such as Cisco IOS, SOX, HIPAA, and PCI DSS, but it will also proactively alert you when a compliance breach is about to occur, allowing preventive measures to be employed. Configuration management is the process of establishing and maintaining system performance. A competent configuration management tool saves your business by preventing critical systems from plunging into unscheduled downtime by keeping a tight leash on your network configurations. Configuration management involves performing automatic configuration backups that can be deployed as soon as a misconfiguration is detected. This process also involves employing role-based access, restricting critical configuration changes to the super admins, saving human effort by automating device updates, and more to help you better understand the changes that will be implemented in the system and track configuration changes in real time. 4. Bandwidth and traffic analysis Bandwidth and traffic monitoring is used to understand the bandwidth availability and usage patterns on your infrastructure and understand its traffic flow, usage, bandwidth hogs, and network strains in real time. By monitoring your bandwidth and traffic, you can keep the application running 24x7, lag-free, with minimal jitter and latency. Bandwidth analysis and traffic shaping is performed by leveraging flow technologies such as NetFlow, Sflow, and jFlow. With this data, advanced reports (eg: forecast reports) can be generated to facilitate bandwidth capacity planning to better manage your existing IT environment and accommodate its future growth. 5. IP address and switch port management IP address management (IPAM) is used to plan, track, and manage your infrastructure's IP address space. With this, IT admins can ensure the repository of assignable IP addresses is always updated, gain improved visibility over IP resource management, and perform IP address delegation with better clarity. Having access to IPAM data makes it easier to identify potential data breaches or device misuse within an organization. IPAM tools periodically scan the routers and subnets for rogue IPs, allowing the admin to flag and block them from accessing the system. Similarly, switch port management is used to track port usage and manage inactive ports. 6. Applications and storage monitoring In today's digital world, speed is everything. Having applications and websites that are slow to respond will affect end users and have an impact on business productivity and profits alike. This is where application monitoring comes in handy. It enables you to monitor all your business-critical applications and ensure they're performing properly. It also helps to generate reports for in-depth performance analysis. Applications such as custom web applications, mobile applications, popular technologies across servers, virtual machines, cloud applications, containers, application servers, databases, big data stores, middleware and messaging components, web servers, web services, and ERP suites can be monitored. Increasing storage can temporarily fix your organization's storage needs, however, in the long run, it's imperative to opt for a storage management system. Employing a storage management process will not only allow you to better manage your storage, but also efficiently make plans to accommodate future requirements. OpManager Plus unites all the individual silos of infrastructure management and offers truly unified IT infrastructure management. There are many advantages of employing OpManager Plus for your unified IT monitoring needs:
<urn:uuid:28b087f5-b3ec-475f-975d-691b70edb4fc>
CC-MAIN-2022-33
https://manageengine.co.uk/it-operations-management/unified-infrastructure-monitoring.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.921243
1,069
1.710938
2
Responsibility for compliance falls with the premises licence holder, designated premises supervisor or an adult authorised by either of the above. Collectively, these are referred to as the “responsible person”. The responsible person must take steps to ensure that staff “do not carry out, arrange or participate in irresponsible promotions”. Three of these categories are outright bans, namely the “dentist's chair” (alcohol being poured by another directly into the mouth of a customer); drinking games or other activities that encourage customers to drink as much alcohol as possible; and posters and flyers that glamorise excessive alcohol consumption. The others remain legal as long as they do not carry a significant risk of undermining a licensing objective. However, it is often difficult to assess exactly under which category a drinks promotion would fall and whether this is banned or whether the event is permitted subject to a risk assessment. Falling foul of the prohibitive mandatory conditions could result in a breach of your premises licence and result in either a review and/or prosecution, both of which could be costly affairs. The authorities may well require you to convince them that a promotion is not irresponsible, but this may not be as easy as it appears. You may find enforcing authorities arguing that your promotion falls under the 'games or other activities' category (which is an outright ban) when it should really fall under one of the categories which remain subject to the significant risk test. What constitutes a game or activity (as opposed to simply being a promotion) could well be critical to whether you are breaking the law or not. Many of these promotions will only be deemed irresponsible after the event (ie, if something goes wrong). If your promotion is not subject to an outright ban, the Home Office guidance on mandatory licensing conditions gives some good pointers as to what a significant risk constitutes. For example: Type of promotion: - How big is the discount? - For how long does the discount apply? - Is there likely to be a significant increase in the number of customers? - What is the profile of the customer base? Type of premises: - Is it a high-volume vertical drinking establishment or a community pub? History of premises: - Have previous promotions been handled responsibly? - Has the licence been reviewed recently? - Have sufficient security measures been taken for any potential increase in the number of customers? The guidance can be found on the www.gov.uk website. If you are planning a new promotion and you are unsure whether it falls foul of the mandatory conditions then speak with your local police licensing officer or seek legal advice.
<urn:uuid:ffb56590-1131-4f43-9578-60751dd8dcbe>
CC-MAIN-2022-33
https://www.morningadvertiser.co.uk/Article/2014/10/16/Drinks-promotions-top-legal-tips
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.947085
541
1.625
2
The “path” of ecumenism “has a clear aim, that of unity”. Pope Francis recalled this at the end of his first speech in Switzerland, during the ecumenical prayer at the World Council of Churches (WCC). “The opposite path, that of division, leads to conflict and breakup. We need but open our history books”, the Pontiff remarked, inviting those present to “set out ever anew on the path of communion that leads to peace”. Division, the Pope said in the spirit of the Council, is “openly contrary to the will of Christ, but is also a scandal to the world and harms the most holy of causes: the preaching of the Gospel to every creature”. “The Lord asks us for unity; our world, torn by all too many divisions that affect the most vulnerable, begs for unity”, Pope Francis emphasised. “I have desired to come here, a pilgrim in quest of unity and peace”, he added, explaining the aim of his trip to Geneva. “I thank God because here I have found you, brothers and sisters already making this same journey”. “For us as Christians, walking together is not a ploy to strengthen our own positions, but an act of obedience to the Lord and love for our world”. “Let us ask the Father to help us walk together all the more resolutely in the ways of the Spirit. May the Cross guide our steps, because there, in Jesus, the walls of separation have already been torn down and all enmity overcome. In him, we will come to see that, for all our failings, nothing will ever separate us from his love”.
<urn:uuid:ebbcbb97-5af2-4a22-9e7b-bdd68e067477>
CC-MAIN-2022-33
https://www.agensir.it/quotidiano/2018/6/21/pope-in-geneva-ecumenical-prayer-our-world-torn-by-all-too-many-divisions-begs-for-unity-walking-together-is-not-a-ploy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.959459
362
2.109375
2
Flash Player Auto Update Daemon stands for the pop-up alert that specifically attacks Mac computers through one of its browsers – Safari, Google Chrome or Mozilla Firefox. Before we continue explaining the origin of Flash Player Auto Update Daemon unexpected notifications, let us state in advance that these pop-ups must never be treated by you as genuine alerts from Apple. Furthermore, they could be extremely dangerous, so beware of them. This particular notification is also similar to other pop-ups we previously wrote about, such as “Your Flash Player might be out of date”, “Please Install Flash Player Pro To Continue”, etc. Flash Player Auto Update Daemon Pop Up quicklinks - Why do Flash Player Auto Update Daemon pop-ups distract you - How to remove Flash Player Auto Update Daemon pop-ups - Automatic Malware removal tools We describe Flash Player update scams in more detail in our post “Your Flash Player might be out of date” scam. Flash Player Auto Update Daemon alerts express absolute nonsense because in most Mac computers Flash Player is not installed at all as some independent software. All popular Mac browsers today are already provided with important features to enable appropriate audio or video playback. When the pop-up comes up, here is the message it gives you: “Flash Player Auto Update Daemon” is not optimized for your Mac and needs to be updated. This software will not work with future versions of macOS and needs to be updated to improve compatibility. Contact the developer for more information. Why do Flash Player Auto Update Daemon pop-ups distract you It is true that Flash Player Auto Update Daemon alerts appear quite often and this is not some single occurrence. While browsing the web you may unexpectedly notice that after you visit a certain legitimate website your browser produces an additional pop-up window that does not lead you to the requested web page. Instead, it forwards you to a certain third-party resource that contains the faulty message quoted above. Flash Player Auto Update Daemon pop-ups are distributed by certain adware that has injected itself into your Mac and has been thus integrated into the browser. It is of utmost importance not to tolerate these absolutely misleading notifications. They are dangerous because typically their mission is to force you into downloading and installing potentially unwanted applications, adware and other malicious programs that can damage your Mac. Unusual browser behavior in your Mac could be the trace of adware in the system. When the adware is active it loads itself on every system startup and specifically hijacks your browser with unwanted pop-ups and subsequent redirections. Flash Player Auto Update Daemon messages could be just one of many other sudden alerts you could expect when your Mac is burdened by adware. The adware could quite likely be installed along with other free applications that you might have installed recently. It is regretful to admit that many free programs are often interconnected with absolutely useless applications that are suggested during the drive-by installation process. How to remove Flash Player Auto Update Daemon pop-ups The first thing you should realize is how important it is to be very careful while you surf the web and especially while installing free software. Your role, in this case, is to pay extremely close attention while you are in the very process of freeware installation. It is mandatory to read all the important details that could be mentioned in the EULAs (End User License Agreements) pertaining to the free software you aim to install. When it comes to Mac computers, the first thing you may implement is checking the list of all available applications in the “Applications” area. In case you find anything that is suspicious it is a good idea to move it to the Trash right away. You might as well check the list of installed add-ons (extensions) of your browser that could as well be the source of the aforesaid pop-ups. Finally, we recommend that you scan your Mac with reliable anti-malware software in order to analyze the status of your computer thoroughly and identify possible leaks in the system security. Automatic Malware removal tools How to remove Flash Player Auto Update Daemon pop-up from Safari:TopRemove malicious extensions - Click on Safari menu on the top left corner of the screen. Select Preferences. - Select Extensions and uninstall Flash Player Auto Update Daemon pop-up and other suspicious extensions. - If your homepage was changed, click on Safari menu on the top left corner of the screen. Select Preferences and choose General tab. Enter preferable URL to the homepage field. - Click on Safari menu on the top left corner of the screen. Select Reset Safari… - Select which options you want to reset (usually all of them come preselected) and click on the Reset button.
<urn:uuid:ae4fcd72-43b6-4065-8316-1df54bc406bf>
CC-MAIN-2022-33
https://www.2-viruses.com/remove-flash-player-auto-update-daemon-pop-up
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.91501
986
1.71875
2
FDA Priority Reviews Highlight Week in Cancer News Top news of the week in oncology and cancer drug development. FDA Grants Frontline Atezolizumab Priority Review in Bladder Cancer The FDA has granted a priority review to the PD-L1 inhibitor atezolizumab (Tecentriq) for use in cisplatin-ineligible patients with locally advanced or metastatic urothelial carcinoma (mUC) as a frontline therapy or following progression occurring ≥12 months after neoadjuvant or adjuvant chemotherapy. The review is based on data from the single-arm phase II IMvigor210 trial. In a study cohort of 119 cisplatin-ineligible, treatment-naive patients, the objective response rate with atezolizumab at a median follow-up of 17.2 months was 23%, including a complete response rate of 9%. Responses occurred regardless of PD-L1 status and across poor prognostic factor subgroups. The median duration of response was not reached. There was an association between tumor mutation load and response. The median progression-free survival and overall survival were 2.7 months (95% CI, 2.1-4.2) and 15.9 months (95% CI, 10.4 to not estimable), respectively. Under the expedited review, the FDA is scheduled to make a final decision on the application by April 30, 2017. Atezolizumab previously received an accelerated approval as a treatment for patients with locally advanced or mUC whose disease progressed during or after platinum-based chemotherapy. Regorafenib Receives FDA Priority Review in Liver Cancer The FDA has granted a priority review to a supplemental new drug application (sNDA) for the use of regorafenib (Stivarga) as a second-line treatment for patients with unresectable hepatocellular carcinoma (HCC), according to Bayer, the manufacturer of the multikinase inhibitor. The sNDA is based on the phase III RESORCE trial, in which the median overall survival was 10.6 months with regorafenib plus best supportive care compared with 7.8 months for placebo plus best supportive care, representing a 38% reduction in the risk of death (HR, 0.62; 95% CI, 0.50-0.78; P <.001). The median progression-free survival was 3.1 months in the regorafenib arm compared with 1.5 months in the placebo group, representing a 54% reduction in the risk of progression or death (HR, 0.46; 95% CI, 0.37-0.56; P <.001). The median time to progression in the regorafenib group was 3.2 versus 1.5 months with placebo (HR, 0.44; 95% CI, 0.036-0.55; P <.001). Regorafenib is currently approved for the treatment of patients with metastatic colorectal cancer and advanced gastrointestinal stromal tumors. FDA Lifts Clinical Hold on Pacritinib The FDA has lifted its clinical hold on trials exploring pacritinib, according to CTI BioPharma, the developer of the JAK2/FLT3 inhibitor. In February 2016, the FDA placed a full clinical hold on pacritinib studies following reports of patient deaths related to intracranial hemorrhage, cardiac failure, and cardiac arrest in the phase III PERSIST-2 myelofibrosis trial. To rectify the hold, CTI BioPharma provided the FDA with final clinical study reports from the PERSIST-1 and 2 myelofibrosis trials and initiated the new PAC203 trial. The PAC203 study is examining the safety and efficacy of pacritinib in patients with primary myelofibrosis who previously received ruxolitinib (Jakafi). Patients will receive pacritinib at either 100 mg once daily, 100 mg twice daily, or 200 mg twice daily. The targeted enrollment is 105 patients for the trial, which CTI BioPharma will likely launch in spring 2017. PEGPH20 Combo Improves PFS in Pancreatic Cancer Adding PEGPH20 to standard nab-paclitaxel (Abraxane) and gemcitabine demonstrated improvements in progression-free survival (PFS) compared with nab-paclitaxel/gemcitabine alone for untreated patients with advanced pancreatic cancer, with the best results observed in those with high expression levels of the biomarker hyaluronan (HA), according to new findings from the phase II Study 202 trial presented during a webcast by Halozyme, the company developing the medicine. Across 279 patients in the study, the primary endpoint of median PFS was 6.0 months in the PEGPH20 arm versus 5.3 months for nab-paclitaxel/gemcitabine (HR, 0.73; 95% CI, 0.53-0.99; P = .045). The overall response rate (ORR) was 40% with PEGPH20 and 33% in the control arm. In those with HA expression on ≥50% of cells, the median PFS was 9.2 months with PEGPH20 (n = 49) compared with 5.2 months in the control arm (n = 35; HR, 0.51; 95% CI, 0.26-1.00; P = .048); however, overall survival (OS) was not significantly improved (11.5 vs 8.5 months; HR, 0.96; 95% CI, 0.57-1.61). The ORR was 45% with PEGPH20 versus 31% in the control arm. A phase III study, known as HALO 301, is currently assessing PEGPH20 in combination with nab-paclitaxel and gemcitabine for patients with metastatic pancreatic cancer with high HA levels. The primary endpoint of the study is PFS, with secondary outcomes measures focused on toxicity and OS. The use of low weight molecular heparin is mandated in the study. Takeda Acquires Ariad Takeda is buying Ariad for $5.2 billion ($24/share). The deal is expected to be finalized next month. Acquiring Ariad adds brigatinib and ponatinib (Iclusig) to Takeda’s established oncology portfolio. Brigatinib currently has an FDA priority review for use in patients with metastatic ALK-positive non—small cell lung cancer who are resistant to prior crizotinib (Xalkori). A final approval decision is scheduled by April 29, 2017. Ponatinib has approved indications for the treatment of patients with CML and ALL. Takeda’s existing oncology products include 3 hematology drugs: brentuximab vedotin (Adcetris; approved for Hodgkin lymphoma and ALCL), bortezomib (Velcade; approved for multiple myeloma and mantle cell lymphoma), and ixazomib (Ninlaro; approved for multiple myeloma). Merrimack Sells Onivyde, Generic Doxil to Ipsen Merrimack has agreed to sell Onivyde (irinotecan liposome injection) and its generic version of Doxil (doxorubicin hydrochloride liposome injection) to Ipsen for up to $1.025 billion plus up to $33 million in net milestone payments retained by Merrimack related to a licensing agreement with Shire. Onivyde is approved in combination with 5-fluorouracil (5-FU) and leucovorin as a treatment for patients with metastatic pancreatic cancer following prior administration of a gemcitabine-based regimen. Merrimack is now refocusing its R&D on its lead pipeline candidates MM-121 (seribantumab; lung and breast cancer), MM-141 (istiratumab; pancreatic cancer), and MM-310 (multiple solid tumors).
<urn:uuid:6eebe78e-103d-4802-9249-68290260b96f>
CC-MAIN-2022-33
https://www.pharmacytimes.com/view/fda-priority-reviews-highlight-week-in-cancer-news
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.905105
1,722
1.515625
2
Basically, around 1980 or so, theoretical physicists managed to unify the electromagnetic and weak forces into the electroweak force. This resulted in, among other things, the standard model. Feeling rather proud of themselves, several of them sat down and started working out a way to unify the new electroweak force with the strong nuclear force to create the electrostrong force. They gave this lofty goal the name "Grand Unified Theory", or GUT. Very quickly, they discovered that most of their workable GUTs seemed to make some rather startling predictions, namely leptoquarks (a new class of boson with both a quark-like fractional electric charge and QCD color), proton decay, and magnetic monopoles. Unfortunately for the physicists, none of these have been observed to date. The current hot topics in theoretical physics are string theory and supersymmetry, which try to unite all four fundamental forces together. Hopefully, this will bypass the controversy surrounding GUT.
<urn:uuid:292f3e7f-16c6-499b-b741-ee66a2178ef4>
CC-MAIN-2022-33
https://everything2.com/title/grand+unified+theory
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.936232
199
2.828125
3
At the 2012 Annual Meeting of the American Academy of Allergy, Asthma, and Immunology, held early this month in Florida, specialists learned a great deal that is important to primary care. Among the most noteworthy presentations: Why primary care isn't following asthma guidelines, the importance of body weight in asthma treatment, and the future of sublingual allergy drugs. At the 2012 Annual Meeting of the American Academy of Allergy, Asthma, and Immunology (AAAAI), held early this month in Florida, specialists learned a great deal that is important to primary care. Among the most noteworthy presentations: Primary care physicians and asthma guidelines. A survey of 26 primary care pediatricians found that just 46% “always” followed the guidelines in the 2007 National Asthma Education and Prevention Program’s Expert Panel Report. Of those who didn’t, the most common reason they cited was complexity of the guidelines. In addition, 61.4% said they initiated inhaled corticosteroids (ICS) as recommended for patients with persistent asthma; most did not mentioned problems with patient adherence. Of those who do initiate controller medication, half don’t wait for a year before reducing medication and never initiate step-down therapy, as the national guidelines advise.1Asthma, obesity, and inhaled corticosteroids. If your overweight or obese patients don’t seem to reap any benefits from ICS, consider their weight, not just the severity of their asthma, as the explanation. Among 61 children aged 2 to 18 who have asthma, those who were overweight or obese showed a reduced cellular response to ICS treatment. The researchers suggest that chronic inflammation spurred by obesity may be interfering with corticosteroid effectiveness, requiring a higher dose.2 Another study presented at the meeting found no correlation between body weight and the severity of asthma.3Sublingual treatments gaining ground. The day may be coming when primary care physicians provide just as much immunotherapy for allergies as allergists-without shots. Although subcutaneous injections are currently the only approved immunotherapy for allergies, several companies have sublingual tablets under investigation. Doctors in many other countries, including most European nations, have been using the tablets for years. Among the studies presented at AAAAI: • A phase 3 study from Merck in which 565 adults with ragweed allergy were randomized to either a sublingual tablet or placebo found that depending on dosage, during the peak 2 weeks of ragweed season the tablets reduced symptoms 17% and 14% more than placebo. They also reduced the need for standard allergy medication.4 • A randomized trial in 21 children aged 7 to 13 compared oral versus sublingual immunotherapy over 6 months for treating peanut allergy. It found both similarly effective in changing challenge threshold, serologic markers, and reactivity. The investigators are following the children for 12 months total and will report the results after unblinding.5 • Long-term results of a 5-year French study of sublingual therapy for grass pollen–induced allergy in 633 adults found significant increases in quality of life in the treatment group compared with the placebo group.6 They also found greater efficacy in patients with the highest symptom scores.7 The same investigators also reported on the efficacy and safety of the treatment in the United States, among 473 adults who used it for 4 months before and during allergy season for 3 years. Participants receiving the study drug showed significant improvements in use of rescue medication, symptoms, and quality of life, confirming that the tablet was effective against US pollens. There were no anaphylactic reactions, suggesting the therapy may be safer than injections.8 Asthma and exercise. Exercise may be a challenge for people who have asthma, but there’s reason to encourage it: Results of a small study showed that asthmatic patients enrolled for 4 months in a structured exercise program at a gym had significantly better quality of life, measured by improvements in symptoms and limitations, compared with those who received education only.9 Overall, 78.3% of the exercise group demonstrated improvement compared with 39.5% of the control group (P = .05). Aspirin allergy desensitization. Two reports demonstrated that patients with an aspirin allergy who develop cardiovascular problems requiring daily aspirin therapy can be desensitized with a supervised protocol. In one report, clinicians used a 7-step protocol (provided in an inpatient or outpatient setting) for 23 patients who were allergic to aspirin or NSAIDs.10 The desensitization involved drinking a solution containing a 1-mg dose of aspirin dissolved with an Alka Seltzer tablet in water, waiting 15 minutes, then taking progressively higher doses in 15-minute intervals ending at a 325-mg dose. If patients developed a rash, they received an antihistamine. Although 3 patients developed angioedema, 2 of them continued the protocol without further problems. Sixteen patients had no reactions and none required an emergency department or hospital visit. One patient discontinued aspirin after developing cough and shortness of breath. Another report of desensitization used in 14 patients who required cardiac stents employed a similar protocol, with similar results11 1. Farooqui N, Stukus D. Survey of asthma management and referral preferences by primary care pediatricians at a pediatric training hospital. Abstract 251. 2. Nunez RA et al. Body mass and corticosteroid response in childhood asthma. Abstract 482. 3. Lu KD et al. Obesity is associated with nocturnal and exercise-related symptoms, but not asthma severity in urban children with asthma. Abstract 558. 4. Berman G et al. Ragweed allergy immunotherapy tablet reduces nasal and ocular symptoms of allergic rhinoconjunctivitis over the peak ragweed pollen season in North America. Abstract 938. 5. Narisety SD et al. A randomized, double-blind, placebo-controlled pilot study of sublingual versus oral immunotherapy for the treatment of peanut allergy. Abstract 102. 6. Horak F et al. Improvement in quality of life with administration of a 300 IR sublingual tablet of 5-grass pollen allergen extract in adults with grass pollen-induced allergic rhinoconjunctivitis. Abstract 174. 7. Worm M et al. Post-treatment, long-term efficacy of a 300 IR sublingual tablet of 5-grass pollen allergen extract in adults with grass pollen-induced allergic rhinoconjunctivitis: the relationship with disease severity. Abstract 177. 8. Cox L et al. A US study of 5-grass pollen allergen extract in adults with grass pollen-induced allergic rhinoconjunctivitis-results of secondary efficacy assessments. Abstract 176. 9. Pollart SM et al. Improvements in quality of life measures in a structured exercise program for persistent asthma. Abstract 231. 10. McMullan KL et al. Safety of aspirin desensitization in patients with a cardiac indication for aspirin. Abstract 325. 11. Riester DE et al. Aspirin allergy in a community teaching hospital. Abstract 327.
<urn:uuid:afe448ee-5698-4f6a-a5ae-48de51ee59d6>
CC-MAIN-2022-33
https://www.patientcareonline.com/view/aaaai-meeting-asthma-obesity-medications-and-more
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.928457
1,476
2.40625
2
If you wish to invest in crypto and want to diversify your retirement holdings, you can do both if you sign up for a cryptocurrency IRA. This innovative savings product is one worth considering. Therefore, the following information will give you further insight on sign-up and set-up for the account. If you’re new to investing, it’s essential to ask questions. The more you know about crypto investments and Bitcoin Roth IRA, the easier it will be to plan for retirement. 1. What is a Crypto IRA account? One of the most fundamental questions is, “What is a crypto IRA account?” Answering this question will help you learn more about how the account works and what will happen once you sign up for the IRA. A crypto IRA is a self-directed IRA or SDIRA. An SDIRA represents an alternative IRA that holds assets, such as precious metals, art, real estate, or crypto. This IRA contrasts with a traditional IRA, set up for trading stocks, bonds, and ETFs, or features mutual funds. 2. How do you enroll in a crypto SDIRA? To enroll in a crypto SDIRA, you simply go online and sign up. A custodian will advise and set up your account. They will also roll over IRA amounts, deposit money, make trades on your behalf, and manage contributions and distributions. You don’t have to worry about anything. All you have to do is focus on your crypto investments. 3. How does an IRA rollover work? You can deposit money into a new crypto IRA or roll over money from a traditional 401(k), regular IRA, or Roth IRA stock and bond account. It’s best to roll over part or all of the money through a direct electronic transfer to avoid taxes or penalties. 4. How much can I contribute to an SDIRA yearly? Most people in the U.S. can contribute $6,000 per year to a traditional or self-directed IRA account, with people aged 50 or over contributing up to $7,000, as a “catch-up” amount. The amount covers your contribution limits for all your IRA accounts – not for each account you own. For married couples, each couple can contribute $6,000 or $7,000 to contribute up to $14,000 jointly. 5. Which is better for crypto – a regular IRA or a Roth account? A Roth SDIRA is a better choice for investing in crypto, as you don’t have any restrictions placed on you when you withdraw the money after you reach 59 1/2 years old. As long as you hold the account for five years, you can start the money whenever you want. Also, you won’t be penalized for withdrawals before that time toward purchasing a first-time home or covering medical expenses or college. While you will have to pay tax upfront on Roth contributions, you won’t be taxed for any capital gains you make when trading crypto in your account. 6. How is a managed IRA account different from a managed crypto fund? When you set up a managed IRA account or SDIRA, you own the account while a manager oversees the transactions. You give the directions concerning trades. On the other hand, an investment manager oversees a managed fund on behalf of several investors. They make the decisions for the group’s investments in the fund account. Learn More about a Crypto IRA Today You can never save for retirement too early. Diversify your savings innovatively and proactively by signing up for a crypto IRA. Read more on KulFiy
<urn:uuid:e11161be-99d1-4538-beea-041710ff841f>
CC-MAIN-2022-33
https://www.kulfiy.com/6-faqs-beginners-have-when-considering-a-crypto-ira-account/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.918465
763
1.578125
2
For a long time, the Gulf of Guinea has been known as a hot-spot for various maritime insecurities. Vices like piracy, kidnapping for ransom and sea robbery were regularly reported. This particular area was even classified as the most volatile area for shipping in the world. The International Maritime Bureau (imb) reports 72 attacks last year on vessels at sea between Ivory Coast and Cameroon—up from 28 in 2014. This year so far it has recorded 30. It is expected that maritime crime will remain a constant feature in the Gulf of Guinea for the foreseeable future, the overall procurement trend and countermeasures by affected nations suggests that the impact and numbers and severity of incidents are no longer increasing and even declining. The contract was signed on November 17, with construction to start in early 2020 while their delivery is set to take place by mid-2023. The OPV 58 S can undertake a variety of missions due to its robust and versatile nature. Amongst such missions is its anti-surface warfare and anti-aircraft deterrent capability through a potent array of offensive weapons systems. With a crew of 48 (24 crew + 24 mission personnel) and a maximum speed of 12 knots, the OPV 58 S can stay at sea for 25 days or travel 4,500 nautical miles. While its performance is quite impressive, its armaments load out is even better. The weapons suite of the OPV 58 S consist of; a 76mm main gun by Leonardo, four SIMBAD-RC surface to air missiles, four 12.7mm manned machine guns, two Nexter 20mm remote weapon stations and four Marte MK2/N anti-ship missiles placed forward of the ship. Naval Group will supply the POLARIS combat management system. The most significant weapon aboard the Senegalese Navy’s OPV 58 S warship is the Marte MK2/N anti-ship missile. Marte MK2/N anti-ship missile. The Marte MK2/N ship-launched variant. fire-and-forget anti-ship missile was introduced in January 2006 and developed by European missile manufacturer, MBDA. It was designed to be deployed a in low-intensity naval warfare operations, to destroy a number of high-value and fast maneuvering targets at medium ranges in all weather conditions. It incorporates state-of-the-art digital technology, and its sea-skimming capability allows it to escape from enemy air defences. Also, it is fitted with a semi-armour piercing high-explosive (HE) warhead, equipped with impact and proximity fuses, which offers high probability of kill against an enemy vessel. As a fire-and-forget anti-ship missile, it uses a combination of mid-course inertial guidance and active radar homing for guidance and navigation. The surface search/navigation radars aboard the launch warship perform initial target designation and tracking before the launch of the missile. After launch, the nose-mounted active radio frequency (RF) seeker acquires the target coordinates from the surface search/navigation radars and allows the missile to fly autonomously towards the target through a number of way-points. An inertial guidance system is used to provide guidance and control for the missile during its mid-course phase of engagement. The active radar homing method is employed to track targets autonomously during the terminal phase of flight. Furthermore, target designation for the missile can also be provided by electro-optic (EO) sensors and electronic surveillance measures (ESM) either mounted on the launch vessel or from other platforms through a data link. Shifting Naval Balance of Power in the Gulf of Guinea Although, these exotic capability would make headlines anytime but still, it’s necessity is questionable since it does not currently solve any real need in the security architecture of the Gulf of Guinea. In fact, the current security reality in the Gulf of Guinea calls for a different class of ships; small, nimble and lightly armed. More so, with the only conventional threat coming from a possible French naval interference near Senegal’s shores but then again, owing to the improved relations between France and West Africa in recent times, this threat has somewhat diminished. With this singular acquisition, the naval balance of power have clearly shifted westward. Nigeria which has traditionally held sway in this region has gradually lost all its sea dominance warships following years of atrophy. The once powerful Nigerian Navy has morphed into a Green Water Navy in response to the piracy crises in the Gulf of Guinea. One of the victims of Nigeria’s naval capability downsizing is the loss of NNS Aradu, a MEKO 360 class vessel which was the most powerful warship in Africa during its operational years. The NNS Aradu was capable of being armed with a wide range of armaments including anti-ship and anti-air missiles, anti-submarine torpedoes and rockets, as well as powerful naval guns. With the trend in recent Nigeria’s naval acquisitions moving towards smaller littoral vessels, it appears that the Nigerian Navy is foregoing its traditional power projection capability for regional security and defence. The Nigerian Navy was gifted two second-hand Hamilton class OPVs have been delivered to Nigeria and now form the country’s largest operational naval assets. Also, two P18N Offshore Patrol Vessels were procured from CSOC in April 2012 for US$42 million each. These are based on the Chinese Navy’s Type 056 missile corvettes but have a dramatically reduced armament of a single 76mm gun, with a secondary armament of two 30mm and two 20mm guns. These two Chinese OPVs, alongside the two Hamilton class vessels represent the most potent surface assets available to the Nigerian Navy, despite their lack of potent armament. In terms of quantity, the Nigerian Navy is still unmatched in the region however, despite this, there is a large disproportionate ratio of firepower/number of ships. With more ships, less firepower. As global security uncertainty becomes more pronounced especially in the maritime domain, Nigerian political elites are now slowly reawakening to the strategic importance of having a combat capable naval structure in place; primed and ready. Recent Nigeria’s mid- and long-term acquisition plans aims to fill some of these capability gaps. For instance, Nigeria has finalized plans to procure a general-purpose frigate valued at $350 million, a long-endurance Offshore Patrol Vessel (OPV) valued at $120 million, a medium-endurance OPV estimated at $60 million, a landing platform dock (LPD) ship worth $350 million and a landing ship-tank valued $90 million. Several other assets includes a submarine worth $300 million, a Seaward Defence Boat (SDB) worth $10 million and a specialized naval security helicopter at an estimated cost of $25 million. The keel for a Damen LST-100 class landing ship for amphibious operations and force projection has been subsequently laid. For now, these new equipment would help fully secure the Gulf of Guinea against piracy, armed robbery at sea, crude oil theft and illegal bunkering, poaching, smuggling, vandalism, kidnapping, proliferation of small arms, illegal waste dumping and oil pollution which is the current threat the region is facing, and that is good enough.
<urn:uuid:9545fa8b-48f2-4f0c-bc81-e29ea81aaf67>
CC-MAIN-2022-33
https://www.military.africa/2019/12/naval-balance-of-power-shifts-as-senegal-introduces-ship-killing-warship/?v=65d8f7baa677
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.949716
1,521
1.914063
2
Customer Satisfaction and Supply Chains Modernizing the supply chain has become a strategy to transform initiatives and create a competitive advantage on a global scale. Modernization shows that SCM software usage grows at a rate of 9% annually. This number is projected to increase by over $22 billion by 2025, gaining more trust from customers worldwide. The Modernization Strategies Plugging in modernized strategies into the supply chain recognizes the industry’s commitment to make the most out of new technologies. In addition to this, it will also allow companies to reap the benefits of an updated supply chain. Gaining substantial results from modernization requires spending a few million dollars and around 12 to 24 months to come into fruition. For these results to be substantiated, companies must implement practical approaches in order for the modernization strategy to succeed. These strategies are categorized into three different initiatives: - Unifying demand and supply management. - The implementation of a segmented strategy. - The creation of a single plan that identifies and responds to deviations and disruptions while continually balancing supply and demand. Successfully implemented strategies will allow a company to realize the full potential of modernization while giving substantial benefits. Increase Customer Satisfaction Modernization comes with a variety of benefits. One of the greatest benefits of modernization is that customers feel as though they can put more trust into the supply chain. The ways that supply chain modernization can benefit your customer base is listed down below. - Availability of data and information – supply chain modernization has allowed data transparency within companies. Customers then feel as though their concerns are being heard which in turn leads to improved customer satisfaction. Customers will also feel empowered and informed about their purchases, making them favor the company’s products and services that are available. - Utilization of advanced analytics – using advanced analytics in the modernization of the supply chain helps to support customer’s decision-making. This is due to the modernization being able to understand and predict customer and supplier behavior which in turn allows them to gain insight with accuracy and confidence. - Optimization of inventory, production, and procurement – on the company side, optimized inventory ensures a higher rate of order fulfillment while also optimizing inventory cost. The same outcome is demonstrated in the optimization of production and procurement processes. - Improved responsiveness enables customers to trust the brand, build brand loyalty, and get quick responses. - Improve decision-making cuts costs – modernization in the supply chain empowers customers to make better and faster decisions, especially on cost and cost savings. - Opportunity to revamp existing processes and introduce new ones – process improvements can be readily executed to ease operations. - Yield higher revenue – pricing strategies are ultimately focused on customer satisfaction. In turn, this expands markets, increases sales, and yields higher revenues. - High Customer retention – with a high retention rate in a modernized supply chain management, customers tend to return to purchase products or services as a result of being satisfied with the supply chain service. - Lower supply chain cost-optimized operations such as storage and warehousing reduces overall cost, forming part of the extensive supply chain strategy. Every aspect of the supply chain modernization has substantially improved customer satisfaction and thus increases valuable trust from satisfied customers. Reap the benefits of supply chain modernization today with Profound Logic’s help! Contact us at [email protected] or call us at 1-877-224-7768 to learn more.
<urn:uuid:bee7bf2f-9dca-49f7-be36-27345b2c3f95>
CC-MAIN-2022-33
https://www.profoundlogic.com/customer-satisfaction-and-supply-chains/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.925753
702
1.507813
2
A MIND-blowing optical illusion shows how our brains lie to us. Using a traffic light and a cyan filter, TikTok user beatonthebeeb explains the illusion and the trick our brain is playing on us. The user, who also goes by the name Dean Jackson, starts by showing a regular stoplight with the typical green, yellow, and red colored lights. He then adds a cyan filter over the traffic light, saying that red specifically cannot pass through this filter. “Yet you’re still seeing the red light, right,” he asks. “I can guarantee you that there is no red light there at all,” he says. “There’s no red at all!” Jackson then goes onto explain how our brains are playing a trick on us and offers proof to back up his claim. Most read in Tech “It’s your brain working overtime convincing you of the red,” he says. In an attempt to prove the illusion, Jackson then covers the non-red lights with the color gray. “Now look … it was grey all along,” Jackson says. The video has been viewed more than 16million times and has amassed more than 1.8million likes. In a follow-up video, Jackson again turns to the same traffic lights for a similar optical illusion. In this case, he uses a different filter to show that yellow light is not, in fact, passing through, and is gray.
<urn:uuid:df9c35b0-69f5-4ff0-86de-7814c22f8cdf>
CC-MAIN-2022-33
http://cta.s41.xrea.com/mind-blowing-optical-illusion-shows-how-our-brains-lie-what-color-do-you-see/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.952744
320
2.09375
2
- Curricula of the blended-learning mentoriship and career guidance training course The curricula ”How to become a good mentor for young people (18+) working as nurses, social workers, and teachers” will be elaborated for the online training and face to face course, and it will include formal and non formal methods of learning about mentorship and career guidance. - ICT materials for the online blended-learning mentorship and career guidance skills training course ICT materials will be elaborated in accordance with the curricula created at O1, and it will be used for the online modules of mentorship and career guidance skills training course. - Mentorship skills and career guidance learning materials and methodology for face to face youth blended-learning training course The learning material will provide the opportunity for participants to consolidate and complement the knowledge, skills and experiences already achieved during the online course. - Guidelines for professional peer-coaching The material will contain theoretical knowledge to define the concept of professional peer-coaching, the process of peer-coaching and its benefits on learners and practical guidelines on the way students, volunteers, internship participants and young professional could share their professional experiences, concerns, ideas with colleagues and to provide them guidance, feedback and suggestions. - Best practice collection for gender balance and non-discrimination in career guidance The collection will have theoretical sections and case studies collected in organization experience and the benefits of gender balance at organizational and society level for each partner country’s. - Online Platform and pilot the youth blended-learning mentorship and career guidance skills training The on-line training platform will be used for blended mobility of young people mentoriship and career guidance training course, and it will be available for the on-line courses in all the 6 languages of the participating countries.
<urn:uuid:8b144e12-9b93-4bfe-a919-c9f5cf2733e6>
CC-MAIN-2022-33
https://onlinementor.eu/index.php/results/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.92469
380
2.359375
2
Subtitle A step-by-step guide for learning to draw more than 25 comic book characters Learn to draw comic book characters with fun and easy, step-by-step drawing projects, and then design your own superheroes and villains. Are you an aspiring cartoonist or comic book artist? Then You Can Draw Comic Book Characters is just for you! Following the simple step-by-step projects in this fun and exciting book, beginning artists—both the young and the young at heart—will learn to draw a range of original heroic and villainous comic characters, each with their own background story and superpower! Tips, techniques, and easy-to-understand instructions for drawing faces, hair, costumes, and poses will help you create your own unique characters in no time. You’ll not only learn how to design characters from scratch, but you’ll also discover how to add dialog and tell a story using panels. The book opens with helpful sections on tools and materials, essential drawing techniques, and color. This information ensures that you know the basics before getting started on the step-by-step projects that follow. Get to know and draw more than 25 fun characters, including: - Jinx Tagget, whose discovery of the Star Stone allows her to control gravity with energy pulses from her hands (and therefore fly!) - Tazu the Terror, whose greatest power is not his magical staff, but his ability to accurately predict the actions of his foes - Monsclara, a powerful but clumsy alien race from the planet Marumei - Battle Model KR-E2, fully sentient robots that want to wake up other KR robots - Alleyne, the smallest person from a planet full of giants, who accidentally ended up on Earth after being zapped through a warp tunnel - Cordy Seacliff, child genius, who created a jet-pack inspired by the old sci-fi movies he loves - Babsti, professor and expert Egyptologist who discovered the secrets the cat goddess Bastet, whose powers she is now able to yield - The Vortexer, an anti-hero consumed by jealousy who wears a technologically enhanced super suit with wrist-mounted vortex cannons - And many more! Throughout the book, in between the drawing projects, are closer looks at how to create a complete comic book, including developing interesting heroes and villains, writing a story, adding dialog, and using panels. And included at the end of the book are templates to scan or photocopy and practice on over and over again. Drawing a character standing, running, flying, or zapping is easy with the included tips, techniques, and templates. Cleverly written and beautifully illustrated by professional artist Spencer Brinkerhoff III, You Can Draw Comic Book Characters is the perfect introduction to comic book character illustration for cartoon artists-in-training!
<urn:uuid:5d41a6c2-2746-4d9c-91ec-b2d4fba35272>
CC-MAIN-2022-33
https://www.quartoknows.com/books/9781633228665/you-can-draw-comic-book-characters
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.929488
587
2.953125
3
If you’re of a certain age, you’ve been waiting for your flying car for a long, long time. Heck, you’ve probably seen a half-dozen flying car concepts come and go – if not more! – but have you seen one driving down the road? You have now. That’s a road-going prototype of the Alibaba-backed XPeng flying car concept up there, and it looks really, really real. It’s Supposed to Look Like This XPeng is one of the few major players out there with a credible shot at bringing a “Tesla killer” to market. They’ve presented five versions of their flying car concept since 2016, but most of those “cars” looked more like remote-controlled drones with seats on them. They haven’t looked like what most people think of as “cars,” is what I’m saying – but this sixth generation of the car finally looks the part. It’s a car, just that it’s a car with a heavy-duty top box (the rotor casing) on the roof. From these pictures, the Xpeng prototype looks like it uses a heavily modified version of the sporty XPeng P7 that our own Tina Casey got the chance to drive a few years ago. The front wheels have been moved forward, giving it a longer overall wheelbase, and the car’s shock absorbers appear significantly beefier – which is probably what you’d want if you had to bring it down for a quick landing. Beyond that, the spy shots show a large casing on the roof to hold in the rotors when they’re not in use – which makes sense, because one of the challenges of designing a flying car/driving drone like this would be locking the rotors properly to prevent damage to them when you’re driving (which would explain the heavy-duty top box). Take a look for yourselves, below, then let us know what you think the odds of Xpeng’s flying car reaching production might be in the comments section at the bottom of the page. Xpeng Flying Car Spy Photos Source | Images: Car News China. Don't want to miss a cleantech story? Sign up for daily news updates from CleanTechnica on email. Or follow us on Google News! Have a tip for CleanTechnica, want to advertise, or want to suggest a guest for our CleanTech Talk podcast? Contact us here.
<urn:uuid:7be0dc46-c278-455e-b5d3-8402f8d0d2c5>
CC-MAIN-2022-33
https://cleantechnica.com/2022/07/03/xpeng-flying-car-caught-testing-in-china/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.949915
530
1.65625
2
3 Important Methods of Integration To Know U-Substitution, Integration by Parts, Trigonometric Substitution One of the most essential parts of Calculus, integration details the techniques of finding an antiderivative, F(x), of the function f(x). It has many applications both in mathematics and physics that involve volume, area, and mechanics. In this article, we’ll examine three of the key methods for integration to have in your arsenal. Integration is essentially the opposite of differentiation. The variety of difficulty within the subject of integration is extremely extensive, with some problems taking 5 seconds to solve and some problems taking 5 minutes. For example, we know that the derivative of x³ is 3x². Therefore, when we integrate 3x², we get x³+C. It is always important to remember the +C, since the derivative of a constant is always zero, so any constant value can be tacked on to the end of a derivative expression and differentiating will yield the same result. However, not all problems are as simple as finding the integral of 3x². What is the integral of sin(2x)? One may jump to write down -cos(2x) + C, but sadly, this would be incorrect. The reasoning behind why this solution is incorrect leads us into our first method of integration: U-Substitution. As I was taught, U-Substitution is a way of dealing with the chain rule from differentiation: It reverses it! The chain rule deals with derivatives of composite functions. In examples like this, we say that the derivative of the function f(g(x)) is f’(g(x))*g’(x). This is why the derivative of -cos(2x) isn’t just sin(2x): we are missing an extra factor of 2 from the derivative of the inside function 2x. Now it should be apparent to us why integrating sin(2x) doesn’t simply yield -cos(2x). It is absolutely necessary to “account” for the chain rule in both differentiation and integration problems. Let’s look at an example problem together. Our first step should be to locate any familiar functions and derivatives, going term by term down the integral. Because we are reversing the chain rule, we want to set our u = sin(x), leaving our du = cos(x)dx. First we change our integral to fit into the u-world, after which we integrate in that same u-world. However, we want our final answer in terms of x, so it is necessary to substitute whatever we set u equal to back into the expression. Don’t forget the +C! Before moving on to integration by parts, let’s examine U-Substitution in the context of definite integrals, integrals with bounds on them. For consistency, we will use the same problem from before. The substitution remains the same: u = sin(x) and du = cos(x)dx. However, when we move into the u-world, the bounds must also be properly converted. Since the upper and lower bounds of the integral are pi/2 and 0, respectively, their corresponding upper and lower u-bounds are 1 and 0, respectively (found by plugging in the bounds into the sin(x) function). From there, the steps are relatively simple to follow. After finding the antiderivative and evaluating the difference between the upper and lower bounds in the u-world, we arrive at our answer of 1/3. Integration By Parts The next technique of integration is integration by parts. The general formula is provided below. The most effective use of integration by parts is to deal with the products of functions, especially when U-Substitution can not be performed. Let’s dive into the integral shown above. Much like the example for U-Substitution, there is a product involved in the integrand. However, no function and its derivative can be simultaneously found. Therefore, the next method to consider should be integration by parts. Before jumping into this problem, let’s take a closer look as to why our little formula works. The way of thinking about the formula is to first consider the product rule of functions u and v (these are really u(x) and v(x)). Next, integrate both sides of the equation. Finally, rearrange the integrals to obtain the initial form of the formula shown at the beginning of the section. Now, let’s hop back into the example problem. For simplicity purposes, we will use Leibniz Notation for u, du, dv, and v. The key to solving our integral, and all other integration by parts problems, is to properly assign the functions to each “Leibniz Notation” part. In other words, what part of the integral should be u, du, dv, and v? Although this seems rather tricky, there is a somewhat critical and effective method of selecting our functions properly: we must focus on what can be differentiated and broken down. In the case of xsin(x) dx, the proper way to assign our u’s and v’s is to first assign u = x and dv = sin(x) dx; the rest follows smoothly. As we can see, by assigning them this way, our du simply becomes dx, effectively simplifying our second integral in the integration by parts formula. The next step and the final answer can be viewed below. Say we had to complete the same integral xsin(x) dx, but this time there were bounds from 0 to pi. The key step to consider is to make sure that the bounds carry to both uv and the integral of vdu. For uv, evaluate the difference of the expression with inputs of the upper and lower bound, and for vdu, solve for the antiderivative and evaluate the difference of that antiderivative with inputs of the upper and lower bound as well. View the solution to our original problem below (look out for where the upper and lower bounds are visually). By far the most difficult method of integration in this list, trigonometric substitutions are often slightly tedious, but I find them to be elegant and extremely satisfying to solve. The main situation in which this type of substitution arises is when there are expressions similar in form to those of the derivative of inverse trigonometric functions. I’ve listed three expressions below to look out for, as well as the appropriate subsitution. We recognize that this is the form for sin. Follow through with the subsequent steps. We equate our x based on the appropriate substitution, and then substitute in the thetas into our original integral. After simplification using identities and removing the square root sign (4 turns into two squared and one minus sin squared turns into cosine squared), we then integrate in the theta-world. HOWEVER, we need to have our answer in terms of x, so the job is not done yet. Here is a problem that involves the second substitution with tangent. You’ll notice that this is a slightly more difficult problem, as the theta we need to replace is within different functions. To deal with this problem, we must consider triangles. First, we follow our normal procedure by rewriting theta in terms of x. However, when we plug x back in, we can see that we have inverse trigonometric functions within other functions. I’ve constructed a triangle to help visualize how the next step works. Tangent of inverse tangent of x/3 is simply x/3: no work needed there. However, having a secant as the outside function requires more thought. What does inverse tangent actually mean? It represents the angle whose tangent gives us our “input ratio.” In our example, our input is x/3, so we can set up a triangle in which the tangent of some angle (a NEW theta), is x/3. From here, we can use the pythagorean theorem to calculate the hypotenuse, and now we find the secant of that same angle. Everything is now in terms of x, and we are happy! Note that since we have the constant ln3, we can just combine that with our +C as the new constant of integration. Our last example problem involves substitution with secant. As always, we need to rewrite theta in terms of x and substitute back into our original equation. As we can see, we need to set up our little triangle again, much like the methodology in the previous example. We create an arbitrary angle such that its secant is x/5. Then, after solving for the missing side, we can substitute all expressions back in terms of x. Like any other definite integral problem, we simply need to find the antiderivative and evaluate. Now we could change our bounds to fit the theta-world, but I recommend to just evaluate with the given bounds after finding the antiderivative in terms of x, at least for these types of problems. Let’s look at our problem from Example 1. We have already solved for the given integral in terms of x using our sin substitution technique. With this antiderivative, we can evaluate the difference between inputs at the upper and lower bound, arriving at our answer. Perhaps my longest article yet, I’ve spend lots of time going through and examining certain problems that involved these integration techniques. I had learned U-Substitution and integration by parts last year, but I picked up trigonometric substitutions a little more recently. My favorite part was setting up those triangles, as I realized that drawing a simple figure could make problems a whole lot simpler. It really shows how clean math is. I hope you have learned some new techniques that can be applied to different integration problems!
<urn:uuid:a71cdae9-554a-4463-96eb-23ea04f79c6c>
CC-MAIN-2022-33
https://albertming88.medium.com/3-important-methods-of-integration-to-know-dfc6108f8eea?source=post_internal_links---------7----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.932691
2,128
3.71875
4
Primary Bone Marrow Lymphoma: An Uncommon Extranodal Presentation of Aggressive Non-Hodgkin Lymphomas MetadataShow full item record Bone marrow involvement by lymphoma is considered a systemic dissemination of the disease arising elsewhere, although some tumors may arise primarily in the bone marrow microenvironment. Primary bone marrow lymphoma (PBML) is a rare entity whose real boundaries and clinicobiological significance are not well defined. Criteria to diagnose PBML encompass isolated bone marrow infiltration, with no evidence of nodal or extranodal involvement, including the bone, and the exclusion of leukemia/lymphomas that are considered to primarily involve the bone marrow. Twenty-one out of 40 lymphomas retrospectively reviewed by the International Extranodal Lymphoma Study Group from 12 institutions in 7 different countries over a 25-year period fulfilled the inclusion criteria. These cases comprised 4 follicular lymphomas (FLs), 15 diffuse large B-cell lymphomas (DLBCLs), and 2 peripheral T-cell lymphomas, not otherwise specified. The FL cases showed paratrabecular infiltration, BCL2 protein and CD10 expression, and BCL2 gene rearrangement. DLBCL showed nodular infiltration in 6 cases and was diffuse in 9 cases; it also showed positivity for BCL2 protein (9/10) and IRF4 (6/8). Median age was 65 years with male predominance. All but 3 FL patients were symptomatic. Most cases presented with cytopenias and high lactate dehydrogenase. Four patients (3 FL cases and 1 DLBCL case) had leukemic involvement. Most DLBCL patients received CHOP-like or R-CHOP-like regimens. The outcome was unfavorable, with a median overall survival of 1.8 years. In conclusion, PBML is a very uncommon lymphoma with particular clinical features and heterogenous histology. Its recognition is important to establish accurate diagnosis and adequate therapy. bone marrow B-NHL diffuse large B-cell lymphoma follicular lymphoma peripheral T-cell lymphoma bone lymphoma aggressive non-Hodgkin lymphoma extranodal lymphoma b-cell lymphoma involvement concordant profile impact Molecular Haematology (including Cytogenetics Group and Cell Markers) License start date AMERICAN JOURNAL OF SURGICAL PATHOLOGY, 2012, 36 (2), pp. 296 - 304 Showing items related by title, author, creator and subject. Post-Transplantation Cyclophosphamide-Based Haploidentical Transplantation as Alternative to Matched Sibling or Unrelated Donor Transplantation for Hodgkin Lymphoma: A Registry Study of the Lymphoma Working Party of the European Society for Blood and Marrow Transplantation. Martínez, C; Gayoso, J; Canals, C; Finel, H; Peggs, K; et al. (2017-10)Purpose To compare the outcome of patients with Hodgkin lymphoma who received post-transplantation cyclophosphamide-based haploidentical (HAPLO) allogeneic hematopoietic cell transplantation with the outcome of patients ... Use of Zidovudine and Interferon Alfa With Chemotherapy Improves Survival in Both Acute and Lymphoma Subtypes of Adult T-Cell Leukemia/Lymphoma Matutes, E (2011-12)Purpose Adult T-cell leukemia/lymphoma (ATLL) is a mature (post-thymic) T-cell lymphoma associated with human T-lymphotropic virus type 1 infection. Survival in aggressive subtypes remains poor, and treatment resistance ...
<urn:uuid:a5a13efc-4275-450c-9455-4cac0bd9f215>
CC-MAIN-2022-33
https://repository.icr.ac.uk/handle/internal/2012
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.867602
837
2.109375
2
The dictionary identifies an invention as “a device, contrivance or process created after study and experiment.” An way of thinking is defined in the role of “a formulated planning or opinion.” Thanks to these definitions, a person will should ask ones self how much look over and experiment will have you really implemented on your considered. Is your conception a tangible alternative or just currently the recognition of a problem that needs a solution? How many opportunities have you assumed to yourself “it would be terrific if there turned out to be a product of which could solve particular problem?” I gain had that corresponding thought many times before. Unfortunately, routinely times, I was not identifying a huge real solution also just the need for a cleanser. Additionally, I own seen many inventors make the corresponding mistake confusing their own personal “identification of a problem” for an actual solution, like a spending unnecessary point in time focusing on those problem and and not the solution. The real difficulty with inventing could not just picking out a need, but also figuring out a solution. The may seem not uncommon sense; however, I really can tell shoppers that I experience talked with 1000s inventors who thing to consider they had an invention, when operating in fact they had an idea acquiring a well-defined solution. The founder can document his creativity in just one particular of i would say the following a set of ways: 1.Inventor’s Pocket book or Document Use a bound notebook or driving history of technology form to record your ultimate invention by clearly reporting the belief and concept and electing and dating in ink cartridge. Also, experience two second people form and get together with the purchase or InventHelp Reviews establish as observe to invention. The characterization should insure the following: consecutively figures pages, this purpose of the invention, a detailed explanation of the invention, drawings or perhaps sketches and as a consequence a multitude of makes use of and advantages. The creator www.diigo.com can fill out an application the USPTO “Disclosure Piece of content Program” and as well , file disclosure documents; however, the fashion described more is as good or better than filing disclosure documents. These USPTO violations a minimal fee on filing these kinds of documents. Note – documenting your personal invention has always been not a good substitute for a provisional or https://hensleypatten.tumblr.com non-provisional patent. I would say the purpose are to get started with a encounter of all time high for your prized invention and to promote you now with the proper documentation found in the purpose of virtually any dispute.
<urn:uuid:c2661e63-0941-4324-9ae0-c9e3b676bb1d>
CC-MAIN-2022-33
http://wood.distributorbajubola.com/tag/patent-idea/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.957726
549
2.328125
2
Birds nests can be incredible structures. Take for example the sociable weaver (Philetairus socius), which builds gigantic nests within nests, large enough to house hundreds of breeding pairs, and several generations of birds. The nests contain many separate chambers, or if you want to anthropomorphize, little bird bedrooms. Studies have shown that the nests have inner and outer rooms, with the center rooms (nearer to the tree or telephone pole) able to retain heat during the night, and the outer chambers used for shade and staying cool during the day. The nests are so well-built that sometimes they can remain occupied for hundreds of years. Then there are malleefowl (Leipoa ocellata), which build a nesting mound: a heap of decaying leaves topped off with a layer of sand, usually about 0.6 meters (2 feet) tall, with a chamber for the eggs. The male malleefowl then adds or removes soil during the incubation of the egg as a way of regulating the temperature. There are countless other examples of birds creating incredible structures to live in and raise their young. Then there are other nests, where birds have clearly thought "that'll do, I'm going to clock off early". It's this latter kind that has taken the Internet by storm over the last few days, because they too are, in their own special way, absolutely amazing, and will make you feel so much better about your own attempts at achieving something in life. Sometimes your nest doesn't have to be elaborate to be effective. Please enjoy some of our favorites from the lazy birds of the world. You won't be surprised to learn that most of them are from pigeons. Cuckoos, meanwhile, lay their eggs in the nests of other birds for them to incubate and feed when they hatch. They even lay eggs that mimic the color, size, and shape of their host birds, which keeps the unwitting host bird from being suspicious, before the imposter offspring hatches and often pushes the foster bird's actual offspring out of the nest. So cut pigeons some slack, it's been a rough year.
<urn:uuid:c0fbc127-2514-4afe-a7b7-e6b26a755482>
CC-MAIN-2022-33
https://www.iflscience.com/what-pigeons-consider-a-successful-nest-will-make-you-so-much-better-about-your-own-life-efforts-59394
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00673.warc.gz
en
0.966052
441
3
3
After being hunted to extinction in the UK 400 years ago, beavers are being brought back to Cornwall by Cornwall Wildlife Trust and partners Woodland Valley Farm. This ground-breaking project hopes to show that beavers can help create new wildlife habitat, make our water cleaner and crucially reduce flooding. Beavers will be reintroduced to a fenced area, upstream of Ladock village, near Truro, that has suffered severe flooding. Our partner Universities will study the before and after impacts, building on research from reintroductions in the UK and across Europe. The results will help us find out if this native species could once again become part of the Cornish landscape to help us combat flooding – naturally. The list of species that have been reintroduced following extinction in the UK is short; white-tailed eagle, great bustard, large blue butterfly and Eurasian beavers. We could perhaps be accused of favouring reintroduction of either large and charismatic or small and beautiful species, whilst neglecting extinct plants, fungi or less attractive animals. Beaver reintroduction however, is most definitely different. Don’t be fooled into thinking beaver reintroduction is about them being cute furry creatures, or that Cornwall is jumping onto a beaver bandwagon. There is no denying that beavers are large, charismatic animals; but there is far more to them than that. Beavers are a keystone species; they significantly alter the habitat around them and as a result affect large numbers of other species. They are vegetarian, eating herbs and grasses near the water’s edge in summer and switching to bark and twigs in winter. Beavers create new and more diverse wetland habitats as they go about their business of dam construction, tree coppicing and canal digging. In a fenced project in Devon, a pair of beavers constructed 13 ponds, and amphibian numbers soared as a result. Freshwater insect numbers also increased significantly, providing food for fish. The Cornwall Beaver Project is monitoring fish species and numbers to see how they change over time and we will be sharing the results with local angling groups. The Cornwall Beaver Project, run by Woodland Valley Farm and Cornwall Wildlife Trust, is working closely with Exeter University researchers to see what impact the beaver dams could have on flood prevention. Research on a small headwater stream in Devon has shown beaver dams and pools slow the flow of river water following heavy rain, potentially alleviating flooding downstream. The Cornwall Beaver Project will test whether or not we get the same effect on a larger stream. By the same token, during drought periods beaver dams can reduce problems of low-flow in rivers by slowly releasing stored water. A happy side-effect of the slowing of the flow in beaver pools is that silt drops out of the water column, taking excess nitrogen and phosphates with it. Researchers found that river water flowing downstream of a beaver habitat was significantly cleaner than water flowing upstream. The Cornwall Beaver Project also hopes to study the levels of bacteria in water entering and leaving the beaver site. Bacteria from both human and livestock sources affects the quality of our bathing waters. Could the effect of sunlight on the water within beaver-created pools reduce the levels of harmful bacteria in streams and help enhance bathing water cleanliness? We plan to find out. In the future, beavers and their engineering prowess could have far-reaching impacts. Wider unfenced reintroduction would bring significant change to Cornwall’s rivers over time; although not everyone will think this is a good idea. Across Europe, 26 countries have brought beavers back, so we have much to learn from those who have already experienced their return. Interesting times lie ahead when, as a society, we decide whether we want these animals back in the wider countryside. For now, let’s just enjoy seeing how the Cornwall beavers settle in and create new habitats at Woodland Valley Farm and collectively learn more about what these fascinating creatures can do. To find out more about the Cornwall Beaver Project, click here. ~ Cheryl Marriott Head of Conservation, Cornwall Wildlife Trust Adviser, CFWI Environment & Public Affairs Sub-Committee
<urn:uuid:13af29d0-5481-4dc7-ad0d-b202ceb19a4a>
CC-MAIN-2022-33
https://cornwallwi.org.uk/beavers-in-cornwall-return-of-a-keystone-species
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.942242
848
3.546875
4
This old map of Garfield, New Jersey was published in 1909 by Thaddeus Mortimer Fowler. T.M. Fowler was one of the most prominent map publishers of the 19th century and spent a majority of his life traveling around the country creating panoramic maps of American towns. The map shows a bird’s eye view of Garfield, NJ as it looked at the beginning of the 20th century. Landmarks on the map include Lotsey Toth Plaudersville Cafe, Garfield Public Schools, Passaic River, Saddle River, Garfield Worsted Mills, Passaic & Garfield Construction Company and more. This old map of Garfield, NJ has been lovingly restored by the team at KNOWOL. Reproductions of the restored map are available on museum quality, archival paper to ensure that this piece of New Jersey history can be passed on to the next generation. Click here to get a copy of the map.
<urn:uuid:a91fcff6-c544-4c52-bb7f-272e9cbb20ea>
CC-MAIN-2022-33
https://www.knowol.com/information/new-jersey/birds-eye-view-garfield-nj-1909/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.940735
190
2.8125
3
3D-printing is becoming an increasingly ubiquitous tool. It’s especially useful for fabricating objects that you might uniquely need: objects that are useful to you, but almost no one else. I’ve had a few. Currently I own an Artillery Sidewinder X1, which I’ve had for a year. I use it so often that I’ve needed to rebuild the extruder assembly once, but besides that it’s been a very capable device. I print all sorts of stuff. Little models for kids to paint, fruit juicers, musubi mashers. However, amongst all the things, I print one particular thing about 10x more. It saves me thousands of dollars a year, far more than the cost of a 3D printer. The object, is a humble phone case: This phone case is slightly strengthened relative to an original design by Peter Holzwarth. It’s easily customizable thanks to the simple language for functional 3d geometry definition, openSCAD (which is FOSS). Anytime I get a new phone for myself, my kids, etc. I pull out some 4$ Harbor Freight calipers. I adjust the height width and depth in the code and I print one of these cases out. If the phone is dropped, this case works like a bike-helmet. A corner pops off and the phone is fine. Then I print another. It also holds the phone a few millimeters off a surface, such that the phone is held above any spills. It holds most objects away from the screen and prevents scratches too. I have printed about 20-25 of these, saving about 20-25 phone screens. Using this case, a 5 year old can have a phone without a broken screen. It’s pretty remarkable. The code for this thing below.
<urn:uuid:d06c40c2-190d-4a32-847a-e8c0fdc6072e>
CC-MAIN-2022-33
http://jparkhill.netlify.app/themostuseful3dp/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00673.warc.gz
en
0.935938
384
2.34375
2
War of Independance - 1948 IDF Halftracks of the 8th Brigade From the moment the State of Israel came into being Arab Armies invaded. All were repulsed and when the war ended Israel had expanded on the original borders of the partition plan. However the price was high 6,000 Israelis died. With the declaration of Independence, came the invasion of Israel by the armies of all the surrounding Arab states. On that day, the Israel army consisted of 30,000 troops with no armor or other heavy equipment. Its air force was but a few Piper Clubs. Though this would all change in the coming weeks, in those first days of the war the regular Arab armies held an overwhelming advantage in terms of men and materiel. The Arab armies invaded on all fronts. In the North, the Lebanese army seized the border crossing of Malkiyah. The Syrians attacked the area around the Sea of Galilee and advanced on Kibbutz Degania, where they were turned back. The Iraqis attacked across the Jordan River near the town of Besian but were forced to retreat. They then moved their troops into Samaria, where they took up defensive positions. The most dangerous advance was that of the Egyptians. That army divided itself into two columns; one headed into the Negev Desert and up through the Hebron Hills towards Jerusalem. The brigade heading for Jerusalem was stopped on the Southern approach to the city at Kibbutz Ramat Rachel. The second column advanced along the coastal road toward Tel Aviv. For five fateful days, that army was delayed by the courageous defense of Kfar Mordechai. Next, they encountered Kibbutz Negba, which they eventually bypassed. The Egyptian forces continued on to where Ashdod is located today and paused. On May 29, the Israelis launched a counter-offensive which ended the Egyptian advance and the threat to Tel Aviv. One other army invaded: the Arab Legion of Jordan. The Arab Legion was the best-equipped and trained Arab army; the Legion was commanded by experienced British officers. Fortunately for Israel, the Legion was relatively small, with 4,500 troops. It had been hoped that the Legion would stay out of the war completely. Secret negotiations had been taking place between the Jewish Agency and the Hashemite King Abdullah. But the King ultimately decided that not joining the other Arab states would make his position in the Arab world untenable. On the day that IsraelÕs independence was declared, the Arab Legion captured the Jewish settlements in the Etzion Bloc, located between Hebron and Bethlehem. But the critical battle was for Jerusalem. On May 28, the outnumbered and outgunned defenders of the ancient Jewish Quarter surrendered. The western portion of the city, however, was successfully defended. But it remained under virtual siege. As a result, grave problems faced Western JerusalemÕs Jewish inhabitants: hunger, thirst, and lack of arms. The road from the coastal plain to Jerusalem had been blocked since the beginning of the war when the Arab Legion occupied the Latrun fortress (having received it from the British.) Latrun stood on an especially strategic elevation that overlooked the road to Jerusalem at the point where the road began the initial ascent from the plain up through the mountains. Whoever controlled Latrun, controlled access to the Jerusalem road. Beginning on May 25, repeated attempts were made by the Israelis to capture the fortress, only to end in failure. Fortunately, Colonel David Marcus, an American member of Machal (Òvolunteers from overseasÓ) helped uncover another narrow path to Jerusalem. Under his direction, the path was hastily widened into a crude road, just in time to relieve the siege of Jerusalem before a first truce went into effect. The truce took place when both sides were exhausted. Under the terms of the cease-fire, neither side was supposed to reinforce their forces. The Swedish Count Bernadotte was appointed as a mediator. But as was expected, the cease-fire agreement was violated and both sides substantially reinforced their positions. During the cease-fire, a ship full of arms purchased by the Irgun arrived off Israel's coast. When the Irgun insisted on retaining some of the arms for its use, Ben-Gurion ordered the army to seize the ship by force. Though the incident nearly caused a civil war, its ultimate effect was to make the Israel Defense Forces (IDF) the only legitimate arms-bearing force in Israel. The truce was soon to expire. Aware of this, the Egyptians launched another assault against Kibbutz Negba. The attack was repulsed and during this period, the IDF achieved minor gains in the Negev region. The major activity included the capture of the Arab cities of Ramla and Lod in the heart of the new nation. While earlier in the war Israel's policy towards the local Arabs was a mixed one, in these two cities the Arab residents were encouraged to board trucks and were transported to Legion lines. The IDF also captured Nazareth and the Galilee areas that had been in Arab hands. During a second cease-fire, Count Bernadotte proposed a settlement that would give the whole Galilee to Israel while giving the Negev desert to the Arabs; Jerusalem was to be internationalized. Both the Arabs and the Israelis categorically rejected the Bernadotte plan and the unlucky mediator was assassinated in Jerusalem by Jewish extremist on September 17, 1948 The second cease-fire ended with an Israeli attack on Egyptian positions. By this juncture, the Israelis were equipped with more modern aircraft and armored vehicles. Israeli forces quickly seized key Egyptian positions and captured the Negev city of Beersheva and soon opened the road to Eilat, at the southern tip of the country. A large Egyptian army was surrounded but refused to surrender. In the final stage of the war, Israeli troops advanced as far as El Arish in the Sinai desert. At that point, the British threatened to intervene, especially after Israel shot down 5 Egyptian planes during a single dogfight. Under British pressure, Israeli troops pulled back.
<urn:uuid:ac39c48d-c7de-447d-97d6-4591b2f9fac2>
CC-MAIN-2022-33
https://www.historycentral.com/Israel/1948WarofIndependance.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.977406
1,241
3.265625
3
The virtual realm ranges from the daily humdrum to a few of the most astonishing and complex utilities which have changed the way in which we live our lives. The branch of knowledge that deals with the creation and use of technical means and their interrelation with life, society, and the setting, drawing upon such subjects as industrial arts, engineering, applied science, and pure science. It is very probably that this new type of smartphones will appeal to numerous customers. The event particularly the production of various high finish technologies such as the mobile phones, televisions, computer systems, appliances, automobiles and a whole lot extra is as quick as the consequences of the most powerful stun gun. 84 This definition’s emphasis on creativity avoids unbounded definitions that will mistakenly include cooking applied sciences,” but it also highlights the prominent role of humans and therefore their obligations for the use of complicated technological techniques. In this dystopian imaginative and prescient human freedom and creativity are gradually crushed as our working lives are increasingly lowered to following a set ‘script’ for every a part of our day, derived by administration software program primarily based on an evaluation of its in-house ‘big information’. In lots of families, numerous guidelines revolve across the internet and most of them are concerning what their children can do on the internet and never how a lot time they spend on the web. Extra frequent are accidents caused by individuals not paying attention whereas taking a look at Fb on their telephones.
<urn:uuid:18b89d89-9fba-42a2-ae4e-64ce40ea99e9>
CC-MAIN-2022-33
http://www.dreamerweblose.net/understanding-heideggers-the-question-concerning-technology.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.957911
303
2.140625
2
Everyone knows that Eskom needs cash. Lots of it. Its position now is so parlous that without funding from the treasury it would not be able to pay its bills. This is not to say that it can’t meet its operating costs. At least until last year, revenues more or less matched costs. Eskom’s big expense right now is finding the billions to fund Medupi, the giant 4 800MW power station it is building in Limpopo province. The final estimates for Medupi are not yet in, but the latest figures put the cost at R120-billion. How much should a coal-fired power station cost? A 2008 World Bank report on the cost of building one in the United States, India and Romania puts these costs at $1 960 (about R14 500), $1 290 (about R9 500) and $2 250 (about R16 500) per kilowatt respectively. The report emphasises that these are not the cheapest power stations. The Chinese build two 500MW power stations each week at a cost of one-third to one-half of international prices. Medupi costs $3 400 (R25 300) per kilowatt, but the World Bank report excludes financing costs, so this is not an apples-for-apples comparison. It would help if Eskom took us, the people paying for Medupi, into its confidence and gave us a breakdown of how all the costs are made up. This may lead us to fire the developer, Eskom Enterprises, though, and bring in the Chinese to build up small plants quickly and cheaply. Eskom is in the news because it wants tariff hikes of 45% a year for the next three years to fund its capitalexpansion programme. It is also in the news because of a row between former chairperson Bobby Godsell and chief executive Jacob Maroga. Godsell wanted action from Maroga on several fronts, including dealing with bad debts, non-payment by some customers, the provision of cheap power to BHP Billiton, the buying of power from independent power producers, resolving the issue of derivatives that have put a black hole in the company’s accounts and improving its position regarding its long-term coal contracts. Godsell also wanted management to advise the board on the type of government guarantee ‘that would satisfy the auditors in terms of the undertaking that was made by the board of the going concern statementâ€. The board wanted Maroga out, but he did not want to go. The issue was quickly politicised as the ANC Youth League and Black Management Forum cried racism. The two were not reined in by the country’s leadership. It took the National Union of Mineworkers and Cosatu, and later ANC secretary general Gwede Mantashe, to point out that far from being a racist, Godsell has a proud track record in helping to shape a democratic South Africa. The political intervention extended to President Jacob Zuma, who called in Godsell and Maroga. Sources close to Zuma have indicated that he was unhappy with Minister of Public Enterprises Barbara Hogan’s handling of the issue as she sided with Godsell and the board against Maroga. Characteristically, Zuma hoped Godsell and Maroga would find a way of working together. Eskom is so cash-strapped now that it is reliant on cheques from the treasury to fund Medupi. Treasury spokesperson Thoraya Panday said ‘the direct transfer from national treasury to Eskom is in the form of the R60-billion loan that was announced last year, disbursed in tranches of R10-billion in 2008-09, R30-billion in 2009-10 and R20-billion in 2010-11â€. Some of the treasury money finds its way to the ANC, or, more specifically, its investment arm, Chancellor House. The Mail & Guardian has detailed in several reports that Chancellor House was a major beneficiary of the awarding of Medupi contracts by Eskom. Chancellor House is a 25% shareholder in Hitachi Power Africa, which won tenders to supply boilers for both Medupi and Kusile, a proposed 4 800MW power station to be built near Witbank. The M&G reported in November 2007 that R20-billion for the boilers for six steam generators ordered by Eskom from the Hitachi consortium accounted for the biggest chunk of what the parastatal planned to spend building Medupi. The estimated cost then was R79-billion. Of major concern to industry insiders is the fact that Medupi is under development while supply contracts with coal companies have been delayed. The usual practice for giant power stations is for development to begin only once long-term coal contracts have been secured. The Medupi contract had only two bidders to supply the boilers. The Kusile boiler contract was awarded to the Hitachi consortium without a further tender. Eskom justified the second award on the basis that it would speed up the development of Kusile and that economies of scale would be achieved. The World Bank report lists boiler costs for an 800MW generator set for coal power at $212 000 (almost R1.6-million) in the United States, $180 000 (about R1.33-milliom) in India and $337 000 (about R2.5-million) in Romania. The R20-billion for six boilers for Medupi translates into $456 000 (about R3.4 million) per boiler. It is not clear what the Hitachi contract is worth to Chancellor House. The two tenders were worth R38-billion combined. Hitachi Power Africa has a 60% interest, the other 40% being held by a European subsidiary of Japan’s Hitachi. This would give Chancellor House’s 25% stake a face value of R5.7-billion when the tenders were issued, before escalations. Kusile is a hot issue for Eskom management. Delaying Kusile is one of the utility’s options to substantially reduce its capital needs, improve its cash flow and lower its tariff requests to the regulator. Godsell raised the issue of delaying the building of Kusile among the 41 items on which he said Maroga and his executive team had failed to act decisively. He described these as unfinished business, meaning they were incomplete or late. We have to assume that it is in Chancellor House’s interest for the Kusile project to go ahead sooner rather than later. Was this a factor in the political intervention played out in the past few days? If the ANC has an interest in the Medupi and Kusile tenders, would it have played the normal watchdog role required of government to ensure that the country was not saddled with uncompetitive prices? Would it have the required neutrality on the timing of Kusile’s construction when its own finances may be dependent on this flow of funds? Whatever the answer to these questions, the ANC is conflicted because of its interest in Medupi and Kusile and this certainly does not alleviate the deep-seated challenges Eskom faces. There is a similarity in the way the unrelated issues of Caster Semenya and Jacob Maroga have been handled. In both cases, just weeks apart, there was an unseemly rush to politicise the issue. When the dust settled around the unfortunate athlete, we saw that the political bluster was an attempt to hide a litany of lies and misrepresentations. There was an attempt to make Godsell’s handling of Maroga’s position a racial issue, even though the ruling party had given him the job as chairperson, and the board, both black and white, were unanimous that Maroga was not succeeding in fixing a broken Eskom. Eskom’s problems now are so deep and multifaceted it will take more than any individual to fix them. It will need a whole country.– Additional reporting by Lynley Donnelly
<urn:uuid:66f1cf97-48d6-46fa-9810-144fb27028c8>
CC-MAIN-2022-33
https://mg.co.za/article/2009-11-13-fixing-a-broken-eskom/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00673.warc.gz
en
0.96834
1,681
1.789063
2
A statement and a question always comes up for me around the topic of emotions in the corporate setting. The statement is that “There is no place for emotions in business!” The question is: “Why do all executives I know at one time or another do unproductive behaviors?” This diagram is an attempt to explain why. When an executive is experiencing an uncomfortable emotion they can still be productive until it hits a certain threshold that they have. Thresholds are different for each person and they are also different for the same person in different settings. The deep cut here is that the settings of the threshold line come out of the executives belief structure and their attitudes. For an example: if I made a presentation where I was doubtful about either my content or ability to deliver it and some makes a derogatory comment afterwards I may: 1. Attack, intimidate or threaten them in some way or 2. Withdraw, accommodate or avoid the conversation – without my even knowing that I did it! There may be other words that describe your behavior but in many instances it won’t be productive. If you are emotionally balanced and have good self esteem then maybe you would choose a productive response such as: “Gee, it seems like you think the presentation could have better met your needs, can you share with me how that might have looked?” The operative dynamic there is “emotionally balanced.” A large part of emotional intelligence is about raising the threshold line and elevating one’s awareness as the intensity of a particular emotion is occurring and having the ability to express or manage it in productive ways. For if we are not aware of the rising intensity then we are very liable to be emotionally hijacked. So here are the keys to avoiding a hijacking: - Become more aware of your emotions particularly when they become intense - Learn how to express yourself emotionally to help release the pressure - If you’re nearing the threshold line take a break, a breath or even say that you are having a strong reaction to the conversation and want to take a break. Doing this will give you more choices in behavior and keep you on the productive side. If you want more information, contact us.
<urn:uuid:326a1d5b-0928-4c8b-b492-cc627ba8feb6>
CC-MAIN-2022-33
https://www.collaborativeoutcomesinc.com/emotional-hijacking/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.958834
457
2.203125
2
This is an attempt to clarify a few of the remarks I've made over the last several days regarding the need for government intervention in health care markets. There are two separate reasons to intervene, market failure and equity. Taking market failure first, there are a variety of failures in health care and insurance markets such as asymmetric information, market power, and principal agent problems. These can be solved by the private sector in some cases, but in others government intervention is required. But even if the private sector or the government can solve the market failure problems adequately, there's no guarantee that the resulting distribution of health care services will be equitable. We don't expect the private sector to, for example, make sure that everyone can live on the coast and have an ocean view if they so desire, we use market prices to ration those goods, but we may want to make sure that everyone can get health care when they have serious illnesses. So equity considerations may prompt the government to intervene and bring about a different distribution of health care services than would occur with an efficient market. I believe that economists have something to offer in both cases. In the first, economic theory offers solutions to market failures, and though not every market failure can be completely overcome, the solutions can guide effective policy responses. I prefer market-based regulation to command and control solutions whenever possible, i.e. I prefer that government create the conditions for markets to function rather than direct intervention. But sometimes the only solution is to intervene directly and forcefully. In the second case, the idea is a bit different. Here, equity is the issue so somehow society must first designate the outcome it is trying to produce before economists can help to achieve it. Right now, it is my perception that the majority of people want to expand to universal or near universal coverage if we can do so without breaking the bank, and without reducing the care they are used to. If we can find a way to do that, the majority will come on board. If that's the case, if that's what we have collectively decided we want, then the job of the economists is to find the best possible way of achieving that outcome (or whatever outcome is desired) given whatever constraints bind the process (whether political realities should be part of the set of constraints is a point of contention, so I'll stay silent on that). So if we are only concerned about efficiency, we do our best to resolve the market failures and leave it at that. We make sure, for example, that people have the information they need to make informed decisions about their care, that there aren't incentives that cause doctors to order too much or too little of some type of care or test, that monopoly power is checked, etc., etc. There's no guarantee that everyone will receive care, or that the distribution of care among those who do receive care will be as desired. But if we are concerned with equity too - and most of us aren't comfortable watching people suffer when we know that help is readily available (perhaps nature imposes this externality upon us purposefully) - if we won't let people die on the street or suffer needlessly due to our sense of fairness and equity - then we will want to intervene to achieve broad based coverage in the least cost and fairest manner we can find (and there may be other equity issue that are important too). Both reasons, equity and efficiency, can justify government intervention into health care markets. I think equity is of paramount importance when it comes to health care, so for me that is enough to justify government intervention, and the existence of market failure simply adds to the case that government intervention is needed. So those opposed to government involvement in health care markets have to first argue that there is no market failure significant enough to justify intervention, a tough argument in and of itself, and also argue that people who, for example, go without insurance or cannot afford the basic care they need deserve no compassion whatsoever from society more generally. That's an argument I could never make even for those who could have paid for insurance but chose to take a chance they wouldn't need care, let alone for those who cannot afford it under any circumstances. I want everyone to be covered as efficiently as possible, and to be required to pay their fair share of the bill, whatever that might be, for the care that's made available to them.
<urn:uuid:b14ed290-3e1f-4b12-af16-830a61312009>
CC-MAIN-2022-33
https://economistsview.typepad.com/economistsview/2009/07/equity-and-efficiency-in-health-care-markets.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.965504
886
1.59375
2
If you are like many people suffering from drug and alcohol addictions, you may also be suffering from a mental health condition. Untreated mental illness often contributes to the cycle of addiction. Many people may try to achieve sobriety without entering treatment only to find that this often exacerbates their mental health conditions. Our treatment program is designed to incorporate mental health treatment into the addiction treatment program. Family Fear And Anxiety When Dealing With Addiction But Not Your Mental Illness Attempting to recover from drug and alcohol addiction without treating underlying mental health conditions can result in a roller coaster effect. Since an addict’s body and brain are not used to abstaining from drugs and alcohol, trying to maintain sobriety on your own and without mental illness treatment can make you suffer from manic episodes or intense depression. These intense mood swings may cause confusion amongst your loved ones. Our treatment program works to treat the mental illness conditions that fuel your addiction while working to help you achieve lifetime sobriety. Using cognitive behavior therapy, group counseling, and individual counseling along with relaxation techniques and diet, we help our patients live a healthy and happy life without drugs and alcohol. Addiction Causes Disconnection With Partner Drug and alcohol addiction may cause you and your partner to feel disconnected. You may find yourself feeling as though you have nothing in common with them. These feelings may lead you to turn to pornography, prostitutes, and even another partner. These behaviors may lead to the disintegration of your marriage, leaving children feeling as though it is their fault. Seeking the help you need to overcome addiction can help change your pattern of behaviors. Our program offers family counseling sessions designed to educate your loved ones and strengthen your relationship with them. Having a family support system during your recovery can help you transition into sobriety. Ongoing Conflict And Violence When Suffering From Mental Illness And Addiction Many people who suffer from mental illness and addiction have ongoing conflict in their homes. Whether the conflict is with your spouse or your children, the constant struggle to maintain a family and control your addiction may become too much. Children have a difficult time respecting parents who are not fully involved in the activities of daily life and spouses may become angry over your absence. If your addiction has contributed to financial instability in your home or any other touchy subject, the arguments may become physical. During our mental health treatment program in CA, you will learn appropriate and healthy ways to handle the stress of daily life through a variety of therapy sessions. We will help to mend damaged relationships between yourself and your loved ones and teach them how to be the ultimate support system in your recovery.
<urn:uuid:172b1ae5-a89b-46a7-ac7c-e43dcddea03a>
CC-MAIN-2022-33
https://www.avalonmalibu.com/blog/dealing-addiction-mental-illness-see-affects-family/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.942535
535
1.984375
2
State Makes USI a Charter School Authorizer The University of Southern Indiana has been approved as a charter school authorizer by the Indiana State Board of Education. WNIN’s Sarah Kuper has more on what that means for USI and area school opportunities: While still a public school, charter schools in Indiana may be structured differently, serve a specific population or focus on a particular area of study. Now, USI is designated as a charter school authorizer - which means the university can decide who can start a new charter school, set academic and operational expectations, and oversee school performance. The first charter school the university will oversee is the Indiana Agriculture and Technology school based in central Indiana. There, middle and high school students have a project-based curriculum focused on agriculture and technology. University and charter school spokespersons say an area USI may pursue is bringing the Ag-Tech school set up to the Evansville area. This could be in collaboration with the already established Joshua Academy charter school.
<urn:uuid:d85014e0-a838-4c13-a4ba-33f4e5e13ef8>
CC-MAIN-2022-33
https://news.wnin.org/local-news/2021-08-27/state-makes-usi-a-charter-school-authorizer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.960584
207
1.828125
2
GROUNDWATER VULNERABILITY AND THE REUSE OF WATER, WITH REFERENCE TO SAUDI ARABIA (pp. 179-184) J.W. Lloyd, Hydrogeological Research Group, School of Geological Sciences, University of Birmingham, UK Abstract: It is noted that an integrated water supply system incorporating surface water, groundwater and recycled water is essential and that in the definition of groundwater resources consideration should be given to the inclusion of some brackish and saline waters. The abstraction of groundwater in Saudi Arabia, irrespective of quality, is a mining operation so that increasing emphasis will need to be placed on desalinization and the recycling of sewage and industrial waste waters. Aspects of the reuse of such waters are discussed with respect to aquifer protection and aquifer value as a storage medium. MANAGEMENT OF GROUNDWATER RESOURCES IN EASTERN SAUDI ARABIA (pp. 185-210) Mohammed Rasheeduddina, W.A. Abderrahmana and J.W. Lloydb aWater Section, Center for Environment and Water, Research Institute, King Fahd University of Petroleum and Minerals, Saudi Arabia; bHydrogeology Research Group, School of Geological Sciences, University of Birmingham, Edgbaston, UK Abstract: Effective management of groundwater in arid countries, such as Saudi Arabia, is an important factor in sustainable development. A regional numerical simulation model of a multi-aquifer system including the Dammam and Umm Er Radhuma (UER) aquifers was developed to assess the behaviour of the aquifer system under long-term water stresses. The model was utilized to predict the responses of the aquifer system under three alternative pumping schemes over a planning horizon of 31 years (1995–2025). Model results postulate that dewatering of the Dammam aquifer will occur at low productivity sites and along the outcrop with the current trend towards increasing abstraction. The UER will exhibit significant cones of depression at large irrigation projects. Aquifer dewatering and drawdowns will be minimal with the conservation alternative. This management scheme should be adopted for the future development and protection of groundwater in the province. UPCONING AND SALINE WATER INTRUSION AND THE NEED FOR WATER CONSERVATION IN THE LOWER PART OF WADI FATIMAH, WESTERN SAUDI ARABIA (pp. 211-226) Mohammed Amin Sharafa, Mohammed Tahir Husseinb and Abdulaziz M. Al-Bassamb aFaculty of Earth Sciences, King Abdulaziz University, Saudi Arabia; bDepartment of Geology, College of Science, King Saud University, Saudi Arabia Abstract: Shallow aquifers were exploited in western Saudi Arabia a long time ago in history. In the last five decades, and under the conditions of an increasing supply of water, many new wells were drilled at relatively deeper intervals than the hand-dug wells of the time. In the downstream part of Wadi Fatimah, and over time, more saline water has been brought up in a number of wells. Overexploitation of groundwater for industrial and agricultural purposes has led to the appearance of two phenomena responsible for the salinization—upconing and saline water intrusion. Upconing occurs in separate pockets while saline water encroachment affects the lower part of Wadi Fatimah and the area towards the Red Sea coast. This article deals with the identication and delineation of areas affected by each of the two phenomena. The methodologies used in this work are mainly hydrogeological and hydrochemical. Resistivity surveys helped in delineating the fresh water–saline water interface. Methods to control upconing and saline water intrusion are suggested to safeguard the aquifer from further contamination. Effective conservation measures are recommended for the protection of groundwater resources in Wadi Fatimah. GROUNDWATER RIGHTS AND LEGISLATION FOR SUSTAINABLE DEVELOPMENT IN ARID REGIONS: THE CASE OF SAUDI ARABIA (pp. 227-235) Mohammed Tahir Hussein, Department of Geology, King Saud University, Saudi Arabia Abstract: The main objective of this article is to shed light on an important issue of water conservation—groundwater rights and legislation. Principles of groundwater rights are detailed and their applications to major aquifer systems, groundwater basins and wadis are discussed. Legislation and the clarification of water rights are vital for the sustainable development of groundwater. They are urgently needed in Saudi Arabia in particular and in all areas where demand exceeds supply. Legislation is one of the main pillars upon which any conservation policy is built. In this article a model is suggested for groundwater allocation in aquifers shared by more than one state. HYDCOND: A COMPUTER PROGRAM TO CALCULATE HYDRAULIC CONDUCTIVITY FROM GRAIN SIZE DATA IN SAUDI ARABIA (pp. 237-246) H.S. Awad and A.M. Al-Bassam, Department of Geology, King Saud University, Saudi Arabia Abstract: Hydrogeologists always look for reliable techniques to determine the hydraulic conductivity of the aquifers with which they are concerned, for better groundwater management and conservation. The use of grain size distribution for unconsolidated aquifer materials is considered feasible and sound. Several empirical equations to calculate hydraulic conductivity using grain size distribution are well established in the literature. The present paper describes a computer program, HYDCOND, which is designed to calculate hydraulic conductivity using grain size data. In addition, the program calculates grain size statistics and classifies the aquifer materials in terms of their main size percentage. HYDCOND is menu-driven, interactive and user friendly program. It was tested extensively and successfully using materials from Minjur aquifer in central Saudi Arabia. The results were found to be reliable and comparable to those obtained using other, costly techniques. HYDCOND can be implemented successfully to calculate hydraulic conductivity in all types of aquifers in Saudi Arabia and other regions of the world. ENERGY AND WATER IN ARID DEVELOPING COUNTRIES: SAUDI ARABIA, A CASE-STUDY (pp. 247-255) Walid A. Abderrahman, Water Section, Center for Environment and Water, Research Institute, King Fahd University of Petroleum and Minerals, Saudi Arabia Abstract: In Saudi Arabia, where water resources are limited, the availability of energy resources, including petroleum, natural gas and electricity, helped in solving the challenge of satisfying rapid and substantial increases in water demand for drinking and industrial and agricultural purposes. Thirty-five major dual-purpose multi-stage flash distillation (MSF) and reverse osmosis (RO) desalination plants were constructed on the Red Sea and Gulf coast to produce drinking water. The process energy requirements for MSF and RO range between 19.5 and 38 kWh/m3, and 0.5 and 9 kWh/m3, respectively. The MSF plants produce about 20% of the total national electricity production. About 85 000 wells were drilled to satisfy the increasing irrigation water demands. The energy requirements to pump 1 m3 from wells range between 0.4 and 0.8 kWh. The adoption of advanced technologies is continuing to reduce power consumption and water demand to conserve energy and water, and to minimize negative impacts on the environment. INVESTMENT NEEDS AND PRIVATIZATION OF WATER SERVICES IN SAUDI ARABIA (pp. 257-260) Adil A. Bushnak, Bushnak Group, Saudi Arabia Abstract: The article outlines the dynamics of the privatization of water supply and sanitation services in Saudi Arabia. It also gives a summary of the projected requirements of desalination plants’ capacity and the estimated capital investment needed for water supply and sanitation services. It gives a summary of public and private initiatives to privatize water services in Saudi Arabia. COMPUTERIZED AND DYNAMIC MODEL FOR IRRIGATION WATER MANAGEMENT OF LARGE IRRIGATION SCHEMES IN SAUDI ARABIA (pp. 261-270) Walid A. Abderrahman, Niaz Mohammed and Ibrahim M. Al-Harazin, Water Section, Center of Environment and Water, Research Institute, King Fahd University of Petroleum and Minerals, Saudi Arabia Abstract: Irrigation water consumption in Saudi Arabia represents about 90% of the national water use, and the limited groundwater resources are the major water supply for irrigation. Improper irrigation water operation accounts for significant water losses in some large irrigation schemes. Consequently, the use of advanced techniques in irrigation operation and scheduling is essential for the reduction of irrigation water demands. A new and original Computerized and Dynamic Irrigation Water Management System (CDIWMS) was developed for automatic and/or manual irrigation operation and scheduling of irrigation schemes containing a large number of fields. The CDIWMS is supported by a comprehensive and dynamic database management system. The system performs several functions, including the dynamic modification of field information and operation conditions such as the delaying or suspension of irrigation, and the setting of fields for cutting or harvesting. The model was tested and implemented successfully in several large irrigation schemes in the Kingdom of Saudi Arabia using full automation and manual operation. The implementation of the CDIWMS has resulted in a saving of more than 25% of the water, energy and costs of operation and maintenance, and in an increase in agricultural production.
<urn:uuid:7e14ea2f-1f56-48a7-8cab-29032892ebef>
CC-MAIN-2022-33
https://thirdworldcentre.org/2001/06/volume-17-issue-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.904702
1,996
1.96875
2
The Terrex Armoured vehicle personnel carrier was developed as a private venture by Singapore Technologies Kinetics in close association with Timoney High Mobility Vehicles of Ireland. The first prototype of the Terrex AV81 APC was completed in the facilities of Timoney Technology of Ireland, which is now partly owned by Singapore Technologies Kinetics. This was first shown in the UK late in 2001. In late 2003 the first of two preproduction models of the Terrex APC was completed and the first of these made its first public appearance during the IDEF 2003 exhibition held in Ankara. On 31st May 2011, the Singapore Armed Forces' (SAF) first Motorised Infantry Battalion was declared fully operational. It was a groundbreaking milestone for our Army's continuous push to enhance our fighting capability. Held at the Murai Urban Training Facility (MUTF), the soldiers of the 2nd Battalion Singapore Infantry Regiment (2 SIR) displayed to all present their enhanced fighting capabilities integrating the Terrex Infantry Carrier Vehicle (ICV) into their operations. - Terrex Personnel carrier: Designed to provide rapid mobility with protection for up to twelve soldiers, including the driver. - Terrex Command Post: Designed for command and control functions within the battalion and squadron headquarters. - Terrex Recovery: Equipped with a 20 tonne crane, mounted at the rear top of the hull, 15 tonne recovery winch and onboard generator. - Terrex Mortar carrier: equipped with 81 mm or 120 mm mortar The TERREX can be fitted with a remote controlled weapon station armed with weapons up to 30 mm in calibre. The TERREX can be also armed with 40 mm automatic grenade launcher weapon station, which includes a coaxial 7.62 mm machine gun and smoke grenade launchers. The turret can be also replaced by a ring mount 12.7 mm machine gun. The Terrex has a modular top deck and its configuration can be changed from anti-tank missile carrier to a 105-mm fire support vehicle. The hull of the Terrex is of all welded steel armour construction to which an additional layer of passive armour can be added for a higher level of protection. The floor of the Terrex is of a V shape to help deflect the blast of anti-tank mines. It has spaced armour in the floor and other parts of the hull for increased battlefield survivability. The all-round ballistic protection provided by the baseline hull armour provides 7.62x51 mm NATO bullet protection. Ceramic-composite add-on armour could be applied as required to the hull faces, starting 800 mm above the ground and weighting about 800 kg to provide additional protection against STANAG Level 2 to Level 4 threats. Power pack of the Terrex consists of a Caterpillar C9 four-stroke turbocharged diesel engine developing 400 hp, coupled to an Allison MD4560P fully automatic transmission. The air intake and outlet louvers are in the roof with the exhaust outlet on the right side of the hull. This power pack gives a maximum road speed of 120 km/h. The Terrex is equipped with an independent suspension system, greatly improving ground mobility and ride comfort over the roughest terrain. The use of large footprint off-road tyres enables the Terrex to traverse soft ground with ease. Mobility is further enhanced by a built-in Central Tyre Inflation System (CTIS), allowing automated inflation and deflation of tyres to suit different terrain while on the move. The all wheel Anti-lock Braking System (ABS) improves safety for highway operations and the Traction Control System (TCS) provides better performance over rough terrain. The TERREX is also fitted with collective NBC filtration and air conditioning system. To minimise its thermal signature, the engine exhaust is channelled downwards from the hull over head the gap between the first and second road wheels on the right side, thereby minimising the thermal bloom. Standard equipment includes powered steering on the front four wheels, central tyre-pressure inflation system, anti-lock braking system and nuclear, biological and chemical defensive system, but there are numerous options. In its baseline configuration, the Terrex is fully amphibious: two water jets mounted one either side at the back of the hull propel the vehicle through water at 10km/h. Remote controlled weapon station armed with weapons up to 30 mm in calibre or 40 mm automatic grenade launcher with 7.62 mm coaxila machine gun or 12.7 mm machine gun. NBC protection system, air conditioning, Central Tyre Inflation System, night vision, Anti-lock Braking System
<urn:uuid:4e93a2ee-c0b5-4efd-8be0-08f8e6434fb9>
CC-MAIN-2022-33
https://www.armyrecognition.com/singapore_army_military_wheeled_armoured_vehicle_u/terrex_armoured_personnel_carrier_technical_data_sheet_specifications_description_pictures_uk.amp.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.921948
967
1.5
2
We wrapped up a week-long summer camp on StopMotion Film Making today at the Edmond Fine Arts Institute, and students showed off the results of their creative week of filmmaking during a “showcase” at the end of class. All told, each student pair created four films each. Day 1 was an experimental film learning the basics of the free SAM Animation software program. In day 2 we introduced storyboarding and the concept of dramatic structure. On day three students experimented a little with claymation / stopmotion with modeling clay, made a short claymation film, and started to plan their longer, final project. Final projects were actually created, with both stopmotion video and sound/audio effects, on days 4 and 5. Final projects had to be at least 30 seconds long, but students could decide what frame rate they wanted to use. Most used a framerate between 5 and 10 fps. SAM makes it very easy for students to change the framerate, which is nice, but this may have created some of the problems I had tonight when uploading these to YouTube. (See below for more details.) Students used microphones to record voiceover narration, and also used the PodSafe Music Network for music as well as Soungle and FindSounds.com for sound effects. All these sites for sound and music are listed on the music/audio resource page of our Celebrate Oklahoma Voices project. Some of the music they used did originate on other sites, and (of course) this provided a good context to discuss copyright and fair use. In the case of one group, which used a clip of “The Imperial March” by John Williams from the Star Wars film series, I showed them how to edit and fade out music using the free program Audacity. For the first three days of camp, we started by watching and analyzing several sample stopmotion films. Most of those examples are listed/linked on our workshop wiki. Here are the students’ final projects! They did great and I think had a lot of fun learning about stopmotion. We met for three hours each weekday this week, from 3 to 6 pm. These projects represent about 5-6 hours of work for each student team. Students in the camp ranged in age from 9 to 14 years old. (If you listen closely in some of these videos, you may hear the voice of a guest actor whose name you know!) The Final Fight by Uday and Ben (52 seconds) This is the 3rd part of a fun trilogy they made using goldfish and other characters. The Arcade by Ben and Spencer (32 seconds) This is a movie about a character who falls into a video game and has to win at several games in order to get out. The Three Sea Creatures by Supriya and Sarah (50 seconds) This movie is a takeoff on “The Three Little Pigs,” where the villain is an evil goldfish. The Alien Invasion of 92 by Cameron and Christian (50 seconds) This movie is a brickfilm (stopmotion with legos) and uses some creative effects they thought of themselves. I thought it would be very straightforward to upload these to YouTube, but for some reason a lot of frames were skipped in the initial Flash-encoded YouTube versions I uploaded. I’m not sure if that was a function of the original framerates at which these were encoded or something else. After reading several online articles about optimal QuickTime Pro export settings for StopMotion movies and YouTube, I adjusted the settings and used a fixed framerate of 10 for re-exported versions of these videos. That seemed to do the trick when I uploaded to YouTube, as the resulting Flash videos seem to have all the frames of the original videos included! The audio tracks are also in sync with the video track, and that was a problem with some of the videos for some reason the first time I uploaded them. Parents gave very positive feedback following our “showcase” in which we watched all the films students created during the week. Several reported that their kids LOVED learning about and doing stopmotion, and couldn’t wait to come back to class each day this week! This was a lot of fun, but also quite a bit of work. I plan to share a lengthier reflection about “lessons learned” leading this camp soon. I may record an audio podcast with my 11 year old son, Alexander, who helped me facilitate the camp. He was a HUGE help, and it was great to see him sharing his expertise with other students as well as working to tactfully keep student groups on task. (Something which is often a challenge during cooperative learning, even when students are doing something fun and engaging like creating stopmotion films!) We used all of our own equipment for this camp, except for several painter’s lights which were provided by one of the staff members. I owe a big thanks to the open source developers of maccam, since that driver allowed us to use two old, inexpensive webcams for student SAM projects. The big mystery of the week, which is still unresolved, is why my father-in-law’s Sony MiniDV recorder stopped sending video out the firewire cable after day 2. We tried everything to reset it, use different cables, etc, and nothing worked. Thankfully we had a portable iSight camera, 2 old USB webcams, and my old Sony Digital8 camcorder. On two occasions student groups had to try making videos with the built-in iSight on a Macbook laptop, and that was REALLY tough. An external camera/webcam which you can mount on a tripod or has its own support base is essential for stopmotion filmmaking. I posted 70 photos I snapped with my iPhone during our workshop to Flickr this evening. Let’s hear it for creative filmmaking fun! 🙂 If you enjoyed this post and found it useful, subscribe to Wes' free newsletter. Check out Wes' video tutorial library, "Playing with Media." Information about more ways to learn with Dr. Wesley Fryer are available on wesfryer.com/after. On this day.. - Inspired by iPadPalooza 2014 Visual Notetaking - 2014 - To list or not to list? It’s Summer in the Northern Hemisphere! - 2012 - A reminder to change your router password - 2010 - Prepping for a week of stopmotion fun! - 2008 - NECC 2008 Podcasters beware! New ISTE policy on new media conference coverage - 2008 - links for 2008-06-19 - 2008 - Visualizing tweets - 2008 - Planning, Funding and Sustaining Strategies for Successful 1:1 Computing (K-12) by Bruce Dixon - 2007 - Kicking Your Digital Photography UP a notch by Lesa Snider King - 2007 - Notes from Alan Kay's keynote at EduComm07 - 2007
<urn:uuid:e32ec6aa-8e81-46b5-8c30-f22b0e6fde69>
CC-MAIN-2022-33
https://www.speedofcreativity.org/2009/06/19/final-stopmotion-project-videos-2009-edmond-fine-arts-institute-summer-camp/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.962391
1,428
2.234375
2
- 1 What would be considered a humanities elective? - 2 What are examples of humanities subjects? - 3 What are the 5 areas of humanities? - 4 What are humanities courses in university? - 5 What comes to your mind when you hear the word humanities? - 6 What are the easiest humanities classes? - 7 What is humanities in your own words? - 8 What is the method of humanities? - 9 Is humanities a difficult class? - 10 What are jobs in humanities? - 11 What is the difference between humanities and arts? - 12 How can humanities makes us human? - 13 What humanities degree is best? - 14 Is music a humanities course? - 15 What are the 7 arts in humanities? What would be considered a humanities elective? Humanities electives are from the departments of Classics & Modern Languages, English, History, Philosophy or Theology. Your elective may not double-count with any other core requirement (except flagged courses — Diversity, E/RS, Writing, Oral Communication or Quantitative Reasoning). What are examples of humanities subjects? Generally, humanities are defined as the branches of learning that have a cultural character. Any subject that covers, in some way, human culture, can be considered a humanity. This includes the history of art, classics, history, literature, performing arts, philosophy, theology and even anthropology. What are the 5 areas of humanities? Branches of the humanities include law, languages, philosophy, religion and mythology, international relations, gender and women’s studies, multicultural and regional studies, popular culture, and art and music, while branches of the social sciences include sociology, anthropology, archeology, geography, political What are humanities courses in university? The Humanities are the disciplines which study human beings and their cultural products. These disciplines include anthropology, history, language and literature, philosophy and political science, to name just a few. What comes to your mind when you hear the word humanities? When you hear the word “humanities,” what is the first thing that comes to mind? ” Human nature, people, relationships, understanding others. ” What are the easiest humanities classes? Easiest Humanity Course - Art and Culture. - The Arts. - Introduction to Humanities. - Introduction to Literature. - Music and culture. - Introduction to philosophy. - Theater and Culture. What is humanities in your own words? humanities Add to list Share. The humanities are studies about human culture, such as literature, philosophy, and history. The humanities provide general knowledge about the best accomplishments of human beings throughout history. Learning the works of Shakespeare, Plato, and Beethoven is part of the humanities. What is the method of humanities? The humanities use methods that are primarily critical, or speculative, and have a significant historical perspective. In both the social sciences and the physical sciences, the empirical method is a way of gaining knowledge by means of direct and indirect observation or experience. Is humanities a difficult class? So, what people mean by saying that humanities is easy is that giving an IAS exam is very difficult but studying the subjects is simple. A humanities student is expected to study books and books of historical, political, social events. They have to study psychology and sociology and geography. What are jobs in humanities? A degree in humanities offers a variety of career paths to choose from and can include jobs in the fields of arts, writing, psychology and marketing. Humanities degree career paths - Graphic designer. - Technical writer. - Sign language interpreter. - Travel agent. - High school teacher. - Human resources specialist. What is the difference between humanities and arts? ANSWER (1) Arts is basically related to painting, sculpture, music, theatre, literature, etc., whereas Humanities is a study of literature, philosophy, art, etc. Arts is basically related to painting, sculpture, music, theatre, literature, etc., whereas Humanities is a study of literature, philosophy, art, etc. How can humanities makes us human? The humanities help us understand others through their languages, histories and cultures. Humanities students build skills in writing and critical reading. The humanities encourage us to think creatively. They teach us to reason about being human and to ask questions about our world. What humanities degree is best? Which Humanities Majors Make The Most Money? - Fashion Design. - Child & Family Studies. - Elementary Education. - Social Work. - Human Development. - Special Education. It takes a lot of passion to pursue what you love, especially if you know you’re not in it for the money. Is music a humanities course? The humanities include ancient and modern languages, literature, philosophy, religion, and visual and performing arts such as music and theatre. What are the 7 arts in humanities? Some subjects in the humanities are history, linguistics, literature, theology, philosophy, and logic. The arts have also been classified as seven: painting, architecture, sculpture, literature, music, performing and cinema.
<urn:uuid:91f96305-478e-4909-aa75-12addb9e651c>
CC-MAIN-2022-33
https://teachhigh-phi.org/humanities/question-what-are-some-humanities-electives.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.915385
1,093
2.59375
3
The Mysterious Holes of Peru: A Pre-Columbian Domestic Water Source for Trans-Oceanic Travelers? Part I No really serious attention has been paid by scientists to resolve the mystery of nearly 7000 'pits' that snake their way for almost one mile across the rugged Cajamarquilla Plain bordering the Pisco Valley of Peru, South America. Just as with their near neighbour the famous Nasca Lines , this curiously patterned stream of cavities (pits) now attracts a plethora of theories concerning its original purpose: silos for grain storage, for water, local tribal defenses, vertical tombs in a mass graveyard - or even a coded message to the Sky Gods! To date the site has revealed no real artifactual evidence whatsoever—just a path of empty holes excavated into a limestone escarpment for no apparent rhyme or reason. No tools have been found, no skeletons or bones, no potsherds or textiles—nothing. However, the ‘pits’ are extremely interesting. Around 7000 have been excavated into a band some 20 meters wide (65 feet), each hole averaging half a meter in diameter (25 inches). Some pits are set in near perfect straight lines, some in curved rows. Each row averages between nine and 12 cavities. Again, as with the Nasca Lines, only from aerial photographs can you truly observe the unique and deliberately precise nature of the elaboration. Screenshot from Google Maps showing long band of holes. There are very distinct types of indent. The larger have a deliberate brick-like construction some two to three meters (six to seven feet) depth. Others are quite shallow 'scoops'; wide rimmed and generally not more than a foot deep. Where the band terminates at its southern end there are two, 24 meter diameter (70 feet) pits, now filled with debris. I am given to understand there are at least another half a dozen of similar size close by. - Mile-long band of mysterious and unexplained holes in Pisco Valley, Peru - Sea-Farers from the Levant the first to set foot in the Americas: proto-Sinaitic inscriptions found along the coast of Uruguay The mysterious holes of Pisco Valley, Peru. (CC BY 3.0) I first became aware of the "Peruvian Holes" shortly after I discovered the Temple of the Sacred Lamb in the High Andes Mountains. I believed that whoever constructed the huge temple complex might have chosen the Pisco River Valley as a natural route to the mountainous retreat from the Pacific Ocean. My curiosity was also aroused by a local report that a huge bull's head effigy, which according to local legend, “had been there forever,” was to be found high up on a cliff-side, just 20 kilometers (12.5 miles) east of Pisco town. If absolutely genuine and of great age, I hoped to reconstruct a chronological time frame based upon the bull effigy, the Temple of the Sacred Lamb , and the huge, third to fourth century BC Phoenician inscription I had uncovered within the Nasca Lines. The mysterious band of holes are on the exact Pisco Valley route to the interior. Was there any connection? Little did I realize at the time just how strong this connection would be. The maritime nation of Minoans worshipped the bull. Likewise, the Phoenicians worshipped the goddess Astarte, who was often symbolized in the form of a bull. The Phoenician god, El Baal, was also depicted in the image of a bull. Later, bull worship was continued by the Greeks. Bull worship was in fact traditional among many ancient civilizations. My immediate thoughts compared the ‘holes’ scenario with the desertification that had confronted the Nasca Region circa AD 690. The local Chincha region, also part of the Atacama Desert, must have suffered the same hardships as the Nasca due to lack of a regular water supply. At Chincha even occasional, heavy, high-altitude storms, interspersed with local light rains, would have only provided a short term solution. A water collection, filtration, storage and supply system, to provide large quantities of fresh clean water which could be stored over the long term for domestic and agricultural purposes, was essential. One may never know the original carrying capacity of this mile-long reservoir, or the rate of seepage. As an estimate, if a cell held a minimum average of 5 liters (1.3 gallons) of water; 7000 cells would furnish around 35,000 liters (7700 gallons) of water per filling. Also, until a hydrological survey is carried out, we do not know if the 24 meter (79 feet) diameter pit at the southern end of the chain was intended as a spring driven reservoir or if it operated as a normal Puquio, typical of those widespread across the nearby Rio Grande de Nasca Basin. Pre-Columbian Water Collection, Filtration, Storage and Supply System. The author's hypothetical solution for the chain of ' Mysterious Holes' located near Pisco, Peru, South America. (© William James Veall. October 2010) There are a number of important issues associated with the water supply facility. To operate as an efficient water collection/filtration device, cavities must have been cleansed of superficial debris on a regular basis, hence the reason scientists have never found any artifactual evidence. By the same token, a local labor force must have been recruited and supervised for construction and cleansing duties. In short, my humble opinion is that 'Humay' became a "Pit Stop" whereby inbound traffic, (e.g. trans-oceanic seafarers) and outward bound traffic could replenish their stocks of water. It also served to cater for local domestic and agricultural demand. With an enclave of numerous ruined buildings a little east of the holes I suspect that Humay was a thriving 'port of call' in ancient times. So, here we have what I believe was a major consideration in constructing the massive water collection and filtration system just inland of the Pacific Coast. I believe the Pisco Valley was one of the major transit routes into and out of mainland Peru from the Pacific Ocean. The bull effigy (El Baal?) high up at the Valley entrance not only bid welcome and godspeed to the Oceanic Traders to and from their Mediterranean homeland, but the effigy was equally a typical Phoenician 'New Kingdom' frontier marker—such as at Tel Dan and the Bethel Kingdom of Israel. - The Lost City of Z and the Mysterious Disappearance of Percy Fawcett - Tipón, Peru and The Hydro Engineering Marvel of the Inc Further, at what point in time did all hydraulic activity cease, and why? This would make for an interesting project for students of ancient hydrology and geomatics. Although a water filtration, storage and supply system is my claim for the primary purpose of the band of holes, this still does not answer the question; why the elegant elaboration? To perform the function intended, holes could be in any chosen order, neat parallel rows or simply randomly disposed. With a chain of material stretching over a mile long to study, I believe I have uncovered a very logical reason for the embellishment. In Part 2, with the aid of aerial pictures and explanatory diagrams I will demonstrate the reason behind the seemingly random disposition of the holes. I will also expose the ancients’ incredible knowledge and expertise in manipulating the effects of light and shadow to ground based petroglyphs; thus permitting imagery and inscriptions to be clearly visible at a low angular viewing distance under favorable solar and lunar light conditions. There must have been a very powerful motive to go to such lengths of artistic elegance. William James Veall examines a large, debris filled, 'pit' at the southern end of the chain of indents known as the 'Mysterious Holes of Peru'. (© William James Veall.) Featured image: Mile long band of mysterious and unexplained holes in Pisco Valley – Peru. (CC BY 3.0)
<urn:uuid:148ab8be-17b2-4844-9f18-bb6f1c563e4c>
CC-MAIN-2022-33
https://www.ancient-origins.net/unexplained-phenomena/mysterious-holes-peru-pre-columbian-domestic-water-source-trans-oceanic-020507
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.947018
1,685
3.484375
3
Oracle Database 10g introduced Database Control (dbconsole) to aid in day to day administration tasks and monitoring. When building a database for use as a repository for Oracle Enterprise Manager Grid Control or the recently […] Using Database Control you can configure RMAN to back up you database to disk or tape with relative ease. This document will detail how to configure RMAN for disk based backups and perform a backup. A common problem with 10g and higher database is that Database Control fails to start after installation. This more common on desktop and laptop installs but the resolution is the same.
<urn:uuid:ce740512-0b05-4120-8d12-064d34160ea3>
CC-MAIN-2022-33
https://oracledistilled.com/category/oracle-database/administration/database-control/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.885629
116
1.75
2
A key legislative panel on Thursday approved a measure that would make Texas the largest state in the country to recognize, “the United States Constitution as our permit to carry.” The specially formed Constitutional Issues Committee in the state Senate approved HB 1927 by an easy 5-2 vote, sending the proposal to the floor next week for further debate. The Republican-backed bill was approved 84-56 by the state House last week, roughly along party lines. Supporters argue that opposition to the move towards permitless carry is hyperbolic and is only an incremental step from what is already legal in the Lone Star State. Texas already has 1.6 million who are licensed to carry, and Texans can carry in their vehicles without a permit. “HB 1927 recognizes the United States Constitution as our permit to carry”, said state Sen. Charles Schwertner, R-Georgetown, one of the bill’s sponsors. “It allows all law-abiding adults to carry a handgun for the protection of themselves and their families.” The proposal, one of no less than three filed in the state legislature so far this session, would allow Texans who were at least 21 years old and legally permitted to possess a handgun to carry one in a holster without first having to get a license. Schwertner reiterated in the debate on HB 1927 that it would not change laws relating to possession of firearms and would keep the state’s current permitting system in place for those who wanted to use it. Read more…
<urn:uuid:98653706-21ae-4fb7-9f7c-e1f72bf609a3>
CC-MAIN-2022-33
https://armsalerts.com/texan-constitutional-carry-appears-imminent/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00673.warc.gz
en
0.961026
312
1.953125
2
Are you a native English speaker? How do you pronounce this word? a light brief snowfall and gust of wind (or something resembling that) Tutoring comment not yet available... LearnThatWord and the Open Dictionary of English are programs by LearnThat Foundation, a 501(c)3 nonprofit. Questions? Feedback? We want to hear from you! or click here for instant support. Copyright © 2005 and after - LearnThat Foundation. Patents pending.
<urn:uuid:f4b04419-13a8-486c-aa63-5c9cb1d55669>
CC-MAIN-2022-33
https://www.learnthat.org/dictionary/163887_snow%20flurry.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00673.warc.gz
en
0.865812
102
1.804688
2
I was asked recently to design and give a walking tour on spatial (in)justice in Dublin, as part of the Landscape, Law and Spatial Justice International Symposium 2022. It is a new(ish) walk for me. Normally I would cover the IFSC or areas north of the Liffey so it’s been interesting to develop a walk that speaks to the theme of the symposium, as well as my own research interests, while basing it on a pathway that starts at St. Stephen’s Green and ends at the Cobblestone in Smithfield. Anyway, this is what I’ve come up with, and this post is really to help me remember the details (you can’t really read from a script on a walking tour it’s all memory I’m afraid!) and also for me to work out, through writing, the points I want to make. That’s the thing about writing: it’s as much about finding out what you think about things as explaining those thoughts to someone else. 1. St. Stephen’s Green Given the times we are living in, it seems appropriate to start the tour with Aercap house, the international headquarters of Aercap – the “World’s largest owner of commercial aircraft” with “$75 billion of assets including approximately 2,000 aircraft, over 900 engines and over 300 helicopters, and an order book of more than 400 of the most fuel efficient, new technology aircraft in the world.” Aercap has been in the news recently due to the war in Ukraine. The company had 135 aircraft and 14 engines on lease to Russian airlines at the time of the Russian invasion in February 2022. It was able to repossess 22 aircraft and three engines but has now lodged insurance claims totalling $3.5 billion due to the seizure of the remaining aircraft and engines by the Russian authorities. Aside from being topical, the building also serves to highlight one of the more ‘interesting’ aspects of Ireland’s GDP – the part that Paul Krugman labelled ‘leprechaun economics’ in a tweet on 12 July 2016. The hue and cry after Krugman’s intervention led to the CSO inventing a modified form of GDP it called GNI*. The calculation is not recognised outside of Ireland where GDP is still used to measure the Irish economy, but it does highlight the distorted effect companies like AerCap have on Ireland’s headline ‘growth’ figures – especially when those figures were used by successive government to ‘prove’ that austerity works. It didn’t, and doesn’t, the growth is a phantom, an accounting trick for tax avoidance. The presence of Aercap and the law firm Kennedy Wilson allows me to delve more deeply into this story, this aspect of the Irish state and the social and class relations that surround these operations. It also sets up the overall theme of the walk – which is, how did we end up with these social and class relationships, along with the idea of tax avoidance as a core industrial strategy, and how are these ideas and frameworks able to reproduce themselves despite the social dis-cohesion they wrought upon society. These are teased out more in stops three to six, with stops one to three setting up the relationships and ideology. 2. Cuffe Lane / mercer house / cuffe st flats In the Dublin Civic Survey Report published in 1945, the city architect Horace T. O’Rourke wrote: The impartial investigator of the Dublin housing problem must be forced to the conclusion that had the municipal area extended periodically in accordance with natural expansion, especially southwards, the expenditure [of town planning] would have been more equitably distributed, and the difficulty of finding suitable sites lessened.Dublin Civic Survey Report, p.67 The quote is interesting as it alludes to one of the structural issues that faced Dublin at the time – namely the tax flight to the suburbs. This had been commented upon as early as the 1880s by Charles Cameron in relation to the hygiene of the city: the hollowing-out of the tax base by the practice of potential rate-payers living outside the city boundaries but commuting by tram to work in the city each day. Which brings us to the corner of Cuffe Lane and Cuffe St and the three examples of public and social/affordable housing in the area. Mercer House consists of two blocks built over an eight-year period from 1926 to 1934. They were commissioned by Dublin Corporation and designed by its team of architects, with the first phase (1926-1930) led by Horace T. O’Rourke. The second phase (1932-24) was built under the supervision of the first dedicated city architect, Herbert Simms, who retained much of the original character and materials which were derived from the Arts and Crafts architectural tradition. (The walk will pass by one of Simms’ projects later on – Chancery Place flats beside the Four Courts – which broke with that tradition in favour of new ideas coming out of Amsterdam at the time.) Despite their outward elegance, Mercer House flats are currently in a significant state of disrepair and are in desperate need of upgrading. Cuffe Lane cottages (although two-storey buildings, the houses were referred to as ‘cottages’ to distinguish them from flats at the time) offer an insight into the private operators who were building what we refer to today as ‘social and affordable housing’. They were constructed by The Association for the Housing of the Very Poor and Industrial Workers Ltd, a private for-profit company that was set up in the late 1890s. On 8 May 1930 it held a meeting at Trinity Chambers, Dame Street with the Reverend David H. Hall presiding. It announced a profit of £1,861 and a dividend of 3% ‘free of tax, for the year ended December 21, 1920’. The company also said that, ‘In addition to the houses already erected thirteen more cottages would soon be erected in Cuffe Lane as a result of the kind assistance given by Messrs Jacob and the helpful attitude of the Commissioners in the way of sites. The Corporation was willing to give sites elsewhere also.’ The land it seems was given either for free or at a reduced rate by the Corporation, and Jacobs made a donation towards construction. It appears from the sale of one of the houses in 1991 that they were used by workers in Jacobs. The 1991 ad says that it was built by Jacobs, but this isn’t the case. They certainty invested in the houses, and probably allocated them to their workers, but it is also likely that the Association collected rent and paid out dividends on the back of it. The point of this stop on the walking tour is to highlight the ‘social housing’ model at play in Dublin from the 1880s onwards where housing was built and rented for profit and a reutrn of 3% for investors. The Dublin Artizans Dwellings company paid out 5% dividend. Housing Reits in Ireland today currently pay out an average of 3.75% on investment. Cuffe Street flats were built in 1963 and designed by the team led by Dublin city architect Niall Montgomery. As with Mercer House they are in need of significant investment. 3. Jacob’s Site, bishop st/aungier st The purpose of the Jacob’s stop is not only with the houses on Cuffe Lane. It also offers an opportunity to bring up the capitalist/comprador nature of the Irish state. Jacob’s was one of the most militant employers during the 1913 Lockout and in the 1920s the company threatened to pull out of Ireland if tariffs were imposed in any fashion. The stop allows me to set the scene for the core theoretical framework I have for understanding the Irish state and the way it has treated the housing issue since 2008. It helps to set up the talk at the next stop. 4. Ship St / Dublin Castle It is at this stage that the tour starts to move into the ideology of the Irish state – how it thinks, how it makes sense of the world and its place within it. 5. Mary’s Abbey Crossing over the river we encounter the original site of the Bank of Ireland, which opened up on 25 June 1783 at a now vacant site on Mary’s Abbey. This stop allows me to talk about the role of finance within Irish capitalism – in particular, comprador finance and its current manifestation in the IFSC. The presence of The Complex art studio and venue allows me to introduce the last part of the walk, which is to bring it down to municipal level and how the city itself is a city of capital flows facilitated by the City Council executive and administration – a point that will be fleshed out at the final stop at Smithfield. Here my part of the walk ends – at the corner of Smithfield Square. I’ll be using the story of Haymarket House and its owners, the Linders Group, to explore the way that space is used in Dublin today, tying together the various strands raised on the walk, before handing over to Prof. Amy Strecker for the story of the campaign to save the Cobblestone.
<urn:uuid:4dcaca94-8034-4dda-bdd6-8efae0a9ac05>
CC-MAIN-2022-33
https://conor-mccabe.com/2022/05/12/a-walking-tour-of-dublin-from-st-stephens-green-to-the-cobblestone/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.970212
1,954
1.515625
2
Recently, York City Mayor Michael Helfrich and the York County Commissioners issued proclamations announcing their cooperation with the U.S. Census Bureau to ensure an accurate count for the city and county. As part of this mission, the City of York, and the County of York, have partnered to create a Complete Count Committee (CCC) – a volunteer committee organized by state, county, and local governments, as well as community leaders to increase awareness about the upcoming Census and to motivate residents to respond. As done in previous decennial Censuses, York City and York County are collaborating by engaging school districts, faith-based organizations, businesses/associations, and community organizations to effectively use the trusted voices in our community to share the information and spread the word about the 2020 Census. Over $675 billion are distributed based on the Census count. Pennsylvania received $39,179,047,733 through Federal spending programs guided by data from the 2010 Census. It is estimated that York City and York County could lose up to $2,000 of Federal funding for each person not counted, or more than $20,000 per person every ten years. The U.S. Census Bureau is hiring 1,500 workers in York County in preparation of the 2020 Census. Positions pay $19/hour and 58 cents per mile of travel. Flexible hours and training are available. Please go to 2020census.gov/jobs to apply and obtain more information.View City Proclamation View County Proclamation
<urn:uuid:741774b4-8c01-46ec-97ec-219d44368551>
CC-MAIN-2022-33
https://www.yorkcity.org/partnership-with-the-u-s-census-bureau/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.948986
306
2.0625
2
Published October 1994 by Self-Counsel Press . Written in EnglishRead online |The Physical Object| Download Buying and Selling a Small Business (Self-Counsel Business Series) Buying and Selling a Business reveals key strategies to sell and acquire business investments. Garrett Sutton, Esq. is a best selling author of numerous law for the layman books, and he guides the listener clearly through all of the obstacles to be faced before completing a winning transaction/5(32). How to Buy and/or Sell a Small Business for Maximum Profit introduces you to the process of buying and selling businesses by focusing on personal goals, proper strategic planning, action planning, writing out sound investment strategies and, seeking Buying and Selling a Small Business book and financing options. The book contains a CD-ROM with Excel and Adobe Formatted /5(7). Buying or selling a business is much more complex, and the opportunities for something going wrong are much greater. This book is a very small investment to make /5(35). Book Description. Produced by BizBuySell, the Internet's largest and most active marketplace for businesses and franchises for sale, written in conjunction with Ed Pendarvis, Founder of The Business Buyers University, this guide provides a detailed overview of the business buying process. This page digital book will teach you:ISBN: Traction: Get a Grip on Your Business is the small business owner’s go-to book for problem-solving — not necessarily the little day-to-day hiccups you’ll experience, but the big things that can totally derail your progress, such as frustration, losing control of the business. Everything you need to sell your business. You’ve worked hard to build your business—so if you’re ready to sell, make sure you protect your interests and maximize profit with The Complete Guide to Selling a Business. Packed with practical advice and invaluable insights—and dozens of key legal forms—this book shows you how to:Book Edition: 5th. There are some great books that were written in regarding small business. These books will help the entrepreneur to start their business. _____ _Best for Beginning Entrepreneur: The E-Myth Revisited. by Michael E. Gerber; This book is the revised version of the E-Myth which was all about the building process of the small business. That. This is why buying and selling used books would still make a good business. However, before you start your buy and sell business, you must first understand the business and industry you are about to jump into. This is why you need a business plan for your bookstore. How to Make Money Buying and Selling Used Books Online. Understudy the book. Author Travis Bradberry didn’t sell over half-a-million copies on sheer chance alone. Emotional Intelligence is strictly business, and helps to take the anxieties and worry out of the workplace, and put logic and confidence in their place. Let’s face it: we’re all working far more hours per day than anyone used to, and it’s straining, which eventually wears down on your emotions. Like buying a house, it must first be determined if the vendor (selling advisor) actually owns what he or she is proposing to sell. Some dealers have an agreement — in writing — proving that the dealer, and not the advisor, owns the book of business. In that case, the selling advisor can’t actually sell the book of business. No one, no matter how small the deal, should sell a business without obtaining financial and tax advice. At the very least, you want an accountant to help you assemble and present your business financial records and to help structure your sale with the intent of managing taxes and facilitating buyer decisions. Home In Depth Special Reports Buying and selling a book of business Buying and selling a book of business In this six-part series, George Hartman, managing director of Accretive Advisor, explains what is involved in buying or selling a book of business, including how to evaluate Buying and Selling a Small Business book worth of a practice. Buying a broker's book of business is an involved process, requiring price negotiations and due diligence required to ensure that the business is worth as much as the offer price. The typical baseline for establishing a fair purchase price is the broker’s trailing 12 months of revenues. Selling your books to people in small businesses is a good way to learn the ropes of special sales. Once you gain skills, confidence, and momentum you can move onto buyers in larger corporations. You may also find your niche in the small-business segment and continue selling to these buyers. Related Posts Stop Selling Books And Start Selling Author: Brian Jud. Buying and growing an existing business is considered a smarter path to success than dealing with the pitfalls of start-up companies. This book outlines the ins and outs of becoming a successful acquisition entrepreneur, written by an investor who has co-founded three startups and acquired seven companies. Buy Buying And Selling A Business: An entrepreneur's guide by Haigh, Jo (ISBN: ) from Amazon's Book Store. Everyday low prices and free delivery on eligible s: 5. "Steingold, a business law attorney and author, explains how to sell a small to midsize business. He describes deciding whether or not to sell, timing the sale, preparing for the practical and legal steps, analyzing the tax consequences, setting a realistic price range, and choosing and working with lawyers, accountants, and other professionals /5(6). The number of advisors who plan to sell their books of business will accelerate in the coming years. Dont complicate things by not having a succession plan. [Buying a Business,Selling a Business,Franchise Opportunity,Small Business,Books,Software] Franchise Information provides free franchise information for 's of different franchise opportunities and business opportunities. Related: How to sell your small business through a broker Buyers: For the buyer, a professional adviser acts as an invaluable buffer in what is an emotive will also help you with paperwork and negotiations. Preparing the business for sale. Sellers: Before you sell your business, you will need to make sure that it is prepared for the scrutiny of potential buyers. Small business management research reports. Edition/Format: Print book: English: Rating: (not yet rated) 0 with reviews - Be the first. Subjects: Sale of business enterprises -- United States. Small business. Sale of business enterprises. View all subjects; More like this: Similar Items. If you're thinking about buying or selling a business and want to get the best deal possible, you'll need to do a lot of planning and preparation. Nolo has books, forms, and online applications that can help you buy or sell a business. For a complete list of Nolo's small business products, see. In fact, there are so many business books on the shelves that it can be overwhelming to determine which are worth reading. Here is a list of 10 inspiring and actionable business books that provide you, or the small business owner on your gift list, with advice, insight, tips, and resources for a boost to business success. Kennedy has written the best small business books to help entrepreneurs take control of their sales process. As he says in the title, Kennedy teaches the principles of bold marketing, directly to customers – that's how to create and sell online courses. These fundamentals can be applied in any medium — making this a timeless must-read for. Buying or Selling a Small Business. Checklist. Questions to Ask When Buying an Existing Business. Are you thinking of buying an existing business. Download this checklist to answer questions about the company's viability and if it's worth purchasing. Remove Buying or Selling a Business filter Buying or Selling a Business; Strategy. The key to success in buying and selling used books online is to know how much money you can sell the book for before you buy it. Even though you could buy books all day long at $1 a pop at most thrift stores, that doesn’t mean you should. You should only purchase a book if you know you can make some money on it. COVID Resources. Reliable information about the coronavirus (COVID) is available from the World Health Organization (current situation, international travel).Numerous and frequently-updated resource results are available from this ’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus. Very good introduction to how to buy a business. You will become more knowledge about what to discuss with brokers, sellers, accountants, and attorneys you meet while searching for a business to buy. The one negative is a lot of repetition of similar ideas such as buying a business for times EBITDA, the steps in due diligence, and fundraising/5(89). Get this from a library. Buying and selling a small business. [Verne A Bunn]. [Buying a Business,Selling a Business,Small Business,Books,Software] C-Corp Asset vs Stock Sale Dilemma C-Corp Asset vs Stock Sale Dilemma. Shareholders of C-Corps often experience significant anxiety when it is time to exit their business. If they are fortunate, they will exit by way of a stock sale. Buying and selling a small business. [Michael M Coltman] Home. WorldCat Home About WorldCat Help. Search. Search for Library Items Search for Lists Search for Contacts Search for a Library. Create Book\/a>, schema:CreativeWork\/a> ; \u00A0\u00A0\u00A0 library. The mantra of every buy-and-sell enterprise is simple, and easily memorized: Buy low, sell high. That is precisely the purpose of this book-to show you. And that’s just a small taste of all the disruptions we’ve enjoyed thanks to the internet. One of the biggest disrupted industries and one of those that provides a great path to a solid making money online venture for an individual entrepreneur is in book publishing. Specifically, publishing and selling ebooks online. Buying and selling a small business. [Michael M Coltman] Home. WorldCat Home About WorldCat Help. Search. Search for Library Items Search for Lists Search for Contacts Search for a Library. Create Book\/a>, schema:CreativeWork\/a> ; \u00A0\u00A0\u00A0\n library. Sell Your Business Online Get Started Now. BizBuySell has facilitated oversuccessful business sales and is visited over 1 Million times each month by potential business buyers. Learn more about the sales process. BizBuySell is the #1 online directory and has facilitated oversuccessful listing receives free distribution to our Partner Network Websites, including. For Business Owners who want to sell. For new and experienced Investors and Entrepreneurs. For Realtors who want to list a small business professionally and successfully. In easy-to-understand terms, here are just some of the things you will 3/5(1). Buying an existing business is often safer than starting one on your own. But watch out for these red flags. Here are some ways to identify business risk before buying an existing small : Cliff Ennico. Sell books on eBay. When it comes to selling books on Amazon vs eBay, personally, I feel Amazon is the better option. I’ve sold books on both platforms and I’ve had a lot more success with Amazon. Here are a few reasons why: You don’t have to hold your own inventory. This book contains information vital to the successful sale or acquisition of a small business. This book is full of information useful to both the buyer and the buyer will benefit from the tips on: - Survival of a small business-- Starting versus buying a business-- Evaluating an existing business-- Financing options-- Writing a buy. Starting a business from scratch can be challenging. Franchising or buying an existing business can simplify the initial planning process. Related Topics: Managing yourself, Small & medium-sized enterprises, Entrepreneurship, Valuation, Participants in business buying, Entrepreneurial ventures, Newsletter Promo Summaries and excerpts of the latest books, special offers, and more from Harvard Business Review Press.A good first step in learning about selling a business is to read the new book, The Business Sale System: Insider Secrets To Selling Any Small Business. (First American Publishing, published November ) The book provides an easy to follow, step-by-step approach for selling any small business at the highest price possible.Guides and tips on how to sell or buy a business in the UK and how to prepare your business for sale, covering contracts and valuations. menu. Entrepreneurs say that Amazon has “shafted” small businesses by passing on the Government’s new 2 per cent digital sales tax. selling a business is a major decision. Given that many sell a .
<urn:uuid:3c6047ed-5a95-4b8c-bd8f-0749a4be7cae>
CC-MAIN-2022-33
https://bupuqosonanyzufi.brokenrranch.com/buying-and-selling-a-small-business-book-16714nx.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.933159
2,778
1.539063
2
Dates, events and presentations Professional preparation for high-risk regions Staff and travellers working for companies or NGO in high risk countries require a special preparation. Our HEAT training (Hostile Environment Awareness Training) prepares travellers for trips into countries such as Nigeria, Mali, Iraq, Afghanistan or the Ukraine. The travellers are prepared to react on critical incidents such as terrorist attacks, kidnappings, serious political unrest and armed conflicts. Aim of the training - Know how to prepare for trips into high-risk areas, hostile environments and conflict zones - Be familiar with the risk landscape in those countries - Understand how to implement preventive measures - Train for the appropriate response to critical incidents Our experienced HEAT instructors The instructors are former members of Government security agencies or military special forces with years of governmental and commercial (NGOs, media, corporations) training and advisory experience. Our interdisciplinary team for security training for crisis regions consists of, among others: - The former founder and head of the HEAT training unit of a federal German security agency, who has been advising and training organisations on security issues for many years. He is regularly deployed as a crisis response advisor for kidnappings and non-medical evacuations in conflict zones. - A former member of the medic platoon within the German Special Forces (KSK), who has been deployed worldwide for years as a paramedic, flight medic and mountain rescuer and instructor for medical aid organisations. He is also currently on assignment as an embedded security advisor and medic for journalists operating in Ukraine. Our trainers of this seminar have themselves lived and worked in high-risk countries. They travel regularly to countries like Venezuela, Libya, Nigeria, Iraq, Pakistan and the Ukraine. - Lectures, presentations, discussions - Group work, role play, simulations - Numerous practical exercises Based on the client's requirements the duration of the trainings varies. Usually, a standard HEAT training requires 3-5 days. We run the our hostile environment awareness training (HEAT) as in-house training and as open courses. Open HEAT courses are offered as 5-day training. Topics of the HEAT course - Context analysis and risk assessments - Travel preparation - Planning for emergencies such as evacuations - Perception of threats and psychological impact of working in high-risk areas - Tactics of perpetrators - Landmine & weapon awareness - Measures to take when traveling on foot and by vehicle - How to assess and increase the security of sites, houses or rooms - Information security - Behaviour at checkpoints and during interrogation by local authorities - Surveillance detection - Hostage survival - Behaviour in the event of shooting attacks and explosions - Behaviour during violent protests - Medical emergency planning and care in the field - Stress management & post-traumatic stress disorder The training can be conducted at our HEAT training site or at other locations worldwide. Our training site includes buildings, a network of roads, rural areas, different types of vegetations as well as accommodation and full catering. Numerous realistic simulation exercises with vehicles and on foot, including the use of pyrotechnics, can be conducted on our premises. Our training facility is located near Ulm (Southern Germany, halfway between Munich and Stuttgart). Shuttle services from the next railway station or from the Airport Stuttgart can be arranged. Questions and Answers about our HEAT course As there are many questions about HEAT training - such as what the differences are compared to classic travel safety training, how our training differs from other providers - we have put together a list of frequent questions and our answers. You can find them here. Our next open 5-day HEAT course takes place: 14 to 18 November 2022 (course language is English) Contact us to receive more information and the course flyer.
<urn:uuid:dc8d2a7d-d5d8-49d1-9302-779e8f4a968a>
CC-MAIN-2022-33
https://www.smartrisksolutions.de/en/hostile-environment-awareness-training-heat
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.952557
798
2.015625
2
This research project is the result of an international collaboration between Apsym and some researchers of Ohio State University in Columbus (US) and Macquarie University in Sydney (AUS). The research studies the construct of Restorativeness and particularly the restorative capability of natural environments. From '80 this construct was deeply explored in Environmental Psychology (e.g. Ulrich, 1984; Kaplan & Kaplan, 1989; Hartig, Korpela, Evans & Garling, 1997; Purcel, Peron & Berto, 2001, Pasini & Berto, 2009), but only few studies have analysed the restorative effects on workplace environments (Finnegan & Solomon, 1981; Kaplan, 1993; Farley & Veitch, 2001). Metal fatigue is a consequence of work activities because task execution causes exhaustion and directed attention's consumption. The attention restoration theory explains how restorative attributes of enviroment have a positive effects on attention. This cross-national study investigates the impact of a restorative experience on workers well being and on their task performance. The first aim of the research is to deeply explore the construct of Restorativeness integrating the analysis of restorative attributes of the physical environment with the analysis of how these attributes can have different meaning depending on the personality and attitudes of each person who perceives them. The result of this exploration will be a broader definition of Restorativeness construct integrating different restorativeness meaning coming from personality and personal reactions of individuals. A second aim is to study the impact of restorative break on workers well being and their task performance. A final aim is to study the same phenomena on three different national contexts: Italy, Australia and United States. Finnegan, M. C. & Solomon, L. Z. (1981). Work attitudes in windowed vs. windowless enviroments. The Journal of Social Psychology, 115, 291-292. Kaplan, R. (1993). The role of nature in the context of the workplace. Landscape and Urban Planning, 26, 193-201. Ulrich, R. S. (1984). View through a window may influence recovery from surgery. Science, 224, 420-421. Kaplan, R., & Kaplan, S. (1989). The experience of nature: A psychological perspective. New York: Cambridge University Press.
<urn:uuid:d3bd9c16-13dc-429f-85ee-d4384eedad2a>
CC-MAIN-2022-33
https://www.dsu.univr.it/?ent=progetto&id=4029
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.874472
492
2.328125
2
A successful presentation requires you to devote much more time to preparing your presentation than you will spend in delivering it. Even experienced speakers must prepare for a presentation; this includes rehearsal. My friend and colleague, Rob Biesenbach names inadequate rehearsal as one of the “11 Deadly Presentation Sins.” In his recent book with this title, Rob provides these strategies to help you prepare for your presentation: So How Long Should You Rehearse? by Rob Biesenbach I love to ask this question of audiences: “For a one-hour speech, how many hours of rehearsal do experts recommend?” The guessing usually starts at five hours. And each time I call out “higher,” people’s eyes get wider. Ten? Fifteen? Twenty? When we finally land on 30 hours, they don’t quite believe it. But that’s the recommendation of one of the foremost experts in the business, Nancy Duarte. Thirty hours to rehearse a one-hour speech. (And that doesn’t include creating the content and the slides, by the way. Throw in another 60 hours for all that!) Now, if you’re in the unfortunate position of delivering several different PowerPoint presentations a week, you’re not going to have that kind of time. But if it’s a really big speech—an important opportunity, such as an annual meeting for shareholders or employees or salespeople, or an address before a big industry or professional group—then you’re going to want to invest some serious time rehearsing. Know your stuff. Know it backward, know it forward, know it sideways. Think of every hole in your argument, every possible objection, and be prepared to answer them—either in the presentation itself or in the Q&A. Knowing your subject cold will boost your confidence immensely. In fact, I’ve found that the number-one cure for stage fright is mastery of your material. Internalize, Don’t Memorize If you try to memorize your presentation word for word, you will come across as stilted. (Unless you’re a good actor!) And you’re more likely to get tripped up as you grasp for the precise phrasing you’ve scripted. It’s better instead to “internalize.” Break up your presentation into bite-sized chunks, one idea or point at a time. Get to know each one. Go over it in your head again and again. Don’t worry about the specific words; just get the gist down. Then start melding these chunks together, one section of the speech at a time. Practice it whenever you have down time—in the car, in the shower, at the gym. You may never say it quite the same way twice, which is the whole point. When you’ve got the core of it internalized, you can deliver it with confidence while still leaving room to play around the edges—ultimately producing that feeling of an authentic, on-the-spot performance. One important tip: your speech is going to be a lot easier to internalize if it’s written in your own true voice—the way you speak in everyday conversation. If you’re not comfortable with rhetorical flights of fancy, it’s better to stay grounded. Practice on Your Own—Out Loud A speech is meant to be delivered aloud, so you absolutely must practice it out loud. Seriously. If you attempt to do it all in your head, sitting in front of your computer screen, you might as well not bother. Get up on your feet and perform it as you would onstage. This will help you catch and unravel long-winded sentences and tongue twisters early on. It’s also the only way to get a true sense of how long the presentation is. And you definitely want to adhere to the time limits you’ve been given. Running over your allotted time is unforgivable. In fact, you should plan to come in under the assigned time. No audience member ever left a speech saying, “Man, I wish that presentation had been longer!” Finally, I find practicing aloud helps me identify weak spots. When I sense things are dragging and I get bored, I make cuts. Practice in Front of Others A speech is nothing without an audience, so it’s a good idea to test your material in front of people beforehand. Ideally it should be work colleagues or industry peers—people who are knowledgeable about the subject matter and the target audience. But if you trust friends or family members to give you honest, constructive feedback, that will work, too. If you can, perform it a couple of times at different stages of development. And really perform it, just as you would onstage. Believe me, nobody wants to watch you halfheartedly phone it in. And that doesn’t help your preparation either. Take note of your audience’s reactions. What seems to work? What doesn’t? Are there places where you’ll want to pause? Points you want to hit harder? Get their feedback. Just be careful: if a certain line gets a big laugh or response with your test audience, don’t assume it will happen at show time, too. No two audiences are alike, and pausing expectantly for a laugh that never comes is pretty awkward. The absolute best way to become aware of your tics and habits, both physical and verbal, is to watch yourself on video. The camera does not lie. In fact, it can be downright brutal. At the same time, understand that video can only approximate what actually happens in the room. It captures just two dimensions, so it can’t convey the energy or chemistry of the moment or what the audience is doing. So don’t beat yourself up too much. You’re probably not as bad as you think. Use video mainly as a tool for spotting technical issues with your performance. Rob Biesenbach is an independent corporate communications pro, actor, author and speaker. He is a former VP at Ogilvy PR Worldwide and press secretary to the Ohio Attorney General, and has written hundreds of speeches for CEOs and other executives. He is also a Second City trained actor who has appeared in more than 150 stage, commercial and film productions in the past decade. His first book, Act Like You Mean Business: Essential Communication Lessons from Stage and Screen, was published in 2011 by Brigantine Media. His latest book, 11 Deadly Presentation Sins offers a path to redemption for public speakers, PowerPoint users, and anyone who has to get up and speak in front of an audience. For more information visit: http://robbiesenbach.com Thank you Rob! “You have to master technique, in order to abandon it.” – Robert Fripp “How to Rehearse for Your Talk,” “Is Your Audience Hearing What You Want to Communicate?,” and “Public Speaking – Why Rehearse?” are just three of the many complimentary resources on Fripp.com to help you prepare for your presentation. Sign up for your complimentary trial and discover how Fripp Virtual Training can transform you and your team. FrippVT delivers high-caliber comprehensive presentation and sales presentations skills training with built in accountability. http://frippvt.com Imagine a training program that gives you 24/7 access to one of the most in-demand executive speech coaches and sales presentation experts. FrippVT is designed to be immediately engaging and makes it fun to learn. If you are a novice presenter or a seasoned professional, you will find the content both practical and relevant. “I am an experienced speaker and successful consultant and highly recommend FrippVT to everyone who speaks in public or has to. It just doesn’t make sense for any professional to be without 24/7 access to the wisdom and experience of the master of professional that Patricia Fripp is. FrippVT is a must-have resource for all professionals.” – Pat Lynch, President, Business Alignment Strategies Executive Speech Coach and Hall of Fame Keynote Speaker Patricia Fripp is hired by individuals and companies who realize that powerful, persuasive presentation skills give them a competitive edge.
<urn:uuid:6013bef4-e050-44d1-80d1-055c6480483e>
CC-MAIN-2022-33
https://fripp.com/public-speaking-how-many-hours-of-rehearsal/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz
en
0.939019
1,762
1.65625
2
Contrary to popular belief, the size of central AC system you need is not just determined by the square footage of your home. The size of central AC you need is actually determined by something called a load calculation. A load calculation is an evaluation performed by a professional and essentially determines how much heat needs to be removed from your home (per hour) to keep the space cool. We know that’s not all of the information you need, and we know you have questions, like: - What does “load calculation” actually mean? - How are AC systems sized? - Why does AC size matter? Below, we’ll answer these 3 questions so that you’re prepared to purchase the right-size central AC system when the time comes. Rather skip the reading and have a professional determine what size central AC unit you need for your home? We can help! Our team of highly-trained pros can come to your home and provide you with a free estimate on a central AC system. Learn more about our AC installation process or… What does load calculation mean? Your AC system actually cools your home by removing heat. A load calculation simply determines how much heat needs to be removed from your home to keep it cool. There are a variety of factors that influence how much heat needs to be removed from your home. Some of these factors include: - Where you live (your climate) - Number of people living in your home - The orientation of your home - Number of windows - Quality and type of insulation - Number of doors - Type of flooring - Whether ductwork is located inside or outside - And other factors A quality technician will take the time to perform a load calculation and let you know what size AC you need in British Thermal Units (BTUs). We’ll dive into the details of how AC systems are sized (BTU output), below. How are AC systems sized? AC systems are measured by British Thermal Units (BTUs). An AC unit’s BTU output is an expression of how much heat it can remove from your home in an hour. For reference, a BTU is equal to the amount of energy produced by lighting one match. Most residential AC systems fall between 18,000 and 60,000 BTUs. Now, the size of an AC system is also measured by tons, which is a different way of expressing a system’s BTU output. When it comes to AC systems, one ton is equal to 12,000 BTUs. So if you’re shopping for ACs and they have tonnage listed instead of BTU output, you can easily determine what the BTU output is. Here’s a quick guide to help convert tonnage to BTU output: - 1 ton = 12,000 BTUs - 1.5 tons = 18,000 BTUs - 2 tons = 24,000 BTUs - 2.5 tons = 30,000 BTUs - 3 tons = 36,000 BTUs - 3.5 tons = 42,000 BTUs - 4 tons = 48,000 BTUs - 4.5 tons = 54,000 BTUs - 5 tons = 60,000 BTUs Now that we’ve discussed how ACs are sized (and how to determine what size you need for home), let’s discuss why all of this matters anyways. Why does AC size matter? When it comes to ACs, bigger isn’t always better. Like we’ve discussed above, there are many factors that go into what size AC is right for your home, and installing an AC system that is smaller or larger than this can cost you problems and money down the road. If your AC system is undersized… it will work continuously to cool your home but will struggle. This can increase the cost of your monthly energy bills as well as shorten the lifespan of your system. If your AC system is oversized… it will turn on for a short period of time, cool your space and then shut off. This is called short cycling and can cause a variety of issues like: - Increased energy bills - Shortened AC lifespan - Hot and cool spots around your home - Expensive repairs or replacements When you’re investing in something as expensive as a central AC system, it’s important to hire a technician that will take the time to find the right size AC for your home. That way, you don’t run into any of the issues we listed above. Ready to install a central AC system? Hire Pittsburgh’s best! If you’re ready to install a central AC system or want more information, reach out to us! We’d be happy to help you determine what the best option is for your home.
<urn:uuid:3bb50b74-8ca5-44fa-82eb-bc03d0d696ae>
CC-MAIN-2022-33
https://calfohomeservices.com/blog/what-size-central-ac-unit-do-i-need/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz
en
0.936025
1,018
2.78125
3
While entertainment is frequently connected with enjoyable, many forms of it are actually really significant. These tasks involve the creation of items that are enjoyed by target markets, ranging from banquets for 2 to performances for thousands. Just like any other business, a number of these tasks are made use of to improve the economy. Federal governments collect tax obligations from the fields that are involved in the show business, and surrounding organizations commonly thrive from their visibility. Yet exactly how do these activities profit the economic situation? Read on to find out more regarding the numerous ways they help the economy. The concept of amusement is not new, as well as most forms of it have been around for centuries. It has adapted to adjustments in technology, culture, and style, and remains to be made use of to delight individuals. Movies and also plays inform tales and also play songs, while celebrations supply home entertainment for a variety of target markets over numerous days. While public executions are prohibited in most nations, some activities have actually progressed right into specialist competitors. Archery as well as fence, for instance, have actually turned into forms of home entertainment. An additional means to recognize the concept of entertainment is to take a look at the interpretation of “play.” Play is any kind of activity that provides a diversion. It can be anything from a clown at a birthday celebration event to an arena rock concert. The term “entertainment” originated from the Old French word entretenir, suggesting to hold together. The meaning shifted to “entertain” when people considered it. Nowadays, enjoyment has numerous definitions. When people are feeling stressed out, amusement is a good way to relieve stress and also increase joy. The endorphins that are launched during the entertainment procedure are an all-natural alleviation for pain as well as tension. This is why home entertainment is so essential. It can advertise imagination and also improve the economy of a nation. It additionally fosters relationships and also boosts interaction abilities. Individuals who take part in fun tasks are much less likely to develop clinical depression. Home entertainment is valuable for every person – young as well as old alike. Besides real-time efficiencies, enjoyment likewise consists of art. The timeless type of enjoyment is storytelling, which has influenced lots of types of art, from paintings to songs. Narration includes analyzing human problems and is not simply home entertainment. In addition, written stories have often been boosted by images, commonly to high artistic standards. A typical way of amusing a group on a journey is to narrate. While this is the earliest type of home entertainment, it has numerous various other usages. The entertainment industry consists of a range of sub-industries, each devoted to different aspects of entertainment. It includes theater, dance, opera, music, literary posting, as well as mass media. It likewise includes social tourist attractions such as galleries, parades, as well as amusement park. Every one of these types of home entertainment are essential, and also it is essential to understand the distinction in between them. To understand the differences, read on for more details. It is essential to bear in mind that there are numerous forms of entertainment, and you can locate almost any kind of kind of enjoyment worldwide today. When a conflict arises in an entertainment industry, lawyers are important in aiding customers fix them. Home entertainment lawyers should be well-informed concerning various sorts of litigation, from a suit to a settlement. In addition to working out with clients and evaluating the influence of their choices, home entertainment lawyers must also be effective communicators. A strong interaction abilities is essential for success in the entertainment industry. If you have any type of questions about the legal concerns including home entertainment, get in touch with an enjoyment attorney today. Despite the kind of entertainment industry, amusement regulation can be fairly complicated. Several types of regulation influence home entertainment, consisting of contract as well as labor and work laws, and common law lawful precedent. An attorney specializing in this area can aid you recognize the law as well as negotiate deals and contracts. These legal representatives can additionally help you solve conflicts and shield your passions. It is necessary to hire a qualified entertainment attorney that specializes in the certain market you’re associated with. In general, home entertainment venues are in charge of a few of one of the most vital building concerns. Mass audiences require to be able to leave a place rapidly, as well as an improperly designed venue can make egress hard. Poor designs create a safety and security hazard, as the Hillsborough disaster programs. Sightlines as well as acoustics are likewise necessary layout factors to consider in the majority of staged venues. One famous structure that inspired designers throughout the world is the Grand Entrance hall at Paris’s Palais Garnier. While entertainment has been around for centuries, its type has actually varied throughout background. It evolved from straightforward narration to clarify performances for mass target markets, and also home entertainment types have actually been adapted for a selection of uses and also ranges. For example, a concert can be adapted for a little audience to a multi-million-person arena. The Roman Colosseum, committed in advertisement 80, was a huge field that organized efficiencies of stage shows, blood sporting activities, as well as other activities. Individuals pick various kinds of entertainment based on their demands. Some tasks advertise emotional growth and can aid people kick back after a lengthy day at the workplace. Various other types of entertainment can be a lot more severe, including religious festivals and ceremonies. In each case, a variety of different objectives can be offered by an entertainment, consisting of maintenance as well as support, payment of soldiers, and even admission to a service. The flick “Entertainment” was launched in the United States on May 5 as well as was dispersed worldwide on May 4. While the meaning of enjoyment is frequently altering, there are some global guidelines. Despite our diverse preferences, most home entertainment is produced to captivate us. People develop it themselves, participate actively in it, as well as passively consume it. This holds true for songs and also aesthetic art. If you’re preparing a party or an event, you can choose any sort of amusement to maintain the visitors entertained. Amusement can vary from straightforward video games as well as tasks to clarify and intricate productions. click over here Motion pictures can be an excellent means to relieve anxiety and also take pleasure in a night out with buddies. Flicks are likewise a simple means to spend time with your family members. You can watch the most up to date hits or capture the latest launches. Despite the kind of home entertainment, it is essential to maximize your time. Simply remember to have an enjoyable time! It’s a good idea to check out new entertainment as well as maintain the family delighted. When picking entertainment, be sure to choose the best form for you.
<urn:uuid:6f73ec0e-6c01-46ee-a10e-84b8e143d21b>
CC-MAIN-2022-33
http://www.ucsbdailynexus.com/2022/06/23/the-reality-about-entertainment-will-be-exposed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.969667
1,398
2.4375
2
It was the first time this chalice had been used since the 7 a.m. Mass aboard the battleship USS Oklahoma docked in Pearl Harbor on Dec. 7, 1941. The chalice belonged to Navy chaplain Father Aloysius Schmitt. The Mass at Christ the King Chapel at Loras College was being held in memory of this heroic chaplain, who died saving others during the attack on Pearl Harbor. After 75 years, his remains were finally identified this year and brought back to Iowa for burial in Christ the King Chapel. “It was an amazing gift to receive from that chalice,” said concelebrant Father Daniel Mode, director of plans and operations for the Chief of Chaplains Office of the Navy. “That chalice was found 16-18 months later, when they raised the Oklahoma from Pearl Harbor.” Father Mode, the author of The Grunt Padre about Servant of God Father Vincent Robert Capodanno, spotted the sacred vessel in the case at Christ the King Chapel displaying Father Schmitt’s effects before the memorial Mass and asked if it could be used. “That actually set the tone for the service,” said Father Schmitt’s grandnephew Steve Sloan. After the Mass, the casket with Father Schmitt’s remains was taken outside for full military honors and then interred in the chapel, which was built in 1946-47 and dedicated to him. No one has ever forgotten what their graduate and Iowa’s native son did that Dec. 7 so long ago. 75 Years Ago Father Schmitt had just finished celebrating the 7 a.m. Mass when the first wave of Japanese planes swooped into the harbor at 7:48 a.m. They hit the Oklahoma with eight torpedoes, then later a ninth. The commanding officer reported the initial five explosions happened within about 70 seconds — and within eight to 10 minutes, the ship rapidly rolled over about 135 degrees. During those frantic minutes, as men scrambled to escape the capsizing ship, 32-year-old Father Schmitt began pushing men through a small porthole to safety. One was sailor Bob Burns. Interviewed years ago for a documentary called For God and Country, Burns vividly remembered that Father Schmitt “recognized my voice and said, ‘Over here!’ There were two gentleman topside pulling, and he was pushing people through — he pushed me out.” Burns had served at Mass that morning. Once Chaplain Schmitt got the 12 out safely, the dozen men tried pulling him through the porthole. He was partly through when he heard men behind him and insisted the freed men push him back into the ship so that he could help the trapped men. He never got out. The heroic priest was among 429 sailors and Marines who died aboard the Oklahoma — one of the two ships losing the most men at Pearl Harbor. He was also the first Catholic chaplain — in fact, the first of any chaplain — to die in World War II. Now, in time for the 75th anniversary of Pearl Harbor, he came home to where he grew up and where he has never been forgotten. On Oct. 5, Father Schmitt’s flag-draped coffin arrived for a memorial Mass at his home parish, St. Luke Church in St. Lucas, a two-hour drive from Dubuque. Born on Dec. 4, 1909, he grew up the youngest of 10 children in a farm family in the rural community and attended Catholic schools. After graduating from Loras College, then called Columbia College, he studied for the priesthood in Rome and was ordained on the Solemnity of the Immaculate Conception, Dec. 8, 1935. In 1939, his archbishop permitted him to enlist as a Navy chaplain. Father Schmitt’s nephew Del Schmitt, now 82 years old, was only 5 the last time he saw his uncle. “It was hard on my dad and the family,” he said, when they learned of the death of “Father Al,” as he was affectionately known. “People that knew him said he was a great guy. Everybody liked him. Now, there’s satisfaction they did bring him back.” Schmitt and his brother and sister presented “the gifts for the Mass,” he said of the special Mass. Another lifelong St. Luke parishioner, Leander Stammeyer, led the Rosary at the Oct. 8 Mass and also prayed an Our Father and Hail Mary in German “to show how he [Father Al] learned the Rosary at his mother’s knee.” Stammeyer, a spry 95-year-old, remembers Father Schmitt well. “I served at his first Mass when he was ordained,” he said. “I played checkers with him when I was a little boy, and he was 10 years older than me.” During vacations from school, Stammeyer stayed with his grandmother in St. Lucas, and Father Al was home from college. His grandmother told him to play checkers with Father Al in the evening. They would play for at least two hours. “I always looked up to him. He gave a good example,” Stammeyer recalled. Stammeyer himself went to seminary in Milwaukee before going “into the service because Uncle Sam called me.” He entered the Navy in 1942. All of these years later, Stammeyer still has vivid memories of Father Al. “He was a kind of a mentor, as far as I was concerned,” he said. “I looked up to him. He had a real smile on his face and was a real friend to all people.” Sloan, himself a graduate of Loras, never met his great-uncle, but heard much about him from the family. “I was fortunate enough to know the sister that was closest to him age-wise — Sister Germaine Schmitt — who was a Franciscan sister and would spend holidays with us growing up,” Sloan explained. “Not a holiday passed when we didn’t have a discussion about Father Al in our household. It was a common discussion.” Sloan recalled how Sister Germaine would always say, “We knew what he did, but when he left that porthole and said, ‘I’m going to check on some other men and bless them,’ we don’t know what happened to him.” Finally an Identification Work on the ship after the attack uncovered the remains of the 429 killed on the Oklahoma, but only a small number could be identified. Attempts over the years failed to identify about 388 men. They were reburied in Honolulu in 1950. Then came DNA identification and the U.S. Department of Defense’s determination to return as many as possible to their families. Sloan explained that a forensic genealogist working for the department used mitochondrial DNA, a stronger form from the female side of the family tree, for the identification. In September, military representatives came to Iowa to tell relatives that they identified Father Schmitt’s remains. The Sloans were overjoyed. This was not the first time the Navy had come to town. In 1944, the Navy presented the Archdiocese of Dubuque with a 24-inch-tall crucifix made from the Oklahoma’s teakwood deck, with the corpus of Christ shaped from the ship’s metal in honor of Chaplain Schmitt. The Witness, the Catholic weekly in Dubuque, carried a Dec. 14, 1944, front-page article on the presentation by the chief of chaplains, 8th Naval district, who recalled Father Al’s “zeal in the service of others, coupled with a sincere and winning personality.” Mentioning his college motto — Pro Deo et Patria (“For God and Country”) — he added, “When he realized the hour had come for him to follow in the footsteps of his Master, he might well hold his head high, as he went forward a worthy bearer of the motto of the alma mater.” When Christ the King Chapel was dedicated in Father Schmitt’s honor in 1947, both Cardinal Samuel Stritch of Chicago and Admiral Chester Nimitz, commander of the U.S. Pacific Fleet during World War II, were there. A display added in the chapel contains several of Father Schmitt’s personal effects that were recovered from the Oklahoma, plus other items like his medals and a rosary made from the ship’s wood. The personal items include his chalice and prayer book; the ribbon, still in place, held in place prayers for the following day, Dec. 8, which would have been the sixth anniversary of his ordination. As a Loras undergraduate walking into the chapel, Father Kyle Digmann always saw those mementos. Today, he is pastor of Christ Our Hope Cluster of parishes, which includes St. Luke’s. “Everybody knows about Father S. He is part of the history around here.” And that history was made more poignant with the memorial Mass. “It was indeed an honor to represent the chaplain corps at that funeral,” Father Mode said while looking at a photo of himself by Father Al’s casket. “It truly made me realize the sacrifice that he made 75 years ago never dissipated. It’s linked to Christ’s sacrifice; it’s eternal. Even 75 years later, it has the same awe. That was an amazing witness, not only to what Chaplain Schmitt was, but the essence of what sacrifice is.” Archbishop Timothy Broglio, head of the Archdiocese for the Military Services, concelebrated the memorial Mass. He told the Register that Father Schmitt’s witness continues to reverberate: “The burial of the earthly remains of Father Al Schmitt, whose heroism is so typical of Catholic chaplains’ commitment to be men for others, reminds us of his valor immediately after the attack on Pearl Harbor 75 years ago. Just like the Lord, whom he loved and served, Father Schmitt gave up his life, so that others might live. I pray that his selflessness might inspire all people to imitate his concern for others and his commitment to life.” Reprinted with permission from the National Catholic Register.
<urn:uuid:13fc8419-cb33-48d3-a63a-23e3a2537909>
CC-MAIN-2022-33
https://catholicsay.com/the-body-and-mass-box-of-pearl-harbor-priest-identified-75-years-later/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.982328
2,240
2.28125
2
Now is an opportune second to address the confluence of cell biological form and function that is the nucleus. Obviously, these early observations didn’t ascribe particular significance to the structure, the given name conveying its central location. Later, the nucleus was noticed and became significantly, with some prescience, LY3009104 an integral tenet from the cell theory. The nucleus continued to be a rather unhappy item in the eukaryotic cells parts list for most decades, before discoveries of discrete cytoplasmic entities, e.g., mitochondria, the Golgi equipment etc. (evaluated in Wilson 1925). THE NUCLEUS INHERITED We have no idea how so when the genome of the ancestral cell initial became encased within a primitive nucleus. We’ve no proof that cells surviving in the RNA globe ever endured a membrane (or any various other structure) across the genome, i.e., that they ever became nucleate. Once a ribozyme RNA replicase arose, anything could have been feasible including the introduction of ribozymes with lipid biosynthetic actions. Enthalpy-favored or free of charge energy-driven occasions could then have got resulted in stabilizing collection of RNA-lipid affinities and on following that. A cottage sector of experiments in the connections of lipids with RNA provides surfaced in the chemical substance biology field before decade however the need for these research to prebiotic systems and the initial cells continues to be speculative. For the development of the DNA globe, and of eukaryotes, a significant concept is a prokaryote organism was invaded by another, non-nucleated cell, establishing an endosymbiotic romantic relationship, with the getting into organisms external membrane seeding what would end up being the nuclear envelope. The main proponent of the plausible idea in addition has recommended that hypothetical invader also earned a centriole, the forerunner of what we know as the centriole/basal body in extant eukaryotes (Margulis et al. 2000). We can not play the videotape of life on Earth backwards and although we can reconstruct some points with a degree of empirical Mouse monoclonal to FGR confidence, albeit amidst argument (examined by Misteli 2001a; Poole and Penny 2001; Rotte and Martin 2001), or speculation (e.g., Lake 2009), when it comes to how the nucleus showed up, we just do not know. THE NUCLEUS ENVELOPED Notwithstanding the uncertainty of its evolutionary origin, the nucleus is usually bounded by a double membrane, the nuclear envelope, which in many cells is usually contiguous with the endoplasmic reticulum. The frequently observed intimacy of the nuclear envelope with the endoplasmic reticulum has been often under-appreciated, particularly as it bears around the isolation of nuclei and issues of producing purity. There is also growing desire for how nuclear membrane proteins may be integrators of nuclear and cytoplasmic business and dynamics (e.g., King et al. 2008; Roux et al. 2009; Starr 2009). A seminal obtaining was that the nuclear envelope contains pores (examined by Gall 1964; 1967), which have now been defined in LY3009104 considerable compositional and structural detail (e.g., Alber et al. 2007; Fernandez-Martinez and Rout 2009). A somewhat less familiar but equally important area of investigation has revealed that this nuclear envelope harbors a signal transduction system of its own, featuring players in common with the plasma membrane, for example the lipid-linked inositol trisphosphate system (Martelli et al. 1991; for reviews observe Divecha et al. 1993; Cocco et al. 2009; Barton et al. 2010). THE NUCLEUS DIVERSIFIED However the nucleus arose, it went on to display a variety of businesses. These range from the highly condensed nuclei of mature erythrocytes LY3009104 in nonmammalian vertebrates towards the bimorphic nuclei in virtually all ciliates. In the last mentioned microorganisms a micronucleus perpetuates the genome whereas a macronucleus includes DNA fragments that represent just a small percentage of the microorganisms genome intricacy and which encode the RNAs and proteins necessary for vegetative lifestyle. It was a specific feature of the genomic strategy, specifically the macronuclear LY3009104 amplification from the ribosomal RNA genes (Gall 1974), that resulted in the discovery from the telomere DNA series (Blackburn and Gall 1978). It had been also in these ciliates that self-splicing RNA was uncovered and where the period of chromatin epigenetic marks premiered (analyzed in Pederson 2010). THE NUCLEUS VIEWED Beyond early observations created by shiny field microscopy, the staining technique produced by Robert Feulgen, which attaches a dye to acid-depurinated DNA, was a significant tool in evolving the DNA = gene theory, predicated on studies from the DNA articles of haploid versus diploid cells with a graduate pupil, Hewson Swift, in the lab of Arthur Pollister at Columbia School, and concurrent types.
<urn:uuid:ac77a9c0-7e5f-4939-95ea-c87974c6eda3>
CC-MAIN-2022-33
https://science-fair-projects-online.com/now-is-an-opportune-second-to-address-the-confluence-of-cell/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00673.warc.gz
en
0.931324
1,082
3.328125
3
I am completing some sample preparations by SPE (for chromatography analysis) and I want to investigate breakthrough metal concentration for the eluted sample by analysis on our ICP-OES. The SPE elute solution is 5% ammonia in 20% water and 75% methanol. This solution will be diluted in water/nitric acid (x10) before analysis on the ICP. Is it OK is my ICP sample contains approximately 7% methanol and 0.5% ammonia? Typically our samples are pure aqueous/nitric with no methanol.
<urn:uuid:6178130c-5319-40e7-9c87-3e1cb4cf6276>
CC-MAIN-2022-33
https://community.agilent.com/technical/atomic-spec/f/forum/5222/methanol-as-a-solvent-for-icp-oes/19314
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.94316
120
1.515625
2
As with previous summers, cities and water suppliers have produced their water quality reports for drinking water as part of the federal Consumer Confidence Report program. This year, based on reports from Jan. 1 through Dec. 31, 2021, most customers in the tri-county area can be confident of the quality of water coming from their faucets. Many area water providers reported no violations on their monthly tests of chemical and organic compounds. Some cities, however, reported violations. The following entities/cities received notifications from the state, for various reasons: - Bell County Water Control and Improvement District No. 3 - Kempner Water Supply Corporation The list of cities and water providers that garnered no violations under state and federal clean water regulations in 2021 include: - Bell County Water Control and Improvement District No. 1 - Copperas Cove - Harker Heights - Fort Hood The water quality reports sent to customers each year are mandated under the Texas Commission on Environmental Quality’s and EPA’s Consumer Confidence Report program. The quality updates are self-reported, with most water service providers posting the information online. Failure to issue a report can result in a TCEQ violation. Tests mandated under federal Environmental Protection Agency standards include monitoring for organic and inorganic contaminants, residual disinfectant levels, lead and copper, and adequate filtration. Lead and copper tests are required to be performed once every three years. The majority of area customers are supplied by the Bell County WCID-1, which draws and treats surface water from Belton Lake. The district is in the process of obtaining backup power generation at the Belton Water Treatment Plant as well as planning an expansion of the plant. The district last performed copper and lead tests in 2020. As a regional water supplier, the district operates its own system of water treatment and distribution to area customers. Cities such as Killeen tap into that regional system for utility connections and storage and are allowed to test the district’s lines and infrastructure on a regular basis. The district does not supply water to Gatesville, Lampasas, the Kempner Water Supply Corporation or Florence. Kempner WSC draws its own surface water from an intake and treatment plant on Stillhouse Hollow Lake and supplies the cities of Kempner and Lampasas. Bell County Water Control and Improvement District No. 3, Gatesville, Belton, Kempner Water Supply Corporation and Florence all reported violations in 2021. Bell County WCID-3 received a violation in April for failing to report a chlorine test on time. “We test our water daily and always ensure to have a proper disinfectant level. The report submitted during the period in question passed but was submitted past the date,” the water district’s report read. Gatesville received three major violations in January 2021 for failing to test for select contaminants. The city failed to run a microbial contaminants, such as Cryptosporidium; Legionella and Giardia lamblia; and Trihalomethanes and haloacetic acids. “We failed to test our drinking water for the contaminant and period indicated. Because of this failure, we cannot be sure of the quality of our drinking water during the period indicated,” Gatesville’s report read. Belton received a violation for the turbidity (or cloudiness) in the water in February. “Turbidity levels, though relatively low, exceeded a standard for the month indicated,” the report read. Kempner Water Supply Corporation also received a violation in February for the turbidity level. Kempner WSC also corrected a violation in February that dated back to May 2015. Florence received several violations in April for failing to test for various contaminants, including Silvex; 2,4 D (a weed killer); Dalapon; Dinoseb; and Picloram. The city reported that TCEQ changed the testing requirements for those contaminants from annually to quarterly for two consecutive quarters. Florence officials said when they tested for the contaminants in July 2021, they were all in compliance with state standards. Killeen, Copperas Cove, Harker Heights and Belton all disclosed estimated water loss amounts in their reports. A number of things can cause water loss, including water line breaks, inaccurate meter readings, fire hydrant flushing or firefighting water use, according to city reports. The following amounts were what each of the cities reported as a loss. Killeen: 945,278,646 gallons Copperas Cove: 475,598,000 gallons Harker Heights: 272,511,226 gallons Belton: 97,213,172 gallons
<urn:uuid:b64a48f9-8494-419d-922f-0bed16f6a81d>
CC-MAIN-2022-33
https://allhealthyinfo.com/tri-county-water-quality-mostly-high-in-2021-local-news/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.949231
996
2.0625
2
Among the list of very first errors buyers produce is absolutely not purchasing a house in conjunction with the ideal rate as they are flipping real estate. These people overpay and so they dont do ample due diligence on this place. You should give yourself more freedom to obtain a home, so that after getting it, youre never jammed by way of it. Many will proceed carelessly, they will perform any preliminary research before purchasing the home within within the, and then people wont actually do the maximum amount just after, and by that moment, its of course past due. As soon as you have already purchased the home, you are caught with what exactly you actually paid for it. As a result you just be sure the fact we will obtain it with a suitable selling price, in case it doesnt benefit our needs to start with, you dont accept it. The particular current market currently, with this rebalancing, you really dont worry about permitting alright offers go. There are an abundance of bargains. So all of us just acquire the properties which undoubtedly work furthermore entirely allow the ok ones that they can depart. And so while real estate investing first is simply getting into the actual deal appropriately, and also number two, recognize the best exit. Recognize precisely why youre acquiring it after which do it suitably with regard to anything you have been intending in doing. In the event you purchase in conjunction with the correct final price, Youll be in good shape with many choices for making money. To get one of the most economical and thorough real estate investing strategies existing head over to: Several Product Reviews Here.
<urn:uuid:343a5ccd-7d4f-4e5b-9e8d-9e992375b5bb>
CC-MAIN-2022-33
http://helpsellinghome.com/our-primary-property-investments-blunders-with-regard-to-beginning-investors/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00673.warc.gz
en
0.964049
323
1.515625
2
"Their losses amount to about 100 billion euros. They also lost a lot of jobs. According to my information, Germany lost at least 500,000 jobs, Italy — about 250,000-300,000" Fallico said in an interview with the German DWN newspaper. At the same time, the Italian expert is particularly concerned about the loss of trust between Russia and Western countries. According to him, Russian businesses are now taking into account political risks and looking for more reliable partners outside the European Union. "Russian companies think twice before doing business with partners from countries that have imposed the sanctions. They are not sure whether there will be new clouds on the horizon or not. Thus, they consider political risks that play an increasingly important role," the expert told the German newspaper. "As a result, they often look for other producers and suppliers who may not offer them the same quality, but are politically more reliable. This is an indirect consequence of the economic sanctions, but a very serious one," he added. According to Fallico, the Russian economy has been able to develop in new circumstances "due to its ability to adapt." "When we speak about agriculture or the food industry, the success is evident. These areas have developed in a positive way during the crisis. In addition, the sanctions have triggered long-term development programs, in particular in the field of research and education. The results will be visible over the next few years," Fallico said.In 2014, the EU and the US introduced sanctions against Russia accusing it of alleged interference in the Ukrainian crisis. The sanctions have been prolonged several times since then. Moscow has denied the allegations and introduced countermeasures against the countries that targeted it with the sanctions. Russian authorities have also repeatedly stated that the restrictive measures are counterproductive as they are detrimental to both the Russian and European economies.
<urn:uuid:d475620b-7780-46c9-8c72-22fd4b27f17f>
CC-MAIN-2022-33
http://us-russia.org/4978-eu-lost-billions-of-euros-and-russias-trust-over-sanctions.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00673.warc.gz
en
0.977743
375
1.726563
2
Decades before Surfside, a hotel collapse killed 114 people in Missouri. What have we learned? Video above: Doctor reflects on Hyatt Skywalk collapse 40 years later On a balmy Missouri evening in 1981, this was one of the hottest places to be. More than 1,500 revelers had gathered on the first floor of the Kansas City Hyatt Regency for a popular tea dance party hosted by the swanky 1-year-old hotel. As musicians performed big band hits, couples swing-danced under long, novel skywalks spanning the second and fourth floors that seemed to float in the sky, historians have recalled. Then, as the orchestra was said to be playing Duke Ellington's "Satin Doll," the fourth-floor skywalk collapsed onto the second-floor skywalk directly beneath it. Both walkways then crashed onto the ground floor, killing 114 people and injuring more than 200 others. The catastrophe on July 17, 1981, is one of the deadliest structural collapses in U.S. history. That same year, the Champlain Towers South condo building in Surfside, Florida, was completed — only to meet a similar, disastrous fate this June, when it partially collapsed killing at least 97 people. Forty years after the Kansas City disaster, the memories are still vivid. And the lessons learned from it are as relevant as ever — not just for engineers and architects but for everyone, several people close to the tragedy told CNN. Here's what they want Americans to remember: Don't rush to judgment, and don't ignore the details Bill Quatman was a 23-year-old architect just starting his career in Kansas City. He wasn't involved in the design of the skywalks, but he marveled at the way they seemed to float in the air — an unusual sight at the time, he said. He and his wife had dined at the hotel a week before the collapse and had noticed another spectacle: "A few thousand people were enjoying themselves at a tea dance, listening to big band music from an orchestra, dancing and laughing to tunes of Glenn Miller, Tommy Dorsey, Duke Ellington," Quatman said. "We saw this tea dance going on (and thought), 'That looks like fun; we should come back sometime.'" But on the evening of July 17, they had other plans. That night — after the skywalks fell — a friend told Quatman about the tragedy but mistakenly said the hotel's roof had fallen in. "The first 48 hours, nobody really knew the cause, but there was speculation — just like there is today with the Surfside condos," Quatman said. "All sorts of theories floating around, and nobody knows ... I think one of the similarities is the rush to judgment." Video below: Hyatt survivor says collapse forever changed him, changed Kansas City The cause of the Surfside collapse is still under investigation. One popular myth following the Kansas City disaster was that the song playing at the time of the collapse — Ellington's "Satin Doll" — somehow contributed to the skywalks falling, he said. The theory was "harmonic vibrations from the band music caused the steel to oscillate," Quatman said. But experts and courts later determined there were fatal engineering design errors. The original design had called for the second-floor and fourth-floor skywalks to both be supported with a set of steel hanger rods connected to the ceiling. But a design change was made over the phone between the steel fabricator and the structural engineer, Quatman said. "They hung the second-floor bridge from the fourth-floor bridge and doubled the load on that connection, which was ultimately a fatal design change," he said. The resulting design was "capable of withstanding only an estimated 30 percent of the mandated minimum," according to the American Society of Civil Engineers. A series of miscommunications and failures to double-check calculations and plans led to the collapse. In the decades since, Quatman has spent much of his career as both an architect and lawyer speaking to engineering and architecture students to help prevent such catastrophic mistakes in the future. "I always end my talks by saying you cannot ignore the small details," Quatman said. "The (connection) that failed was about 8 inches wide." Don't take the 'simple things' for granted Brent Wright was just 17 years old when he lost his mother and stepfather. Since then, every anniversary of the collapse has been challenging. "Even though it's been 40 years, those memories come flooding back," said Wright, now 57. "It's emotional. All these years later, I still miss my mother and stepfather." Karen and Gene Jeter had gotten married just 16 days before the skywalks collapsed. The newlyweds spent their final moments doing what Karen loved — dancing. It was a skill she insisted her son learn — for the sake of his future dating life. "When I was growing up, my mom said, 'Look, you need to learn how to dance. All the girls will love it if you actually know how to dance.' So she taught me how to dance," Wright said. Footage of the Hyatt Regency's dance party showed his mother and stepfather having a glorious time, Wright said. The event was so popular, his father and future stepmother were also there. But Wright didn't know that — or about the tragedy that would change his life — until the following day. On the night of the collapse, he was working the loading dock at a Macy's store to earn money for college. "I had the radio turned on on the dock and heard something come over the radio about some accident. It wasn't clear what the details were," Wright recalled. "I called my mom because I was going to ask her about it. Nobody answered." Wright, who lived with his father at the time, came home that night and went right back to work early the next morning. Then his dad called him and told him to come home immediately. "My dad just looked at us and said, 'I don't know any way to tell you this, but your mom and Gene were killed at the Hyatt collapse,'" Wright said. "It was absolutely awful." The Jeters never got to see Wright and his younger sister Shelly become adults and have children of their own. "They've missed so many things through the years," Wright said. "They missed me going to college, graduating from college, graduating from law school, getting married, having children. All those things, all those milestones in our lives. It's difficult, even 40 years later." Over the years, he's learned to cope with grief — a process he knows families of the Surfside victims are just beginning. "You try not to forget the past but also try not to let all the grief or the difficulties from the past hold you back from going forward," he said. "I know my mom wanted that. She would have said, 'Go ahead and live your life and be happy. But don't forget me.' So we don't." To ensure his mother, stepfather and 112 other victims are never forgotten, Wright became president of the Skywalk Memorial Foundation. It led efforts to create the Skywalk Memorial, which features a modern design evoking two people dancing, along with the names of those lost. It also honors the hundreds injured and the rescuers. "Even all these years later, none of (the rescuers) have ever been able to forget what they saw, what they did, which was selfless," Wright said. This anniversary, Wright is also remembering the dozens of lives lost in the collapse at the Surfside condo building. "All those people in Florida, my heart breaks for them. I want them to know that there are people everywhere who are thinking about them, praying for them," he said. "I hope that they get help from mental health professionals because it's not something you can do on your own." And there's a lesson everyone can take away from such tragedies. "We all have to remember not to take those day-to-day, simple things (like) family for granted. You just don't know when you may never have another chance to see them again," he said. "It's a good reminder, and it's something I've tried to do as I live my life is to try not to take those things for granted." The mental health needs of first responders are crucial Vince Ortega, then 26, was the first Kansas City police officer dispatched to the scene. On the police radio, "The way it came out was (an) elderly lady had fallen off the escalator," said Ortega, now 66. More calls quickly followed, but nothing prepared him for what he saw when he arrived at the hotel. "People were running out, bleeding from the head," he said. "When I went in, I saw a dead body right away. The rubble had flattened the body out. I could tell it was a woman because she had a dress on." Ortega had no idea what had collapsed. So fearing another imminent collapse, he tried to rush as many injured survivors as he could outside to safety. "You're just helpless because you're bringing out just a few at a time, and there's a whole lobby full of people," he said. "Then water started coming out of the walls." The collapse of the skywalks broke the sprinkler system, flooding the floor with several inches of water, Ortega said. No amount of academy training can fully prepare a first responder for such a mass tragedy, he said. "There was this one gentleman who was underneath the rubble ... 'I need help! I need help!' And he had his arm sticking out from the rubble," Ortega said. "So my (officer) friend grabbed his hand and started to pull him out, and his arm just came off. And my friend just dropped it and walked out the door. He actually never came back -- he never returned to the police department." Such overwhelming trauma highlights the need for first responders to have adequate mental health support, Ortega said. "Back then they didn't really offer the mental health assistance" needed, he said. That changed after other officers who had responded to the collapse started leaving the force. "They did it after people started not showing up for work. And they figured out nobody wanted to admit they got affected by it." Ortega said he's lucky to come from a family of first responders — including two firefighter brothers and a nurse mother — who helped him cope with the trauma. But some emergency workers can be haunted by feelings of inadequacy despite their most valiant efforts. "You always wish you could have done a little more," Ortega said. He now thinks about the first responders in Surfside, who have been digging through tons of rubble for weeks trying to find those still missing from the condo collapse. Digging through the wreckage, one Florida rescuer said, has also meant "emotionally digging for more strength to continue." Ortega hopes the Surfside teams can benefit from the lessons learned 40 years ago in Kansas City. "Once it's done, please seek counseling," Ortega said. "Over the years, I've seen people leave the job with mental health issues because of the overwhelming tragedy that they see over time." "Everybody is vulnerable," he said. "I was just fortunate."
<urn:uuid:bcf7adef-c19b-4ca0-b5be-52bc850174ab>
CC-MAIN-2022-33
https://www.wlwt.com/article/decades-before-surfside-a-hotel-collapse-killed-114-people-in-missouri-what-have-we-learned/37054573
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.985577
2,421
2.171875
2
Like the shops and restaurants shuttered by the coronavirus pandemic, the Lehigh Valley’s drug and alcohol rehabilitation centers have been eerily quiet the past few weeks. New admissions for addiction treatment are down 50% or more at some facilities. The number of warm handoffs, in which people who are rushed to a hospital with a drug- or alcohol-related emergency are met by a counselor and coaxed into rehab, have been cut in half. Police requests for addiction counselors to visit people revived from opioid overdoses are down across the Valley. Addiction specialists wish they could say this was good news. Instead, they are deeply afraid of what comes next. “I would love to say that people have stopped using controlled substances and alcohol, but we know that’s not realistic,” said Layne Turner, Lehigh County’s drug and alcohol administrator. “Instead we’re wondering, how are they getting by?” The isolation prescribed by federal and state officials is exactly the opposite of what people grappling with substance use disorder often need. “Addiction is an attachment dysfunction,” explained Betsy Martellucci, clinical director at the Mid Atlantic Rehabilitation Services treatment facility in Bethlehem. “Being socially isolated completely exacerbates any addiction features." For some, technology is helping. For the 50 people whose faces appear as thumbnails on a new Lehigh Valley Alcoholics Anonymous virtual group, being stuck at home doesn’t mean going it alone. Connecting through Zoom each night, they laugh, talk and listen together. As the group celebrated its two-week anniversary April 2, The Morning Call was invited to observe the meeting, with the condition that participants would not be identified. Members were made aware that a reporter was present. Singles, couples, dog pictures, and icons with mere initials dotted the screen, some playing with virtual backgrounds like fields of grass and the northern lights. Like any other AA meeting, members observed a moment of silence, recited the serenity prayer and the organization’s responsibility statement, and shared with others. The towline through every testimony was unity, with a nod of gratitude to the medium that makes unity possible during a socially isolating pandemic. For some, it was their second virtual meeting of the day, and others were skeptical of the effectiveness at first. The very structure of the virtual meeting, many reflected, is a mark of resilience. There are more than 100 AA groups in the Lehigh Valley, about 80 of which are connected through the ABE Intergroup. They’ve all had to shut down in-person meetings during the pandemic, but within days, most of them transitioned to virtual platforms. “The vast majority of us have, by necessity, adapted,” said Scott F., chairman of the Intergroup’s public information committee. “There’s not a whole lot of fellowship that’s lost.” Necessity, he says, because addiction is isolating, and the only solution — and a core tenet of AA — is reaching out. “The solution is not isolating," he said. "The solution is getting connected.” But the ripple effects of a shut-down economy are leaving folks with an elevated state of stress. “There’s a lot of people truly suffering,” said Freddie M., the Intergroup’s chair. “People laid off from jobs, people who haven’t seen their kids because they can’t leave mom’s house. There are people who are crying in meetings. It’s no different than when we’re in person.” He even believes virtual meetings could open new doors for Alcoholics Anonymous, and perhaps draw in newcomers for whom stepping foot into a physical meeting is just too much. It’s usually one of the toughest parts of recovery, he explained — walking into that first meeting. But inevitably, technology can’t reach everyone. Counselors at Martellucci’s clinic in Fountain Hill only saw half the usual participation in their group therapy sessions the first week they went online. Now about 50 groups, each week, use a HIPPA-compliant version of Zoom. Martellucci’s staff set up six computer stations at the clinic, equipped with webcams for clients who otherwise don’t have access at home. “Some people are super frustrated with it, feeling like it’s difficult to connect,” she said. “Other people are saying this is a lifeline, that this is the only connection they have with the outside world.” Even online meetings run the risk of disruption, in the form of menacing hackers and trolls. Suzanne Corbin, a manager at a Catasauqua residential treatment facility who is four years into recovery from opioid addiction, experienced this at her group meeting last Thursday. More than half the participants were hackers who filled the thumbnails with pornographic images, racial slurs and videos of kids drinking. It was already a bad week. She lost a friend from an overdose. She just wanted to be with her group. The administrator of the meeting got a handle on it, and they’ve upgraded the security features of their Zoom platform. So they’ll continue to meet, because they have to. “The cool part about all of it is the world is at a standstill, and we’re still recovering,” Corbin said. Erica Panella, a certified recovery specialist who works for Lehigh County, is worried that some of her clients are not handling the isolation and disrupted daily routines of the pandemic well. Though she’s working from home most of the week, Panella said she’s busier than ever, reaching out to clients in recovery by phone, Facetime and video conferencing. “Recovery is hard to begin with, and then you add all these new types of stressors," she said. "So I’m constantly on the phone, trying to make sure everyone is OK. A lot of people have no other support, and they feel very disconnected right now.” Alcohol addiction is already the No. 1 issue for Panella’s clients, and she worries about an explosion of new cases as people turn to a bottle to calm their frayed nerves. Calls to the state Department of Drug and Alcohol Programs hotline have been relatively consistent thus far, Secretary Jen Smith said last week, with no sharp upticks or declines. Interestingly, alcohol-related calls to the hotline decreased in the last week of March, from 58 calls to 36 calls, though she noted a wave could still be coming. “Under the circumstances we are living in, it is extremely likely that we could see more individuals turning to substances to deal with anxiety, depression, stress,” she said in a conference call with the media. “For individuals who are prone or already have existing mental health conditions, you’re looking for ways to make it easier on yourself, and substances are likely the answer to that question.” Panella’s other concern is for those who were forced into sudden sobriety by the coronavirus and may relapse the second they’re able to leave their homes. Using drugs, especially opioids, after a period of abstinence carries a high risk of overdosing. “Everyone is running on fear right now,” she said. Fear, too, of what a resurgence in the opioid crisis would mean for hospitals already overwhelmed with handling an impending coronavirus caseload, Martellucci said. Before the COVID-19 pandemic, opioid addiction was considered Pennsylvania’s greatest public health crisis. Though overdose deaths were down last year for the first time in five years, dropping 23%, according to the state’s opioid dashboard, 3,811 Pennsylvanians lost their lives, including 130 in Lehigh County and 69 in Northampton County. A post-pandemic surge in overdoses would certainly push those numbers higher. Lehigh County’s addiction helplines barely ring these days, and there are far fewer requests for admission into local treatment centers than just a month ago, said Turner, Lehigh County’s drug and alcohol administrator. One reason for this is the strict CDC guidelines designed to prevent coronavirus outbreaks inside hospital-type settings such as residential drug and alcohol treatment centers. New applicants are screened over the phone and turned away if they are perceived as a risk. “If you’re over 60, you’re not getting in. If you self-report an underlying condition, like asthma, you’re not getting in," Turner said. This is a concern because the majority of people suffering from the disease of addiction also have medical issues, Turner said. “A lot of our clients have physical health complexities that, until a month ago, we had no problem treating.” Facilities are trying to be creative, using telehealth to provide counseling. Residential facilities like Corbin’s in Catasauqua haven’t allowed visitors in about a month; residents wear masks every day and videoconference with family as much as they can. Turner said he’s heard of one facility that is only admitting men during the pandemic because that makes it easier to divide people into housing groups. Twelve-step Zoom meetings are great, Turner said, but he worries about folks who usually go to a library or Starbucks to get internet access. “A lot of these public places are closed. The less tech-savvy population we serve is being left behind.” With fewer people seeking help, Turner worries that treatment centers may soon be forced to lay off staff, which could lead to another crisis when the pandemic eases and more need help. The state has seen some diminishing of the addiction-related workforce, Secretary Smith said, but she remains optimistic. “The reality is, our field is no stranger to crises," she said. “Our field is no stranger to trying to adapt to new circumstances … to pulling things together when it seems impossible. This is something we’re equipped to handle.” As the pandemic drags on, the only thing people who help the addicted can do is wait. “People are afraid to go out. People are afraid to go to the hospital. Does this mean people are going to turn to other substances?" Turner said. "Trying to answer these questions is almost like shaking a Magic 8-Ball — there’s just no way for us to know.” IF YOU NEED HELP - Department of Drug and Alcohol Programs’ 24/7 hotline (for connecting with treatment providers): 800-662-HELP - AA hotline: 610-882-0558 - Treatment Trends: 610-432-7693, Monday-Friday 8:30 a.m. to 4:30 p.m. - Mid Atlantic Rehabilitation Services: 610-419-3101, Monday-Friday 8 a.m. to 5 p.m. - Pyramid: 484-225-7693, Monday-Friday 8 a.m. to 5 p.m.
<urn:uuid:50baa6b7-75dd-4d03-95b9-0f5c275300dc>
CC-MAIN-2022-33
https://www.mcall.com/coronavirus/mc-nws-coronavirus-addiction-treatment-options-20200409-7lzgrwulmfd63gsmbnfvnoxsfe-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.958832
2,379
1.515625
2
Sometimes, as human beings, we seem to be afloat on the sea of time. The days and even the years merge together. This was one such occasion. The date was September 20th. The year? Ah, that is where we must pause and consider the facts. If the year should prove to be 1973, then we could quite accurately say that the events of which I speak occurred in Queens, New York. There two sons of India met for the first time. Their identities? The legendary sitar player Pandit Ravi Shankar and spiritual Master Sri Chinmoy. If, however, we should vault twenty-nine years to September 20th, 2002, then it would be an entirely different matter. Why, then we would find ourselves in Del Mar, California, where Ravi Shankar and Sri Chinmoy were once again scheduled to meet. And, lest you imagine such reunions to be their habitual practice, I must point out a most remarkable fact: this was to be their second only meeting. So let us cross the ocean of time, immense in its breadth and full of trackless paths, and arrive at September 20th, 2002 – a day when history repeated itself. Del Mar Hilton Hotel: The sun glides towards the limitless blue rim of the Pacific, causing trees and humans alike to cast long, cool shadows as they witness its glorious descent. Sri Chinmoy stands framed in the doorway of the Hilton Hotel ballroom, watching the exquisite scene and waiting for Ravi Shankar and his family to arrive. It is no coincidence that Ravi literally means ‘the golden sun’. A sudden quickening of activity indicates that the moment has come. Ravi Shankar, his wife Sukanya and their daughter Anoushka, approach and Sri Chinmoy offers them his soulful pranams. At age 82, Ravi Shankar is eleven years older than Sri Chinmoy, who affectionately addresses him as ‘brother’ and later as ‘dada’, meaning ‘elder brother’ in their shared Bengali language. By virtue of Ravi Shankar’s legendary musical genius and his pivotal role in bridging the musical cultures of East and West, he seems larger than life, a lion among men, in spite of his diminutive stature. As human beings, many of us stand in the reflected light of some great personage, our lives are ennobled far beyond our imagination by this contact. But when two such giant souls meet together, each one basks in the light of the other. So it is with Ravi Shankar and Sri Chinmoy. “A drop has arrived at the heart-door of the ocean to receive affection and compassion from the ocean.” 1 With these words, Sri Chinmoy greets his guest, adding that he is “absolutely enamoured of [Raviji’s] nectar-flooded music.” While offering Ravi Shankar the ‘U Thant Peace Award’, Sri Chinmoy elaborates: “Every single day, your colossal music soul swiftly travels the universe and prayerfully gathers a huge bouquet of twinkling stars to place at the Feet of the Absolute Lord Beloved Supreme … Ravi Shankar the musician and God the Supreme Musician sleeplessly communicate with each other through the language of love.” Deeply moved, Ravi Shankar responds: “Sri Chinmoy, my brother, I am so overwhelmed and emotionally I feel choked with the love that you have shown towards me.” Sri Chinmoy now introduces an aspect of the programme that has become almost a personal signature for him in his meetings with men and women from all countries and diverse walks of life. He wishes to honour Ravi Shankar by lifting him overhead with one arm. Clearly enthralled by this unique request, which has something of a child’s playfulness about it, Ravi Shankar springs to his feet and approaches the metal lifting apparatus. He then steps onto a small elevator and is transported to the top of the machine. “It’s nice up here!” he quips on arriving at the top. For Sri Chinmoy, this is a particularly light lift, given that in the past he has lifted many individuals weighing in excess of 300 pounds. But he approaches it in the same prayerful mood that he has shown in each of his previous lifts. We realise anew that for each lift, light or heavy, this spiritual teacher relies fully upon God’s unconditional Grace. With a surge of power, he raises his left arm to full extension and the platform travels upwards. Sri Chinmoy holds Ravi Shankar aloft for nearly a full minute and then lowers the platform with infinite care and tenderness. Afterwards, as he garlands Ravi Shankar with a special medallion, Ravi Shankar says, “It is I who should honour you in this way.” Sri Chinmoy next invites Sukanya and Anoushka to ascend the platform and he lifts them simultaneously, one in each hand. Following the lifting portion of the ceremony, Ravi Shankar tells the audience of more than two hundred of Sri Chinmoy’s students: “You are so lucky to have him as your guide in life – and what wonderful work is being done! Please keep it up. We are all so tired of the violence and all the negative things, all the discord that is happening. Amidst that, people like him and those who love him and follow him are doing wonderful work.” Ravi Shankar’s heartfelt testimony reminds us that he and Sri Chinmoy are kinsmen – not only Indians, but Bengalis, among whom there exists the strongest of bonds. It is a bond of the land, a bond of culture, of history and, above all, of spirituality, for Bengal has been the cradle of so many spiritual luminaries in India’s past – Sri Chaitanya, Sri Ramakrishna, Sri Aurobindo, Swami Vivekananda, Lahiri Mahasay, Sri Yukteshwar, Swami Yogananda, Anandamayee Ma and many others. All these saintly figures comprise the rich and living spiritual heritage of Bengal. Sri Chinmoy’s meeting with Ravi Shankar is eloquent with the silent presence of such great souls. Fittingly, Sri Chinmoy has celebrated Raviji’s life in song and he and his students have recorded their arrangements on video. As the first strains of music fill the air, we watch the maestro tapping gracefully with his forefinger in time to the rhythm and listening intently to catch the Bengali words. This is Sri Chinmoy’s exquisite tribute to him, translated into English by the composer: Ravi Shankar, to you I offer my soulful obeisance. You are the lion-sitarist. In the hallowed world of music-pilgrimage, Immortal you are in every heart. From high Heaven the Cosmic Gods descend and garland you. At every moment, they illumine your life-road. Two sleepless friends you have: Heaven’s Fragrance, Heaven’s Glory. Rapt in dance at the Feet of the Absolute Lord Supreme Is your outer frame. 2 It is a monumental and majestic song, prompting Ravi Shankar to exclaim, “Sri Chinmoy’s voice has such expression!” The programme continues for several hours, with many surprises for Ravi Shankar and his family. Finally, the time arrives to exchange parting words. “First Swami Vivekananda came to give India’s spiritual wealth to the West. Then came Paramahansa Yogananda. Now Sri Chinmoy has come,” reflects Ravi Shankar. “I shall treasure in the inmost recesses of my heart your blessing-light,” replies Sri Chinmoy. “Go on giving as much as you have been giving all the time,” says Ravi Shankar to Sri Chinmoy, in a final benediction. Queens, New York: Having found each other again after twenty-nine long years, neither Ravi Shankar nor Sri Chinmoy can afford to allow another twenty-nine years to elapse before their next meeting. After all, both of them are now in the evening of their lives. This time, the magnetic pull of their inner connection charts a direct course across the ocean of Time. Sri Chinmoy expresses a soulful and prayerful wish for Ravi Shankar and Anoushka to offer a private concert for him and his students in New York. Ravi Shankar immediately accepts the invitation and a date is set for October 11th. “Love, and do as thou wilt,” wrote St Augustine. So, like a bird of passage, Ravi Shankar sets his sights on the distant horizon of New York and flies east with his family. For the next few days, Sri Chinmoy and his students entertain them with music, singing, conversation and stories. Ravi Shankar’s comment on the experience is a single Bengali word: abhutpurba, meaning ‘unprecedented’. Later, he enthuses: “What Sri Chinmoy does is God-given. He has such a tremendous and fantastic creative urge.” At the close of one function he leaves the hall, walking side by side with Sri Chinmoy, holding his hand. The maestro and the master – two highly venerated human beings and, at the same time, two simple Bengali village boys. Friday, October 11th – the day of Ravi Shankar’s private concert – is ushered forth under a patina of grey clouds and persistent rain. It is Sri Chinmoy’s wish that Ravi Shankar perform at Aspiration-Ground, Sri Chinmoy’s little meditation park. Because of the inclement weather, Sri Chinmoy has arranged for a huge white marquee to be erected. Wooden boards are laid over the ground and, if one peers between them, it is possible to see that the water level is now several inches deep. The whole of Aspiration-Ground is literally flooded and the marquee reposes on it like a barge on Dal Lake. Sri Chinmoy then requests his students to decorate the interior so that it resembles “a rishi’s abode – full of purity and simplicity.” When Ravi Shankar visits the marquee during the afternoon for a sound check, he confides to an assistant, “I knew Sri Chinmoy would do something extraordinary for my concert.” By early evening, a bright panoply of umbrellas in the driveway indicates the arrival of Sri Chinmoy’s special guests for the occasion: Mrs Mariam Chowdhury, wife of United Nations Under-Secretary-General Anwarul Chowdhury; H.E. Vijay Nambiar, Indian Ambassador to the United Nations, and his wife Malini; H.E. Ananda Guruge, former Sri Lankan Ambassador to the USA, France and the UN, and his wife Darshanika; local councilman Jimmy Gennaro and many others. Among Sri Chinmoy’s students, many have flown in to be present at this historic concert, some from as far away as Iceland, Norway, Sweden, Australia, Hong Kong, Switzerland, Germany, Hungary, England and France. The seats inside the marquee rapidly fill up and still people continue to pour in, choosing to stand at the back rather than miss out on the performance. Still others sit outside on bleachers in the rain, cocooned under umbrellas, fully prepared to participate in this momentous event aurally, if not visually. Sri Chinmoy arrives and greets his special guests. Then he takes his seat, not more than three feet from the stage itself. There is a hush as everyone waits for the maestro to arrive. Suddenly, word spreads that Ravi Shankar has entered the marquee. He is walking slowly down the aisle from the rear entrance. The crowd bursts forth in a thunderous standing ovation. Ravi Shankar and Anoushka seat themselves on the stage, side by side, flanked by the two tabla players – Tanmoy Bose and Bikram Ghosh. The two tanpura players, Kenji and Premik, are positioned to the rear, one on each side. Behind this cluster of musicians, the maroon archways and coconut palm decorations create the illusion that the musicians are, indeed, seated on the porch of an ancient rishi’s abode. The moment has come. The great maestro places his plectrum on his right index finger and commences the alap. A trained Indian classical musician could perhaps describe in more detail the experience of the next one and a half hours. Most of us could only listen with all our hearts and souls and allow ourselves to be washed away by the river of sound that Ravi Shankar created. Ravi Shankar has written: “The raga reflects the spiritual hopes of the people, the constant struggle for life. It is drawn out of the moods of the seasons, the prayers in our temples, for our music is not written down; it is passed from heart to heart.” Some members of the audience feel that the music has become a capsule of Indian history, weaving together strains of Kashmiri folksongs, Bengali baouls, ghazals and South Indian carnatic music. Others feel that the music expresses the mood of India, especially her seasons. Definitely, the steady thrumming of the rain on the roof of the tent and the occasional crack of thunder confirm this impression. Moreover, as Ravi Shankar plays faster and faster, his left hand moving like lightning up and down the teak stem of the sitar, the steady beat of the rain seems to intensify more and more, until it is literally beating down on our flimsy shelter. I have heard of Tansen and other legendary musicians of old who could cause fire to break out or rain to fall depending on which raga they played. But this is literally happening before our eyes. With the fingers of his right hand mimicking the pitter-patter of the raindrops, Ravi Shankar urges the two tabla players to recreate the sound of the rain on their instruments. Their duet chimes perfectly with the pelting tattoo above our heads. As Ravi Shankar plays with ever-increasing speed, he signals Anoushka with a nod of his head to repeat his breathtaking musical arabesques. She looks spellbound by her father’s brilliance. His musical genius, ever unpredictable and always original, has reached new and dizzying heights and she abandons herself to his lead. It takes supreme courage and consummate skill to perform like this. Forgetting his age, forgetting time, forgetting anything external to the moment itself, Ravi Shankar soars on wings of purest inspiration to realms that others can only dream of. Suddenly the music finishes and the entire audience springs to its feet in rapturous appreciation. Sri Chinmoy approaches the maestro with a beautiful garland but Ravi Shankar is too humble to allow Sri Chinmoy to place it around his neck. He and Sri Chinmoy clasp hands lovingly, the garland suspended between them. At dinner together later that evening, Sri Chinmoy recounts to Ravi Shankar an experience that he had during the concert: I prayed and meditated. Then I asked God, “God, please tell me, where is Heaven?” God’s immediate answer was, “Are you blind? Where else is Heaven, if not inside Ravi Shankar’s heart?” I asked God another question: “God, where are You?” He said, “Are you deaf? Are you blind? Can you not see where I am? I am inside Ravi Shankar’s music.” Then God said, “I am not only inside his music, but also I am his music as well.” During the dinner, Sri Chinmoy also reveals to Ravi Shankar that he first heard him perform around 1947 when Ravi Shankar visited the Sri Aurobindo Ashram in South India. Sri Chinmoy was then a young boy of fifteen or sixteen and he was fortunate to sit on the floor only a few metres away from the maestro. He never forgot that sublime experience. Ravi Shankar, in turn, tells Sri Chinmoy that very few times in his life has he played with such enthusiasm and inspiration as he had at Aspiration-Ground. He says that he was getting such joy from the spiritual atmosphere; it reminded him of ancient India. Nowhere could he trace the feeling of modern India. He praises Sri Chinmoy for evoking the real atmosphere and spirituality of ancient India. Anoushka comments that she has never before seen her father indicate to the tabla players to try to imitate the rain. It is something totally new and improvised. Sri Chinmoy offers his own spiritual interpretation of the weather conditions that prevailed during the concert: “Instead of calling it torrential rain, let us call it the tears of Mother Earth for Father Heaven to descend. Ravi Shankar represents Heaven and here Mother Earth cried and cried for Heaven to descend. So this rain was nothing but the tears of Mother Earth for Heaven to descend. Heaven descended in response to the ceaseless tears of Mother Earth.” Still later that same night, long after his illustrious guests have departed, Sri Chinmoy reflects: “For me, it was an unforgettable experience, a truly unforgettable experience. In my memory, it will remain forever. Ravi Shankar’s performance was absolutely unique. He played and played with all his heart, wholeheartedly, absolutely like a young man. At the age of 82, he played really like a young man. We were all transformed.” Indeed, as the days pass and the memory of that evening lingers, we realise the truth of Sri Chinmoy’s words. We are all transformed, transformed forever.
<urn:uuid:5c8d429b-56b3-4c27-9349-d70909228ff2>
CC-MAIN-2022-33
https://www.srichinmoy-reflections.com/pilgrims-eternity
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.959391
3,879
1.757813
2
Our team, led by Dr. Gerald Regni Jr., provides a complete dental care program so you can have that perfect smile and healthy body. We are more than just fillings and tooth extractions. We aren’t only here to take your pain away. We’re here to make sure you never experience that pain again. You’ve heard of the adage, “An ounce of prevention is worth a pound of cure.” It’s an axiom from centuries ago, which remains true today, especially in our practice. At our dental clinic, our primary goal is the prevention of dental problems and diseases by helping you maintain a healthy mouth. Your dental care program will begin with a visit to our office for a general oral examination. We will take x-rays of your mouth. We will also ask you about particular habits like which side of your mouth you usually chew food and if you grind your teeth while sleeping. Dr. Regni will also take your medical history. We need to know if you are suffering from any illness and taking any medication. We would also like to learn if you are allergic or sensitive to any dental products or materials. Our desire for more information is part of our holistic approach in our practice. We genuinely believe your oral health is interconnected with your overall health. We will recommend cleaning if you haven’t had your teeth cleaned by a dentist for some time. Cleaning prevents tooth decay and gum disease. We want your natural teeth to last your entire lifetime. But after examination and cleaning, we may discover the need to address problems that require immediate attention. We may recommend that you undergo other dental procedures that bring your teeth back to health. These procedures are part of our therapeutic function. Some of our services are the following: - Amalgam Filling ReplacementGingivectomy - Biological & Holistic DentistryGum Disease Treatment - Biological TestingInlays and Onlays - Dental BondingInvisalign® - Dental Bridges Non-Metal Implants - Dental CrownsNon-Surgical Laser Therapy - Dental Fillings Root Canals - Dental ImplantsSmile Makeover - Dental VeneersTeeth Whitening - DenturesTooth Extraction & Site Preservation - Full-Mouth ReconstructionWisdom Tooth Removal We will lay out a treatment plan that fits your needs and preferences. Dr. Regni will make sure that the procedures and dental materials he recommends, improve both your dental and overall health. When non-invasive methods of treatment are available, he will gladly present these to you as options. At our dental clinic, we always have your best interests in mind. Call us now at 215-351-9399!
<urn:uuid:9e69e557-84c9-4cef-a645-071d122c30a3>
CC-MAIN-2022-33
https://www.philly-dentist.com/general-dentistry/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.928086
577
1.617188
2
The topic of regionalization of services among area cities and towns took center stage in Winthrop this week when House Speaker Robert DeLeo came to Town Hall for a press conference to announce funds for a study to look into the feasibility of regionalization of municipal services for Winthrop, Revere, and Chelsea. Regionalization efforts are being considered in order to help the communities share resources and thus lower expenses for certain functions. Speaker DeLeo has the support of the leaders of all three communities, including Winthrop Town Manager James McKenna in this endeavor, which will fall under the umbrella of the Metropolitan Area Planning Council. Although the concept of regionalization has its strong proponents, there are sure to be dissenters along the way. However, there does appear to be a consensus that savings can be found by regionalizing public health, veterans services, public works, and libraries, all of which were outlined by Speaker DeLeo’s office in a press release on the matter. The unfortunate fiscal reality facing state government, and by extension, the cities and towns, is that things are worse than they were during the Great Depression and will continue to be dire for the foreseeable future. We support the study and applaud Speaker DeLeo for enabling the first step in the process toward regionalization to get underway. We would add that having the House Speaker leading the way is a very good sign for Winthrop and one that says to us that Speaker DeLeo will make it happen for the benefit of Winthrop, Revere, and Chelsea.
<urn:uuid:183da9f9-b491-48ec-bb18-061eb76e0f74>
CC-MAIN-2022-33
https://winthroptranscript.com/2010/03/24/an-inevitability-the-realities-of-regionalization/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.969052
313
1.5625
2
The Boy Scouts of America strives to instill in young people the principles of integrity, character, responsibility, and leadership – preparing them to make ethical and moral choices over their lifetimes. It is the Emerald Coast Science Center’s (ECSC) mission to inspire and grow a scientifically engaged community. It is ECSC's vision to be the recognized leader for scientific exploration, encounters and education in Northwest Florida, and as such, it has promoted science, technology, engineering, arts, and mathematics (STEAM) education and public outreach in Okaloosa County and beyond for over 30 years. The Coldwater Nationals is a fox dog field trial designed to introduce more young people to hunting and conservation by providing safe, educational, mentored youth hunts. The youth accompanied by a parent or guardian can learn outdoor skills from a mentor during organized hunts. We hold our annual fox dog field trial event at the Coldwater Creek Recreation Area. What is a Fox Dog Field Trial? It is a 3-day hunt for 5 hours each day, where dogs are cast into the field to pursue game animals and their skills are assessed by judges. Liberty County High School “The Club” is a community site for the Boys and Girls Club of Tabula Rasa. At Boys and Girls Club of Tabula Rasa, Our mission is to inspire and enable all youth, especially those who need us the most, to reach their full potential as productive, caring, and responsible citizens. Our goal is to provide a safe environment for personal growth in academics, arts and fitness. Deer Point Angler's Club provides students and their families opportunities to learn together on how to become ethical anglers and conservation stewards. At Deer Point Elementary School we believe that all of our students will be a success. We focus on learning for all, student safety, responsibility, and respect. Together we can make the difference for the students by working to develop model citizens through the use of Positive Behavior Support (PBS) and school-wide expectations. Our slogan: C.A.S.T. The vision of Eglin Youth Programs is to provide a "POSITIVE PLACE FOR KIDS" and to encourage cooperation between fellow youth members; to challenge young people to be responsible for their actions, resourceful with the environment and respectful of the ideas and customs of others. The Southeastern Dog Hunters Association (SEDHA) was originally organized as the Blackwater Dog Hunters Association in 2012 out of Santa Rosa County, Florida but, quickly changed its name to represent members across the United States. Our primary base of members resides and hunts in Florida’s Hunting Zone D (Tallahassee to Escambia County). We strive to recruit, retain & reactivate men and woman in outdoor activities by offering a variety of opportunities to youth and families. For the past eleven years, FHF has hosted approximately 90 weekend youth hunts under the FWC Youth Hunting Program at various private leases and lands in both North and North/Central Florida. And for the past two years, FHF has begun its own New "Old" Hunters Program by hosting a total of six weekend mentored hunts. Nestled on the bluffs overlooking Lake Talquin's southern shore, the park offers outdoor activities for all ages. Visitors will find outstanding freshwater fishing with common species such as largemouth bass, striped bass, speckled perch, bream and catfish being caught off the park's boardwalk or dock. Bring your canoe or kayak to launch and explore the roughly 10,000-acre Lake Talquin. Enjoy a leisurely walk on the interpretive trail past ravine systems to a bluff overlooking the lake. Blackwater Fox Hunter Association hosts an annual field trial/bench show every year around the fourth of July. They hold this event at the Coldwater Equestrian Campground where there are many activities for the youth and families to enjoy. The bench show includes a child-friendly handling session with prizes for each child, a dance held under the pavilion for all of the families involved in the field trial, and a water slide and tubes for the kids to enjoy during their time.
<urn:uuid:a561df80-958f-44cf-8a1d-31c6f6160c4c>
CC-MAIN-2022-33
http://fyccn.org/taxonomy/term/5
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00673.warc.gz
en
0.955318
850
2.015625
2
St. Louis, MO (KTRS) There’s a new initiative to address disparities in transportation infrastructure in rural America. On Tuesday, U.S. Transportation Secretary Elaine Chao was in St. Louis to deliver a keynote address at the annual American Association of State Highway and Transportation meeting. It was there that Chao announced the Rural Opportunities to Use Transportation for Economic Success initiative, also known as R.O.UT.E.S. “Rural America, which has a disproportionately high rate of fatalities and is historically neglected, needs to have its transportation needs addressed,” said Chao. “We will bring together leaders and staff in key infrastructure modes – Highways, Aviation, Transit, and Railroads – to examine grant programs’ potential to better support the Nation’s critical rural transportation infrastructure.” Chao added. During her speech, Chao cited transportation safety statistics in rural America. “Rural communities and their transportation networks are vital to our nation. 69 percent of the Nation’s lane miles are in rural areas. Two-thirds of rail freight originates in rural areas. But rural transportation infrastructure is challenged by disparities. The disproportionate rate of crash fatalities in rural areas is especially alarming. 19 percent of Americans live in rural areas. Yet, 72 percent of large truck occupant fatalities, 67 percent of pickup occupant fatalities, and 58 percent of SUV occupant fatalities occur in rural areas. The fatality rate on rural roads is twice that on urban roads.” Chao said to a crowd of transportation officials. Chao also announced the formation of a rural transportation infrastructure council, the ROUTES Council, to lead the way on this initiative. This new internal deliberative body at the Department will identify critical rural transportation concerns and coordinate efforts among DOT’s different modal administrations. The Council will initially review public comments and create a rural resources handbook, holding its first meeting in November 2019.
<urn:uuid:4813b000-ca62-4c04-ad81-ed56647acbca>
CC-MAIN-2022-33
https://ktrs.com/u-s-transportation-secretary-visits-st-louis-to-announce-rural-transportation-initiative/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.939058
397
2.140625
2
Trey C, Davidson CS. The management of fulminant hepatic failure. Prog Liver Dis. 1970;3:282–98. Lee WM. Acute liver failure in the United States. Semin Liver Dis. 2003;23(3):217–26. Makin AJ, Wendon J, Williams R. A 7-year experience of severe acetaminophen-induced hepatotoxicity (1987–1993). Gastroenterology. 1995;109(6):1907–16. Williams R, Wendon J. Indications for orthotopic liver transplantation in fulminant liver failure. Hepatology. 1994;20(1 Pt 2):S5–10. Clemmesen JO, Larsen FS, Kondrup J, Hansen BA, Ott P. Cerebral herniation in patients with acute liver failure is correlated with arterial ammonia concentration. Hepatology. 1999;29(3):648–53. Bernal W, Hall C, Karvellas CJ, Auzinger G, Sizer E, Wendon J. Arterial ammonia and clinical risk factors for encephalopathy and intracranial hypertension in acute liver failure. Hepatology. 2007;46(6):1844–52. Ware AJ, D’Agostino AN, Combes B. Cerebral edema: a major complication of massive hepatic necrosis. Gastroenterology. 1971;61(6):877–84. Lidofsky SD, Bass NM, Prager MC, Washington DE, Read AE, Wright TL, et al. Intracranial pressure monitoring and liver transplantation for fulminant hepatic failure. Hepatology. 1992;16(1):1–7. O’Grady JG, Alexander GJ, Hayllar KM, Williams R. Early indicators of prognosis in fulminant hepatic failure. Gastroenterology. 1989;97(2):439–45. O’Grady JG, Schalm SW, Williams R. Acute liver failure: redefining the syndromes. Lancet. 1993;342(8866):273–5. Rolando N, Wade J, Davalos M, Wendon J, Philpott-Howard J, Williams R. The systemic inflammatory response syndrome in acute liver failure. Hepatology. 2000;32(4 Pt 1):734–9. Vaquero J, Polson J, Chung C, Helenowski I, Schiodt FV, Reisch J, et al. Infection and the progression of hepatic encephalopathy in acute liver failure. Gastroenterology. 2003;125(3):755–64. Canalese J, Gimson AE, Davis C, Mellon PJ, Davis M, Williams R. Controlled trial of dexamethasone and mannitol for the cerebral oedema of fulminant hepatic failure. Gut. 1982;23(7):625–9. Hanid MA, Davies M, Mellon PJ, Silk DB, Strunin L, McCabe JJ, et al. Clinical monitoring of intracranial pressure in fulminant hepatic failure. Gut. 1980;21(10):866–9. Murphy N, Auzinger G, Bernel W, Wendon J. The effect of hypertonic sodium chloride on intracranial pressure in patients with acute liver failure. Hepatology. 2004;39(2):464–70. Forbes A, Alexander GJ, O’Grady JG, Keays R, Gullan R, Dawling S, et al. Thiopental infusion in the treatment of intracranial hypertension complicating fulminant hepatic failure. Hepatology. 1989;10(3):306–10. Tofteng F, Larsen FS. The effect of indomethacin on intracranial pressure, cerebral perfusion and extracellular lactate and glutamate concentrations in patients with fulminant hepatic failure. J Cereb Blood Flow Metab. 2004;24(7):798–804. Clemmesen JO, Hansen BA, Larsen FS. Indomethacin normalizes intracranial pressure in acute liver failure: a twenty-three-year-old woman treated with indomethacin. Hepatology. 1997;26(6):1423–5. Bernard SA, Gray TW, Buist MD, Jones BM, Silvester W, Gutteridge G, et al. Treatment of comatose survivors of out-of-hospital cardiac arrest with induced hypothermia. N Engl J Med. 2002;346(8):557–63. The Hypothermia after Cardiac Arrest Study Group. Mild therapeutic hypothermia to improve the neurologic outcome after cardiac arrest. N Engl J Med. 2002;346(8):549–56. Shankaran S, Laptook AR, Ehrenkranz RA, Tyson JE, McDonald SA, Donovan EF, et al. Whole-body hypothermia for neonates with hypoxic-ischemic encephalopathy. N Engl J Med. 2005;353(15):1574–84. Marion DW, Penrod LE, Kelsey SF, Obrist WD, Kochanek PM, Palmer AM, et al. Treatment of traumatic brain injury with moderate hypothermia. N Engl J Med. 1997;336(8):540–6. Henderson WR, Dhingra VK, Chittock DR, Fenwick JC, Ronco JJ. Hypothermia in the management of traumatic brain injury. A systematic review and meta-analysis. Intensive Care Med. 2003;29(10):1637–44. Traber P, DalCanto M, Ganger D, Blei AT. Effect of body temperature on brain edema and encephalopathy in the rat after hepatic devascularization. Gastroenterology. 1989;96(3):885–91. Cordoba J, Crespin J, Gottstein J, Blei AT. Mild hypothermia modifies ammonia-induced brain edema in rats after portacaval anastomosis. Gastroenterology. 1999;116(3):686–93. Rose C, Michalak A, Pannunzio M, Chatauret N, Rambaldi A, Butterworth RF. Mild hypothermia delays the onset of coma and prevents brain edema and extracellular brain glutamate accumulation in rats with acute liver failure. Hepatology. 2000;31(4):872–7. Vaquero J, Blei AT. Mild hypothermia for acute liver failure: a review of mechanisms of action. J Clin Gastroenterol. 2005;39(4 Suppl 2):S147–57. Vaquero J, Butterworth RF. Mild hypothermia for the treatment of acute liver failure—what are we waiting for? Nat Clin Pract Gastroenterol Hepatol. 2007;4(10):528–9. Jalan R, Damink SW, Deutz NE, Lee A, Hayes PC. Moderate hypothermia for uncontrolled intracranial hypertension in acute liver failure. Lancet. 1999;354(9185):1164–8. Jalan R, Olde Damink SW, Deutz NE, Hayes PC, Lee A. Restoration of cerebral blood flow autoregulation and reactivity to carbon dioxide in acute liver failure by moderate hypothermia. Hepatology. 2001;34(1):50–4. Jalan R, Olde Damink SW, Deutz NE, Davies NA, Garden OJ, Madhavan KK, et al. Moderate hypothermia prevents cerebral hyperemia and increase in intracranial pressure in patients undergoing liver transplantation for acute liver failure. Transplantation. 2003;75(12):2034–9. Caldwell SH, Hoffman M, Lisman T, Macik BG, Northup PG, Reddy KR, et al. Coagulation disorders and hemostasis in liver disease: pathophysiology and critical assessment of current management. Hepatology. 2006;44(4):1039–46. Vaquero J, Belanger M, James L, Herrero R, Desjardins P, Cote J, et al. Mild hypothermia attenuates liver injury and improves survival in mice with acetaminophen toxicity. Gastroenterology. 2007;132(1):372–83. Stravitz RT, Kramer AH, Davern T, Shaikh AO, Caldwell SH, Mehta RL, et al. Intensive care of patients with acute liver failure: recommendations of the U.S. Acute Liver Failure Study Group. Crit Care Med. 2007;35(11):2498–508. Williams R. Classification, etiology, and considerations of outcome in acute liver failure. Semin Liver Dis. 1996;16(4):343–8. Schmidt LE, Larsen FS. MELD score as a predictor of liver failure and death in patients with acetaminophen-induced liver injury. Hepatology. 2007;45(3):789–96. Schiodt FV, Ostapowicz G, Murray N, Satyanarana R, Zaman A, Munoz S, et al. Alpha-fetoprotein and prognosis in acute liver failure. Liver Transpl. 2006;12(12):1776–81. Pereira LM, Langley PG, Hayllar KM, Tredger JM, Williams R. Coagulation factor V and VIII/V ratio as predictors of outcome in paracetamol induced fulminant hepatic failure: relation to other prognostic indicators. Gut. 1992;33(1):98–102. Larson AM, Polson J, Fontana RJ, Davern TJ, Lalani E, Hynan LS, et al. Acetaminophen-induced acute liver failure: results of a United States multicenter, prospective study. Hepatology. 2005;42(6):1364–72. Bernal W. Changing patterns of causation and the use of transplantation in the United kingdom. Semin Liver Dis. 2003;23(3):227–37. Vaquero J, Fontana RJ, Larson AM, Bass NM, Davern TJ, Shakil AO, et al. Complications and use of intracranial pressure monitoring in patients with acute liver failure and severe encephalopathy. Liver Transpl. 2005;11(12):1581–9. Blei AT, Olafsson S, Webster S, Levy R. Complications of intracranial pressure monitoring in fulminant hepatic failure. Lancet. 1993;341(8838):157–8. Axelrod YK, Diringer MN. Temperature management in acute neurologic disorders. Crit Care Clin. 2006;22(4):767–85. Jalan R, Olde Damink SW, Deutz NE, Hayes PC, Lee A. Moderate hypothermia in patients with acute liver failure and uncontrolled intracranial hypertension. Gastroenterology. 2004;127(5):1338–46. Clifton GL, Miller ER, Choi SC, Levin HS, McCauley S, Smith KR Jr, et al. Lack of effect of induction of hypothermia after acute brain injury. N Engl J Med. 2001;344(8):556–63. Polderman KH. Application of therapeutic hypothermia in the intensive care unit. Opportunities and pitfalls of a promising treatment modality—Part 2: practical aspects and side effects. Intensive Care Med. 2004;30(5):757–69. Munoz SJ. Hypothermia may impair hepatic regeneration in acute liver failure. Gastroenterology. 2005;128(4):1143–4. Jalan R. Intracranial hypertension in acute liver failure: pathophysiological basis of rational management. Semin Liver Dis. 2003;23(3):271–82. Shiozaki T, Kato A, Taneda M, Hayakata T, Hashiguchi N, Tanaka H, et al. Little benefit from mild hypothermia therapy for severely head injured patients with low intracranial pressure. J Neurosurg. 1999;91(2):185–91. Munoz SJ, Moritz MJ, Bell R, Northrup B, Martin P, Radomski J. Factors associated with severe intracranial hypertension in candidates for emergency liver transplantation. Transplantation. 1993;55(5):1071–4. Diringer MN, Reaven NL, Funk SE, Uman GC. Elevated body temperature independently contributes to increased length of stay in neurologic intensive care unit patients. Crit Care Med. 2004;32(7):1489–95. Clifton GL, Choi SC, Miller ER, Levin HS, Smith KR Jr, Muizelaar JP, et al. Intercenter variance in clinical trials of head trauma–experience of the National Acute Brain Injury Study: hypothermia. J Neurosurg. 2001;95(5):751–5.
<urn:uuid:0d8271ad-221c-4551-a22e-c8893ed6dabc>
CC-MAIN-2022-33
https://link.springer.com/article/10.1007/s12028-008-9090-y?error=cookies_not_supported&code=5343a98b-fc39-4002-ab86-82ea6b528493
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00673.warc.gz
en
0.652076
2,819
1.59375
2
Our Story: From Obscure to ExtraordinaryIt began on a farm in Oakley, CA in the tumultuous days of the late 1960s when a young Fred Cline spent summers on his grandfather's farm. While the rest of the country was in cultural upheaval, Valeriano Jacuzzi, one of the seven Jacuzzi brothers who pioneered American aviation and water pumps, taught his grandson the cherished old-world ways of teasing magic from the soil. Fred never lost his love for the soil. With new bride Nancy Bunting, he embarked on a mission to bring Rhone-style wines to American dinner tables. Restoring vines that were decades old, some over 100 years, Fred and Nancy produced Mourvedre, Carignane, Marsanne, Roussane and Viognier. He also planted acres of what would become legendary Cline Cellars Zinfandel.In 1993, Fred and Nancy moved the winery to a 350-acre ranch in the famed Carneros Valley in Sonoma County. There the Clines planted Merlot, Chardonnay, Pinot Noir, and Syrah. They opened a tasting room in the 1853 farmhouse, and renovated the grounds to highlight the history and pastoral beauty of the property.Today, the Clines own many acres of vineyards throughout Sonoma County, with other properties in Oakley and Tehama. Passionate about the importance of history, they own and have restored the nearby Dillon Beach Resort, the Mizpah Hotel in Tonopah, NV, and the Villa Laura in Tuscany. They also operate Green String Farm, a 150-acre working farm that produces a variety of fruits and vegetables grown on soil that is tended and nurtured without toxic chemicals. The produce from Green String is used by such culinary luminaries as Alice Waters of Chez Pannise.
<urn:uuid:6e8dab73-ec4e-4e99-8463-262603a4ea7e>
CC-MAIN-2022-33
https://www.empirewine.com/search/?q=b%3A790
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.943559
379
1.5625
2
What is Vital Wheat Gluten? Is Vital Wheat Gluten Keto? Does Vital Wheat Gluten have carbs? These are the questions I get asked most often when I include Vital Wheat Gluten in any of my recipes labelled “low carb” or “keto”. I often get comments similar to these: “It includes wheat, it's not keto” “Can I replace the vital wheat gluten with something low carb?” “what's the purpose of vital wheat gluten?” I've finally decided it's time to put these questions and concerns to rest! Let's get into it.. What is Vital Wheat Gluten? Gluten is a protein found in wheat. It's what gives dough it's elastic and stretchy texture. When making vital wheat gluten, water is added to hydrate and activate the gluten and then all other parts of the wheat are removed so just the protein is left behind. It's often also referred to as “Gluten Flour”. So what does this mean for the carb count? Removing all other parts of the wheat means that the carbs are going to be MUCH lower. Think 1g of carbs per tablespoon. This low carb count makes it easy to incorporate into low carb recipes. But is vital wheat gluten keto? In my opinion, Yes. Vital wheat gluten is very low in carbs and is unlikely to cause a large spike in blood sugar. Especially because it's usually used in a recipe involving fats as well. You also don't typically go around consuming mass quantities of vital wheat gluten. If you did, you'd probably make yourself sick and it wouldn't be very appetizing! Typically vital wheat gluten is only used in small quantities such as 1-2 tbsp per recipe, going as high as about 1/2 a cup per recipe. With most recipes being breads, cookies and muffins and typically making about 12-16 servings… that's only about 0.5-0.66g of carbs coming from vital wheat gluten per serving if you were to use the full half cup. That's a very small amount. So, yes. vital wheat gluten in my own opinion is completely keto-friendly and is a great addition to desserts and breads to give them a more traditional chewy texture. But then why does it get such a bad rap in the keto community? Many strict keto-ers like to point out the fact that vital wheat gluten is “WHEAT” and Ketogenic diets do not include wheat. I have a few issues with this.. 1. No one ever really said you can't have wheat on a Ketogenic diet. A Ketogenic diet is keeping your carbs below a threshold (usually ~20g-50g NET carbs) to maintain a certain level of ketosis. Eating wheat, if the carb count is below this threshold is really not going to affect you negatively. Your level of ketosis doesn't necessarily equate to weight loss (yes, you may experience a slightly greater decrease in hunger at higher levels but the actual process of losing weight does not slow down if your ketone levels are lowered for a very short period of time). If you eat a food that contains wheat and it's low in carbs and doesn't cause you extra cravings.. then awesome. It's completely acceptable on your Low Carb/ Ketogenic diet. People are completely fine with eating store-bought low carb breads and wraps without even realizing very minuscule amounts of wheat are included. Wheat is not the enemy, it's the total carb count that should really concern you. 2. Vital Wheat Gluten shouldn't even be labelled as “wheat”. It's just the protein extracted from wheat. It's ultimately A PROTEIN. If you do not have a wheat allergy then vital wheat gluten is completely fine for you to consume on a ketogenic diet. Stop fearing it for the name! As I said, it's often referred to as gluten flour as all of the other parts of the wheat are removed. More reasons why you shouldn't be concerned: 1. Vital Wheat gluten is often used in Ketogenic recipes that are high in fibre as well as fats. Adding fats and fibre to a recipe creates almost a “protective effect”. Fibre slows down digestion..and so do fats. It also lowers the risk of any sort of insulin spike or increase in blood sugar levels. 2. Vital Wheat Gluten is extremely filling. I often find after eating recipes containing vital wheat gluten, I am much less hungry for hours after then with recipes that do not contain it. This hunger-suppressing affect is a great addition to your Ketogenic diet! So now that we know vital wheat gluten is acceptable on a Ketogenic diet… How do we use it in baking and cooking? Glad you asked! This is where the fun stuff comes in. Baking with vital wheat gluten is great. Seriously. If you've never tried it before..prepare to be amazed. Vital wheat gluten offers a truly amazing chewy texture to baked goods and a fantastic elasticity to keto-friendly breads and crusts. You can start by adding 1-2 tbsp in place of almond flour in one of your favourite low carb muffin or cookie recipes. Then move on to making your own low carb breads by using vital wheat gluten for about 1/4 to 1/3 of the flour in your low carb bread recipe (ideally in place of almond flour). You can also use it to thicken sauces, create vegan-friendly low carb meat replacements and even in burgers and patties as a binding agent! Where can I buy Vital Wheat Gluten? You can buy it in a few places! - Your local bulk foods store – it's often carried here under the name of “Gluten Flour” - Health food stores or the health food isle of your local grocery store -typically brands like Bob's Red Mill will carry Vital Wheat Gluten here - Amazon – ah, my favourite place for everything and anything. You can find vital wheat gluten here for sure if you cannot find it in the above two places. I buy this one. Do you have any recipes I can try first? I sure do! Some of my all-time most popular recipes contain vital wheat gluten! (I think that's why I get so many questions about it). My recipe THE GREATEST LOW CARB PIZZA OF ALL-TIME (Yeast Risen) is still to this day, one of my favourite recipes using vital wheat gluten. The dough was the CLOSEST I've ever gotten to traditional pizza dough. It's fluffy, chewy, and soft with a slight crispiness around the edges. Delicious! Chewy Keto Chocolate Chip Cookies –This second recipe is also one of my best ones.. It actually is close to taking over 1st place on my blog for the most re-pinned recipe with about 35K re-pins on pinterest! It's been made by 100's of people now and it amazes me every time how well they turn out for each person! It's really a no-fail recipe! And finally.. here's an easy single serve recipe just to get you used to baking with vital wheat gluten! This is my Amazing 8 Min Low Carb Flatbread that I've seen re-created in so many interesting ways! People use it to dip in hot dips such as spinach and artichoke, top as a pizza, use for bruschetta or even just as a breading for sandwiches! - Vital wheat gluten is a PROTEIN more-so than a carb - Vital wheat gluten IS keto friendly if you do not have a gluten allergy - Vital wheat gluten is very low in carbs with just 1g per tbsp - You can increase fibre and fats in a recipe to minimize any insulin response - Vital wheat gluten is very filling and delicious - There are many recipes you can make with it..get creative! I hope you guys enjoyed this little article! I've been meaning to write it for ages after getting so many questions in regards to baking with vital wheat gluten! As always, keto should be a lifestyle that works for YOU. Your definition of a Ketogenic diet may be totally different from someone else's. Do what works best for you. If you decide to include vital wheat gluten in your diet..AWESOME. I hope you love it as much as I do! If not, I completely understand and there's still plenty of delicious recipes out there you can enjoy! Thanks again for taking the time to read this.. and I look forward to talking to you all soon!
<urn:uuid:079049ed-3f89-4d7d-a0fc-4551076d5742>
CC-MAIN-2022-33
https://mouthwateringmotivation.com/2019/12/03/is-vital-wheat-gluten-keto/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.959566
1,852
1.960938
2
|Attached is a scan of some old notes, not code. It's pretty straightforward to code once you do the trigonometry (that's what's in these notes).| The trickiest part of a calculation like this is deciding what you mean by "coast": Is it the wind at the beach? Or 25, 50, 100km offshore? That has implications for how complicated your "coastline" is, but more importantly the wind is almost always stronger further offshore, so the result depends very much on this choice. This is further complicated by how the wind product was calculated and how that processing treated the nearshore region. The scale of coast you choose will therefore have large implications for the result. On Jun 27, 2018, at 12:38 AM, vivek shilimkar <vivek.shilimkar@xxxxxxxxx> wrote:
<urn:uuid:088f33a3-52d1-45ff-8c9f-3a14b7845559>
CC-MAIN-2022-33
https://www.pmel.noaa.gov/maillists/tmap/ferret_users/fu_2018/msg00211.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz
en
0.953204
186
2.015625
2
the story behind shavout jewish holiday Click here to load reader Post on 08-Apr-2017 Embed Size (px) HISTORY BEHIND HEBREW COMMUNITY Hebrew History Major PeriodsBiblical or Classical Until 3rd century BCMost of the Old Testament is written Mishnaic or Rabbinic Language of the Mishna: collection of Jewish traditionsMishnaic Hebrew spoken Rabbinic Hebrew written200 AD - 6th century AD Medieval 6th - 13th century AD Borrows Greek, Spanish, Arabic words and from other languages Haskala and Modern Europe (1770-1880) Language of Israel (1886 - present) Revival of HebrewBased on biblical languageInnovations to meet modern needsOnly colloquial speech based on a written languagePronunciation based on Sepharadic (Hispano-Portuguese) Jews rather than Ashkenazi (East European) JewsSyntax based on that of the MishnaUse of word three-consonants roots with vowels and other consonants added k.t.v yields kotev (writes)Written from right to left in a Semitic script of 22 letters Language policy of Israel TODAY Multilingualism in IsraelIsrael is a complex, multilingual, multicultural society ! A linguists Heaven!!! Messianic Jewish Bible Institute About UsMessianic Jewish Bible Institute is one of the leading institutes in USA which provides high quality Messianic Jewish education and related online programs to the people. We will provide you with complete information about Christianity and Jesus, the Massiah.For more information visit us now...!! Contact UsPO Box 610105 Dallas Texas 75261Call us: (817)864-9300Fax: 817.864.9304 http://mjbi.org/
<urn:uuid:a5aec128-25b2-460f-a1df-717cb0c7e9fa>
CC-MAIN-2022-33
https://vdocument.in/the-story-behind-shavout-jewish-holiday.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.816686
400
3.484375
3
Botanical name: Tacca chantrieri Family: Dioscoreaceae (Yam family) Synonyms: Tacca macrantha, Tacca roxburghii, Tacca wilsonii Bat flower is the most unusual black flower that looks like bat with long cat whiskers. They rise up on long stems from the broad shiny leaves. Bat flower is bat-like in color, shape and quite a complex plant with interesting side bracts of dark shiny green and white leaves. After flowering, berries are produced. The leaves are broad and about 40 cm long. They are often grown as garden plants. Bat Flower is found in NE India and SE Asia, at altitudes of 200-1300 m. • Is this flower misidentified? If yes, The flower labeled Bat Flower is ...
<urn:uuid:247cb6b9-5e52-4980-aec4-79be9616c8bb>
CC-MAIN-2022-33
https://flowersofindia.net/catalog/slides/Bat%20Flower.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.89719
186
2.421875
2
The Intersection of Disability and Gender with Online Harassment by Dr. Erin Pritchard I am a lecturer in Disability studies. I am also a woman with dwarfism, who since childhood has been called ‘midget’ by strangers who find my dwarfism funny and unacceptable within society. Here, I explore the online harassment I received as a disabled, female academic after successfully campaigning to remove the word midget from a popular brand of sweets. I argue that online harassment was provoked both by British news media, which is predominantly politically biased, and my identity as a disabled female academic. Disability studies is characterized by a personal interest in disability and evolved from disability activism in the 1960s. As a lecturer in disability studies and a disabled person, I want my research to foster change. In 2019, I had a chapter published in an academic book arguing that the word midget is a form of disability hate speech. Just to clarify, the word midget is deemed offensive by the vast majority of people with dwarfism. It is derived from the word midge, which refers to a sandfly and was used to refer to people with dwarfism in Victorian freaks shows. In line with disability activism, I contacted several supermarkets asking them to remove the word midget from their “Midget Gems” and instead replace it with a more appropriate word, such as mini. However, I did not realize that changing the name would result in such abuse after it hit the headlines. Newspaper headlines included: ‘Midget Gems renamed by M&S over fears term could offend people with dwarfism. However, a more appropriate headline would be ‘Companies drop outdated term in favor of a more enlightened one.’ The Daily Mail’s headline read: ‘Marks & Spencer have rebranded Midget Gems as Mini Gems after woke protest.’ I am not sure how contacting a supermarket is a ‘woke protest,’ but woke is a term used by biased media outlets to stoke division. Marks & Spencer, a British supermarket, had changed the name several months before the Daily Mail and others published the story. However, it was only after the story came out that I began to receive online abuse. It has to be acknowledged that the way the media publishes stories about minority activism is not to highlight their struggles, but to provoke hate against them. The abuse mostly came from average sized men. While at first it may seem that they were upset at a bag of sweets being renamed, it is more to do with being a female, disabled academic having a say in society. Their emails suggest that I should know my place in society. They reinforced this through online harassment, which social media has enabled them to do with limited backlash. A number of disgruntled people took not only to social media, but also searched for my university email address in order to send abusive messages, including this message from an anonymous email account: “What a nasty old vile witch you are. Banning midget gems. Nasty old cow. Wish someone would ban you permanently. Just cause you’re a MIDGET doesn’t mean you can ban the word. Just face it you’re a dwarf. Nasty old vile cow. You’re a midget, small lady. Go sue me. Just shut your face and stop being woke. Grow up!” Just to clarify, I did not ban midget gems, but simply convinced a few companies to change the name. For some reason, changing the name of a bag of sweets makes me a ‘nasty old vile witch.’ Here, my disability is not being attacked, but rather my gender. Both ‘witch’ and ‘cow’ are slurs often directed towards women. However, my disability was also targeted. To capitalize the word midget is an attempt of power. Whilst I successfully campaigned to have the word removed, this person is trying to reverse the power relations by demonstrating that they can call me a midget. Furthermore, there’s an aversive message to get me banned — not sure if they mean from academia or life. However, ‘just shut your face’ suggests that I should not have a voice and thus remain powerless. Also ‘grow up!’ is not only used to signify that my campaign is perhaps immature, but is used to make fun of my height. The phrase was used multiple times on Twitter, as well as tweets insinuating I was as ‘thick as two SHORT planks.’ As a person with dwarfism, I am aware of how people like to use synonyms associated with short in order to seem funny. This is all to try and reclaim their power over my objection to disability hate speech. Just for the record, I know I am a dwarf. I have no problem with that term; however, this person is clearly confused. Whilst midget is a form of disability hate speech, dwarf is not. However, it is obvious that not a lot of people know this or refuse to accept it, as one person, who even put in the subject bar ‘Midget’ demonstrates: “Get a life.. why do people like you create issues when there are none. Stupid witch” Here the harasser attempts to insult my intelligence, which he connects to my gender when he refers to me as a ‘stupid witch.’ While the term midget may not be an issue for the person harassing me, as he has probably never had that word shouted at him, instead of trying to educate himself about dwarfism, he uses his own views to ignore the experiences of people with dwarfism. When I shared my article on numerous Facebook groups for people with dwarfism, I received a lot of support and it was apparent that they were pleased about the word being removed, because that word is an issue to them, like this woman with dwarfism: “Amazing!!!! I reached out to Mondelez, one of the world’s largest snacks companies, a while back about their use of the word in their candy name. I am not sure if they make this exact product but worth checking in with them! Congrats on a great victory!” While comments such as this made me realize why it is important to fight for disability rights, I questioned whether it was worth the abuse, especially as there were no consequences for the abusers. However, I hold a privileged position in academia which enables me to enact change. I joined Twitter in 2021 in order to share my research. I follow numerous academics in order to network, as well as to promote my own research. I was hoping that sharing articles would result in a healthy debate, not schoolyard bullying. I am also a core member of the Centre for Culture and Disability Studies (CCDS) and have shared some of my lectures and presentations on their YouTube channel. Comments had to be disabled because of the abusive messages I received. While I reported the emails to the police, nothing really came of it. Report features and blocking features on various platforms are not effective in stopping online abuse, and people are given free reign to abuse people on various internet platforms. However, ex-police officer Harry Miller writes in the Daily Mail that he thinks investigating hate speech is a waste of police time. In other words, the person who is a target of hate speech should just take it. As a result of the abuse I receive in society, like a lot of people with dwarfism, I restrict when and where I go out. I was now finding that I was having to do the same with social media. The abusive emails and tweets came fast and furious. To deal with the tweets, I simply changed the settings on my Twitter account so that I could choose to be unaware of the online harassment. However, I could not escape the abuse that was coming through my university email account as I had to access it for work purposes. This had an impact on my well being. I received a lot of support from my colleagues and I realized the importance of my work. My colleague, Professor David Bolt, an academic who identifies as disabled, pointed out that while people were shocked at the abuse I received on Twitter, this is what disabled people always receive — it was just that social media made it more obvious to the wider society. People who harass and abuse others online like those who emailed me and sent messages to my Facebook account, my work email, mail, and on the CCDS YouTube channel are the same type of people who shout “midget” in the street, prompting me to contact companies in the first place. All they did was confirm why my campaign was needed. Just to clarify, I have no problem with anyone being against my campaign. I would rather engage with people who have a valid argument as opposed to those who just see an opportunity to abuse a disabled woman. Both social media and the police need to take hate speech more seriously. When people believe they can get away with harassing somebody based on their gender or disability, they are led to believe that the person is lesser than them and is always open to abuse. Dr. Erin Pritchard is a lecturer in Disability Studies at Liverpool Hope University and core member of the Centre for Culture and Disability Studies. Her research focuses on the social and spatial experiences of people with dwarfism. Her monograph, ‘Dwarfism, Spatialities and Disabling Experiences’ was published by Routledge in 2021. She has also written about the importance of female researcher safety, drawing on her own experiences of being sexually assaulted during the recruitment phase of her PhD.
<urn:uuid:f7f45105-4c18-42c9-af98-255e5ff168ca>
CC-MAIN-2022-33
https://medium.com/sexual-assault-awareness-month-2022/the-intersection-of-disability-and-gender-with-online-harassment-b10207e29479?source=user_profile---------3----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.983032
1,986
1.601563
2
We like to keep it simple in this section. In this genesis stage, we offer enough structure to build the unknown. For us, these statements below do not live only on paper or screen. We avoid hopeful thinking and focus on attainable action without oversimplifying. Like water. They are memorized; they are lived until, like any lived experience, things change. We don’t wait to set aside time to focus on their updating, rather as the challenge arises, we adjust. Like water. The Equity Consortium institutionalizes equity. Organizations and individuals are both equipped to thrive without perpetuating historically harmful practices.
<urn:uuid:e667b015-a66f-4079-8907-b3d0e372b12b>
CC-MAIN-2022-33
https://www.theequityconsortium.com/organizing-principles.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00673.warc.gz
en
0.906679
150
1.96875
2
Some twenty years later, the older brother is killed, triggering the sister to attempt suicide. As a result of the suicide attempt, the viewer learns that the sister had been in therapy with a Jewish psychiatrist to whom she had presented herself as the child of Jewish Holocaust survivors. The psychiatrist explains to the surviving brother that she immediately knew the sister was not Jewish, but wondered why she would choose to portray herself as the child of parents who had suffered such great tragedy. The psychiatrist’s wondering got me wondering about how all family members tell their histories and why, and, more specifically, why my white parents had told me my white family’s history through a social justice lens. In 1923, my father’s father, the Reverend Edward Oliver Clark, organized what, in 1924, became the Chevy Chase Baptist Church, situated in Northwest Washington, D.C., just outside Chevy Chase, Maryland. He pastored that church from 1924 to 1956. It is of note that the church proclaims to have “restarted” its mission in 1998, and my grandfather’s founding role is no longer mentioned. Next time I am in D.C., I will stop by to see if the bronze plaque of him that was affixed to the outside of the church for as long as I can remember is still there. From my father, I was taught to understand my grandfather’s pastoral commitments as forward thinking. The main story that my father told and retold during my childhood and into my adulthood as illustrative of this thinking was about how my grandfather taught theology for a year at Howard University, an HBCU, during the “Great Depression,” and did so without compensation. As a result of this role, my grandfather had occasion to invite one or more Howard University students to his home during holidays, ostensibly because these students’ could not afford to travel to their own homes during these periods. My father describes his engagement with these students as having had a profound impact on his own consciousness regarding race and racism. I am eternally grateful for that because I surely benefitted from it—I am a different person today…
<urn:uuid:621b3c68-cb0e-4ce6-b8d2-5a06b4bbec06>
CC-MAIN-2022-33
https://buyblackallyearlong.com/but-arent-we-good-white-people/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.986913
439
2.359375
2
Posted On: 2022-05-24 Give each boy five Christmas cards or seals. On signal, each boy introduces himself to five parents other than his own. Each time he must leave a card or seal with them. (Parents should not accept the card or seal until the introduction is complete and the boy can repeat their name.) The first den to finish, assembles as a den and raises their hands in the Cub Scout sign or gives their den yell.
<urn:uuid:3b3c216d-132a-4e11-9dc5-2e43e4acc597>
CC-MAIN-2022-33
https://insanescouter.org/p/4090/43/Christmas_Handshake.html?utm_source=footer_links
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.952902
97
1.710938
2
Tampa, Florida (CNN) — When it comes to piloting a plane, I have zero experience. In fact, I've never even considered attempting it. Nevertheless, as we swoop over Florida's Tampa Bay on a gorgeous November morning, I enthusiastically take over the controls of the ICON A5, a two-seater amphibious plane that looks like a sports car, maneuvers like a jet ski and is so intuitive, the company says that even a novice can learn to fly it in less than 30 hours. At 23 feet long and weighing in a 1,510 pounds, it's known as a sea light-sport aircraft. Designed to help you focus on the freedom of flying without worrying if the plane will react unpredictably, there's nothing else quite like it on the market. Now that I'm in control, my whole body tenses for a good five minutes. Am I really ready to pilot this shiny new machine all by myself? I'm not entirely sure. However, I take comfort in the fact that the A5 was built specifically for people like me, and it was designed to drive like a car. Plus, the fact that Icon's CEO and founder, Kirk Hawkins, is next to me in the cockpit doesn't hurt either. He can take over the controls at any time. So far, so good. We glide smoothly through the air at about 1,000 feet, and I'm comfortable enough to take in the sights. Lovely Fort De Soto Park doesn't disappoint. Squiggles of dreamy white dunes are surrounded by water that looks like it should be in the Caribbean. The Sunshine Skyway Bridge, with its series of long-spanning cables, is equally impressive. The adrenaline is still racing. And as most surreal experiences go, it just keeps getting better. For starters, there's another ICON A5 to my left, which is thrilling in itself. We are flying in formation, and my job is to mimic its movements. You'd think this would be intimidating, but it's not. It's just plain fun. That's music to Hawkins' ears. He's the brains behind this newfangled plane, an idea 10 years in the making. As a former Air Force F-16 pilot and a Stanford Business School grad, he has focused most of his adult life on making sport flying available to the masses. "The idea for us was to create an airplane where the average human being can go out and experience the world without having the burden of becoming a professional pilot," he says. So it makes sense that the dashboard looks like what you see in your car. There are only a few gauges that I don't recognize. "It's the Apple approach to things," he says. "You humanize it, and make it intuitive and easy and cool." He's so confident people will want to fly (and buy) his planes that he just opened a flight-training facility at Peter O. Knight Airport. Located on Davis Island, five minutes from downtown Tampa, it's a place where both beauty and sailboats abound. The company's other training center is in Vacaville, California, where ICON is headquartered. Wide eyes and open windows By 9 a.m., it's time for a brief water-landing pitstop. Hawkins takes over the controls. I've been too busy learning to fly in formation (not something non-pilots get to try very often) and interviewing Hawkins to even think about learning to do a water landing myself. It's something Hawkins tells me most people can master in about 30 minutes. A few negative-Gs and 360-degree turns later and it becomes a fun roller-coaster ride in the sky. Plus, it's an open-air flight, so I occasionally flop my arms out. Just because I can. At a few hundred feet above the water, it's easy to spot a boater waving at us, a flock of pelicans and even stingrays. "We're gonna pull over here and stop and get out for a second," he says. Surely he's kidding, right? But after landing the plane on the water, he takes off his seatbelt, and I realize he's not. Seconds later, he pops the roof and we climb onto the wings, which could easily double as diving boards. Suddenly, this feels less like a plane outing and more like I'm on a boat sunbathing. Everything is drenched in a mesmerizing golden hue. I can imagine picnicking on the beach nearby. Or taking the plane somewhere for a remote weekend camping trip. Because the plane has a range of about 430 miles on a full tank, it's made for short getaways. "This entire thing is about inspiring people," he explains. "Once you learn to fly, you will never be the same. You will look at the sky different, you will look at the planet different." Designed to make flying simple "The primary motor skills for operating a plane are pretty easy," Hawkins tells me. "We have people landing by themselves with an instructor on their very first day, within 30 minutes." That said, they've painstakingly taken the time to design it for safety. The goal of the spin-resistant airframe feature is that if the pilot makes mistakes, the airplane doesn't lose control. As a backup, there's a complete airplane parachute. "The spin resistance feature is a big deal as it's the first airplane that the FAA has deemed spin-resistant," says Chris Dupin, a flight instructor and US Air Force officer. "A significant number of general aviation fatalities are from loss of control accidents that involve an unrecovered spin on the base to final turn." Plus, there's the angle of attack indicator, something you don't typically see in a light aircraft. It shows you where the wing is happy (in the green) or where it could stall (in the red). The pilot's job is to keep the wing within the green or yellow section of the gauge. This is part of what makes water takeoffs and landings so easy to learn. Becoming a barnstormer "Kirk Hawkins has an extremely creative and innovative idea for pilot training that is more intuitive; teaching the feel of flight first and the principals and structure later, not unlike how people learn to drive," says Christine Negroni, veteran aviation journalist and author of "The Crash Detectives." "The world is facing a pilot shortage, so the idea of teaching differently, so that different learning styles can be accommodated could very well expand the pool of pilot candidates." On that note, about 40% of the folks who've put down deposits for the ICON A5 are not pilots, which means this plane is drawing aviation newbies. After an hour and a half of flying time, Hawkins lands us on the airport runway, a maneuver that you can tackle after you've mastered several water landings. It's a bit trickier since it requires more precision and knowledge about crosswinds. At this point, if I owned this plane, I'd hook it up to a trailer, fold the wings up, drive it home, and park it in the garage. Get some air time If you want your own ICON A5, get in line. More than 1,800 customers have put deposits down. For those who aren't ready to shell out $207,000 to buy one, there's the option of stopping by ICON's training facility in Tampa, or the facility in Vacaville, California, to fly for the day. The Sport Flying Introduction class is 1.5 hours for $595. To snag your Sport Pilot License, you will need to spend 20-plus hours and pricing varies.
<urn:uuid:3f013eb8-f8b7-493d-8349-e65d793c1102>
CC-MAIN-2022-33
https://www.cnn.com/travel/article/sports-car-with-wings-icon-a5/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00673.warc.gz
en
0.969661
1,627
1.5625
2
Why were the aughts so nasty for stocks? The U.S. ended the decade more or less where it began in terms of total employment. The owners of capital fared no better, with the nominal S&P500 stock price index down 20% for the decade. The dividends stockholders collected made up for some of that, but inflation took away even more. Blue line: Nominal value of S&P500 stock index, January 1980 to December 2009. Red line: value as of January 2000. Data source: Robert Shiller. One of the reasons stocks did so badly was that real earnings ended the decade 80% lower than they began. Even when you smooth out cyclical variations by taking a decade-long average as in the dashed blue line below, the downturn in earnings at the end of the decade is still pretty significant. Green line: Real value (in 2009 dollars) of earnings on the S&P500, January 1980 to December 2009. Dashed blue line: arithmetic average of green line for the preceding 10 years. Data source: Robert Shiller. But a bigger reason why stocks did so badly was the changed valuation of those earnings. Yale Professor Robert Shiller likes to summarize this by using decade-long averages of real earnings to calculate a price-earnings ratio. In January 2000, this cyclically adjusted P/E ratio was profoundly out of line with the average values we’d seen over the previous century. If you trust the tendency of this series to revert to its long-run average, it means that whenever the blue line is above the red, you should expect stock prices to grow at a slower rate than earnings. If you bought when the blue was as far above the red as it was in January 2000, then I hope there was something else you found to enjoy about the naughty aughts. Cyclically adjusted P/E over the last century. Blue line: Ratio of real value (in 2009 dollars) of S&P composite index to the arithmetic average value of real earnings over the previous decade, January 1880 to December 2009. Red line: historical average (16.34). Data source: Robert Shiller. That doesn’t mean you should never buy when the P/E exceeds its historical average. If you buy at those times, you may expect to earn a return below the average historical real yield of 5.5% per year, but it could be that this lower return of, say, 4% would still be better than you can get anywhere else, and good enough for your saving objectives. In 1995, Shiller’s long-run P/E was a bit rich by historical standards at about 20, right where it is today. If you bought at those high prices in 1995 and sold at the even higher prices in 2000, then you did very, very well. But if you’re smart enough to know exactly how to pull that off, then I’m smart enough to know that I’m not you. Shiller’s graph persuaded me to keep extra cash entirely out of stocks for most of the last 15 years. I shared with Econbrowser readers my reasons for going back into the market over November 2008 through the spring of 2009. In retrospect, that was the one brief window over the last 20 years when Shiller’s calculation suggests you could earn above-average historical returns from buying stocks. Many financial analysts used to give the advice to put steady monthly amounts into stocks and hold for the long term, trusting in the long-run averages eventually to give you that 5.5% annual real return. The experience of the last decade has spooked some people out of that philosophy. I think it still makes sense provided that the long-run P/E doesn’t get above 20; beyond that, you want to be aware of the risks. Some people have the psychological reaction that when stock prices have been going down, equities are becoming a riskier investment. I take the opposite view– the higher stock prices go, the scarier they look to me. Disclaimer: This page contains affiliate links. If you choose to make a purchase after clicking a link, we may receive a commission at no additional cost to you. Thank you for your support!
<urn:uuid:36efff3f-8770-4d61-be8d-935c07fdaf2e>
CC-MAIN-2022-33
https://wallstreetpit.com/13190-earnings-ended-the-decade-80-percent-lower-than-they-began/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz
en
0.965275
887
2.203125
2
Sound in Meditation An experience that came at the end of meditation was this feeling of hearing a bell ring, and noticing when it began and when it ended. This is a Buddhist practice that I was shown. The point could have been the impermanence of everything being shown. The paradox of this was that it also showed me the opposite, which is the eternalness. I was hearing the bell ring at the moment of creation, and then ripple out and fade away until it could not be heard. I feel vibration in the body with the sound. I imagine that there is a sine wave that ripples outward from the bell and the bell sound continues beyond what we can here. When does it ever end? And then taking that to all sounds that have begun...do they end? Or does the sine wave continue to ripple out and effect and resonate with everything? There is an end to what we hear but there are frequencies we don't hear and are they there when we don't perceive them? I sense the sound does not have an end. The sound of OM is the sound of the universe creating, the beginning of creation. That is a rippling sine wave bending and shaping into a combined stream of sine waves, which could be the beginning of all sounds ever made. And what if all sounds ever made are still sounding rippling out, but we just cannot hear them with our human hearing abilities? Synchronicity made me run across this about temple bells so I have to share! THE SCIENCE BEHIND TEMPLE BELLS "Most of the old temples have large bell at the entrance of the temple and you need to ring it before you enter temple. A Temple bell have a scientific phenomena; it is not just your ordinary metal. It is made of various metals including cadmium, lead, copper, zinc, nickel, chromium and manganese. The proportion atwhich each one of them mixed is real science behind a bell. Each of these bells is made to produce such a distinct sound that it can create unity of your left andright brain. The moment you ring that bell, bell produces sharp but lastingsound which lasts for minimum of seven seconds in echo mode good enough totouch your seven healing centres or chakras in your body. The moment bell sound happens your brain is emptied of all thoughts. Invariably you will enter state of Tran’s state where you are very receptive. This Trans state is the one with awareness. You are so occupied in mind that only way to awaken you is with a Shock! Bell works as Anti-dote to your mind. Before you enter temple – to awake you and prepare you for taste of awareness is the real reason behind temple bell." I love tools that help us get into other states of consciousness. I love thinking/feeling about the unified mind as the two hemispheres become one and thus I see in oneness. I wrote a blog on oneness mind recently called The Heart is in the Driver's Seat. I love that the solutions and tools are ancient and right in plain sight being rediscovered. I love tapping into the emptiness, the expansive state of being connected to all that is. Thanks for hearing....... Shannon Luminance River Akashic Intuitive Readings and Blogging Shivrael Luminance River
<urn:uuid:356dc3b4-f4b8-4bcc-8c94-44144f37e61e>
CC-MAIN-2022-33
https://www.akashicintuitive.com/blog/the-sound-ripples-out-to-all-creation
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.964498
702
1.90625
2
The Tin Drum The Tin Drum (German: Die Blechtrommel) is a 1959 novel by Günter Grass. The novel is the first book of Grass's Danziger Trilogie (Danzig Trilogy). It was adapted into a 1979 film, which won both the Palme d'Or, in the same year, and the Academy Award for Best Foreign Language Film the following year. Cover of the first German edition |Original title||Die Blechtrommel| |Translator||Ralph Manheim, Breon Mitchell| |Cover artist||Günter Grass| |Publisher||Hermann Luchterhand Verlag| Published in English |Followed by||Cat and Mouse| The story revolves around the life of Oskar Matzerath, as narrated by himself when confined in a mental hospital during the years 1952–1954. Born in 1924 in the Free City of Danzig (now Gdańsk, Poland), with an adult's capacity for thought and perception, he decides never to grow up when he hears his father declare that he would become a grocer. Gifted with a piercing shriek that can shatter glass or be used as a weapon, Oskar declares himself to be one of those "clairaudient infants", whose "spiritual development is complete at birth and only needs to affirm itself". He retains the stature of a child while living through the beginning of World War II, several love affairs, and the world of postwar Europe. Through all this, a toy tin drum, the first of which he received as a present on his third birthday, followed by many replacement drums each time he wears one out from over-vigorous drumming, remains his treasured possession; he is willing to commit violence to retain it. Oskar considers himself to have two "presumptive fathers"—his mother's husband Alfred Matzerath, a member of the Nazi Party, and her cousin and lover Jan Bronski, a Danzig Pole who is executed for defending the Polish Post Office in Danzig during the German invasion of Poland. Oskar's mother having died, Alfred marries Maria, a woman who is secretly Oskar's first mistress. After marrying Alfred, Maria gives birth to Kurt, whom Oskar thereafter refers to as his son. But Oskar is disappointed to find that the baby persists in growing up, and will not join him in ceasing to grow at the age of three. During the war, Oskar joins a troupe of performing dwarfs who entertain the German troops at the front line. But when his second love, the diminutive Roswitha, is killed by Allied troops in the invasion of Normandy, Oskar returns to his family in Danzig where he becomes the leader of a criminal youth gang (akin to the Edelweiss Pirates). The Russian army soon captures Danzig, and Alfred is shot by invading troops after he goes into seizures while swallowing his party pin to avoid being revealed as a Nazi. Oskar bears some culpability for both of his presumptive fathers' deaths since he leads Joseph Bronski to the Polish Post Office in an effort to get his drum repaired and since he returns Alfred Matzerath's Nazi party pin while the latter is being interrogated by Soviet soldiers. After the war Oskar, his widowed stepmother, and their son have to leave the now Polish city of Danzig and move to Düsseldorf, where he models in the nude and works engraving tombstones. Mounting tensions compel Oskar to live apart from Maria and Kurt; he decides on a flat owned by the Zeidlers. Upon moving in, he falls in love with Sister Dorothea, a neighbor, but he later fails to seduce her. During an encounter with fellow musician Klepp, Klepp asks Oskar how he has an authority over the judgement of music. Oskar, willing to prove himself once and for all, picks up his drum and sticks despite his vow to never play again after Alfred's death, and plays a measure on his drum. The ensuing events lead Klepp, Oskar, and Scholle, a guitarist, to form the Rhine River Three jazz band. They are discovered by Mr. Schmuh, who invites them to play at the Onion Cellar club. After a virtuoso performance, a record company talent seeker discovers Oskar the jazz drummer and offers a contract. Oskar soon achieves fame and riches. One day while walking through a field he finds a severed finger: the ring finger of Sister Dorothea, who has been murdered. He then meets and befriends Vittlar. Oskar allows himself to be falsely convicted of the murder and is confined to an insane asylum, where he writes his memoirs. - Oskar Matzerath: Writes his memoirs from 1952 to 1954, age 28 to 30, appearing as a zeitgeist throughout historic milestones. He is the novel's main protagonist and unreliable narrator. - Bruno Munsterberg: Oskar's keeper, who watches him through a peep hole. He makes knot sculptures inspired by Oskar's stories. - Anna Koljaiczek Bronski: Oskar's grandmother, conceives Oscar's mother in 1899, which is when his memoir begins. - Joseph Koljaiczek ("Bang Bang Jop" or "Joe Colchic"): Oskar's grandfather, a "firebug". - Agnes Koljaiczek: A Kashubian, Oskar's mother. - Jan Bronski: Agnes' cousin and lover. Oskar's presumptive father. Politically sided with the Poles. - Alfred Matzerath: Agnes's husband. Oskar's other presumptive father. Politically sided with the Nazi Party. - Sigismund Markus: A Jewish businessman in Danzig who owns the toy store where Oskar gets his tin drums. The store is ruined during the Danzig Kristallnacht. - Maria Truczinski: Girl hired by Alfred to help run his store after Agnes dies and with whom Oskar has his first sexual experience. She becomes pregnant and marries Alfred, but both Alfred and Oskar believe that they are Maria's child's father. She remains Oskar's family throughout the post-war years. - Bebra: Runs the theatrical troupe of dwarfs which Oskar joins to escape Danzig. He is later the paraplegic owner of Oskar's record company. - Roswitha Raguna: Bebra's mistress, then Oskar's. - "The Dusters": Danzig street urchins gang, Oskar leads as "Jesus" after he proves his mettle by smashing all the windows with his voice at the abandoned Baltic Chocolate Factory. - (Sister) Dorothea: A nurse from Düsseldorf and Oskar's love after Maria rejects him. - Egon Münzer (Klepp): Oskar's friend. Self-proclaimed communist and jazz flautist. - Gottfried Vittlar: Becomes friends with and then testifies against Oskar in the Ring Finger Case at Oskar's bidding. Oskar Matzerath is an unreliable narrator, as his sanity, or insanity, never becomes clear. He tells the tale in first person, though he occasionally diverts to third person, sometimes within the same sentence. As an unreliable narrator, he may contradict himself within his autobiography, as with his varying accounts of, but not exclusively, the Defense of the Polish Post Office, his grandfather Koljaiczek's fate, his paternal status over Kurt, Maria's son, and many others. The novel is strongly political in nature, although it goes beyond a political novel in the writing's stylistic plurality. There are elements of allegory, myth and legend, placing it in the genre of magic realism. The Tin Drum has religious overtones, both Jewish and Christian. Oskar holds conversations with both Jesus and Satan throughout the book. His gang members call him "Jesus", then he refers to himself as "Satan" later in the book. Initial reaction to The Tin Drum was mixed. It was called blasphemous and pornographic by some, and legal action was taken against it and Grass. However, by 1965 sentiment had cemented into public acceptance, and it soon became recognized as a classic of post-World War II literature, both in Germany and around the world. In 1979 a film adaptation appeared by Volker Schlöndorff. It covers only Books 1 and 2, concluding at the end of the war. It shared the 1979 Cannes Film Festival Palme d'Or with Apocalypse Now. It also won the Oscar for Best Foreign Language Film of 1979 at the 1980 Academy Awards. Kneehigh theatre company with the Everyman theatre produced a theatre adaptation in 2017. The production is mostly sung, and features the story from birth through the war, and then ends with Oskar marrying Maria. In popular culture - Return to the Onion Cellar: A Dark Rock Musical, an original musical premiered in 2010 at the New York International Fringe Festival, references The Tin Drum and Günter Grass. - The Onion Cellar, a play by Amanda Palmer and Brian Viglione of The Dresden Dolls with the American Repertory Theater, is based on a chapter in The Tin Drum. - The 80s synthpop band 'Bronski Beat' may be named after Oskar's drumming. - 80s futurist band Japan named their final studio album "Tin Drum." - The Tin Drum Bookstore on Narborough Road (Diversity Street) in Leicester, UK. - The Tin Drum is featured in Season Two of the STARZ TV series “Counterpart.” Emily Silk is seen carrying it around as she attempts to recover her memory following an attempted assassination. - The tin drum features as the logo for the public Australian Broadcaster Triple J, a youth radio station. - Contemporary Literary Criticism. Ed. Christopher Giroux and Brigham Narins. Vol. 88. Detroit: Gale Research, 1995. pp. 19-40. From Literature Resource Center. - Hanks, Robert (1996-06-03). "radio review". The Independent. Independent News & Media. Archived from the original on 2009-03-05. Retrieved 2008-09-19. - "Music Details for Tuesday 4 February 1997". ABC Classic FM. ABC. 2007-02-15. Archived from the original on 2016-03-04. Retrieved 2008-09-19. - Return to the Onion Cellar: A Dark Rock Musical Archived 2016-01-20 at the Wayback Machine - "The hypocrite's halo". The Washington Times. August 20, 2006. - Jeffrey Hart. "Response to "How the Right Went Wrong"". Dartmouth Alumni Magazine. Archived from the original on 2006-12-28. - "IMDb: The Tin Drum (1979)". - Gunter Grass discusses The Tin Drum on the BBC World Service programme World Book Club - Extensive Review (in German) - The Tin Drum, reviewed by Ted Gioia (Conceptual Fiction)
<urn:uuid:8f7f2a1e-166d-4f54-ad24-884550f052fb>
CC-MAIN-2022-33
https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/The_Tin_Drum
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz
en
0.947358
2,492
2.265625
2
Search and compare thousands of words and phrases in American Sign Language (ASL). The largest collection online. How to sign: a person who fastens or makes fast "he found the door fastened and wondered who the fastener was"; Categories: human, individual, mortal, person, somebody, someone, soul Upload your sign now.
<urn:uuid:3560ef4b-f857-466e-b3c0-591a331867fd>
CC-MAIN-2022-33
https://www.signasl.org/sign/fastener
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.879725
72
2.703125
3