text
stringlengths 181
608k
| id
stringlengths 47
47
| dump
stringclasses 3
values | url
stringlengths 13
2.97k
| file_path
stringlengths 125
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
138k
| score
float64 1.5
5
| int_score
int64 2
5
|
---|---|---|---|---|---|---|---|---|---|
WB to send new India strategy to its board: Kim
Washington: Outlining a bold agenda to end extreme poverty by 2030, World Bank President Jim Yong Kim announced on Tuesday that a new Country Partnership Strategy for India will be sent to the bank's board next week.
Praising India's efforts to eliminate poverty, Kim said, "India's contribution to ending global poverty could be staggering. In the last five years, roughly 50 million people have been lifted out of poverty in India."
Calling for a world free of poverty, Kim in his speech outlined the ambitious agenda for ending poverty and increasing inclusive growth.
"Next week, we will send to our Board a new Country Partnership Strategy for India, the first such strategy designed with these two goals in mind," Kim said in a major policy speech.
"But in the next generation, we estimate that with a concerted push an additional 300 million Indians could escape extreme poverty," he said in his remarks at the prestigious Georgetown University.
Kim was in India last month, during which he visited Uttar Pradesh.
"We know the end of poverty will not come easily. In the years ahead, as we push toward this goal, the job will become tougher and tougher, because those remaining in poverty will be the hardest to reach," he said.
"Some live in densely populated areas in emerging economies, such as the Indian state of Uttar Pradesh, which I visited last month and which accounts for 8 per cent of the people in the world living in extreme poverty," he said.
"People living in Uttar Pradesh need so many things, including improved infrastructure, stronger education systems that prepare students for the work force, and greater inclusion of women and other vulnerable groups in labour markets," Kim said.
"Others who remain trapped in poverty live in countries caught in cycles of fragility. A substantial and growing share of poor people live in fragile or conflict-affected states, where both the need for and the obstacles to development tend to be the greatest. Fragile states must be front and centre in any agenda to end extreme poverty," the World Bank President said. | <urn:uuid:96ca235f-14bb-455c-b1a1-6f29b8f290c9> | CC-MAIN-2017-04 | http://zeenews.india.com/business/news/international/wb-to-send-new-india-strategy-to-its-board-kim_73390.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00246-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.957071 | 424 | 1.90625 | 2 |
How would you complete this sentence: “I’m a___________ Catholic.”
Cradle, convert, revert? Practicing, devout, serious? Perhaps cafeteria, cultural or C&E (Christmas & Easter)? Fallen away, lapsed, relapsed, collapsed?
In an organization of one billion worldwide, there are bound to be varying levels of interest and commitment among members. Which makes me wonder: What kind of Catholics are we raising?
I’ll be honest: if our kids (now 8 and 5) are anything like me they could be “temporarily lapsed, former C&E (give or take a feast day), happy-to-now-be-practicing, cradle Catholics” when they’re adults. However, what I'm shooting for are “happily practicing, on-fire, lifelong Catholics.”
Am I setting the bar too high? I don’t think so; it can’t hurt to try.
A 2009 study showed one in 10 American adults describe themselves as a former Catholic. Nearly half said they left the Church before they turned 24, and the reason most cited was that they “gradually drifted away.” That’s disheartening for anyone who loves the Church and a daunting statistic for Catholic parents.
The survey pointed out key differences between former Catholics and lifelong Catholics in their level of religious commitment between ages 13 and 18. Former Catholics were less likely to have attended Mass regularly, or to have had strong faith as teenagers. (Author’s note: Mom and Dad, I now appreciate the fact that Sunday Mass attendance was not negotiable at our house.)
While I can’t control the spiritual journey of my children, here are some things I can do to help influence it:
1.Live as a faithful Catholic myself: keeping in mind that little eyes are always watching and little ears are always listening. Lead by example.
2.Teach them about the faith: not just what we do as Catholics, but why.
3.Encourage questions and provide answers: not pretending to know all the answers, but knowing where to find them.
4.Help them get involved: there are countless opportunities to get involved spiritually, socially and service-wise.
5.Pray: Think St. Monica.
6.Be patient and loving: See #’s 1-5. Patience and love should come in handy for all of the above.
I WELCOME YOUR COMMENTS: “I'm a ______________ Catholic.”
Follow my blog on Facebook: www.facebook.com/MothersMusings | <urn:uuid:8a8b93ad-3b29-4029-9b97-60275cc00b89> | CC-MAIN-2017-04 | http://www.catholicnewsagency.com/cw/post.php?id=613 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00429-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.951922 | 560 | 1.570313 | 2 |
Subsequent to my question about the mis-named book above, I have had an opportunity to
confirm that it is in fact: Magyar Zsido Csaladok Genealogiaja.
Erno Munkacsi was the son of Bernat Munkacsi and they both authored
Magyar Zsido Csaladok Genealogiaja, OR Genealogy of Hungarian Jewish Families,
which is the true name of the book in question:
Genealogical Revelations of Hungarian Jewish Families - First Volume Editor - Munkatchi
It's TRUE name is:
Magyar Zsido Csaladok Genealogiaja, or Genealogy of Magyar Jewish Families written by Munkacsi, Bernat and his son, Munkacsi, Erno.
It details specifically the MUNK and FELSENBURG Hungarian families.
My father is a distant relative of these families.
Erno is the author of "How it Happened....." In my father's genealogy of the Sonnenschein's, he writes:
“Erno was attorney of the Jewish Congregation in Budapest. During the critical year of 1944 he was one of those
Jewish leaders whose political acumen saved the lives of a good part of the Budapest Jewish community.”
There is criticism of Erno (e.g. in Wiki https://en.wikipedia.org/wiki/Erno_Munkacsi) but I believe my father.
Erno and the other leaders of the Budapest Judenrat did what they humanly could to save as many lives as possible.
My father's maternal family, Sonnenschein, are descendants of Chaile Felsenburg, Bernat's grandmother, and my father's great great grand aunt. Chaile (1805 - 1851) married Bernat Munk. Munk was Magyar-ized to Munkacsi; many Jewish families Magyar-ized their names.
I have the full PDF of Magyar Zsido Csaladok Genealogiaja.
I sent the original copy in my possession to the USHMM in 2017.
They have not included it in my father's archive, but his update is there:
Los Angeles, CA | <urn:uuid:d110d147-5a04-4e5f-881d-cb70a38d52a9> | CC-MAIN-2022-33 | https://groups.jewishgen.org/g/main/message/656315?p=%2C%2C%2C20%2C0%2C0%2C0%3A%3ACreated%2C%2Cposterid%3A4610526%2C20%2C2%2C0%2C80817900 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00477.warc.gz | en | 0.89702 | 551 | 1.648438 | 2 |
1. The corrupt government official has agreed with the unscrupulous construction company to look the other way when the company cheats money out of its investors. In return the company will pay the official a large sum of money.2. Mike and Kathy are relative and Mike is Kathy's boss. That's why when Kathy does something wrong, Mike tolerates it.3. I turn a blind eye to your acts of theft because I know you are in financial trouble, but you are getting out of control.4. I didn't like the excuse she gave for being late, but I let it ride.5. People have a blind spot with their own problems.
look the other way Tolerate something turn a blind eye to something let it ride blind spotlook the other way 很貼切,Tolerate something 指願意接受某種行為.
1. 雖然 Mike 是 Kathy 的老闆, 可是他們是親戚, 所以當 Kathy 犯錯時, Mike 都睜一隻眼閉一隻眼.2. 我知道你經濟有困難, 所以才對你的偷竊行為睜一隻眼閉一隻眼, 沒想到你越來越過分.3. 我不喜歡她遲到的理由, 但我就睜一隻眼閉一隻眼.4. 人們對自己的問題總是睜一隻眼閉一隻眼.< >
An aborigine, s the name suggests, refers to one of the original or earliest known inhabitants of a country or region. | <urn:uuid:e1843fe3-d6c0-4506-9c99-dd6e0d336aa9> | CC-MAIN-2017-04 | http://www.chtoen.com/%E7%9D%9C%E4%B8%80%E9%9A%BB%E7%9C%BC%E9%96%89%E4%B8%80%E9%9A%BB%E7%9C%BC%E7%9A%84%E8%8B%B1%E6%96%87%E6%80%8E%E9%BA%BC%E8%AA%AA | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00122-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.765763 | 470 | 2.59375 | 3 |
Barbara Kruger re-makes signs. Unlike the bulk of signage we see every day, Kruger's work tries not to deceive us into believing we have a need to fulfill, but to allow us to discover the deception of signs. As far as a classification of her medium, Kruger is considered a montage artist. But, as Kate Linker, who wrote the text for Love for Sale: The Art and Words of Barbara Kruger, puts it, her pieces "resist the smooth coherence associated with that genre (Love, 12)." Kruger makes visible the breakdown of metanarrative structures, the decentered nature of contemporary culture, the struggle between sign and signifier, the hyper-consumerism of the late 20th century, the commodification of the sign, and involves her viewers in the universal flow of power. She reapportions the power of cultural iconography and commercial images, robbing the slick conveyances of societal assimilation of their strength and giving it to her audience in the form of knowledge.
Kruger has forged her career from the saddle and tack of late capitalist consumerism. Her key influences are "movies, television, and the stereotypical situations of everyday life (Love, 12)." From blue collar, New Jersey roots, she has built a successful career in a whole spectrum of disciplines. The key to understanding Kruger lies in considering the place of the sign in society. Kruger's work can be found in all of the realms where signs dominate: book covers, posters, billboards, T-shirts, and matchbooks. In addition to all of this different design work, Kruger writes two columns for Art Forum magazine, one analyzing film and the other analyzing television. She is a prolific writer, editor and lecturer, and has organized many shows and events. She is a quintessentially postmodern artist.
After graduating from Syracuse University, she enrolled in Parsons School of Design in 1965. Shortly after coming to Parson's, she was given a job at Mademoiselle, and within a year was chief designer. Her design experience would factor heavily into the work she began doing as an artist in 1969. Throughout this time she was tuned into the ideas being bandied about by the postmodernists. She incorporates the ideas of a wavering master narrative, a decentered culture, the notions of simulation and simulacra, consumerism and the commodification of the sign, and the fluid nature of power. All of these elements work together in her art to reject conformity and interfere with the cultural stigmas and stereotypes we are bombarded with every day.
A popular topic of postmodern theory is the breakdown of the metanarrative. In "The Postmodern Condition: A Report on Knowledge," Jean-Francois Lyotard defines postmodernism "as incredulity toward metanarratives (Postmodern Condition, 71)." The overarching story of how the world fits together no longer satisfactorily explains the world we live in. This concept leads postmodernism to rely on individual micronarratives to order our world. Jacques Derrida's ideas about a rupture and the decentering of the world, as explained in "Structure, Sign, and Play in the Discourse of the Human Sciences," fit right into this idea that the grand scheme has failed to tell us anything useful. Derrida states that "the center has no locus" and that anything that resembles a center is just the intersection of various signs (Structure, 225). Both of these concepts are at work in Kruger's pieces.
Kruger has a work entitled "Your comfort is my silence." As long as the ethereal "you" doesn't hear "my" micronarrative, your worldview remains intact. The use of the pronouns serve to decenter the viewer's position. The viewer is shaken because the natural reaction to the piece is that the "you" does not refer the viewer in particular, but to some otherness that is not viewing the picture at the moment. The viewer reacts by stepping out of s/he/its normal frame of reference to evaluate the picture, thereby forming s/he/its own micronarrative of what the image is referring to. Kruger also uses the feminist micronarrative often. She brings this to the foreground in many of her works, and pulls in the alternate, female, perspective of the world. Lyotard mentions that, "Narrative function is losing its functors, its great hero, its great dangers, its great voyages (Postmodern Condition, 72)." Kruger backs this up with her piece, "We don't need another hero," which features a Norman Rockwell image from a Saturday Evening Post issue of a woman (or girl) admiring the bicep of a boy.
But Kruger is aware that a rupture is necessary to get viewers to begin constructing their personal micronarratives. In order to achieve this, Kruger shows her art in a multitude of forms and modifies it to fit with the medium through which people will experience the work. Imagine the effect of putting images featuring slogans like "Surveillance is your busywork" on signs on a subway car in New York City. Now juxtapose this with the exact same image shown in Sydney with the phrase changed to "Surveillance is their busywork." Kruger knows that people not intricately involved in the system of global Americanization are not those that she is railing against. She adjusts her art to communicate in the best possible way with her viewers. Kruger's pieces are insidious, popping up in odd places and camouflaged as everyday signage, but designed to force those who experience them to skip track and end up on a different course than they were the moment before.
The concepts of simulation and simulacra are inextricably linked to
both postmodernism and Kruger's work. Jean Baudrillard, in "The Precession of
Simulacra," outlines the following idea:
The postmodern notion is that most of what is presented to us through various forms of media has little to do with reality. Possibly nothing at all to do with reality. The image begins by representing some real-world object or idea, a "basic reality" in Baudrillard's words, then masks whatever it was representing before. This progresses until the image masks the absence of whatever it was representing, and then until finally the image has nothing whatsoever to do with reality. In this final stage the simulacrum is created (Precession, 346-7). The simulacra build upon each other to create a hyperreality: a reality that is purely intellectual and bears no resemblance to the real physical world. The hyperreality in turn churns out more simulacra, completing a cycle of creation and destruction that bears no relevance or relation to any reality. This hyperreality is readily apparent in all forms of communication (i.e. television, film, radio, theater, literature as well as the various sub-categories such as network news, newspapers, magazines and straight-to-video movies) as a distorted reflection of real life. Baudrillard describes this as "substituting signs of the real for the real itself (Precession, 343)."
Kruger reflects Baudrillard's theories exquisitely. She describes her focus as "the panorama of social relations (Love, 29)." She is concerned with revealing that the social ideals we hold about beauty, self-identity and consciousness are mere simulacra. It is not that we are not capable enough, but that the signs we're holding up to each other are unattainable. Kruger's image of a woman looking into a broken mirror with the words "You are not yourself" is a good example of her work's dialogue with Baudrillard's ideas. This image is suggestive of the distance between the simulacrum and reality: You are not yourself because what society tells you to be is impossible. The concept of self-identity in our culture has been turned into a simulacrum, and is therefore irrelevant to real life. This piece also highlights another connection between Kruger and Baudrillard: They are both fascinated by the eye, sight, gaze. In Kruger's work, this can be misassociated and relegated to another facet of her feminist stance, but it has as much if not more to do with her fascination with Baudrillard's theories, which have often been explained/described in terms of mirrors of reality and distortions. The image is theoretically a mirror of society, but has been distorted into a simulacrum.
Kruger's art formalistically plays with the idea of simulacra as well. It fronts like it is simply another sign: another simulacrum misrepresenting reality to us all. What prevents Kruger's work from being just another simulacrum is the text. She adds words that "intercept the stunned silence of the image with the uncouth impertinences and uncool embarrassments of language (Love, 29)." It is through this juxtaposition that she brings her art above the realm of ordinary signage. The fact that many of her words and images are appropriated from other places also helps nail down the purpose/truthfulness of the images. For example, the "We don't need another hero" piece that was mentioned earlier succeeds on all of these levels. Both the text and the image are appropriated, but by blatantly flaunting this, she causes the viewer to think about the cultural baggage going along with the piece.
Sign for Sale
Fredric Jameson, in "Postmodernism, or the Cultural Logic of
Late Capitalism," describes the commodification of the sign in different terms:
Her epiphany is apparent in the piece "When I hear the word culture I take out my checkbook." This picture is a grotesque close-up of, fittingly, a ventriloquist's dummy, and in a much smaller text box hidden in the corner of the image is the phrase "We mouth your words." The parallel between the image and the latter phrase is obvious, but what about the main phrase about culture, which is obviously more foregrounded compositionally. Knowledge of Kruger's design proficiency negates explaining it as simply a red herring. The intent is to imply some relationship between the commodification of culture, which is really a simulacrum anyway, and control. The relationship is a postmodern one, expounded by theorists like Baudrillard and Jameson. But her message is also informed by Marxist theory. The ideas of the society are handed down from the ideology of the ruling class (German, 173). Kruger disarms by subtly implying a long history of intellectual, political, economic and class antagonism.
Power Flow, Kruger and Foucault
Kruger is one of many postmodernists whose ideas are influenced by Marx. Michel Foucault, in The History of Sexuality: Volume I: An Introduction, expounds a theory that forms the basis for most of Kruger's ideas about power. Foucault determined: "Power is everywhere; not because it embraces everything, but because it comes from everywhere (History, 334)." In Foucault's theory, power is not a quantifiable and/or containable concept, it "is not an institution ... it is the name that one attributes to a complex strategical situation in a particular society (History, 334)." Power basically flows continually, and we are constantly in the process, or at least at risk of becoming involved in the process, of going from powerful to powerless and vice versa. Power struggles occur all the time, and manifest themselves in all kinds of relations including economic processes, knowledge relations, and sexual relations (History, 334). Power is constantly in flux because, as Foucault writes, "Where there is power there is resistance (History, 336)."
Power is embedded in the signs and icons of culture, media,
advertisement. Kruger supplies the resistance. For her, like Foucault, power is
"diffuse, decentralized, and, in consequence, anonymous (Love, 27)." Kate Linker
summarizes the connection:
Combatively, Kruger's work serves as anonymous vehicles for power to
flow through. Her pieces facilitate the empowerment of the viewer while stripping the
power from the image of societal conformity. The image is unattainable, being a simulacrum
charged with the energy of hyperreal constructs, and its power can only misdirect.
Kruger's work undermines that power, renders the simulacrum powerless, by establishing a
relationship with the reader. This relationship is set up in the rupturing effect of her
text, which is due in large part to her use of pronouns. Linker writes about the
significant impact the words I, me, we, you have on Kruger's pieces:
This decentering at once grabs the attention of the viewer and encourages and allows for the viewer to engage with the work on s/he/its own terms, and thereby allows also for power to flow. Kruger works to enhance this redistribution of power, and sometimes changes the piece to fit a different audience. For example, the piece "Your manias become science" features a mushroom cloud, and has an obvious connection to the destructive nature of control. It remains the same piece when it is put on the back of matchbooks. However, when she exhibits it outside of America it may change. In Mexico City and Sydney it reads, "Their manias become science."
Although power is diffuse and anonymous, it is not impossible to
realize who is not in power, and Kruger does not aim to alienate her viewers. Rather she
wishes to allow them to realize their alienation. This most certainly speaks to a marxist
concept that alienated individuals are not necessarily aware of their alienation
(Grundrisse, 293). By initiating this power flow, Kruger has also fulfilled another
marxist ideal. Artists throughout history have interpreted the world, "the point,
however, is to change it (Theses, 145)."
Baudrillard, Jean. "The Precession of Simulacra." Hutcheon and Natoli 342-75.
Derrida, Jacques. "Structure, Sign, and Play in the Discouse of the Human Sciences." Hutcheon and Natoli 223-43.
Foucault, Michel. "Excerpts from Postmodernism, or the Cultural
Logic of Late Capitalism." Hutcheon and Natoli
Hutcheon, Linda, and Natoli, Joseph, eds. A Postmodern Reader. New York: SUNY, 1993.
Jameson, Fredric. "Excerpts from Postmodernism, Or the Cultural
Logic of Late Capitalism." Hutcheon and Natoli
Lyotard, Jean-Francois. "Excerpts from The Postmodern
Condition: A Report on Knowledge." Hutcheon and Natoli
Marx, Karl. "Theses on Feuerbach." Tucker 143-5.
Marx, Karl. "The German Ideology: Part One." Tucker 146-200.
Marx, Karl. "The Grundrisse." Tucker 221-93.
Miers, Charles, ed. Love For Sale: The Words and Pictures of Barbara
Kruger / text by Kate Linker. Japan: Harry N.
Tucker, Robert C., ed. The Marx-Engles Reader. New York: W.W. Norton & Company, Inc., 1978.
The material provided above is the result of hard work by myself and my friends. All text and images are (C)1999 by Shawn Rider, [email protected], and/or the appropriate party, and are not available for public use unless specifically noted such. There's not much I can do about it, so if you do use them please link to me ( http://www.wdog.com/rider ) and keep my name attached. I'm a college student, so, if you like what you see, I come cheap. If you've read this much of the copyright statement, you've read too much. I actually don't believe much in copyright. That's probably bad, being an original artist and all, but, especially at this stage in the game, there's not a lot to lose. Spread around the goodness. I figure not many people would read this, especially not crooks ripping off my stuff and saying it's their own. I can trust you, right? You've read this far; you care. Thanks for caring. Any banners found on these pages are not commercial links. I made them and they go to pages I work on. Feel free to use them to link from your page. This page is for fun, not profit, although fun and profitable would be a best-case scenerio. Scripts used on these pages were generated using tools available at www.builder.com and www.nebulus.org . Feel free to link to any page in this web. No hotlinks, please. Thanks for stopping by. | <urn:uuid:f3357dc8-3880-4c4f-9fbf-51e00486ddd6> | CC-MAIN-2017-04 | http://www.wdog.com/rider/writings/real_kruger.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00202-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.946976 | 3,517 | 1.625 | 2 |
Boost News Desk | Jul 28, 2022 | 0
License issued for Torbay’s first electric Taxi
Torbay is the first local authority to issue a license for an all-electric taxi.
Councillor Vic Ellery, Exectuive Lead for Environment said:
Our licensing team were asked if we would allow an electric vehicle to be licensed as a taxi, and after viewing the actual vehicle and hearing all the benefits of having a vehicle of this type on the road, we awarded the licence.
“It’s known that electric vehicles can enhance a good transport network and with the current culture of people wanting to change the impact they are having on the environment, we are extremely glad to be able to help have an impact on our environment in the Bay.
Torbay Council’s licensing tram have recently awarded Airport Transfers Torbay, based in Preston, Paignton with the new license.
The electric car, is a Nissan Leaf and is now operating as a Hackney Carriage around the bay.
Steve Guttridge, from Airport Transfers Torbay said:
Nationally, the move from petrol and diesel powered cars to electric is growing, and you can see why. As well as the impact it has on the environment with regard to emissions, the cost of running a vehicle like this is considerably cheaper. So far feedback from our clients has been positive, and it is a great feeling to know we are making a difference and helping to keep our environment cleaner.
Electric taxi saves more than the environment
The benefits don’t just stop with the environment, throughout may it was found that the electric car was using 3.8 pence per mile.
It might not sound like a lot, but given the average cost for a diesel is 17 pence per mile its clear that savings can be made.
CO2 emissions have also been cut to just over 600kg.
Further details about this new licensing achievement can be seen in the video below. | <urn:uuid:e5b049f2-e1a1-46f6-aa48-4ea5748531dc> | CC-MAIN-2022-33 | https://www.boostdigitalmedia.net/license-torbays-first-electric-taxi/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00479.warc.gz | en | 0.968571 | 411 | 2.078125 | 2 |
Colouring fabric is easy if you have the right dye. You can go to any arts and crafts store and pick up a bottle or packet of dye, but it probably won't be environmentally friendly. If you're looking for a way to dye fabric black with natural materials, use oak galls. Oak galls are growths on oak trees and appear similar to nuts. When crushed and boiled, oak galls make an easy black dye.
- Skill level:
Other People Are Reading
Things you need
- 4 cups cold water
- 2 sauce pots
- 1 cup vinegar
- 2 cups crushed oak galls
- Kitchen knife
- 4 cups water
Collect about 40 oak galls from an oak tree. The galls are spherical in shape, have tiny "horns" or bumps protruding from them and are typically dark brown and grey. They can simply be pulled or snapped off of twigs or branches.
Pour 4 cups of cold water into a sauce pot. Add 1 cup of vinegar to water. Place the sauce pot on the stove and bring the water to a simmer. This mixture will be your colour fixative to make the colour set in the fabric.
Place the fabric you wish to dye into the sauce pot. Leave the fabric simmering in the fixative for one hour. While the fabric is simmering, start working on the dye.
Chop the galls up using a kitchen knife until you have 2 cups of galls.
Place the galls into a separate sauce pot with 4 cups of water. Turn the burner on high. When the water starts to boil, lower the temperature to allow the water to simmer the galls for one hour.
Remove the fabric from the fixative after one hour. Rinse it under cool water. Wring out excess water.
Place a strainer over the top of a bucket. Carefully pour the water dye into the strainer to separate the dye from the chopped galls. Pour the water dye, or dye bath, back into the sauce pot.
Place the wet fabric into the dye. Turn the burner on low and keep the dye simmering. For a stronger shade of black, leave the fabric in the dye bath over night.
Take the fabric out when the desired shade is reached. Rinse the fabric out under cool water until the water runs clear.
- 20 of the funniest online reviews ever
- 14 Biggest lies people tell in online dating sites
- Hilarious things Google thinks you're trying to search for | <urn:uuid:941df9f6-fe7c-4c33-af5d-266422fbada9> | CC-MAIN-2017-04 | http://www.ehow.co.uk/how_6734277_homemade-black-fabric-dye.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00244-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.881688 | 519 | 2.6875 | 3 |
Previous Challenge Entry (Level 1 – Beginner)
Topic: Write in the ADVENTURE genre (05/24/07)
TITLE: A Trail of Light or a Trail of Dark
By Carol Dee Meeks
LEAVE COMMENT ON ARTICLE
SEND A PRIVATE COMMENT
ADD TO MY FAVORITES
To me, my adventure really started when I accepted Jesus Christ into my heart. I have chosen the trail of light. The Apostle Paul tells me in Romans 12:28, “Therefore, since we receive a kingdom which cannot be shaken, let us show gratitude, by which we may offer to God an acceptable service with reverence and awe.” One day soon, the world will come crumbling down and only God’s kingdom will remain. Those who took Him seriously will join Him with everlasting life.
Paul also says, “We are to love others as Christ loved, for He is love.” In Romans 13:1, Paul adds, “Let love of the brethren continue.”
My mission or venture should produce physical results. If I love as Christ loved, I will show strangers hospitality by behaving in a kind and generous manner. Serving and sharing a meal with others in my home, or listening to an evening of conversation from someone who is lonely, or meeting the needs of traveling missionaries are activities Jesus wants me to do. When I am kind and manage some of these activities, I am doing them unto my Lord. The Bible tells me I am to visit the sick, I am to visit the widows, and I am to empathize with those in prison, especially those locked up for Jesus’ sake, and all those who have been treated badly.
In Philippians 4:11, Paul says, “I have learned to be content in whatever circumstances I am in.” He drew on God’s power for strength. I must learn to rely on God’s promises as Paul Did. If I want more than I have, I must ask my Savior to remove this desire because He will supply all my needs, and He knows what is best for me. I must strive to live with less and give from my abundance, savor what I have, don’t dwell on what I don’t have. Money and possessions tarnish and grow as grounds for offspring’s feuds at death.
My journey also includes respecting my husband and our marriage vows. In Hebrews 13:4, I read: “Marriage is to be held in honor among all.” My mom always told me, “The best gift you can give your children is to love their dad.” When times were tough, those words kept me from visiting a divorce lawyer. Staying and ironing out our problems has given me strength and made me fall more in love with my spouse as I watched him work as hard as I did to make our marriage survive. We will soon celebrate forty-three years of marriage. We have had many ups and we have had many downs, but we faced them with each other. We asked for God’s guidance, for His favor, and His direction.
In a changing world, Christ is always the same. My relationship with Him is lasting as long as I keep my focus on Him but it is a lifelong journey. Only when the Holy Spirit dwells inside me and makes me a changed vessel, can I be successful and feel like Jesus Christ approves of my actions. Then and only then, is my venture a choice of light.
The opinions expressed by authors may not necessarily reflect the opinion of FaithWriters.com.
If you died today, are you absolutely certain that you would go to heaven? You can be right now. CLICK HERE
JOIN US at FaithWriters for Free. Grow as a Writer and Spread the Gospel. | <urn:uuid:98db0ced-b631-44f8-88e2-2ae15f7f0917> | CC-MAIN-2017-04 | http://www.faithwriters.com/wc-article-level1-previous.php?id=16203 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00282-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.966358 | 801 | 1.84375 | 2 |
CORPORATE SOCIAL RESPONSIBILITY4
AIMS AND OBJECTIVES5
LIST OF SOURCES FOR INFORMATION GATHERING7
LIMITATIONS IN GATHERING INFORMATION9
Results, Analysis, Conclusions and Recommendations12
MICHAEL PORTER’S FIVE FORCES26
Skills and Learning Statement38
Meetings with my Mentor:38
Answering my research questions44
Demonstration of interpersonal and communication skills47
The topic that I have chosen for Oxford Brookes research and analysis project is Topic 18: The marketing strategies of an organization. The organization that I have selected is Mobilink (Wireless Telecommunication Company in Pakistan).
Mobilink, a subsidiary of the Orascom Telecom Holding, is Pakistan’s leading cellular and Blackberry service provider. With more than 31.6 million subscribers, Mobilink maintains market leadership through cutting-edge, integrated technology, the strongest brands and the largest portfolio of value added services in the industry, a broadband carrier division providing next generation internet technology as well as the country’s largest voice and data network with over 8,000 cell sites. Housing Pakistan’s largest distribution and contact centre networks and an unparalleled 6,500 kilometers fiber optic backbone, Mobilink has already invested over US $3.3 billion in the country to date and provides uninterrupted countrywide connectivity, unmatched customer services and international roaming in over 140 countries. The company is also the official cellular partner of the Pakistan Cricket Board. As a responsible corporate citizen, Mobilink also offers a range of socially inclusive products and services dedicated to enhance access to information. Through Mobilink Foundation, the company supports education, health and environmental initiatives and promotes sustainable business practices. Mobilink offers exclusively designed tariff plans that cater to the communication needs of a diverse group of people, from individuals to businessmen to corporate and multinationals. To achieve this objective, they offer both postpaid (Indigo) and prepaid (JAZZ) solutions to their customers. Compared to Mobilink’s competitors, both the postpaid (Indigo) and prepaid (JAZZ) brands are the largest brands of their kind in the Pakistan cellular industry. In addition to providing advanced voice communication services that makes the lives of millions that much easy, Mobilink also offer a host of value-added-services to there prized customers. At the same time, Mobilink places high importance to its coverage, which is why they cover 10,000+ cities and towns nationwide as well as over 140 countries on international roaming service. (http://www.mobilinkgsm.com/about/about.php)
The vision of Mobilink states:
“To be the leading Telecommunication Services Provider in Pakistan by offering innovative Communication solutions for our Customers while exceeding Shareholder value & Employee Expectations.” (http://www.mobilinkgsm.com/about/vision.php) ACHIVEMENTS
The achievements of Mobilink in past few years are summarized as follows: * ISO 9002 Quality Management System Certification for Billing, Engineering Departments and CS Contact Center. * Implementation of a full Intelligent Network (IN) platform from Siemens for the Prepaid platform. * Largest Call Center in Pakistan, which is there to assist the customers 24 hours. * Only cellular service in Pakistan to provide coverage on the M2 motorway. * Bilateral roaming in over 100 countries around the world with true international roaming with over 300 operators across the globe. * First mobile operator in Pakistan to offer extensive GPRS Roaming and BlackBerry Roaming services.... | <urn:uuid:b3d524c3-5ff3-4b1a-bd66-5c91d1167e72> | CC-MAIN-2017-04 | http://www.studymode.com/essays/Marketing-Research-1361450.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00337-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.893983 | 739 | 2.296875 | 2 |
- Author: Jeff Jarmoc
- Date:21 March 2012
- Threat ID: 571
Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have become key components of the modern Internet. The privacy, integrity, and authenticity provided by these protocols are critical to allowing sensitive communications to occur. Without these systems, e-commerce, online banking, and business-to-business exchange of information would likely be far less frequent.
Threat actors have also recognized the benefits of transport security, and they are increasingly turning to SSL to hide their activities. Advanced Persistent Threat (APT) attackers , botnets , and even commodity web attacks can leverage SSL encryption to evade detection.
To counter these tactics, organizations are increasingly deploying security controls that intercept end-to-end encrypted channels. Web proxies, data loss prevention (DLP) systems, specialized threat detection solutions, and network intrusion prevention systems (NIPS) offer functionality to intercept, inspect, and filter encrypted traffic. Similar functionality is present in lawful intercept systems and solutions enabling the broad surveillance of encrypted communications by governments. Broadly classified as "SSL/TLS interception proxies," these solutions act as a "man in the middle," violating the end-to-end security promises of SSL.
This type of interception comes at a cost. Intercepting SSL-encrypted connections sacrifices a degree of privacy and integrity for the benefit of content inspection, often at the risk of authenticity and endpoint validation. Implementers and designers of SSL interception proxies should consider these risks and understand how their systems operate in unusual circumstances.
Before exploring the methods and associated risks of intercepting and inspecting encrypted communications, it is important to understand the inner workings of the relevant protocols. The governing specifications for SSL , TLS , and X.509 provide much greater detail.
The SSL and TLS protocols are very similar mechanisms and share a common history. Netscape originally proposed the SSL protocol as a v2.0 draft specification in 1994. SSLv2.0 was then updated to become SSLv3.0 , which formed the basis of the standardized TLS protocol v1.0 . TLS has since been revised to v1.1 and v1.2 . Modern implementations generally support both TLSv1.0 and TLSv1.1, with TLSv1.2 support still somewhat limited. However, the original name "SSL" has become part the common lexicon.
In this analysis, the terms SSL and TLS are used interchangeably and generally refer to the specification for TLSv1.1 with differences highlighted where relevant.
The SSL handshake process is illustrated in Figure 1.
Figure 1. Sample two-party TLS handshake.
Broadly, the SSL protocol and its handshake serve the following purposes:
- Exchange version and extension compatibility information.
- Secure exchange of identity certificates and cryptographic key materials.
- Negotiate a cipher suite to be used for encryption.
- Establish a secure transport layer for use by higher layer protocols.
Of specific note is that the TLS protocol itself does not validate endpoint identity. This is a function left to companion protocols. In practice, this task commonly falls to X.509.
A server can also request that the client provide its own identity certificate via a client certificate message. This scenario, known as "mutual authentication" or "client certificate authentication," poses special challenges to interception. It generally causes mutually authenticated sessions to bypass inspection.
This analysis focuses primarily on HTTP over TLS , though other application-layer protocols leverage TLS similarly.
X.509 certificate validation
The authenticity component of SSL stems from the ability to validate an endpoint's certificate. The X.509 specification governs the format of these certificates, as well as considerations necessary for validating their integrity and suitability for a given purpose.
RFC5280 goes into much greater detail, but the validation process consists of the following points:
- Validating the digital signature of a certificate.
- Following the certificate chain to determine relevant certificate authorities.
- Validating any/all intermediate certificates encountered.
- Determining if the root CA is trusted.
- Confirming certificate temporal validity by checking issuance and expiration dates.
- Determining the subject for which the certificate applies, for comparison with the higher layer protocol's expectation.
- Determining if the certificate has been revoked.
In the X.509 specification, the only defined means of checking for certificate revocation is through a certificate revocation list (CRL). However, the specification leaves room for other extensions to expand upon this standard. One extension that has gained broad support is the Online Certificate Status Protocol (OCSP) .
Failures in certificate validation result in a failure of SSL's authenticity. Failure of SSL's authenticity allows for identity spoofing and, by extension, attacks against end-to-end integrity.
SSL / TLS interception proxies
To inspect plain-text contents of communications over SSL, interception proxies insert themselves in the flow of traffic and terminate the client's request. The interception proxy makes a second request on behalf of the client to the server. This behavior causes what was an end-to-end session to instead be two separate, but related, point-to-point sessions. The goal is to allow access to the plain-text session contents while transferring between the two encrypted sessions.
Interception proxies may be implemented in several ways, depending on their purpose and the type of inspection they perform. Perhaps the most common scenario is to integrate with an existing HTTP or SOCKS proxy. However, Deep Packet Inspection devices, next-generation firewalls, application-aware firewalls, and data loss prevention (DLP) systems are other possible points. Interception may also reside on the client itself as part of an endpoint protection suite, or even as a web-browser plugin.
Despite the wide variance in how the interception proxies access to the SSL session, they all operate the same way once they've reached the session. They terminate two separate sessions and act as a man in the middle (MITM) to exchange the contents between the two sessions. Unless otherwise indicated, the term "proxy" in this analysis refers to this exchange between two SSL sessions and should not be confused with an HTTP or TCP proxy.
As shown in Figure 2, SSL interception TLS handshakes build on the simple handshake of Figure 1 by including the interception proxy and additional session.
Figure 2. Sample SSL interception TLS handshakes.
These two separate sessions are referred to as "client-side" and "server-side," with the distinction being drawn from the function of the other party in that session.
The notable differences in this three-party scenario are:
- There are two distinct SSL sessions, each of which negotiates its parameters, cipher suites, and other parameters.
- There are two distinct server certificates, one of which is generated by the proxy.
- The client endpoint never sees the identity certificate provided by the server endpoint and instead relies on the proxy's provided identity.
Interception proxy certificate authority
To act as the server for the client-side SSL session, an interception proxy must have access to the private key that corresponds to the certificate it's presenting. Because the server endpoint's private key is unavailable, the interception proxy must generate a new certificate and key pair to use for this session.
This certificate must be signed by a certificate authority (CA) the client endpoint trusts. Otherwise, validation errors will occur on the client. There are two primary means of signing such certificates under a CA the client will trust.
The more common scenario is to generate a private CA for the proxy's use. The certificate identifying this CA is then distributed to the endpoints, which import it as a trusted root. This method prevents errors from occurring on client endpoints that are appropriately configured, but it may pose a logistical challenge for the implementing organization.
A SubCA is an intermediate signing authority authorized by a trusted root. Organizations that can convince a trusted public root CA to issue them a SubCA certificate can use this certificate for interception proxy purposes. This method eases the deployment process because existing endpoints will already trust these certificates that chain to a trusted root.
The practice of using public SubCAs for SSL interception proxies has drawn attention and debate . SubCAs have the technical ability to sign certificates that will be considered valid by most endpoints on the Internet, not just those configured explicitly as in a private CA scenario. Therefore, exposure of the signing certificates, private keys, or generated certificates presents a significant risk for the implementing organization and for all Internet users who trust the root CA that issued the certificates.
Trustwave recently announced that it has issued this type of SubCA certificate in the past , but the organization changed its stance, revoked the certificate in question, and pledged never to issue such certificates in the future. This announcement led to significant debate regarding what actions, including the possibility of root trust revocation, should be taken in response.
Other CAs have been suspected of having similar programs, though the programs are rarely advertised. Dan Kaminsky noted in 2009 that "at least two companies offer this, probably more." At Black Hat USA 2011, Moxie Marlinspike highlighted GeoTrust's GeoRoot program as a very public example of this practice. It's widely believed that other such programs exist; however, because they aren't publicly discussed and disclosed, the extent of this practice remains mostly unknown.
In response to the Trustwave disclosure, Mozilla issued a communication to trusted roots CAs asking them to revoke and disclose such certificates, and clarifying that trusted roots should not issue SubCAs for interception purposes . As of this writing, it remains to be seen what impact this request will have and whether other browser manufacturers will follow Mozilla's lead or take related action.
Risks introduced by interception proxies
Interception proxies introduce several new avenues of possible risk into the environments they protect. This analysis focuses on the risks introduced through transitive trust relationships. Other risks summarized in the following sections include possible legal exposures, an increased threat surface, and the possibility of decreased cipher strength.
When implementing an SSL interception proxy, an organization may face increased legal exposure as a result of inspecting communications intended to be encrypted and private. Implementing organizations should carefully consider the legal risks.
Employees' expectations of privacy when using encrypted protocols may affect the employer's rights and obligations. For this reason, organizations should develop a clear use policy, explicitly outlining handling of encrypted communications, and present it to all employees.
Microsoft highlights this concern with a warning in the installation screen for the Forefront Threat Management Gateway HTTPS interception functions (see Figure 3), as well as in its documentation .
Figure 3. Microsoft Forefront Threat Management Gateway legal warning.
Implementers of any SSL interception proxy should consider these issues and consult their legal teams.
Increased threat surface
Interception proxies are meant to inspect plain-text contents of what would otherwise be encrypted traffic. Encrypted traffic is often highly valued by attackers. Therefore, providing a single point where all encrypted sessions can be viewed in plain text may make that point a high-value target. Compromising an interception proxy would allow an attacker to inspect and potentially modify plain-text contents of any encrypted sessions that are subject to the proxy's interception.
Because the CA used by the inspection proxy is trusted by client endpoints, it is also a highly valuable target for attackers. If the CA signing keys are compromised, then it is trivial to spoof communications to client endpoints that trust that CA. With interception proxies using public SubCAs, the risks of CA signing key exposure are greater. The risks extend to all client endpoints on the Internet that trust the issuing root. Similarly, exposure of generated private keys can allow for spoofing attacks involving the website for which they're valid.
These issues combine to increase the sensitivity of the interception proxy system. Vulnerabilities on this system present an increased risk to all clients who trust it.
Decreased cipher strength
The introduction of an interception proxy results in two point-to-point encrypted sessions. Because these sessions negotiate their cipher suites independently, there is a possibility that either the client-side or server-side sessions may use a weaker cipher than a session directly between the client endpoint and server endpoint.
As an example, consider SSL sessions involving Google's web properties. Google recently took the step of preferring cipher suites that support forward secrecy . Forward secrecy , also known as Perfect Forward Secrecy (PFS), is a cryptographic property of certain cipher suites. It seeks to reduce the impact of key exposures by using the endpoint's keys to derive another key, used to encrypt data in transit. This second key is valid only for a short period of time, typically a single session. The result of this process is that a compromise of the server's private key would not allow previously generated content to be decrypted. In high-security environments, this property is valuable as a hedge against the possibility of an attacker collecting large amounts of ciphertext with hopes of later recovering the keys.
While valuable in many cases, cipher suites supporting PFS are not commonly preferred in practice due to performance and implementation complexities. As a result, a proxy may not support cipher suites necessary for PFS. If this is the case, then both the client-side and server-side sessions may revert to weaker cipher suites lacking PFS, despite the support of the endpoints involved.
Other scenarios are possible in any case where the interception proxy does not support stronger cipher suites that both endpoints support. The resulting cipher suite might be less secure than if negotiated without the proxy's interception.
The differences in the establishment of an SSL session when interception is introduced create a phenomenon called "transitive trust." Similar to the mathematic transitive property "if a=b and b=c, then a=c," transitive trust relationships can be described with the following statement: "if the client trusts the proxy and the proxy trusts the server, then the client trusts the server." This property can manifest itself in several flaws.
Transitive root trust
A Dell SecureWorks blog post titled "Transitive Trust and SSL Certificate Validation" discussed transitive trust, using transitive root trust as the prime example. Because interception proxies create two SSL sessions, the proxy must act as the client for the server-side session and validate the trustworthiness of the root CA that signed the server endpoint's certificate. This process leaves the client unable to make its own decision about the trustworthiness of the server endpoint's root CA. As a result, in cases where the interception proxy trusts a CA that the client endpoint does not, the client inherits the interception proxy's trust decision.
Consider the compromise of DigiNotar's CA . As a result of the compromise, all major browser manufacturers, including Google , Mozilla , and Microsoft , rapidly revoked trust in DigiNotar's CA roots. As illustrated in Figure 4, these browsers no longer trust certificates signed by DigiNotar's roots.
Figure 4. Untrusted root.
However, when connecting through an interception proxy that trusts the server's root CA, a transitive root trust is formed (see Figure 5).
Figure 5. Transitive root trust.
This example of transitive root trust highlights the need to manage trust roots on the interception proxy itself, because the proxy masks the roots configured on the client endpoint. A similar transitive root trust can manifest in cases where the interception proxy accepts certificates from unknown root CAs.
Self-signed certificates are similar to certificates signed by an untrusted root. The only difference is that the certificate is its own root. Because anyone can create self-signed certificates and there's no external verification of their root, these certificates generally should not be accepted as valid. For this reason, browsers typically present a warning dialog asking the user how to proceed. This warning gives the user an opportunity to check the certificate's status via some other means, such as verifying the expected certificate fingerprint out of band with the server's operator, prior to proceeding.
Interception proxies that accept self-signed certificates on the server-side session and sign the client-session certificate under the trusted CA certificate improperly elevate this certificate to trusted status from the client's perspective. This elevation of status allows for spoofing the server endpoint identity of encrypted communications.
X.509 certificate validation calls for checking the certificate's issuance and expiry date stamps, verifying that the current time falls within this period. Proxies that fail to check for certificate expiration prior to generating new client-session certificates elevate expired certificates to trusted status from the client's perspective.
Certificate revocation is necessary to invalidate certificates in cases of theft or loss of key materials. There are two major mechanisms for certificate revocation commonly deployed: the checking of Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) responders.
Interception proxies that do not properly perform CRL and/or OCSP checks on server-side session certificates may improperly elevate trust in these certificates from the client endpoint's perspective.
In the X.509 specification , checking published CRLs is the prescribed means of discovering if a certificate has been revoked. Under the CRL model, a CA will periodically publish a list of certificate fingerprints that should no longer be trusted. Validating endpoints should regularly check and cache this list, verifying each certificate's fingerprint to determine that it has not been revoked. This model provides a means of identifying revoked certificates but can also introduce a window of exposure to the client because the list is not updated in real-time.
An attacker may also be able to block access to a CRL endpoint while simultaneously presenting an expired certificate, thus preventing revocation checking from showing the certificate's true status.
The OCSP is an X.509 message extension intended to address the temporal limitations of CRL checking. It is performed through real-time checking with an OCSP responder included in the certificate. An OCSP responder should return a signed response with either a positive acknowledgement that a certificate is valid or a negative acknowledgement that the certificate is revoked.
However, as first demonstrated by Moxie Marlinspike in 2009, OCSP can be subject to bypass . By spoofing a "tryLater" response code, an attacker can cause an OCSP endpoint to enter its failure mode. Because most endpoints fail-open or accept certificates in the absence of a negative response, OCSP is bypassed.
OCSP has also been criticized as a privacy failure because the active real-time checking provides information to the OCSP responder every time a client attempts to validate a certificate. This process reveals information about user browsing habits to the OCSP responder and its operators.
While both CRL and OCSP revocation checking have problems in practice, they are the only commonly accepted certificate revocation systems. Google recently announced that it will forgo OCSP checking in future versions of Chrome . Chrome will instead adopt a modified CRL approach, where the revocation lists are provided using Google's automatic-update mechanism rather than the CA's CRL server. This approach has raised questions and concerns surrounding the scope of Google's revocation pushing and fallback mechanism for private CAs. It also remains untested in practice. Other proposals have been put forward, but none have been standardized or become widely deployed.
Certification validation flaws and vulnerabilities
The interception proxy's certificate validation routines may introduce additional vulnerabilities. These vulnerabilities may stem from past validation flaws that affected endpoints and newly discovered validation flaws that can apply equally to interception proxies and endpoints.
Moxie Marlinspike disclosed a certificate validation flaw in 2002 related to how intermediate certificates are validated. When certificates are indirectly signed by a root CA and instead signed by an intermediate CA, the endpoint should check the intermediate certificate's basic constraints field to ensure it is authorized to act as an intermediate CA. If this field is set to "false," then the certificate is not a valid intermediate CA. Marlinspike found that Internet Explorer 6 (IE6) did not validate this property, allowing any valid certificate to be used as an intermediate CA despite the intermediate certificate's own assertion that it is not valid for this purpose.
While Marlinspike's 2002 finding affected IE6, he discovered the same issue as late as 2009 in OpenSSL and many packages that depend on OpenSSL . In 2011, Trustwave SpiderLabs disclosed that Apple's iOS operating system was vulnerable to the same flaw .
Interception proxies may also be subject to this flaw. The result is that an attacker with a valid leaf certificate, which is not intended to act as an intermediate CA, can act as an intermediate CA and sign certificates. When generating certificates for the client-side session, the interception proxy generates a new certificate chain the client endpoint considers valid. As a result, a client endpoint does not need to be vulnerable to this issue for the exploit to succeed if the interception proxy is vulnerable.
Null prefix injection
The Null prefix injection attack leverages a flaw in X.509 certificate validation that was simultaneously discovered by Moxie Marlinspike and Dan Kaminsky , who both disclosed their findings at Black Hat USA 2009.
The issue stems from a variance in how strings are encoded in X.509, compared to how validation libraries, often implemented in C, handle strings. X.509 strings are length-encoded , similar to how the PASCAL programming language encodes strings. For example, the six-character string "string" would be encoded as "0x06string", where 0x06 is the hex value of 06. In the C programing language, strings are encoded by appending a null character on the end (null-terminated), so our example would be "string0x00", where 0x00 is a null byte with the hex value 00. This disparity creates an opportunity for an attacker to affect the subject name of a certificate if the validation routine improperly handles the length-encoded values as if they were null-terminated.
When issuing domain-validated certificates, CAs are only concerned with ownership of the root domain name rather than the fully-qualified domain name. The owner of .example.com can therefore request a certificate for anything.example.com as well, and it will be issued because domain ownership is verifiable. This method creates the opportunity for an attacker to obtain a certificate for www.victim.com0x00.example.com. A validation routine that improperly parses this value as a null terminated string will end up believing the certificate subject is www.victim.com, allowing the attacker to manipulate the scope of certificate validity.
Interception proxies can also improperly handle length-encoded strings as null-terminated strings. If the proxies use the output of this validation to determine the subject name of the client-side session's certificate, then an attacker may be able to control the subject name of the certificate presented to the client endpoint. This scenario results in the interception proxy unknowingly aiding the attacker's ability to spoof certificates, while hiding the true certificate from the client endpoint.
Improper certificate cache verification
In the interest of performance, many SSL interception proxies don't generate a new client-session certificate for each session. Instead, they'll generate a certificate the first time a client endpoint contacts a given server endpoint and cache that certificate for a period of time. This behavior is especially common among proxies positioned as network gateways, where thousands of users can simultaneously access different sites, making performance overhead critical. In some cases, the certificate remains in cache for a lifetime and expires only when the corresponding server endpoint isn't seen for a long lifetime, measured in days or weeks.
The caching of these certificates can create new opportunities for an attacker. Depending on the criteria used to index and look up certificates in the cache, an attacker may be able to present a new certificate on the server-side session while the interception proxy continues to present the previously cached certificate on the client-side session. If this occurs, the client will be unaware that their trust is now transitively placed in a different server endpoint. This disparity can enable impersonation attacks.
The process that happens when a site is first visited is illustrated in Figure 6.
Figure 6. Certificate added to cache on first visit.
The client endpoint makes its request, and the interception proxy retrieves the server endpoint's certificate. This certificate is verified, and a corresponding certificate is generated for use on the client-side session. This certificate is also stored in cache for later use.
On subsequent visits, the cached certificate is retrieved and presented to the client, avoiding the need to generate a new certificate on each visit (see Figure 7).
Figure 7. Reading cached certificate on subsequent visits.
Figure 8 shows what happens when an attacker enters the scenario as a MITM on the server-side session.
Figure 8. Attacker exploiting improper caching.
In the example shown in Figure 8, the attacker injects his own certificate, which is presented to the SSL interception proxy. The proxy validates this certificate and looks in its cache to see if a certificate already exists that can be used for the client-side session. In this case, it finds and presents a previously cached certificate to the client. The primary weakness is a failure to detect that the server-side session's certificate presents a different fingerprint and is signed under a different CA. While this scenario requires the attacker obtain a certificate that is valid for the server endpoint's subject, other validation flaws may operate in tandem to ease the attacker's burden. For example, this scenario can be exploited using self-signed certificates if the proxy accepts them as valid. It can also be exploited for certificates valid for a different subject, in cases where the proxy also fails to validate that the certificate subject matches the client endpoint's request.
Testing SSL interception proxies
While the flaws can be difficult to test, many can be exposed by visiting a web server that intentionally presents a malformed certificate and observing the result. To ease this process, Dell SecureWorks researchers have developed a website (https://ssltest.offenseindepth.com) that tests for many of these flaws.
When an interception proxy determines that a site is untrustworthy, it must determine how to handle the failure. There are several choices, and which mode a proxy operates under affects the impact on the client endpoint.
An interception proxy operating in a fail-closed mode that encounters an untrustworthy certificate immediately terminates both server-side and client side sessions. This is the most secure failure mode but comes at the expense of the user experience. When a session is terminated, the client endpoint will have no ability to determine why, and thus will present a generic "Connection Failed" response to its user.
Some systems augment a fail-closed mode with out-of-band notification to the client endpoint via a browser plugin or host agent. This step can address the user experience concerns, but it results in additional software to install and configure on endpoint systems.
Some systems seek to address the user experience concerns of a fail-closed system by terminating only the server-side session and presenting a friendly response to the user in the client-side session.
While this approach can help explain the reason for the failure, it can also introduce additional vulnerabilities depending on the content presented. In cases where the contents of the certificates are shown to the user, the certificate contents may become a vector for cross-site scripting and other web-based attacks.
Passthrough mode describes a scenario where the proxy passes portions of the server-side certificate to the client-side session despite flaws that prevent it from validating. This mode is most often observed when the host subject doesn't match or the certificate is expired. The intention is to preserve the existing user experience by presenting the same error that would appear if there were no proxy in place.
In most circumstances, this mode offers a reasonable compromise between security and user experience without introducing additional software. However, in some cases this mode can combine with endpoint validation flaws or the presence of additional downstream interception proxies to introduce unusual, and potentially exploitable, conditions.
Testing framework – ssltest.offenseindepth.com
A testing framework is publicly available at https://ssltest.offenseindepth.com. The website displays a table listing brief descriptions of many of the vulnerability scenarios discussed in this analysis. All rows are initially formatted with cascading style sheets (CSS) that present the scenarios as green and "NOT VULNERABLE." The website attempts to load additional CSS formatting from several hosts on the same domain that intentionally present invalid certificates. If a host's certificate is accepted, then the CSS formatting is loaded. The CSS code then modifies the table to flag the corresponding entry as vulnerable.
By visiting this site from a source behind any SSL interception proxy, a user can determine at a glance if the session is vulnerable to any issues. A copy of the request headers is also displayed on the page, providing information that may be useful in identifying the offending system.
Figure 9 shows a sample visit from a typical installation of Firefox 10.0.2 on Linux directly to the test page. In this case, there is no SSL interception proxy in use, so no vulnerabilities are shown.
Figure 9. SSL test framework showing no vulnerabilities.
Changing the browser's proxy settings allows the same browser to communicate through a known-vulnerable proxy (see Figure 10).
Figure 10. SSL test framework showing several vulnerabilities.
To test the null prefix injection attack, listed as Null Char on the test framework, the proxy must be configured to fully trust the CA certificate linked on the page. Importing this CA certificate should only be done on test equipment, however. Without this CA being trusted, the test is only valid in cases where the interception proxy is also vulnerable to trusting certificates signed by unknown CA.
On some browsers, several certificate warning dialogs may occur when behind interception proxies that operate in a passthrough failure mode. To accurately gauge the interception proxy's vulnerability, these certificates should not be accepted. However, in cases where browsers silently refuse content loaded via websites presenting untrusted certificates, the framework shows a non-vulnerable scenario even though the user would receive a warning page if visiting the site directly.
Although not the intended purpose, this framework may also be useful for testing SSL endpoints when visited directly from those systems.
Dell SecureWorks Counter Threat Unit (CTU) researchers tested several devices for vulnerabilities identified in this analysis. The following findings were coordinated with the appropriate vendors and disclosed.
Cisco IronPort Web Security Appliance
The Cisco IronPort Web Security Appliance (WSA) is vulnerable to several issues described in this analysis. Disclosure of these vulnerabilities has been coordinated with Cisco, and software updates addressing these issues are expected to be released in version 7.5 or 7.7, tentatively scheduled for public availability in July 2012.
Additionally, an administrator cannot view or manage trust roots or blacklist individual certificates. Cisco plans enhancements to address these shortcomings, but no estimated release date is available at publication time.
Self-signed certificates accepted
By default, Cisco IronPort WSA accepts self-signed certificates. Corresponding client-side certificates are created under the context of the proxy's CA, so the client endpoint cannot identify sites presenting self-signed certificates. An attacker could exploit this vulnerability by performing a MITM attack outside the proxy and presenting a self-signed certificate for the target domain. An internal client endpoint sees a valid certificate signed by the proxy's CA and trusts it transitively. This behavior enables spoofing and interception attacks.
The Cisco IronPort WSA can be configured to silently block access to sites presenting a self-signed certificate. Cisco IronPort BugID 77544 provides specific details.
Unknown CA root accepted
By default, Cisco IronPort WSA accepts certificates signed under an unknown root. Corresponding client-side certificates are created under the context of the proxy's CA, so the client endpoint cannot identify sites presenting certificates signed by unknown, untrusted root CAs. An attacker could exploit this vulnerability by performing a MITM attack outside the proxy and presenting a certificate for the target domain signed by an unknown CA. An internal client endpoint sees a valid certificate signed by the proxy's CA and trusts it transitively. This behavior enables spoofing and interception attacks.
The Cisco IronPort WSA can be configured to silently block access to sites presenting a certificate signed under an unknown CA. Cisco IronPort BugID 77544 provides specific details.
Lack of certificate revocation checking – CVE-2012-1316
The Cisco IronPort WSA does not check for certificate revocation via either CRL or OCSP standards. Client-side certificates are created under the context of the proxy's CA even when the server-side certificate has been revoked. An attacker could exploit this vulnerability to perform MITM attacks outside the proxy using compromised certificates that have been revoked. An internal client endpoint sees a valid certificate signed by the proxy's CA and trusts it transitively. This behavior enables spoofing and interception attacks.
At publication time, there are no software updates or known workarounds available. Cisco plans to address this vulnerability in version 7.7, currently scheduled for release in July 2012.
Failure to validate intermediate basic constraints - CVE-2012-1326
The Cisco IronPort WSA fails to validate the basic constraints of intermediate CAs in a certificate chain. Client-side certificates are created under the context of the proxy's CA even when the server-side certificate has been created under an intermediate certificate that is not a valid CA. An attacker could exploit this vulnerability to perform MITM attacks outside the proxy using certificates signed by any valid certificate chaining to a public root. An internal client endpoint sees a valid certificate signed by the proxy's CA and trusts it transitively. This behavior enables spoofing and interception attacks.
At publication time, there are no software updates or known workarounds available. Cisco plans to address this vulnerability in version 7.7, currently scheduled for release in July 2012.
Key pair cache weaknesses – CVE-2012-0334
The Cisco IronPort WSA mishandles key pair caching. Cached key pairs are used for client-session traffic, despite changes in server-side certificates. An attacker could exploit this vulnerability to perform MITM attacks outside the proxy using any certificate that validates on the WSA. An internal client endpoint sees the same valid certificate signed by the proxy's CA under previous visits. The server-side certificate's properties do not need to be valid in the scope of the target site. This behavior enables spoofing and interception attacks.
At publication time, there are no software updates or known workarounds available. Cisco plans to address this vulnerability in version 7.5, currently scheduled for release in July 2012.
Astaro Security Gateway
The Astaro Security Gateway, a Sophos product, is affected by one vulnerability described in this analysis.
Lack of certificate revocation checking
The Astaro Security Gateway (firmware 8.300) does not check for certificate revocation via either CRL or OCSP standards. Client-side certificates are created under the context of the proxy's CA even when the server-side certificate has been revoked. An attacker could exploit this vulnerability to perform MITM attacks outside the proxy using compromised certificates that have been revoked. An internal client endpoint sees a valid certificate signed by the proxy's CA and trusts it transitively. This behavior enables spoofing and interception attacks.
At publication time, there are no software updates or known workarounds available. According to Astaro's security team, the absence of these solutions is a conscious design consideration related to known attack techniques allowing for bypass of both CRL and OCSP checks. Astaro is monitoring developments in this area but does not plan to change the product's behavior at publication time.
Microsoft Forefront Threat Management Gateway
Based on the evaluation by Dell SecureWorks CTU researchers, Microsoft Forefront Threat Management Gateway 2010 SP2 does not seem to be vulnerable to the issues described in this analysis.
Check Point Security Gateway
Based on the evaluation by Dell SecureWorks CTU researchers, Check Point Security Gateway R75.20 does not seem to be vulnerable to the issues described in this analysis.
This analysis has explored SSL interception proxies holistically and identified cases in which they may introduce risk into the environments they're meant to protect. Intercepting SSL-encrypted connections sacrifices a degree of privacy and integrity for the benefit of content inspection, often at the risk of authenticity and endpoint validation. Implementers and designers of SSL interception proxies should note the following recommendations.
Implementers of SSL interception proxies should thoroughly understand how their systems operate. This understanding can then be applied toward examining failure modes and the impact of potential flaws.
- Inform end users of interception being performed to protect the organization from legal risk. Ensure the legal team reviews corresponding policy documents.
- Identify and document trust roots. Ensure administrators are ready to rapidly revoke that trust if necessary.
- Consider both security and user experience when configuring systems. Test configurations for security impacts.
- Actively test interception proxies to determine their failure modes and the impacts on overall end-to-end security.
- Consider the proxy to be a high-value asset. Harden its configuration and ensure software updates are current to protect it from direct attack and minimize risks of its participation in known and mitigating attacks against end users.
- Consider failure modes and the relative benefits of conveying information to users versus possibly enabling attacks through malicious certificates.
Designers and developers
Designers and developers of these systems should understand that intercepting SSL is not a procedure governed under any RFC or other standards and that it comes with several tradeoffs that may affect the overall system integrity. Special attention should be paid to the following points:
- Give administrators the tools they need to manage trust roots.
- Consider the failure modes of your system and what impacts they present.
- Wherever possible, default to the most secure settings and require administrators to accept risks inherent in some less-secure options if required.
- Test systems under a variety of attack scenarios.
SSL V2.0 Draft specification. http://www.mozilla.org/projects/security/pki/nss/ssl/draft02.html
Lawson, Nate. "TLS/SSL Protocol Design" (Slide 8). http://www.slideshare.net/rootlabs/tls-design20100603
Marlinspike, Moxie. "SSL and The Future of Authenticity." http://blog.thoughtcrime.org/ssl-and-the-future-of-authenticity
Kazanciyan, Ryan. "The State of the Hack" (Slide 21). http://www.mandiant.com/uploads/presentations/SOH_Infragard_120910.pdf
FireEye. "Bredolab — Severely Injured but Not Dead." http://blog.fireeye.com/research/2010/10/bredolab-severely-injured-but-not-dead.html
Internet Draft - "The SSL Protocol Version 3.0." http://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00
Percoco, Nicholas J. "Clarifying the Trustwave CA Policy Update." http://blog.spiderlabs.com/2012/02/clarifying-the-trustwave-ca-policy-update.html
"Remove Trustwave Certificate(s) from trusted root certificates." https://bugzilla.mozilla.org/show_bug.cgi?id=724929
Marlinspike, Moxie. "SSL and the Future of Authenticity." Black Hat USA 2011. https://media.blackhat.com/bh-us-11/Marlinspike/BlackHat-USA-2011-Marlinspike-SSL-Future-Authenticity-SlidesOnly.mov
GeoTrust. "GeoRoot." http://www.trustico.com/material/DS_GeoRoot_0205.pdf
"really sub-CAs for MitM deep packet inspectors?" http://[email protected]/msg01782.html
"Mozilla Communication: Action Requested by March 2, 2012." http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/e825f6dcd55a52f6#
Microsoft. "Planning for HTTPS inspection." http://technet.microsoft.com/en-us/library/ee658156.aspx
Google. "Protecting data for the long term with forward secrecy." http://googleonlinesecurity.blogspot.com/2011/11/protecting-data-for-long-term-with.html
Wikipedia. "Perfect Forward Secrecy." http://en.wikipedia.org/wiki/Perfect_forward_secrecy
Jarmoc, Jeff. "Transitive Trust and SSL Certificate Validation."
Vasco. "DigiNotar Reports Security Incident." http://www.vasco.com/company/press_room/news_archive/2011/news_diginotar_reports_security_incident.aspx
Google Chrome blog. "Stable Channel Update." http://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html
Mozilla Foundation. "Mozilla Foundation Security Advisory 2011-35." http://www.mozilla.org/security/announce/2011/mfsa2011-35.html
Microsoft. "Microsoft Security Advisory (2607712)." http://technet.microsoft.com/en-us/security/advisory/2607712
Marlinspike, Moxie. "Defeating OCSP With the Character '3'." https://www.blackhat.com/presentations/bh-usa-09/MARLINSPIKE/BHUSA09-Marlinspike-DefeatOCSP-PAPER2.pdf
Langely, Adam. "Revocation Checking and Chrome's CRL." http://www.imperialviolet.org/2012/02/05/crlsets.html
Dimcev, Adrian. "Inside Google's Pushing Revocation List Approach." http://www.carbonwind.net/blog/post/Inside-Google%E2%80%99s-pushing-revocation-list-approach.aspx
Marlinspike, Moxie. "New Tricks for Defeating SSL In Practice." https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
Trustwave SpiderLabs. "iOS SSL Implementation Does Not Validate Certificate Chain." https://www.trustwave.com/spiderlabs/advisories/TWSL2011-007.txt
Marlinspike, Moxie. "Null Prefix Attacks Against SSL/TLS." https://www.blackhat.com/presentations/bh-usa-09/MARLINSPIKE/BHUSA09-Marlinspike-DefeatSSL-PAPER1.pdf | <urn:uuid:d3cf51a4-5569-4861-b667-a8a450a1923e> | CC-MAIN-2017-04 | https://www.secureworks.com/research/transitive-trust | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00386-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.897414 | 8,951 | 2.484375 | 2 |
In October 1992, the Mosaic Templars Building
Preservation Society was organized for the purpose of securing and
rehabilitating the Mosaic Templars headquarters building and currently
holds 501(c)(3) status. Listed in the National Register of Historic
Places, the structure is one of only three major landmarks remaining
from the "Heyday" of West Ninth
Street, and was once the hub of black business and social life
in Little Rock and the surrounding area.
The effort to save the Mosaic Templars Building and the idea of
its potential use, at least in part, as a museum and/or cultural
center, have struck a common chord, to bring together people from
all walks of life.
In October 1993 in furtherance of the partnership agreement with
our Society, the City of Little Rock purchased the building outright.
It is now our task to raise the money necessary to complete this
The Mosaic Templars Building, always a symbol of hope and achievement,
is as vital now to the people of Little Rock as it was after the
turn of the last century. Please join
us in the noble effort to restore this historic monument and
preserve related community history.
Board of Directors, 2003
Mosaic Templars of America Building Preservation Society
(Left to right:) Dr. John W. Graves, Dr. Rapheal Lewis, Mary Lois Hardin, Ellen T. Carpenter (President), Professor Linda Kamara (rear), John Cain, Maud Woods, Constance Sarto (rear), Dr. Stephen Schaefer, Dr. Andre Guerrero (Not Pictured: Erma Franks) | <urn:uuid:5bc44ad9-9dd4-4d0b-bf35-b54df1ec336d> | CC-MAIN-2017-04 | http://www.mosaictemplarspreservation.org/mission/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00088-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.906528 | 346 | 1.90625 | 2 |
Cellular is an animation that helps you make geometric sequences composed of square cells.
Explore what happens when you draw graphs of quadratic equations
with coefficients based on a geometric sequence.
Watch the video to see how to sum the sequence. Can you adapt the method to sum other sequences?
2) What is the area of the blue portion of this figure?
3) What is the area of the orange portion of this figure?
If you continue the pattern, can you predict what each of the following areas will be? Try to explain your prediction.
Now imagine that instead of the pattern growing, we start with a square and the pattern continues inwards - with the circles and squares becoming smaller and smaller.
If the areas of the four blue shapes labelled A, B, C and D are one unit each, what is the combined area of all the blue shapes? Explain any reasoning you have used. | <urn:uuid:0ab83b03-1541-4c01-9556-0895eb4687c6> | CC-MAIN-2017-04 | https://nrich.maths.org/905 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00412-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.930033 | 187 | 3.921875 | 4 |
medical students question
Sep 6, 2003
As a medical student hoping to major in HIV medicine and treatment whether in the states or with the WHO I would like to know your realistic assesment of the life expectancy of HIV patients with access to HAART and near perfect adherence? Some of my professors have pointed to the Cornell test (16years)as a bench mark while other researchers and professors have argued that the introduction of powerful new HAART era drugs have considerably altered this equation meaning that as future doctors we are looking at treatments for patients that approach normal life expectancy (30years+) as opposed to 8-10 untreated and 16 in Cornell study. What are your thoughts?
Also with continual development of new more potent retrovirals my professor argued that even if we assume exhaustion of current regimens and resistance thru mutation that even a gradual growth of new drugs (assuming limited side effects) will contribute to the near normal life expectancy that we are hoping to nurture. Would you agree?
Also do you believe we are closer to making HIV a chronic disease condition (as observed in diabetes etc) and no longer a fatal illness?
Your sight is a great resource for medical students who wish to help eradicate this disease.
thanks for the inspiration
Response from Dr. Pierone
Hello, it is great to hear that you interested in HIV medicine and treatment. New energetic doctors are needed in this field to replace the practitioners that are aging (rapidly) and leaving for pharm company jobs or the "quiet life".
But on to your questions. Yes, HIV is now is a chronic manageable disease like diabetes. Actually, diabetes is a good example because, as you know, some of our patients get diabetes from the HIV medications.
In the past, much of HIV treatment revolved around prevention and treatment of opportunistic infections. Now, we see so many fewer opportunistic infections that I need to look up dosages of medications to treat them. I used to know them by heart from constant use (or perhaps it's my aging brain, who knows).
The challenges of contemporary HIV treatment are twofold. First is anticipating and managing the side effects of medications. Second is dealing with development of viral resistance to the medications.
The future is bright (for those with access to medications). The newer medications will certainly be less toxic and more potent. We will develop superior strategies to facilitate adherence. Better and more rational sequencing of antiretrovirals will lead to improved outcomes for those with resistance. Finally, immune-based therapies will also be developed and will play an important role in HIV management.
Life expectancy for HIV infection should be close to normal for those with perfect or near perfect adherence to medications.
Get Email Notifications When This Forum Updates or Subscribe With RSS
This forum is designed for educational purposes only, and experts are not rendering medical, mental health, legal or other professional advice or services. If you have or suspect you may have a medical, mental health, legal or other problem that requires advice, consult your own caregiver, attorney or other qualified professional.
Experts appearing on this page are independent and are solely responsible for editing and fact-checking their material. Neither TheBody.com nor any advertiser is the publisher or speaker of posted visitors' questions or the experts' material. | <urn:uuid:53ff5413-3252-468f-a269-b29bee1e7dde> | CC-MAIN-2016-44 | http://www.thebody.com/Forums/AIDS/Meds/Q150168.html?ic=4003 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722951.82/warc/CC-MAIN-20161020183842-00209-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.945607 | 667 | 2.046875 | 2 |
Sept. 6, 2006 — -- The government of Pakistan today denied it would allow Osama bin Laden to avoid capture under terms of a peace agreement it signed with Taliban leaders in the country's North Waziristan area.
"If he is in Pakistan, today or any time later, he will be taken into custody and brought to justice," the Pakistani ambassador to the United States, Mahmud Ali Durrani, said in a statement.
The ambassador said a Pakistani military spokesman, Major General Shaukat Sultan, had been "grossly misquoted" when he told ABC News Tuesday that bin Laden would not be taken into custody "as long as one is being like a peaceful citizen." The comments were recorded in a telephone interview with ABC News.
Q. ABC News: If bin Laden or Zawahiri were there, they could stay?
A. Gen. Sultan: No one of that kind can stay. If someone is there he will have to surrender, he will have to live like a good citizen, his whereabouts, exit travel would be known to the authorities.
Q. ABC News: So, he wouldn't be taken into custody? He would stay there?
A. Gen. Sultan: No, as long as one is staying like a peaceful citizen, one would not be taken into custody. One has to stay like a peaceful citizen and not allowed to participate in any kind of terrorist activity.
General Sultan said today it was "hair splitting" to speculate whether troops would be sent in if bin Laden was found in North Waziristan.
"If someone is found there, we will see what is to be done," General Sultan said today. "Pakistan is committed to the war on terror, and of course we will go after any terrorist found to be operating here," he said.
Under the terms of the peace agreement, the Pakistani Army promised to cease action in the area and to return captured Taliban weapons and soldiers.
Former White House counter-terrorism czar Richard Clarke, an ABC News consultant, said "What this means is that the Taliban and al Queida leadership have effectively carved out a sanctuary inside Pakistan."
General Sultan said today he "rejected" the idea that Pakistan had created a safe haven for terrorists. | <urn:uuid:4042134d-25cf-4a09-92eb-19e7a8dfbd7f> | CC-MAIN-2022-33 | https://abcnews.go.com/International/Investigation/story?id=2398972 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00469.warc.gz | en | 0.977503 | 461 | 1.679688 | 2 |
The house was built in the late Federal style by Scottish shipping merchant Charles Edmondston at the height of his commercial success. During the Panic of 1837 Edmondston was forced to sell his house. It was purchased by Charles Alston, a member of a well-established Low Country rice-planting dynasty who quickly set about updating the architecture of his house in the Greek Revival style.
The house has remained in the Alston family since 1838. Despite the ravages of the Civil War, the Earthquake of 1886 and numerous hurricanes, the Alston family pieces remain in place much as they have for over 150 years. | <urn:uuid:76dd06da-aabc-44b7-b61e-451097431665> | CC-MAIN-2017-04 | http://www.21eastbattery.com/edmondston-alston-house.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00338-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.98831 | 127 | 2.203125 | 2 |
Have you heard that a gaggle of black-clad radicals, many wearing masks, defaced the United States Capitol—the very symbol of our republic—during their antiwar march on Saturday?
If you depend on the major networks or newspapers for news, you probably didn't. The story would have gone unreported entirely if it had not been for The Hill, a Capitol Hill paper serving the political community, which ran a piece picked up by the Drudge Report.
Here's what ABC, NBC, CBS, The New York Times, The
Waving red and black flags, and carrying riot shields emblazoned with “America out of everywhere,” 300 protesters spray-painted “anarchist symbols,” political taunts and curses on the west front steps of the Capitol building. The western side is the portion of the Capitol facing the Mall, which was in full view of every reporter and cameraman covering the march.
Furious Capitol Hill police were ordered to stand aside and allow the anarchists to wield their spray cans unmolested, though the police were permitted to block their attempt to rush the Capitol's doors.
The anarchists, many of whom were members of Students for a Democratic Society (SDS), provided plenty of compelling footage for the TV cameras. No doubt they had plenty of compelling quotes ready to go for the press, as sophisticated political activists always do, but they had no takers.
An Associated Press story reprinted by The Washington Post briefly mentioned the rush on the Capitol. A writer for CounterPunch, a leftwing newsletter, bemoaned the failure of more protestors to join the charge up the Capitol steps, so “it would have been hard for the men in blue to do much.” Apart from The Hill's story, that's all the coverage of the assault on and defacement of the Capitol that I could find
Apparently the media don't want Americans to know that some of the people protesting the
Brian Fitzpatrick is senior editor of the Culture and Media Institute. | <urn:uuid:0a470af1-1484-4f9e-9f90-6d4c0139fda5> | CC-MAIN-2017-04 | http://www.mrc.org/articles/whitewashing-reds-and-blues-blacks-and-yellows | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00339-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967687 | 415 | 1.5625 | 2 |
An "open standard" must not prohibit conforming implementations in open source software.
To comply with the Open Standards Requirement, an "open standard" must satisfy the following criteria. If an "open standard" does not meet these criteria, it will be discriminating against open source developers.
- No Intentional Secrets: The standard MUST NOT withhold any detail necessary for interoperable implementation. As flaws are inevitable, the standard MUST define a process for fixing flaws identified during implementation and interoperability testing and to incorporate said changes into a revised version or superseding version of the standard to be released under terms that do not violate the OSR.
- Availability: The standard MUST be freely and publicly available (e.g., from a stable web site) under royalty-free terms at reasonable and non-discriminatory cost.
- Patents: All patents essential to implementation of the standard MUST:
- be licensed under royalty-free terms for unrestricted use, or
- be covered by a promise of non-assertion when practiced by open source software
- No Agreements: There MUST NOT be any requirement for execution of a license agreement, NDA, grant, click-through, or any other form of paperwork to deploy conforming implementations of the standard.
- No OSR-Incompatible Dependencies: Implementation of the standard MUST NOT require any other technology that fails to meet the criteria of this Requirement. | <urn:uuid:a8bc12cd-2eb2-4f6f-957f-5646f6662599> | CC-MAIN-2017-04 | https://opensource.org/osr | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00336-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.83242 | 289 | 2.0625 | 2 |
A Canadian company has been granted a United States patent for the design of a 20-km-high tower that would act as a launch pad for space flight.
The freestanding space tower concept, developed by Thoth Technology Inc., is held rigid by pressurized gas and would allow spacecraft and people to be lifted to a level in the atmosphere requiring less force to launch.
Reaching 20km above Earth, it would stand more than 20 times higher than the world’s current tallest building, the 829-metre-high Burj Khalifa in Dubai.
While Outer Space proper is considered to begin around 100km out, 20km is just beyond the 19-km "Armstrong Limit", the point at which atmospheric pressure is so low that your bodily fluids would boil off without a protective suit.
Thoth Technology, named after an Egyptian god associated with the moon, says the tower would offer "an exciting new way to access space, using completely reusable hardware and saving more than 30% of the fuel of a conventional rocket."
Astronauts would ascend to 20km by electrical elevator.
"From the top of the tower, space planes will launch in a single stage to orbit, returning to the top of the tower for refueling and reflight," said the design’s inventor Dr. Brendan Quine, who is also Professor of Space Engineering and Planetary Physics at York University, Toronto.
Thoth President and CEO, Caroline Roberts, believes the space tower, coupled with self-landing rocket technologies being developed by others, will herald a new era of space transportation.
"Landing on a barge at sea level is a great demonstration, but landing at 12 miles above sea level will make space flight more like taking a passenger jet," she said.
An image from the patent (http://www.uspto.gov/web/patents/patog/week29/OG/patent.html)
The space elevator concept is capturing imaginations around the world.
Last year Japanese construction giant Obayashi announced long-term plans to work toward a far more ambitious one, 96,000km high, in cooperation with space technology leaders.
And last month there was a Space Elevator Conference in Seattle.
Images via Thoth Technology | <urn:uuid:b30be970-7e77-464e-99dc-67329e8e9684> | CC-MAIN-2022-33 | https://www.globalconstructionreview.com/patent-granted-inflatable-sp8a6c8e-elevator/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00667.warc.gz | en | 0.9453 | 468 | 3.3125 | 3 |
I have previously outlined the number of times that the Buggy name appears in the counties of Ireland in the 1901 census. To accompany this I have created a map to show the location of every Buggy that is listed.
Each person is listed by first name, relationship to the head of family and age. The placement arrows are located beside the names of the townlands, or streets in urban areas, where they live. The placing of townland names on Google Maps is not 100% accurate, but gives a very good indication of their location.
For those of you unfamiliar with Irish geography and civil administration, a townland is the smallest administrative area of land in Ireland. They can vary in size from a few acres to many square kilometres, with some townlands having no inhabitants. There are about 64,000 townlands in Ireland. If you live in rural Ireland you usually say you are from ‘x’ townland in county ‘x’. Of course, to make matters confusing, townlands can share the same name as a church or civil parish. Many counties also have two or three townlands with the same name.
Local government authorities (county councils) have online digital mapping features where you can see the exact location and size of all townlands in each county. Here are the links for Kilkenny and Laois, the two counties with the highest frequency of names. | <urn:uuid:84a76dc8-b671-4074-a098-00ab46bf4bb2> | CC-MAIN-2016-44 | https://buggynamehistory.wordpress.com/2010/09/15/map-of-census-of-ireland-1901/?like=1&_wpnonce=d1fb2cdf27 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719453.9/warc/CC-MAIN-20161020183839-00229-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.973284 | 285 | 2.890625 | 3 |
It is the peculiar job of an American president to embody citizens’ greatest hopes and fears, to be magnified in the popular imagination and national psyche into a world-straddling colossus. Thanks to the foresight, skepticism and, perhaps, perverse sense of humor of the founders of our democracy, the president’s vast symbolic power is hobbled and constrained on every side by our multiply divided system of government. American democracy is premised on the idea that power corrupts, that human beings tend to be selfish, cowardly and, if not stupid, short-sighted, foolish, and ever mindful of the whims of the electorate. The president can propose and sign legislation, but can’t pass it without majorities of two separate and often warring legislative houses; even executive orders are subject to review by unelected judges whose lifetime tenure gives them a considerably longer shelf-life than commanders-in-chief.
Americans rarely elect presidents whose talents warrant their high office, but when, as in 2008, we do, we paradoxically ensure that they will fall short of the potential with which we fell in love when we voted them in. Whatever their strengths or accomplishments, presidents are judged them harshly and caricatured savagely. That is their role in our political and psychological economy: to represent fantasies of absolute power that we mercilessly, relentlessly puncture. We doom our presidents to fail our greatest hopes than risk empowering tyrants who fulfill our worst fears.
I wonder if we ever really know how heavily our rages and disappointments weigh upon our presidents, how deeply they are wounded by our constant adulation and assault. I wish sometimes we could speak to them not as symbols but as human beings whose most unforgivably failing is, perhaps, that they are so much like those who elect them.
Letter to a President
We think our horror isn’t ours.
It is. We think that you can’t imagine
how horrible it is to lose, to perish
with loss for a spine. We do.
We docket you before our indignation
for the worst of what you’ve been,
strip you of vulnerability, youth, your own deep disappointments,
leave you with no right or evidence
to defend yourself against us. But we know how it feels
to brood over remains of ideals
sacrificed to a world
that will never remember
the states in which we reversed depression,
the freshness we found in our worn-out generations,
the courage with which we survived biography’s limitations,
the lightness with which we wore, the gratitude with which we surrendered,
the beautiful forms of our lives. | <urn:uuid:173860a6-c848-4223-ac44-167d32bd3bee> | CC-MAIN-2016-44 | http://www.tikkun.org/tikkundaily/2013/04/11/letter-to-a-president/comment-page-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00416-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.950298 | 549 | 2.09375 | 2 |
In TCM, we often speak about humans being part of the interconnected whole—the web of life—that includes all of Nature’s creations, from the tiniest ant to the cosmos themselves. This quote from Albert Einstein calls us to understand the simplicity and complexity of it all.
A human being is a part of a whole, called by us, “universe,” a part limited in time and space. He experiences himself, his thoughts and feelings as something separated from the rest … a kind of optical delusion of his consciousness. This delusion is a kind of prison for us, restricting us to our personal desires and to affection for a few persons nearest to us. Our task must be to free ourselves from this prison by widening our circle of compassion to embrace all living creatures and the whole of nature in its beauty.
– Albert Einstein
Learn more about consciousness and everyday life. Check out our Building Bridges for TCM Conference on September 14-17, 2017 in Reston, Virginia. | <urn:uuid:9ee29814-96f2-405a-8e76-b9939962d2c1> | CC-MAIN-2022-33 | https://www.tcmworld.org/part-of-a-whole/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00670.warc.gz | en | 0.958332 | 205 | 2.109375 | 2 |
March 21, 2004 — As Virgin Islanders join the rest of U.S. consumers facing rising prices at the gas pump, the commissioner of the Department of Licensing and Consumer Affairs is pondering a new local gas tax set to go into effect this week.
Commissioner Andrew Rutnik said he was hoping the results of a gas-pricing survey would help him decide whether to tax motorists at the pump or tax gasoline wholesalers instead. But with several wholesalers withholding information from the department, the commissioner is left with less information than he had hoped for to help him make his decision.
"We've been very successful in getting about 50 percent of the information in a timely fashion, but the last 10 or 15 percent of these gas stations … have been very reluctant to give that [information] voluntarily," the commissioner said late last week.
Had the pricing information come into DLCA by the first of the month, Rutnik said he could have had a few days to analyze the data before a flexible petroleum tax (FPT) goes into effect March 23. The FPT is the second attempt by the V.I. government to augment its revenue stream from gas consumers since the early 1980s. However, because of the number of exemptions associated with the earlier flat tax at the pump, the government only realizes a fraction of the anticipated revenues.
"As it turns out, we've noticed there's a great deal of exemptions in that [tax]. My numbers show we're only getting about 30 percent of the fuel consumed in the Virgin Islands taxed. We don't know exactly why yet, but we're looking at the implications of that tax, as opposed to the flexible petroleum tax."
Rutnik says he thinks the FPT will prove a more reliable source of funds to the government, and to ensure its reliablility, he's thinking of applying the tax at the wholesale level. Rutnik says the study was needed to give officials a look at wholesalers' gross profit margins.
New local taxes are just one of the worries facing consumers today, with prices for gas climbing steadily. By summer, DLCA officials say motorists can expect a new round of price increases.
Hikes in world oil prices are putting the squeeze on Virgin Islanders from a number of sources. Within the past several days, Hovensa announced increases for its retail gasoline, representing the cheapest price at the pump in the territory. About a week later, the governing board at the Virgin Islands Water and Power Authority granted its executive director permission to recalculate its request to raise the levelized energy adjustment clause (LEAC) currently being considered by the Public Services Commission.
With prices spiraling ever higher, the commissioner said a long-standing question becomes more pressing in the minds of consumers: Is the price of gas in the Virgin Islands a fair market price, given the disparity between prices at the pump in St. Croix and St. Thomas? It's the kind of information Rutnik has been after since he first became the licensing commissioner.
"The price of fuel is certainly driving the consumer to question why we are paying so much when we have this refinery over here on St. Croix. When we look at all the information and analyze all the information in the study, we will have a better idea whether this is a fair market in the Virgin Islands or not," he said.
Share your reaction to this news with other Source readers. Please include headline, your name, and the city and state/country or island where you reside.
Publisher's note : Like the St. John Source now? Find out how you can love us twice as much — and show your support for the islands' free and independent news voice.. click here. | <urn:uuid:b319e39e-f884-46cc-9d4f-c9d4b83f2ea9> | CC-MAIN-2022-33 | https://stthomassource.com/content/2004/03/22/vi-motorists-could-be-facing-new-gas-tax-1-557/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00679.warc.gz | en | 0.968061 | 762 | 2.03125 | 2 |
An Ohio woman severely injured when she went to the aid of a horse owner in danger of being trampled is challenging the state’s definition of being a spectator at an equine event as she seeks damages for her injuries.
Roshel Smith argues that her presence at the horse barn where the accident happened is not covered by the state law meant to limit lawsuits against the horse industry.
The owner of the horse who kicked Smith in the face says Smith met the definition of a spectator by her activities that day and should be prevented from suing.
The Ohio Supreme Court, which heard final arguments in the case last month, is expected to rule this fall.
Smith, 30, was on her day off in 2007 when she stopped by a horse stables at the Wayne County fairgrounds where she worked for her father, a horse trainer.
As Smith waited for her father, horse owner Donald Landfair pulled up in his horse trailer with two horses, according to court records. After successfully unloading the first animal, he was trying to unload the second, Annie, an untrained 2-year-old, when an Amish horse-drawn wagon came down the road and spooked the horse with its loud noise, according to documents filed with the Supreme Court.
After Annie knocked Landfair to the ground and was in danger of trampling him, Smith noticed what was happening and rushed to help, records show. The horse kicked her in the left side of the face, knocking her unconscious and leaving her with about $50,000 in medical bills, including extensive dental work that remains to be done, according to court filings and her attorney, John Rinehardt. Her lawsuit alleged Landfair acted negligently by trying to handle the untrained horse and failing to get help when unloading Annie. | <urn:uuid:1ea8e440-2110-4c85-8e6b-a88b59078e88> | CC-MAIN-2017-04 | http://www.vindy.com/news/2012/aug/05/woman-injured-by-horse-fights-state-law-/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00171-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.978004 | 365 | 1.53125 | 2 |
Current astrocytoma models are limited in their ability to define the roles of oncogenic mutations in specific brain cell types during disease pathogenesis and their utility for preclinical drug development. In order to design a better model system for these applications, phenotypically wild-type cortical astrocytes and neural stem cells (NSC) from conditional, genetically engineered mice (GEM) that harbor various combinations of floxed oncogenic alleles were harvested and grown in culture. Genetic recombination was induced in vitro using adenoviral Cre-mediated recombination, resulting in expression of mutated oncogenes and deletion of tumor suppressor genes. The phenotypic consequences of these mutations were defined by measuring proliferation, transformation, and drug response in vitro. Orthotopic allograft models, whereby transformed cells are stereotactically injected into the brains of immune-competent, syngeneic littermates, were developed to define the role of oncogenic mutations and cell type on tumorigenesis in vivo. Unlike most established human glioblastoma cell line xenografts, injection of transformed GEM-derived cortical astrocytes into the brains of immune-competent littermates produced astrocytomas, including the most aggressive subtype, glioblastoma, that recapitulated the histopathological hallmarks of human astrocytomas, including diffuse invasion of normal brain parenchyma. Bioluminescence imaging of orthotopic allografts from transformed astrocytes engineered to express luciferase was utilized to monitor in vivo tumor growth over time. Thus, astrocytoma models using astrocytes and NSC harvested from GEM with conditional oncogenic alleles provide an integrated system to study the genetics and cell biology of astrocytoma pathogenesis in vitro and in vivo and may be useful in preclinical drug development for these devastating diseases.
24 Related JoVE Articles!
Bacterial Delivery of RNAi Effectors: Transkingdom RNAi
Institutions: Charité Campus Mitte.
RNA interference (RNAi) represents a high effective mechanism for specific inhibition of mRNA expression. Besides its potential as a powerful laboratory tool, the RNAi pathway appears to be promising for therapeutic utilization. For development of RNA interference (RNAi)-based therapies, delivery of RNAi-mediating agents to target cells is one of the major obstacles. A novel strategy to overcome this hurdle is transkingdom RNAi (tk
RNAi). This technology uses non-pathogenic bacteria, e.g. Escherichia coli
, to produce and deliver therapeutic short hairpin RNA (shRNA) into target cells to induce RNAi. A first-generation tk
RNAi-mediating vector, TRIP, contains the bacteriophage T7 promoter for expression regulation of a therapeutic shRNA of interest. Furthermore, TRIP has the Inv
locus from Yersinia pseudotuberculosis
that encodes invasin, which permits natural noninvasive bacteria to enter β1-integrin-positive mammalian cells and the HlyA
gene from Listeria monocytogenes
, which produces listeriolysin O. This enzyme allows the therapeutic shRNA to escape from entry vesicles within the cytoplasm of the target cell. TRIP constructs are introduced into a competent non-pathogenic Escherichia coli
strain, which encodes T7 RNA polymerase necessary for the T7 promoter-driven synthesis of shRNAs. A well-characterized cancer-associated target molecule for different RNAi strategies is ABCB1 (MDR1/P-glycoprotein, MDR1/P-gp). This ABC-transporter acts as a drug extrusion pump and mediates the "classical" ABCB1-mediated multidrug resistance (MDR) phenotype of human cancer cells which is characterized by a specific cross resistance pattern. Different ABCB1-expressing MDR cancer cells were treated with anti-ABCB1 shRNA expression vector bearing E. coli
. This procedure resulted in activation of the RNAi pathways within the cancer cells and a considerable down regulation of the ABCB1 encoding mRNA as well as the corresponding drug extrusion pump. Accordingly, drug accumulation was enhanced in the pristine drug-resistant cancer cells and the MDR phenotype was reversed. By means of this model the data provide the proof-of-concept that tk
RNAi is suitable for modulation of cancer-associated factors, e.g. ABCB1, in human cancer cells.
Microbiology, Issue 42, Transkingdom RNAi, shRNA, gene therapy, cancer, multidrug resistance, bacteria
An Allele-specific Gene Expression Assay to Test the Functional Basis of Genetic Associations
Institutions: University of Oxford.
The number of significant genetic associations with common complex traits is constantly increasing. However, most of these associations have not been understood at molecular level. One of the mechanisms mediating the effect of DNA variants on phenotypes is gene expression, which has been shown to be particularly relevant for complex traits1
This method tests in a cellular context the effect of specific DNA sequences on gene expression. The principle is to measure the relative abundance of transcripts arising from the two alleles of a gene, analysing cells which carry one copy of the DNA sequences associated with disease (the risk variants)2,3
. Therefore, the cells used for this method should meet two fundamental genotypic requirements: they have to be heterozygous both for DNA risk variants and for DNA markers, typically coding polymorphisms, which can distinguish transcripts based on their chromosomal origin (Figure 1). DNA risk variants and DNA markers do not need to have the same allele frequency but the phase (haplotypic) relationship of the genetic markers needs to be understood. It is also important to choose cell types which express the gene of interest. This protocol refers specifically to the procedure adopted to extract nucleic acids from fibroblasts but the method is equally applicable to other cells types including primary cells.
DNA and RNA are extracted from the selected cell lines and cDNA is generated. DNA and cDNA are analysed with a primer extension assay, designed to target the coding DNA markers4
. The primer extension assay is carried out using the MassARRAY (Sequenom)5
platform according to the manufacturer's specifications. Primer extension products are then analysed by matrix-assisted laser desorption/ionization time of-flight mass spectrometry (MALDI-TOF/MS). Because the selected markers are heterozygous they will generate two peaks on the MS profiles. The area of each peak is proportional to the transcript abundance and can be measured with a function of the MassARRAY Typer software to generate an allelic ratio (allele 1: allele 2) calculation. The allelic ratio obtained for cDNA is normalized using that measured from genomic DNA, where the allelic ratio is expected to be 1:1 to correct for technical artifacts. Markers with a normalised allelic ratio significantly different to 1 indicate that the amount of transcript generated from the two chromosomes in the same cell is different, suggesting that the DNA variants associated with the phenotype have an effect on gene expression. Experimental controls should be used to confirm the results.
Cellular Biology, Issue 45, Gene expression, regulatory variant, haplotype, association study, primer extension, MALDI-TOF mass spectrometry, single nucleotide polymorphism, allele-specific
Genome-wide Gene Deletions in Streptococcus sanguinis by High Throughput PCR
Institutions: Virginia Commonwealth University.
Transposon mutagenesis and single-gene deletion are two methods applied in genome-wide gene knockout in bacteria 1,2
. Although transposon mutagenesis is less time consuming, less costly, and does not require completed genome information, there are two weaknesses in this method: (1) the possibility of a disparate mutants in the mixed mutant library that counter-selects mutants with decreased competition; and (2) the possibility of partial gene inactivation whereby genes do not entirely lose their function following the insertion of a transposon. Single-gene deletion analysis may compensate for the drawbacks associated with transposon mutagenesis. To improve the efficiency of genome-wide single gene deletion, we attempt to establish a high-throughput technique for genome-wide single gene deletion using Streptococcus sanguinis
as a model organism. Each gene deletion construct in S. sanguinis
genome is designed to comprise 1-kb upstream of the targeted gene, the aphA-3
gene, encoding kanamycin resistance protein, and 1-kb downstream of the targeted gene. Three sets of primers F1/R1, F2/R2, and F3/R3, respectively, are designed and synthesized in a 96-well plate format for PCR-amplifications of those three components of each deletion construct. Primers R1 and F3 contain 25-bp sequences that are complementary to regions of the aphA-3
gene at their 5' end. A large scale PCR amplification of the aphA-3
gene is performed once for creating all single-gene deletion constructs. The promoter of aphA-3
gene is initially excluded to minimize the potential polar effect of kanamycin cassette. To create the gene deletion constructs, high-throughput PCR amplification and purification are performed in a 96-well plate format. A linear recombinant PCR amplicon for each gene deletion will be made up through four PCR reactions using high-fidelity DNA polymerase. The initial exponential growth phase of S. sanguinis
cultured in Todd Hewitt broth supplemented with 2.5% inactivated horse serum is used to increase competence for the transformation of PCR-recombinant constructs. Under this condition, up to 20% of S. sanguinis
cells can be transformed using ~50 ng of DNA. Based on this approach, 2,048 mutants with single-gene deletion were ultimately obtained from the 2,270 genes in S. sanguinis
excluding four gene ORFs contained entirely within other ORFs in S. sanguinis
SK36 and 218 potential essential genes. The technique on creating gene deletion constructs is high throughput and could be easy to use in genome-wide single gene deletions for any transformable bacteria.
Genetics, Issue 69, Microbiology, Molecular Biology, Biomedical Engineering, Genomics, Streptococcus sanguinis, Streptococcus, Genome-wide gene deletions, genes, High-throughput, PCR
Genome-wide Screen for miRNA Targets Using the MISSION Target ID Library
The Target ID Library is designed to assist in discovery and identification of microRNA (miRNA) targets. The Target ID Library is a plasmid-based, genome-wide cDNA library cloned into the 3'UTR downstream from the dual-selection fusion protein, thymidine kinase-zeocin (TKzeo). The first round of selection is for stable transformants, followed with introduction of a miRNA of interest, and finally, selecting for cDNAs containing the miRNA's target. Selected cDNAs are identified by sequencing (see Figure 1-3 for Target ID Library Workflow and details).
To ensure broad coverage of the human transcriptome, Target ID Library cDNAs were generated via oligo-dT priming using a pool of total RNA prepared from multiple human tissues and cell lines. Resulting cDNA range from 0.5 to 4 kb, with an average size of 1.2 kb, and were cloned into the p3΄TKzeo dual-selection plasmid (see Figure 4 for plasmid map). The gene targets represented in the library can be found on the Sigma-Aldrich webpage. Results from Illumina sequencing (Table 3
), show that the library includes 16,922 of the 21,518 unique genes in UCSC RefGene (79%), or 14,000 genes with 10 or more reads (66%).
Genetics, Issue 62, Target ID, miRNA, ncRNA, RNAi, genomics
Generation of RNA/DNA Hybrids in Genomic DNA by Transformation using RNA-containing Oligonucleotides
Institutions: Georgia Institute of Technology.
Synthetic short nucleic acid polymers, oligonucleotides (oligos), are the most functional and widespread tools of molecular biology. Oligos can be produced to contain any desired DNA or RNA sequence and can be prepared to include a wide variety of base and sugar modifications. Moreover, oligos can be designed to mimic specific nucleic acid alterations and thus, can serve as important tools to investigate effects of DNA damage and mechanisms of repair. We found that Thermo Scientific Dharmacon RNA-containing oligos with a length between 50 and 80 nucleotides can be particularly suitable to study, in vivo
, functions and consequences of chromosomal RNA/DNA hybrids and of ribonucleotides embedded into DNA. RNA/DNA hybrids can readily form during DNA replication, repair and transcription, however, very little is known about the stability of RNA/DNA hybrids in cells and to which extent these hybrids can affect the genetic integrity of cells. RNA-containing oligos, therefore, represent a perfect vector to introduce ribonucleotides into chromosomal DNA and generate RNA/DNA hybrids of chosen length and base composition. Here we present the protocol for the incorporation of ribonucleotides into the genome of the eukaryotic model system yeast /Saccharomyces cerevisiae
/. Yet, our lab has utilized Thermo Scientific Dharmacon RNA-containing oligos to generate RNA/DNA hybrids at the chromosomal level in different cell systems, from bacteria to human cells.
Cellular Biology, Issue 45, RNA-containing oligonucleotides, ribonucleotides, RNA/DNA hybrids, yeast, transformation, gene targeting, genome instability, DNA repair
Generation of High Quality Chromatin Immunoprecipitation DNA Template for High-throughput Sequencing (ChIP-seq)
Institutions: Children's Hospital of Philadelphia Research Institute, University of Pennsylvania .
ChIP-sequencing (ChIP-seq) methods directly offer whole-genome coverage, where combining chromatin immunoprecipitation (ChIP) and massively parallel sequencing can be utilized to identify the repertoire of mammalian DNA sequences bound by transcription factors in vivo
. "Next-generation" genome sequencing technologies provide 1-2 orders of magnitude increase in the amount of sequence that can be cost-effectively generated over older technologies thus allowing for ChIP-seq methods to directly provide whole-genome coverage for effective profiling of mammalian protein-DNA interactions.
For successful ChIP-seq approaches, one must generate high quality ChIP DNA template to obtain the best sequencing outcomes. The description is based around experience with the protein product of the gene most strongly implicated in the pathogenesis of type 2 diabetes, namely the transcription factor transcription factor 7-like 2 (TCF7L2). This factor has also been implicated in various cancers.
Outlined is how to generate high quality ChIP DNA template derived from the colorectal carcinoma cell line, HCT116, in order to build a high-resolution map through sequencing to determine the genes bound by TCF7L2, giving further insight in to its key role in the pathogenesis of complex traits.
Molecular Biology, Issue 74, Genetics, Biochemistry, Microbiology, Medicine, Proteins, DNA-Binding Proteins, Transcription Factors, Chromatin Immunoprecipitation, Genes, chromatin, immunoprecipitation, ChIP, DNA, PCR, sequencing, antibody, cross-link, cell culture, assay
Purification of Transcripts and Metabolites from Drosophila Heads
Institutions: University of Florida , University of Florida , University of Florida , University of Florida .
For the last decade, we have tried to understand the molecular and cellular mechanisms of neuronal degeneration using Drosophila
as a model organism. Although fruit flies provide obvious experimental advantages, research on neurodegenerative diseases has mostly relied on traditional techniques, including genetic interaction, histology, immunofluorescence, and protein biochemistry. These techniques are effective for mechanistic, hypothesis-driven studies, which lead to a detailed understanding of the role of single genes in well-defined biological problems. However, neurodegenerative diseases are highly complex and affect multiple cellular organelles and processes over time. The advent of new technologies and the omics age provides a unique opportunity to understand the global cellular perturbations underlying complex diseases. Flexible model organisms such as Drosophila
are ideal for adapting these new technologies because of their strong annotation and high tractability. One challenge with these small animals, though, is the purification of enough informational molecules (DNA, mRNA, protein, metabolites) from highly relevant tissues such as fly brains. Other challenges consist of collecting large numbers of flies for experimental replicates (critical for statistical robustness) and developing consistent procedures for the purification of high-quality biological material. Here, we describe the procedures for collecting thousands of fly heads and the extraction of transcripts and metabolites to understand how global changes in gene expression and metabolism contribute to neurodegenerative diseases. These procedures are easily scalable and can be applied to the study of proteomic and epigenomic contributions to disease.
Genetics, Issue 73, Biochemistry, Molecular Biology, Neurobiology, Neuroscience, Bioengineering, Cellular Biology, Anatomy, Neurodegenerative Diseases, Biological Assay, Drosophila, fruit fly, head separation, purification, mRNA, RNA, cDNA, DNA, transcripts, metabolites, replicates, SCA3, neurodegeneration, NMR, gene expression, animal model
Detecting Somatic Genetic Alterations in Tumor Specimens by Exon Capture and Massively Parallel Sequencing
Institutions: Memorial Sloan-Kettering Cancer Center, Memorial Sloan-Kettering Cancer Center.
Efforts to detect and investigate key oncogenic mutations have proven valuable to facilitate the appropriate treatment for cancer patients. The establishment of high-throughput, massively parallel "next-generation" sequencing has aided the discovery of many such mutations. To enhance the clinical and translational utility of this technology, platforms must be high-throughput, cost-effective, and compatible with formalin-fixed paraffin embedded (FFPE) tissue samples that may yield small amounts of degraded or damaged DNA. Here, we describe the preparation of barcoded and multiplexed DNA libraries followed by hybridization-based capture of targeted exons for the detection of cancer-associated mutations in fresh frozen and FFPE tumors by massively parallel sequencing. This method enables the identification of sequence mutations, copy number alterations, and select structural rearrangements involving all targeted genes. Targeted exon sequencing offers the benefits of high throughput, low cost, and deep sequence coverage, thus conferring high sensitivity for detecting low frequency mutations.
Molecular Biology, Issue 80, Molecular Diagnostic Techniques, High-Throughput Nucleotide Sequencing, Genetics, Neoplasms, Diagnosis, Massively parallel sequencing, targeted exon sequencing, hybridization capture, cancer, FFPE, DNA mutations
High-throughput Functional Screening using a Homemade Dual-glow Luciferase Assay
Institutions: Massachusetts General Hospital.
We present a rapid and inexpensive high-throughput screening protocol to identify transcriptional regulators of alpha-synuclein, a gene associated with Parkinson's disease. 293T cells are transiently transfected with plasmids from an arrayed ORF expression library, together with luciferase reporter plasmids, in a one-gene-per-well microplate format. Firefly luciferase activity is assayed after 48 hr to determine the effects of each library gene upon alpha-synuclein transcription, normalized to expression from an internal control construct (a hCMV promoter directing Renilla
luciferase). This protocol is facilitated by a bench-top robot enclosed in a biosafety cabinet, which performs aseptic liquid handling in 96-well format. Our automated transfection protocol is readily adaptable to high-throughput lentiviral library production or other functional screening protocols requiring triple-transfections of large numbers of unique library plasmids in conjunction with a common set of helper plasmids. We also present an inexpensive and validated alternative to commercially-available, dual luciferase reagents which employs PTC124, EDTA, and pyrophosphate to suppress firefly luciferase activity prior to measurement of Renilla
luciferase. Using these methods, we screened 7,670 human genes and identified 68 regulators of alpha-synuclein. This protocol is easily modifiable to target other genes of interest.
Cellular Biology, Issue 88, Luciferases, Gene Transfer Techniques, Transfection, High-Throughput Screening Assays, Transfections, Robotics
Optimization and Utilization of Agrobacterium-mediated Transient Protein Production in Nicotiana
Institutions: Fraunhofer USA Center for Molecular Biotechnology.
-mediated transient protein production in plants is a promising approach to produce vaccine antigens and therapeutic proteins within a short period of time. However, this technology is only just beginning to be applied to large-scale production as many technological obstacles to scale up are now being overcome. Here, we demonstrate a simple and reproducible method for industrial-scale transient protein production based on vacuum infiltration of Nicotiana
plants with Agrobacteria
carrying launch vectors. Optimization of Agrobacterium
cultivation in AB medium allows direct dilution of the bacterial culture in Milli-Q water, simplifying the infiltration process. Among three tested species of Nicotiana
, N. excelsiana
× N. excelsior
) was selected as the most promising host due to the ease of infiltration, high level of reporter protein production, and about two-fold higher biomass production under controlled environmental conditions. Induction of Agrobacterium
harboring pBID4-GFP (Tobacco mosaic virus
-based) using chemicals such as acetosyringone and monosaccharide had no effect on the protein production level. Infiltrating plant under 50 to 100 mbar for 30 or 60 sec resulted in about 95% infiltration of plant leaf tissues. Infiltration with Agrobacterium
laboratory strain GV3101 showed the highest protein production compared to Agrobacteria
laboratory strains LBA4404 and C58C1 and wild-type Agrobacteria
strains at6, at10, at77 and A4. Co-expression of a viral RNA silencing suppressor, p23 or p19, in N. benthamiana
resulted in earlier accumulation and increased production (15-25%) of target protein (influenza virus hemagglutinin).
Plant Biology, Issue 86, Agroinfiltration, Nicotiana benthamiana, transient protein production, plant-based expression, viral vector, Agrobacteria
Identification of Key Factors Regulating Self-renewal and Differentiation in EML Hematopoietic Precursor Cells by RNA-sequencing Analysis
Institutions: The University of Texas Graduate School of Biomedical Sciences at Houston.
Hematopoietic stem cells (HSCs) are used clinically for transplantation treatment to rebuild a patient's hematopoietic system in many diseases such as leukemia and lymphoma. Elucidating the mechanisms controlling HSCs self-renewal and differentiation is important for application of HSCs for research and clinical uses. However, it is not possible to obtain large quantity of HSCs due to their inability to proliferate in vitro
. To overcome this hurdle, we used a mouse bone marrow derived cell line, the EML (Erythroid, Myeloid, and Lymphocytic) cell line, as a model system for this study.
RNA-sequencing (RNA-Seq) has been increasingly used to replace microarray for gene expression studies. We report here a detailed method of using RNA-Seq technology to investigate the potential key factors in regulation of EML cell self-renewal and differentiation. The protocol provided in this paper is divided into three parts. The first part explains how to culture EML cells and separate Lin-CD34+ and Lin-CD34- cells. The second part of the protocol offers detailed procedures for total RNA preparation and the subsequent library construction for high-throughput sequencing. The last part describes the method for RNA-Seq data analysis and explains how to use the data to identify differentially expressed transcription factors between Lin-CD34+ and Lin-CD34- cells. The most significantly differentially expressed transcription factors were identified to be the potential key regulators controlling EML cell self-renewal and differentiation. In the discussion section of this paper, we highlight the key steps for successful performance of this experiment.
In summary, this paper offers a method of using RNA-Seq technology to identify potential regulators of self-renewal and differentiation in EML cells. The key factors identified are subjected to downstream functional analysis in vitro
and in vivo
Genetics, Issue 93, EML Cells, Self-renewal, Differentiation, Hematopoietic precursor cell, RNA-Sequencing, Data analysis
gDNA Enrichment by a Transposase-based Technology for NGS Analysis of the Whole Sequence of BRCA1, BRCA2, and 9 Genes Involved in DNA Damage Repair
Institutions: Centre Georges-François Leclerc.
The widespread use of Next Generation Sequencing has opened up new avenues for cancer research and diagnosis. NGS will bring huge amounts of new data on cancer, and especially cancer genetics. Current knowledge and future discoveries will make it necessary to study a huge number of genes that could be involved in a genetic predisposition to cancer. In this regard, we developed a Nextera design to study 11 complete genes involved in DNA damage repair. This protocol was developed to safely study 11 genes (ATM
, and TP53
) from promoter to 3'-UTR in 24 patients simultaneously. This protocol, based on transposase technology and gDNA enrichment, gives a great advantage in terms of time for the genetic diagnosis thanks to sample multiplexing. This protocol can be safely used with blood gDNA.
Genetics, Issue 92, gDNA enrichment, Nextera, NGS, DNA damage, BRCA1, BRCA2
Microarray-based Identification of Individual HERV Loci Expression: Application to Biomarker Discovery in Prostate Cancer
Institutions: Joint Unit Hospices de Lyon-bioMérieux, BioMérieux, Hospices Civils de Lyon, Lyon 1 University, BioMérieux, Hospices Civils de Lyon, Hospices Civils de Lyon.
The prostate-specific antigen (PSA) is the main diagnostic biomarker for prostate cancer in clinical use, but it lacks specificity and sensitivity, particularly in low dosage values1
. ‘How to use PSA' remains a current issue, either for diagnosis as a gray zone corresponding to a concentration in serum of 2.5-10 ng/ml which does not allow a clear differentiation to be made between cancer and noncancer2
or for patient follow-up as analysis of post-operative PSA kinetic parameters can pose considerable challenges for their practical application3,4
. Alternatively, noncoding RNAs (ncRNAs) are emerging as key molecules in human cancer, with the potential to serve as novel markers of disease, e.g.
PCA3 in prostate cancer5,6
and to reveal uncharacterized aspects of tumor biology. Moreover, data from the ENCODE project published in 2012 showed that different RNA types cover about 62% of the genome. It also appears that the amount of transcriptional regulatory motifs is at least 4.5x higher than the one corresponding to protein-coding exons. Thus, long terminal repeats (LTRs) of human endogenous retroviruses (HERVs) constitute a wide range of putative/candidate transcriptional regulatory sequences, as it is their primary function in infectious retroviruses. HERVs, which are spread throughout the human genome, originate from ancestral and independent infections within the germ line, followed by copy-paste propagation processes and leading to multicopy families occupying 8% of the human genome (note that exons span 2% of our genome). Some HERV loci still express proteins that have been associated with several pathologies including cancer7-10
. We have designed a high-density microarray, in Affymetrix format, aiming to optimally characterize individual HERV loci expression, in order to better understand whether they can be active, if they drive ncRNA transcription or modulate coding gene expression. This tool has been applied in the prostate cancer field (Figure 1
Medicine, Issue 81, Cancer Biology, Genetics, Molecular Biology, Prostate, Retroviridae, Biomarkers, Pharmacological, Tumor Markers, Biological, Prostatectomy, Microarray Analysis, Gene Expression, Diagnosis, Human Endogenous Retroviruses, HERV, microarray, Transcriptome, prostate cancer, Affymetrix
DNA-affinity-purified Chip (DAP-chip) Method to Determine Gene Targets for Bacterial Two component Regulatory Systems
Institutions: Lawrence Berkeley National Laboratory.
methods such as ChIP-chip are well-established techniques used to determine global gene targets for transcription factors. However, they are of limited use in exploring bacterial two component regulatory systems with uncharacterized activation conditions. Such systems regulate transcription only when activated in the presence of unique signals. Since these signals are often unknown, the in vitro
microarray based method described in this video article can be used to determine gene targets and binding sites for response regulators. This DNA-affinity-purified-chip method may be used for any purified regulator in any organism with a sequenced genome. The protocol involves allowing the purified tagged protein to bind to sheared genomic DNA and then affinity purifying the protein-bound DNA, followed by fluorescent labeling of the DNA and hybridization to a custom tiling array. Preceding steps that may be used to optimize the assay for specific regulators are also described. The peaks generated by the array data analysis are used to predict binding site motifs, which are then experimentally validated. The motif predictions can be further used to determine gene targets of orthologous response regulators in closely related species. We demonstrate the applicability of this method by determining the gene targets and binding site motifs and thus predicting the function for a sigma54-dependent response regulator DVU3023 in the environmental bacterium Desulfovibrio vulgaris
Genetics, Issue 89, DNA-Affinity-Purified-chip, response regulator, transcription factor binding site, two component system, signal transduction, Desulfovibrio, lactate utilization regulator, ChIP-chip
Identification of Sleeping Beauty Transposon Insertions in Solid Tumors using Linker-mediated PCR
Institutions: University of Minnesota, Minneapolis, University of Minnesota, Minneapolis.
Genomic, proteomic, transcriptomic, and epigenomic analyses of human tumors indicate that there are thousands of anomalies within each cancer genome compared to matched normal tissue. Based on these analyses it is evident that there are many undiscovered genetic drivers of cancer1
. Unfortunately these drivers are hidden within a much larger number of passenger anomalies in the genome that do not directly contribute to tumor formation. Another aspect of the cancer genome is that there is considerable genetic heterogeneity within similar tumor types. Each tumor can harbor different mutations that provide a selective advantage for tumor formation2
. Performing an unbiased forward genetic screen in mice provides the tools to generate tumors and analyze their genetic composition, while reducing the background of passenger mutations. The Sleeping Beauty
(SB) transposon system is one such method3
. The SB system utilizes mobile vectors (transposons) that can be inserted throughout the genome by the transposase enzyme. Mutations are limited to a specific cell type through the use of a conditional transposase allele that is activated by Cre Recombinase
. Many mouse lines exist that express Cre Recombinase
in specific tissues. By crossing one of these lines to the conditional transposase allele (e.g.
Lox-stop-Lox-SB11), the SB system is activated only in cells that express Cre Recombinase
. The Cre Recombinase
will excise a stop cassette that blocks expression of the transposase allele, thereby activating transposon mutagenesis within the designated cell type. An SB screen is initiated by breeding three strains of transgenic mice so that the experimental mice carry a conditional transposase allele, a concatamer of transposons, and a tissue-specific Cre Recombinase
allele. These mice are allowed to age until tumors form and they become moribund. The mice are then necropsied and genomic DNA is isolated from the tumors. Next, the genomic DNA is subjected to linker-mediated-PCR (LM-PCR) that results in amplification of genomic loci containing an SB transposon. LM-PCR performed on a single tumor will result in hundreds of distinct amplicons representing the hundreds of genomic loci containing transposon insertions in a single tumor4
. The transposon insertions in all tumors are analyzed and common insertion sites (CISs) are identified using an appropriate statistical method5
. Genes within the CIS are highly likely to be oncogenes or tumor suppressor genes, and are considered candidate cancer genes. The advantages of using the SB system to identify candidate cancer genes are: 1) the transposon can easily be located in the genome because its sequence is known, 2) transposition can be directed to almost any cell type and 3) the transposon is capable of introducing both gain- and loss-of-function mutations6
. The following protocol describes how to devise and execute a forward genetic screen using the SB transposon system to identify candidate cancer genes (Figure 1
Genetics, Issue 72, Medicine, Cancer Biology, Biomedical Engineering, Genomics, Mice, Genetic Techniques, life sciences, animal models, Neoplasms, Genetic Phenomena, Forward genetic screen, cancer drivers, mouse models, oncogenes, tumor suppressor genes, Sleeping Beauty transposons, insertions, DNA, PCR, animal model
MISSION LentiPlex Pooled shRNA Library Screening in Mammalian Cells
RNA interference (RNAi) is an intrinsic cellular mechanism for the regulation of gene expression. Harnessing the innate power of this system enables us to knockdown gene expression levels in loss of gene function studies.
There are two main methods for performing RNAi. The first is the use of small interfering RNAs (siRNAs) that are chemically synthesized, and the second utilizes short-hairpin RNAs (shRNAs) encoded within plasmids 1
. The latter can be transfected into cells directly or packaged into replication incompetent lentiviral particles. The main advantages of using lentiviral shRNAs is the ease of introduction into a wide variety of cell types, their ability to stably integrate into the genome for long term gene knockdown and selection, and their efficacy in conducting high-throughput loss of function screens. To facilitate this we have created the LentiPlex pooled shRNA library.
The MISSION LentiPlex Human shRNA Pooled Library is a genome-wide lentiviral pool produced using a proprietary process. The library consists of over 75,000 shRNA constructs from the TRC collection targeting 15,000+ human genes 2
. Each library is tested for shRNA representation before product release to ensure robust library coverage. The library is provided in a ready-to-use lentiviral format at titers of at least 5 x 108
TU/ml via p24 assay and is pre-divided into ten subpools of approximately 8,000 shRNA constructs each. Amplification and sequencing primers are also provided for downstream target identification.
Previous studies established a synergistic antitumor activity of TRAIL when combined with Paclitaxel in A549 cells, a human lung carcinoma cell line 3, 4
. In this study we demonstrate the application of a pooled LentiPlex shRNA library to rapidly conduct a positive selection screen for genes involved in the cytotoxicity of A549 cells when exposed to TRAIL and Paclitaxel. One barrier often encountered with high-throughput screens is the cost and difficulty in deconvolution; we also detail a cost-effective polyclonal approach utilizing traditional sequencing.
Molecular Biology, Issue 58, LentiPlex, shRNA, RNAi, High-Throughput Screening, Deconvolution, TRAIL, Paclitaxel, A549
Mapping Bacterial Functional Networks and Pathways in Escherichia Coli using Synthetic Genetic Arrays
Institutions: University of Toronto, University of Toronto, University of Regina.
Phenotypes are determined by a complex series of physical (e.g.
protein-protein) and functional (e.g.
gene-gene or genetic) interactions (GI)1
. While physical interactions can indicate which bacterial proteins are associated as complexes, they do not necessarily reveal pathway-level functional relationships1. GI screens, in which the growth of double mutants bearing two deleted or inactivated genes is measured and compared to the corresponding single mutants, can illuminate epistatic dependencies between loci and hence provide a means to query and discover novel functional relationships2
. Large-scale GI maps have been reported for eukaryotic organisms like yeast3-7
, but GI information remains sparse for prokaryotes8
, which hinders the functional annotation of bacterial genomes. To this end, we and others have developed high-throughput quantitative bacterial GI screening methods9, 10
Here, we present the key steps required to perform quantitative E. coli
Synthetic Genetic Array (eSGA) screening procedure on a genome-scale9
, using natural bacterial conjugation and homologous recombination to systemically generate and measure the fitness of large numbers of double mutants in a colony array format.
Briefly, a robot is used to transfer, through conjugation, chloramphenicol (Cm) - marked mutant alleles from engineered Hfr (High frequency of recombination) 'donor strains' into an ordered array of kanamycin (Kan) - marked F- recipient strains. Typically, we use loss-of-function single mutants bearing non-essential gene deletions (e.g.
the 'Keio' collection11
) and essential gene hypomorphic mutations (i.e.
alleles conferring reduced protein expression, stability, or activity9, 12, 13
) to query the functional associations of non-essential and essential genes, respectively. After conjugation and ensuing genetic exchange mediated by homologous recombination, the resulting double mutants are selected on solid medium containing both antibiotics. After outgrowth, the plates are digitally imaged and colony sizes are quantitatively scored using an in-house automated image processing system14
. GIs are revealed when the growth rate of a double mutant is either significantly better or worse than expected9
. Aggravating (or negative) GIs often result between loss-of-function mutations in pairs of genes from compensatory pathways that impinge on the same essential process2
. Here, the loss of a single gene is buffered, such that either single mutant is viable. However, the loss of both pathways is deleterious and results in synthetic lethality or sickness (i.e.
slow growth). Conversely, alleviating (or positive) interactions can occur between genes in the same pathway or protein complex2
as the deletion of either gene alone is often sufficient to perturb the normal function of the pathway or complex such that additional perturbations do not reduce activity, and hence growth, further. Overall, systematically identifying and analyzing GI networks can provide unbiased, global maps of the functional relationships between large numbers of genes, from which pathway-level information missed by other approaches can be inferred9
Genetics, Issue 69, Molecular Biology, Medicine, Biochemistry, Microbiology, Aggravating, alleviating, conjugation, double mutant, Escherichia coli, genetic interaction, Gram-negative bacteria, homologous recombination, network, synthetic lethality or sickness, suppression
A Restriction Enzyme Based Cloning Method to Assess the In vitro Replication Capacity of HIV-1 Subtype C Gag-MJ4 Chimeric Viruses
Institutions: Emory University, Emory University.
The protective effect of many HLA class I alleles on HIV-1 pathogenesis and disease progression is, in part, attributed to their ability to target conserved portions of the HIV-1 genome that escape with difficulty. Sequence changes attributed to cellular immune pressure arise across the genome during infection, and if found within conserved regions of the genome such as Gag, can affect the ability of the virus to replicate in vitro
. Transmission of HLA-linked polymorphisms in Gag to HLA-mismatched recipients has been associated with reduced set point viral loads. We hypothesized this may be due to a reduced replication capacity of the virus. Here we present a novel method for assessing the in vitro
replication of HIV-1 as influenced by the gag
gene isolated from acute time points from subtype C infected Zambians. This method uses restriction enzyme based cloning to insert the gag
gene into a common subtype C HIV-1 proviral backbone, MJ4. This makes it more appropriate to the study of subtype C sequences than previous recombination based methods that have assessed the in vitro
replication of chronically derived gag-pro
sequences. Nevertheless, the protocol could be readily modified for studies of viruses from other subtypes. Moreover, this protocol details a robust and reproducible method for assessing the replication capacity of the Gag-MJ4 chimeric viruses on a CEM-based T cell line. This method was utilized for the study of Gag-MJ4 chimeric viruses derived from 149 subtype C acutely infected Zambians, and has allowed for the identification of residues in Gag that affect replication. More importantly, the implementation of this technique has facilitated a deeper understanding of how viral replication defines parameters of early HIV-1 pathogenesis such as set point viral load and longitudinal CD4+ T cell decline.
Infectious Diseases, Issue 90, HIV-1, Gag, viral replication, replication capacity, viral fitness, MJ4, CEM, GXR25
Setting-up an In Vitro Model of Rat Blood-brain Barrier (BBB): A Focus on BBB Impermeability and Receptor-mediated Transport
Institutions: VECT-HORUS SAS, CNRS, NICN UMR 7259.
The blood brain barrier (BBB) specifically regulates molecular and cellular flux between the blood and the nervous tissue. Our aim was to develop and characterize a highly reproducible rat syngeneic in vitro
model of the BBB using co-cultures of primary rat brain endothelial cells (RBEC) and astrocytes to study receptors involved in transcytosis across the endothelial cell monolayer. Astrocytes were isolated by mechanical dissection following trypsin digestion and were frozen for later co-culture. RBEC were isolated from 5-week-old rat cortices. The brains were cleaned of meninges and white matter, and mechanically dissociated following enzymatic digestion. Thereafter, the tissue homogenate was centrifuged in bovine serum albumin to separate vessel fragments from nervous tissue. The vessel fragments underwent a second enzymatic digestion to free endothelial cells from their extracellular matrix. The remaining contaminating cells such as pericytes were further eliminated by plating the microvessel fragments in puromycin-containing medium. They were then passaged onto filters for co-culture with astrocytes grown on the bottom of the wells. RBEC expressed high levels of tight junction (TJ) proteins such as occludin, claudin-5 and ZO-1 with a typical localization at the cell borders. The transendothelial electrical resistance (TEER) of brain endothelial monolayers, indicating the tightness of TJs reached 300 ohm·cm2
on average. The endothelial permeability coefficients (Pe) for lucifer yellow (LY) was highly reproducible with an average of 0.26 ± 0.11 x 10-3
cm/min. Brain endothelial cells organized in monolayers expressed the efflux transporter P-glycoprotein (P-gp), showed a polarized transport of rhodamine 123, a ligand for P-gp, and showed specific transport of transferrin-Cy3 and DiILDL across the endothelial cell monolayer. In conclusion, we provide a protocol for setting up an in vitro
BBB model that is highly reproducible due to the quality assurance methods, and that is suitable for research on BBB transporters and receptors.
Medicine, Issue 88, rat brain endothelial cells (RBEC), mouse, spinal cord, tight junction (TJ), receptor-mediated transport (RMT), low density lipoprotein (LDL), LDLR, transferrin, TfR, P-glycoprotein (P-gp), transendothelial electrical resistance (TEER),
Genetic Manipulation in Δku80 Strains for Functional Genomic Analysis of Toxoplasma gondii
Institutions: The Geisel School of Medicine at Dartmouth.
Targeted genetic manipulation using homologous recombination is the method of choice for functional genomic analysis to obtain a detailed view of gene function and phenotype(s). The development of mutant strains with targeted gene deletions, targeted mutations, complemented gene function, and/or tagged genes provides powerful strategies to address gene function, particularly if these genetic manipulations can be efficiently targeted to the gene locus of interest using integration mediated by double cross over homologous recombination.
Due to very high rates of nonhomologous recombination, functional genomic analysis of Toxoplasma gondii
has been previously limited by the absence of efficient methods for targeting gene deletions and gene replacements to specific genetic loci. Recently, we abolished the major pathway of nonhomologous recombination in type I and type II strains of T. gondii
by deleting the gene encoding the KU80 protein1,2
. The Δku80
strains behave normally during tachyzoite (acute) and bradyzoite (chronic) stages in vitro
and in vivo
and exhibit essentially a 100% frequency of homologous recombination. The Δku80
strains make functional genomic studies feasible on the single gene as well as on the genome scale1-4
Here, we report methods for using type I and type II Δku80Δhxgprt
strains to advance gene targeting approaches in T. gondii
. We outline efficient methods for generating gene deletions, gene replacements, and tagged genes by targeted insertion or deletion of the hypoxanthine-xanthine-guanine phosphoribosyltransferase (HXGPRT
) selectable marker. The described gene targeting protocol can be used in a variety of ways in Δku80
strains to advance functional analysis of the parasite genome and to develop single strains that carry multiple targeted genetic manipulations. The application of this genetic method and subsequent phenotypic assays will reveal fundamental and unique aspects of the biology of T. gondii
and related significant human pathogens that cause malaria (Plasmodium
sp.) and cryptosporidiosis (Cryptosporidium
Infectious Diseases, Issue 77, Genetics, Microbiology, Infection, Medicine, Immunology, Molecular Biology, Cellular Biology, Biomedical Engineering, Bioengineering, Genomics, Parasitology, Pathology, Apicomplexa, Coccidia, Toxoplasma, Genetic Techniques, Gene Targeting, Eukaryota, Toxoplasma gondii, genetic manipulation, gene targeting, gene deletion, gene replacement, gene tagging, homologous recombination, DNA, sequencing
Isolation of Fidelity Variants of RNA Viruses and Characterization of Virus Mutation Frequency
Institutions: Institut Pasteur .
RNA viruses use RNA dependent RNA polymerases to replicate their genomes. The intrinsically high error rate of these enzymes is a large contributor to the generation of extreme population diversity that facilitates virus adaptation and evolution. Increasing evidence shows that the intrinsic error rates, and the resulting mutation frequencies, of RNA viruses can be modulated by subtle amino acid changes to the viral polymerase. Although biochemical assays exist for some viral RNA polymerases that permit quantitative measure of incorporation fidelity, here we describe a simple method of measuring mutation frequencies of RNA viruses that has proven to be as accurate as biochemical approaches in identifying fidelity altering mutations. The approach uses conventional virological and sequencing techniques that can be performed in most biology laboratories. Based on our experience with a number of different viruses, we have identified the key steps that must be optimized to increase the likelihood of isolating fidelity variants and generating data of statistical significance. The isolation and characterization of fidelity altering mutations can provide new insights into polymerase structure and function1-3
. Furthermore, these fidelity variants can be useful tools in characterizing mechanisms of virus adaptation and evolution4-7
Immunology, Issue 52, Polymerase fidelity, RNA virus, mutation frequency, mutagen, RNA polymerase, viral evolution
Profiling of Estrogen-regulated MicroRNAs in Breast Cancer Cells
Institutions: University of Houston.
Estrogen plays vital roles in mammary gland development and breast cancer progression. It mediates its function by binding to and activating the estrogen receptors (ERs), ERα, and ERβ. ERα is frequently upregulated in breast cancer and drives the proliferation of breast cancer cells. The ERs function as transcription factors and regulate gene expression. Whereas ERα's regulation of protein-coding genes is well established, its regulation of noncoding microRNA (miRNA) is less explored. miRNAs play a major role in the post-transcriptional regulation of genes, inhibiting their translation or degrading their mRNA. miRNAs can function as oncogenes or tumor suppressors and are also promising biomarkers. Among the miRNA assays available, microarray and quantitative real-time polymerase chain reaction (qPCR) have been extensively used to detect and quantify miRNA levels. To identify miRNAs regulated by estrogen signaling in breast cancer, their expression in ERα-positive breast cancer cell lines were compared before and after estrogen-activation using both the µParaflo-microfluidic microarrays and Dual Labeled Probes-low density arrays. Results were validated using specific qPCR assays, applying both Cyanine dye-based and Dual Labeled Probes-based chemistry. Furthermore, a time-point assay was used to identify regulations over time. Advantages of the miRNA assay approach used in this study is that it enables a fast screening of mature miRNA regulations in numerous samples, even with limited sample amounts. The layout, including the specific conditions for cell culture and estrogen treatment, biological and technical replicates, and large-scale screening followed by in-depth confirmations using separate techniques, ensures a robust detection of miRNA regulations, and eliminates false positives and other artifacts. However, mutated or unknown miRNAs, or regulations at the primary and precursor transcript level, will not be detected. The method presented here represents a thorough investigation of estrogen-mediated miRNA regulation.
Medicine, Issue 84, breast cancer, microRNA, estrogen, estrogen receptor, microarray, qPCR
Vaccinia Virus Infection & Temporal Analysis of Virus Gene Expression: Part 3
Institutions: MIT - Massachusetts Institute of Technology.
The family Poxviridae
consists of large double-stranded DNA containing viruses that replicate exclusively in the cytoplasm of infected cells. Members of the orthopox
genus include variola, the causative agent of human small pox, monkeypox, and vaccinia (VAC), the prototypic member of the virus family. Within the relatively large (~ 200 kb) vaccinia genome, three classes of genes are encoded: early, intermediate, and late. While all three classes are transcribed by virally-encoded RNA polymerases, each class serves a different function in the life cycle of the virus. Poxviruses utilize multiple strategies for modulation of the host cellular environment during infection. In order to understand regulation of both host and virus gene expression, we have utilized genome-wide approaches to analyze transcript abundance from both virus and host cells. Here, we demonstrate time course infections of HeLa cells with Vaccinia virus and sampling RNA at several time points post-infection. Both host and viral total RNA is isolated and amplified for hybridization to microarrays for analysis of gene expression.
Microbiology, Issue 26, Vaccinia, virus, infection, HeLa, Microarray, amplified RNA, amino allyl, RNA, Ambion Amino Allyl MessageAmpII, gene expression
A Strategy to Identify de Novo Mutations in Common Disorders such as Autism and Schizophrenia
Institutions: Universite de Montreal, Universite de Montreal, Universite de Montreal.
There are several lines of evidence supporting the role of de novo
mutations as a mechanism for common disorders, such as autism and schizophrenia. First, the de novo
mutation rate in humans is relatively high, so new mutations are generated at a high frequency in the population. However, de novo
mutations have not been reported in most common diseases. Mutations in genes leading to severe diseases where there is a strong negative selection against the phenotype, such as lethality in embryonic stages or reduced reproductive fitness, will not be transmitted to multiple family members, and therefore will not be detected by linkage gene mapping or association studies. The observation of very high concordance in monozygotic twins and very low concordance in dizygotic twins also strongly supports the hypothesis that a significant fraction of cases may result from new mutations. Such is the case for diseases such as autism and schizophrenia. Second, despite reduced reproductive fitness1
and extremely variable environmental factors, the incidence of some diseases is maintained worldwide at a relatively high and constant rate. This is the case for autism and schizophrenia, with an incidence of approximately 1% worldwide. Mutational load can be thought of as a balance between selection for or against a deleterious mutation and its production by de novo
mutation. Lower rates of reproduction constitute a negative selection factor that should reduce the number of mutant alleles in the population, ultimately leading to decreased disease prevalence. These selective pressures tend to be of different intensity in different environments. Nonetheless, these severe mental disorders have been maintained at a constant relatively high prevalence in the worldwide population across a wide range of cultures and countries despite a strong negative selection against them2
. This is not what one would predict in diseases with reduced reproductive fitness, unless there was a high new mutation rate. Finally, the effects of paternal age: there is a significantly increased risk of the disease with increasing paternal age, which could result from the age related increase in paternal de novo
mutations. This is the case for autism and schizophrenia3
. The male-to-female ratio of mutation rate is estimated at about 4–6:1, presumably due to a higher number of germ-cell divisions with age in males. Therefore, one would predict that de novo
mutations would more frequently come from males, particularly older males4
. A high rate of new mutations may in part explain why genetic studies have so far failed to identify many genes predisposing to complexes diseases genes, such as autism and schizophrenia, and why diseases have been identified for a mere 3% of genes in the human genome. Identification for de novo
mutations as a cause of a disease requires a targeted molecular approach, which includes studying parents and affected subjects. The process for determining if the genetic basis of a disease may result in part from de novo
mutations and the molecular approach to establish this link will be illustrated, using autism and schizophrenia as examples.
Medicine, Issue 52, de novo mutation, complex diseases, schizophrenia, autism, rare variations, DNA sequencing | <urn:uuid:c04d8270-a164-44e1-b306-cef34c7735af> | CC-MAIN-2017-04 | http://www.jove.com/visualize/abstract/25057852/integrative-genomic-transcriptomic-analysis-identified-candidate | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00356-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.899674 | 11,912 | 1.960938 | 2 |
iOS Core Animation Advanced TechniquesJun 15, 2014 · 4 minute read · Comments
I have never found Core Animation to be an easy framework to grasp so I was interested to see if this book could help. Read on for my review of iOS Core Animation: Advanced Techniques by Nick Lockwood (Published Aug 13, 2013 by Addison-Wesley Professional).
You can develop a lot of iOS apps without ever really being aware of the Core Animation framework. However sooner or later it is something you are going to want to understand. It may start with the desire to round the corners of a view which leads to copying some code from Stack Overflow:
someView.layer.cornerRadius = 10.0f; someView.layer.borderWidth = 5.0f; someView.layer.masksToBounds = YES;
If you want to know why this works and what the CALayer object is doing then this is the book for you. Actually it goes way beyond this trivial use of the framework to cover advanced animation and performance techniques as explained in the preface:
Although no prior knowledge of Core Animation is assumed, this is not merely a cursory introduction to the framework. The aim of this book is to leave no stone unturned when it comes to the Core Animation APIs.
The first section of the book dives deep into the CALayer hierarchy and static content. I read this section pretty much from beginning to end as it provides an excellent foundation to really understanding what Core Animation is. The second section is an exhaustive look at animation and the final section discusses performance. I have never considered myself a Core Animation expert so it was no surprise that I learned a lot from this book and will be referring back to it regularly.
A deeper dive into the book contents:
Section I: The Layer Beneath
The first section of the book introduces the key concepts of the Core Animation framework. It was the section I found most useful in that it finally got me to understand what was going on under the covers.
Core Animation is a compositing engine; its job is to compose different pieces of visual content on the screen, and to do so as fast as possible.
Chapters in this first section cover the layer tree which mirrors the view hierarchy, how to work with and draw directly into the backing image of CALayer and manipulate the geometry of the layer. Visual effects such as rounded corners and drop shadows and transforms are covered but rather than just cut and pasting some code you get to understand how and why these effects work. This section finishes up with details on when to use each of the specialised Core Animation layers such as CAShapeLayer and CATextLayer.
Section II: Setting Things in Motion
After laying down the foundations the middle section of the book covers animation. This starts simple with the implicit animations that you pretty much get for free when changing an animatable CALayer property. The topics progress through explicit animations where you need specific control over the animation of a property, the CAMediaTiming protocol to control the timing of an animation, easing and timer-based animation.
Section III: The Performance of a Lifetime
The final section of the book covers performance and how to use Core Animation efficiently. The chapter on tuning for speed looks at how to determine if an animation is running slowly and what to do to fix it. There is a lot of good practical advice here on how to test and analyse Core Animation with Instruments. Further chapters cover efficient drawing, image IO and layer performance.
This book set out to be a complete guide to Core Animation which given the subject matter could be a difficult read. Luckily I think Nick achieves his aim without losing the reader in too much detail. I learnt a huge amount from this book and if you have any interest in Core Animation I think you will too. It definitely earns a place on my bookshelf. | <urn:uuid:3c441c92-fea9-45a3-9f15-970c6708c6c1> | CC-MAIN-2017-04 | http://useyourloaf.com/blog/ios-core-animation-advanced-techniques/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00034-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.933972 | 789 | 2.140625 | 2 |
Holistic healing seeks to follow a holistic approach, when providing treatment for imbalances in the body and mind, and focuses on a more balanced lifestyle. What sets it apart from the alternative medicine, complementary medicine, and integrative medicine is that that it doesn’t focus solely on physical health, but includes the mind and the soul also. However, it is still the experience of physical discomfort that prompts a person to seek holistic healing treatments. Holistic healing attempts to address all parts of an individual, with a focus on the physical body, where illnesses manifest themselves the most. It is not a band-aid or quick fix cure, rather a constant journey to discover the underlying causes of illnesses, thereby promoting wholeness and a healthier life.
Beyond The Mind-Body Connect
Looking at it in a simplistic way, holistic healing is a lifestyle approach, which seeks to transcend the mind-body connection in finding ways to maintain wellness. It values the overall wellness and “wholeness”. It brings into play physical healing, mental health and wellness, emotional well-being, and spiritual beliefs and values, while healing the person. A holistic approach involves seeking tools that motivate the patients to work towards their desires and find their personal power. Holistic healing places considerable emphasis on personal power, as it believes that the latter has a major role in promoting our wellness and functionality.
Any individual, who desires to find wholeness within his own being, learns over time, the value of tending to relationships, caring for the planet and being thoughtful of the natural environs that surround us. Holistic healing encourages the feeling of compassion for humankind and helps the patient to acknowledge and tolerate the differences amongst the diverse population of humans. It stresses on feeling ‘good’ and ‘complete’ from within and fosters one’s ability to fight the physical forms of illnesses.
Role Of Holistic Healer
Acknowledging the premise that our physical ailments and pains are symptomatic of an internal imbalance, a holistic healer tries to find out the internal causes of imbalances in the mind and body, manifesting themselves as physical illnesses. A continuous abuse of the body through an unhealthy diet, lack of exercise, or too little sleep can be reasons for the illness symptoms you are experiencing. The role of a holistic healer is to identify these underlying causes and work upon them to treat the problem from its root. He/she has to do a complete evaluation of the patient and gather as much information as possible on the latter’s lifestyle. The information becomes the foundation of working out a suitable treatment and lifestyle approach for the patient.
Types Of Holistic Healing Treatments
Holistic healing treatments are mostly “natural” and shun problem-specific approach, in favor of a more holistic one, while combining different natural treatments to deal with the problem. Some of the most popular holistic healing treatments have been listed below.
- Ayurveda medicine
- Natural diet
- Herbal remedies
- Naturopathic medicine
- Energy-based therapies
- Prayerful intention
- Chinese medicine | <urn:uuid:0cd7a043-2c5c-444b-8add-c5a7e06bbb7d> | CC-MAIN-2022-33 | https://lifestyle.iloveindia.com/lounge/what-is-holistic-healing-7233.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00469.warc.gz | en | 0.919847 | 656 | 2.703125 | 3 |
The sheer number of hybrid and electric vehicles on display at the 2010 North American International Auto Show in Detroit certainly illustrates the green commitment of automakers, but other—more significant—environmental improvements will be less noticeable.
“People are ignoring the improvements in overall efficiency," says Morningstar auto analyst Dave Whitson.
Though the Obama administration's stimulus package budgeted $2.4 billion for electric vehicles and demand for hybrids continues to grow, we’re still a long way from steering U.S. drivers away from fossil fuels for good, says Whitson.
Analysts say incremental improvements in existing combustion engine technologies will play an important role, while new technologies gain traction and prove themselves to consumers.
Whitson points to many smaller improvements, such as more aerodynamic design, improved turbochargers and lighter materials that are drawing the industry closer to the administration’s goal to increase fuel efficiency to 39 mpg for cars and 30 mpg for light trucks by the 2016 model year, versus the general 25-mpg standard of today.
These efforts include Ford Motor’s Eco-Boost engines that promise 20 percent greater fuel efficiency via new turbo charge and injection technologies, and GM’s Chevrolet Cruze—planned for the 2011 model year—that Whitson says could achieve 40 mpg with a more efficient gasoline engine, at about half the price of their all-electric Chevy Volt and while approaching competitor’s hybrid models on fuel efficiency.
The Detroit auto show will showcase 20 electric vehicles in its “Electric Avenue” display, but the electric vehicle segment likely won’t be profitable for a long time.
“There are a lot of misconceptions that scale will drive the prices way down,” says Sue Cischke, group vice president for sustainability, environment and safety engineering at Ford, and the firm’s chief sustainability officer, about the battery technologies that typically make up half the cost of electric vehicles.
But even if new battery developments now in the pipeline get costs come down to $400/kwh from the current $700/kwh, Cischke says it’s still expensive.
“Automakers are going to lose money on these,” says Morningstar’s Whitson, about the current generation of lithium-ion battery technologies—available in electric vehicles like GM’s soon-to-be released Chevy Volt and Nissan’s Leaf, which he considers a big limiting factor in terms of profitability and vehicle performance.
Aside from higher upfront cost to consumers, the biggest issue is that current and proposed green drive trains—like hybrids, all-electric, fuel cells, natural gas, biofuel flex-fuel vehicles and even hydrogen—only work in either certain regions of the country or for certain purposes, essentially making them niche products.
Hybrids may work very well in stop-and-go traffic in congested cities but have slow paybacks if used mainly on highways, while electric vehicles have limited ranges and power for heavy loads.
Consumers in smaller urbanized markets with homogenous--and high--gasoline prices, such as Europe and Japan, find these alternative vehicles very attractive because the payback for the owners is quicker and they don’t use their cars the same way Americans do.
Automakers are still crying to create greater appeal, especially in a challenging economic climate.
Ford’s Cischke says a maturing and more savvy consumer base, tougher regulation and volatile gas prices have pushed her firm’s efforts away from the status-symbol marketing of early hybrids, toward ensuring the right customer gets the right car for their needs, at the right price.
Ford now plans to offer Eco-Boost, hybrid and electric drive train options for the Focus family of small cars by 2012.
“We looked very closely at this,” she says about their coming efforts to market green drive trains as just another option that customers can evaluate on price and performance across one vehicle platform. “Not everyone wanted that [green] badge on their chest. Now that challenge is how do you do this more affordably.”
Good or excellent gas mileage is enough for some. According to the Alliance of Automobile Manufacturers, AAM, an organization representing automakers with 80% of the US market, there are currently 180 vehicles offering 30-plus mpg fuel efficiency out of the 1000 vehicle options available to U.S. consumers.
That includes 32 hybrid vehicles, 15 clean diesel vehicles and 90 E85 ethanol-ready flex-fuel vehicles.
Alternative energy vehicles, however, still make up a small portion of the overall U.S. fleet. AAM counts 290,000 hybrids among the 10.6 millions cars and light trucks sold in the U.S. in 2009. Almost half—139,000--were Toyota Priuses.
Morningstar’s Whitson says the US saw “a big shift” to compacts and hybrids when gas prices touched $4-a-gallon in the summer of 2008, but we’ll need to hit that level again to see greater interest in all-electric vehicles or hybrids.
“Everyone is concerned with fuel prices,” says Ford’s Cischke. “However, there isn’t the drive into small vehicles there was two years ago.” But she adds that while a past generation of Americans shied away from smaller cars due to cheap gas prices, today’s younger drivers are looking for more value.
A lack of infrastructure is another limiting factor, whether it’s the recharging stations and electricity transmission needed for electric vehicles, or the additional storage and distribution networks needed for other alternate fuels.
Though critical, that is not the job of automakers. "Our goal is to develop automobiles,” says AAM spokesman Charles Territo, adding that automakers already spend $80 billion on research and development.
While start-up electric automakers like Tesla and new offerings like the Volt and Leaf grab headlines, Territo says greening the nation is about much more than that.
“There is no one silver bullet that will drive our goals in energy security and (controlling) greenhouse gas emissions,” he says. “It’ll take diverse technologies and it’ll take time.” | <urn:uuid:b447c744-1f38-4178-858a-7189a86b364a> | CC-MAIN-2017-04 | http://www.cnbc.com/id/34622187 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00175-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.92996 | 1,310 | 2.375 | 2 |
Cardinal Group offers two types of insulation for use in commercial construction environments. These products can be used alone or in tandem to achieve specific goals of the architect and building owner alike. The products we offer are of the highest quality currently available in the insulation market.
Spray Polyurethane Foam (SPF)
Spray Polyurethane Foam, commonly referred to as SPF, is a spray applied insulation that forms a continuous insulating air barrier. It works on any substrate to which it is applied. Since SPF is applied as a liquid and then expands, it is capable of providing the best possible protection against air infiltration. Additionally, SPF offers the highest R-value per inch of any installed insulation. More importantly, SPF provides a continuous air barrier to seal air infiltration to and from the structure. Air infiltration, according to the U. S. Department of Energy, accounts for up to 40% of the structures energy loss. SPF has also been shown to increase the rack strength of walls and other structural systems to which it is applied. Ultimately, it makes your structure stronger, safer and more durable.
Closed Cell vs. Open Cell SPF
|Highest insulating “R-Value” per inch (> 6.0) – Decreased Operating Costs||Good insulation value (R = 3.5)|
|Low vapor permeability (low perm)||Higher vapor permeability, but controlled|
|Air barrier||Air barrier at full wall thickness|
|Increases wall strength|
|Medium density (1.75 – 2.25 lbs./ft3)||Low density (0.4 – 1.2 lbs./ft3)|
|Absorbs sound, especially lower range frequencies||Best sound absorption in everyday frequency ranges.|
|Lower Yield – Increased Initial Cost||Economical yield|
Cellulose Insulation is made up of roughly 75%-85% recycled paper fiber. Normally, it is predominantly newsprint. However, it may contain other post consumer forms. The balance of the insulation is made up of fire retardants to make the product safe for installation. The R-value of cellulose insulation compares well with other types of low cost insulation at approximately R-3.8 per inch. Cellulose insulation cames in two basic forms: loose fill and stabilized.
Loose fill cellulose is suitable for horizontal applications such as attics, building canopies and the like. As indicated by the name, loose fill is blown in loosely until the cavity is filled to the required depth to obtain the specified R-value.
On the other hand, stabilized cellulose insulation is suitable for both horizontal and vertical applications, including overhead. Stabilized cellulose is spray applied with water and/or adhesives being introduced into the product. These additives are introduced at the gun, directly at the time of application. Thus, the insulation can be applied vertically into cavities without any other support. When the cellulose dries out, the cavity is completely filled with insulation devoid of any gaps. Generally, it outperforms traditional batt insulation.
Thermal & Vapor Barriers
Cardinal also carries a line of cellulose spray-on insulation that can be used as a thermal barrier over SPF insulation. SPF insulation requires a thermal barrier when installed. Typically, sheetrock is used to accomplish this task. However, in large warehouses and areas where the cost for the aesthetic properties are unwarranted, we can install URE-K cellulose thermal barrier over the foam. The URE-K provides thermal barrier characteristics as well as additional sound attenuation which is especially important in large industrial settings.
Additionally, stabilized cellulose insulation can be utilized in our hybrid system. This usually encompasses a minimal pass of 1 inch of closed cell SPF for its air and vapor barrier properties along with high R-value. This is then coupled with the cost savings of filling the balance of the cavity with cellulose insulation. In a typical 2×6 inch wall stud cavity, the resulting R-value is approximately R-24 complete with air barrier, improved rack strength and completely sealed. | <urn:uuid:49dbea72-0c82-414f-90bc-ded2aa8b3d3d> | CC-MAIN-2022-33 | https://cardinalcri.com/insulation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00269.warc.gz | en | 0.92101 | 881 | 1.882813 | 2 |
Date Of Execution: 1 Jan 1706
Execution Place: Tyburn
A Master of Thieves' Slang, who was full of Artful Tricks, which, however, did not save him from the Gallows at Tyburn, where he found himself in 1706
ARTHUR CHAMBERS was of base extraction, and consequently void of education, good manners or any other qualification that was amiable. The first step, in his opinion, to complete him a thorough master in the thieving art was to have at his finger ends all the canting language (which comprehends a parcel of invented words, such as thieves very well know, and by which they can distinguish one another from the other classes of mankind), in order to the attainment whereof he put himself under the direction of an experienced teacher that way; and, what was soon observable, attended so closely to the dictates of his preceptor that he not only outrivalled him but became superior to any of his contemporary thieves.
Chambers quickly demonstrated how pleasing his new language was to him, for he could not enter an ale house but he would be punning with the landlord: indeed his gay apparel (for Arthur could not endure the thought of being called a sloven) very often induced the masters of the houses he frequented to sit down by him and listen to his jocular way of talking. Sometimes, from the ignorance of some of them, he would impudently assert that what he now and then mixed with his ordinary English was the purest Greek in the world, and, to convince them he was sincere in what he advanced, would frequently pull out of his pocket a Greek testament and say: "Sir, this book was made by one of the oldest philosophers; believe me, I have studied it this dozen years, and every moment I looked into it I gained a twelvemonth's knowledge." The landlord would be gazing all the while open mouthed at Chambers, and, to be sure, he on his part was very intent upon something besides his Greek Testament, for, soon after, a general complaint was made of abundance of money being lost; but which way was the question. In Launceston, in Cornwall, whither he went, the inhabitants received him with open arms for a considerable time, and his merry disposition soon procured him the acquaintance of men of note in that country. He had taken care, too, before leaving London, to supply himself with a great number of false crown and half crown pieces, which, on his arrival, he uttered at all the places he frequented; but abundance of persons having been deceived with these pieces, and a general complaint made round about, search was made everywhere for the apprehending of the cheat, and poor Chambers was taken up; the consequence of which was the sending of him to jail, where he remained a year and a half before he could get his enlargement. Cornwall now became too hot for him to stay any longer there; so he made the best way he was able to London, where, on the very first day of his arrival, he performed the most cunning, artful and yet barefaced piece of felony that was ever heard of.
Having alighted from the wagon, he went directly to an ale house in West Smithfield, where, seating himself in a box, and calling for a pint of beer and a slice of bread and cheese, he comfortably refreshed himself; then, falling into discourse with some tradesmen in the next box to him, about the country and quiet enjoyment of a rural life, the talk was insensibly turned upon diving or picking of pockets. "Look ye, gentlemen," said Chambers, "I can pick a pocket as well as any man in Great Britain, and yet, though I say it, am as honest as the best Englishman breathing. For an instance of what I say, observe the country gentleman just now passing by the window. I'll step out and take his watch though it is now scarce five o'clock." A wager of ten shillings was immediately laid that he did not perform it. Chambers answered the bet, and presently, pushing out of the door, made a quick round till he came to the end of Long Lane, where he met with the gentleman, and courteously pulling off his hat to him asked if he could inform him which was the nearest way to Knave's Acre; to which the gentleman replied: "Lackaday, friend, you ask a very ignorant person, for I am a stranger here, and want to know the nearest way to Moorfields." "Oh, Sir, I live there, and can acquaint you which way to take; excuse me, Sir, I would willingly bear you company thither, but extraordinary affairs calling me to find out a place called Knave's Acre I must necessarily be jogging on; but be pleased to take my directions." So saying, he pointed with his hand. "Look you, Sir, you have no other way to go than directly along this lane, which will bring you into a street called Barbican, that into a dirty lane over against it, and that into Chiswell Street, the end whereof will lead you into Moorfields." All this while the country gentleman was staring the way Chambers pointed, who in the interim made sure of his watch, and after the gentleman and he had left one another returned back to the company, laid down the spoil on the table, and claimed the wager which was accordingly paid.
One day, being very well dressed, he goes to the Exchange and mixes with some Italian merchants, and after some little conversation, which ran on trade and shipping, calls one of them aside, who was a very comely and grave person. With him he seems to be in a close and eager dialogue, the merchant all the while nodding and biting his thumb. Meantime one of Chambers's confederates comes up and begins to discourse with the merchant much after the same manner as he had done. Upon which Chambers says: "Sir, I perceive you have no liking to my proposition, but possibly you may not meet with such another bargain as mine I mean as to profit." "No liking!" answered the merchant. "Yes, yes, Sir; I had as lief chap with you as the best man alive, so I find but my advantage in it." Upon this the merchant spoke a few words to Chambers's confederate, and then, calling Arthur to him, said: "Here is another gentleman who has a bargain much like yours to dispose of; if you can join together, we'll throw the commodities together and make but one lot of them." "Agreed," replied Chambers, who without any further ceremony, as the merchant stood close to his confederate, dived nimbly into his pockets and drew thereout a purse of gold and his gold watch, and imperceivably conveyed them to his confederate. But this spoil not satisfying the avaricious temper of our adventurer, and seeing a very good handkerchief hanging out of the merchant's coat pocket, he snaps at it, but unluckily for his first prize. The merchant, it seems, caught him in the act; and seizing him by the collar, called out, "Thief! thief!" which words raised abundance of persons then on the walks about them, and everyone was desirous to know the bottom of the matter. The merchant was for having our adventurer before a magistrate; and he, on his part, strenuously denied the fact (for by this time the purse and watch were found gone), and even threatened the injured tradesman to punish him for defaming his character among the only persons in the world he got his living by. During this contention the confederate, who had received the purse and watch from Chambers, had marched to the porter at the gate, to get proclamation to be made on the Exchange that if any person had lost a purse with gold in it, and a gold watch, on giving the true marks he might have it again. These words reaching the merchant's ears, he, glad of the opportunity of regaining his lost things, let go Chambers, with a thousand excuses for his rudeness and rash accusations, and went directly to the crier; but both Chambers and his confederate procured means of slipping away in the meantime.
This disappointment but the more sharpened the wit and cunning of our adventurer, who was resolved to use his talents (as he called them) to a much better purpose than his last endeavour had produced. To this end he takes a first floor of a house in Soho Square, and contracts with the landlord to pay fourteen shillings a week for the same. For a while good harmony and understanding ruled between Chambers and the gentleman of the house, who took him for a man of fortune, as his dress and expenses might have very well argued him. One evening as they were at supper —- I mean the family of the house our adventurer —- came in, seemingly in a vast uneasiness, which made the good folks importune him to let them know what it was that disturbed him. "I have so much friendship for you, Mr Woodville" , said the landlord (for you must know this was the name he had given himself), "that if I can be of any real service to you, it is but opening your mind to me, and you may depend to find me both your counsellor and benefactor." Chambers, pleased with the landlord's frank kindness, made no further doubt to unravel the great mystery he had at his heart, and thus began: "It is with a thousand struggles of the soul that I find myself obliged to speak. Landlord, I am very sensible of the obligations I already owe you, and that thought makes me decline being any further burthensome to you; you must know, then, that, having been at Hampstead this afternoon, where I frequently used to go to divert myself with an affectionate brother of mine, I was there a mournful spectator of his death. 'Tis too much for me" (here he pretended to weep) "to acquaint you with every sad particular about the struggles he had before his soul departed out of his body; let it suffice to say that he has left me heir to his possessions (but his life would have been of greater value to me), and in his will appointed me to inter him in the cloisters in Westminster Abbey. Now, Landlord, the favour I have to desire of you is, for convenience of his funeral, to have his body brought here, and carried hence to his grave."
These last words Chambers pronounced with a deep groan, which made the landlord and all the family compassionate towards him; they told him anything they had was at his service, the landlord left him at his own liberty to bring the corpse, and choose whatever room he pleased to place it in. He thanked him for his civility, and told him he would certainly repay it very shortly, in a way he should be very sensible of. Which indeed he was as good as his word to perform. Chambers accordingly went out the next morning, leaving word that the hearse with the corpse would be with them about six in the evening. And true was he to his word. For just upon six o'clock a stately hearse with six horses arrived at the door, and men, suborned to this end, took thereout a beautiful coffin, with fine hinges and nails, wherein our adventurer had put himself, there being private holes in the sides for respiration. The counterfeit load was straightway borne up one pair of stairs and placed on a table in the dining room, where the landlord, to grace the deceased brother of his lodger, had set out a very fine and rich sideboard of plate, besides other valuables. You must know Chambers was laid in the coffin in his clothes, and a winding sheet wrapped round him, and one of his confederates had taken care to draw the screws. All this time our adventurer was missing, which made the landlord ask the fellows where he was, who said he had bade them acquaint him that having a multitude of things to dispatch about the funeral, it was probable he might not come home that night, but should be obliged to stay with a friend of his in the Strand. The landlord took the excuse for granted, the hearse and men departed, and the family of the house, excepting the maid, at their usual hour went to bed, leaving Chambers to rise out of his silent mansion of death and perpetrate his villainous design.
Accordingly he gets out, with his winding sheet about him, and going downstairs places himself in a chair over against where the maid was sitting, who, hereby frightened at the apparition, as she thought, screamed out, "A ghost! a ghost!" —- and without speaking another word ran as fast as she could up into her master's chamber and told him and his wife the story. "A ghost!" says the master; "phoh, you fool, there's no such thing in nature; you have been asleep, woman, and waking suddenly have fancied you saw a thing there never was." Scarce were these words out of the mouth of the landlord when in steps, with a solemn tread, our adventurer, Chambers, in his winding sheet, and presenting himself and his face, which was covered over with flour, full to the maid, the landlord and his wife, sets himself down in a chair in the room, where he continued full half an hour, putting the above three persons into the greatest panic in the world all the time. After which the imaginary ghost stalks downstairs and opens the door to six of his accomplices, who, while their director, Chambers, raps the doors to drown the noise of more persons being in the house than himself, strip the dining room of all the plate and other rich furniture therein, and then, making a general search through out the other chambers and the kitchen below, rifle and carry off everything of value to the amount of six hundred pounds. All this while the family, believing a spirit was actually in their house, and making the horrid noise they heard, kept close hid under the bedclothes; but the dawn of day soon appearing, their fears began to abate. Where upon the maid gets up, and has the courage to go down and see the consequences of the late bustle. She finds all her pots and pans removed effectually out of the way, and a dreadful havoc made among the pewter, which, to the very last plate, has all vanished. She hastens to her master, who is still in bed, acquaints him with the spirit's having robbed the house, and tells him that she cannot in conscience live with him any longer, since a bad and thieving ghost visited his family, which proved that his house was not a good one, nor were the persons that composed his family fit to be lived with. Whereat the landlord could not forbear bursting out into an extreme laughter: "Why, thou silly jade, can it be supposed that ghosts, or spirits, who have neither flesh, blood nor bones, can rob? Phoh, banish thy foolish conceits, and let me come and see what has been a working all this night." The maid, displeased with her master's words, goes downstairs, and finding some of her fellow servants and neighbours about the door tells them what she had seen; whereat all seem astonished, and say they should not dare to stir an inch out of their houses in the night if the case was so as she related it. Meantime the landlord had roused his indolent body from his bed and made a strict search in those places where he thought the most valuable part of his movables lay, which he found entirely conveyed away; but coming into the dining room, and seeing the plate gone, and an empty shell of a coffin, he, too late, is made sensible of the imposition, which we will leave him to mourn, or banish the thoughts of, just as he pleases.
Chambers during a few years committed actions the most daring and artful that were ever known, and he received a just recompense for his ill spent life at Tyburn in 1706. | <urn:uuid:b4f3d781-8edc-4fe6-aaa7-af8b83e2c546> | CC-MAIN-2022-33 | http://www.britishexecutions.co.uk/execution-content.php?key=1850&termRef=Arthur%20Chambers | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00666.warc.gz | en | 0.9911 | 3,375 | 2.25 | 2 |
Nearly two years ago, I wrote that while the Web has a future, it may not have a past. Exhibit A in my argument was the lamentable state of Jeff Jarvis’s influential blog, BuzzMachine. Started in the aftermath of 9/11, its archives offer an invaluable chronicle of the development of new media in the 21st century. But as I noted, trying to dig through those archives was nearly as arduous as excavating Troy. Links to the first few years of posts were hard to find, and when you did, they were encrusted with spam advertisements.
A year and a half later, thanks to son Jake Jarvis, the archives have been restored. Though it means quite a few of the links in my article have been broken, I’m happy at how easy it now is to read through those early posts. True, they don’t have the original look and feel, and they have squirreled away somewhere the ominous old blog title, “WarLog: World War III.” But you can always find samples of the original on the Internet Archive.
In all, it’s a good day for the history of the Web, one I wasn’t sure was coming. Now if Filloux will just correct that typo…. | <urn:uuid:05610ba5-efd4-4959-afd5-eaa761458c12> | CC-MAIN-2017-04 | http://www.b2bmemes.com/2012/04/16/jeff-jarvis-strikes-a-blow-for-web-history/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00235-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.976716 | 266 | 1.523438 | 2 |
(The Hosting News) – A number of government agencies including NASA are listed among the victims of an alleged hacktivist breach leaking data pertaining to 1.6 million accounts.
Team GhostShell has taken responsibility for an operation acquiring info such as passwords, usernames, emails, phone numbers and more.
Aside from NASA’s Center for Advanced Engineering, others affected included the FBI, the Federal Reserve, police organization Interpol and DHS.
Team Ghostshell is loosely affiliated with Anonymous and their latest operation was carried out under the name “Project White Fox”.
“#ProjectWhiteFox will conclude this year’s series of attacks by promoting hacktivism worldwide and drawing attention to the freedom of information on the net. For those two factors we have prepared a juicy release of 1.6 million accounts/records from fields such as aerospace, nanotechnology, banking, law, education, government, military, all kinds of wacky companies & corporations working for the department of defense, airlines and more,” stated the hacking group via Pastebin.
According to a report from PCWorld.com, Team GhostShell earlier this year carried out prominent attacks on websites mostly based in China. Later, they were instrumental in leaking data from top universities including Princeton, Harvard and Cambridge.
The Credit Union National Association, another one of the hacking victims, appeared to confirm the breach, yet denied sensitive data was taken. “We don’t save any information about credit union members on our website,” remarked a representative in PCWorld’s report. The spokesperson went on to note, “We’re a trade association. We exist for the institutions that are credit unions, not the credit union members.”
Hacktivism has grown increasingly larger as a movement within the past two years with groups including Anonymous heading the effort. | <urn:uuid:24d401b9-6ff7-412d-96a0-323ea52543d6> | CC-MAIN-2017-04 | http://www.thehostingnews.com/nasa-dhs-federal-reserve-included-in-alleged-breach-26875.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00158-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.946468 | 383 | 1.59375 | 2 |
Changing Your Air Filter
Your engine air filters should be replaced between 15,000 and 30,000 miles, depending on your driving conditions. If you have a turbocharged engine or drive on unpaved roads, you will likely need to change it more often. Even if you dont drive a lot, your air filter should be replaced every three years as it can become brittle as it ages.
In order to replace your air filter, keep your vehicle on a dry, flat surface and locate the air filter housing and open ityou may need a screwdriver from your household toolkit. Remove the old air filter, along with any debris. Note how the older filter is installed so you can do the same thing when installing the new air filter. Match the direction and placement of the old housing once you install the new filter and you are done.
Winter Tires Or Snow Tires
If you live in a climate where the temperature regularly drops below 45°F/7.2°C or in an area where snow and ice linger for months on end then a set of winter tires, also known as snow tires, is likely a wise choice to get you through the snowy season. Snow tires are specifically engineered to perform in wintery conditions, equipping you the traction, grip and control that summer tires simply arent built to provide. The special rubber compounds in winter tires stay softer and more pliable than summer or all-season tires in frigid conditions, giving you a better grip and superior braking ability.
Another key difference is in winter tires physical design look closely, and youll notice that they feature hundreds of small cuts in the rubber, called sipes, which create tiny edges that provide increased traction by gripping and grabbing wet, icy and snowy roads. Couple those sipes with deep grooves and channels in the tread that are meant to dissipate water, slush and snow, and its clear to see why winter tires provide the utmost traction and peace of mind when frigid conditions arrive.
Raise The Car With The Jack
Underneath your car, there will be specific jack points designed to accommodate the jack. They are usually marked with arrows. Place the jack under the jack point nearest the flat tire and turn the crank to raise the car. Stop as soon as the flat tire is off the ground its not usually necessary or helpful to use the full height of the jack.
Don’t Miss: Who Accepts Carcareone Credit Card
What Type Of Roads
Different usage conditions require different tire characteristics.
For mainly city driving, look for:
- Braking distance: Use tires with the optimum braking distance, on both dry and wet roads.
- Longevity: City driving with its numerous stops and starts puts great demands on the tire. Choose tires with increased longevity.
- Fuel economy: Tires with low rolling resistance save fuel.
tip2 environment 680
For mainly road or highway driving, look for:
- Braking distance at high speed: For maximum safety, select tires that provide optimum braking distance on both dry and wet roads.
- Comfort: For long trips, choose tires that offer comfort both in terms of vibration and noise level.
- Handling: Select tires that provide excellent grip and stability.
If you drive on unpaved roads:
- Look for tires that provide off-road traction and maximum durability.
What Should My Tire Pressure Be
The correct air pressure is determined by car manufacturers and tire makers. You can consult a tire pressure chart usually located in the car’s door jamb or sometimes in the trunk, but always in your owner’s manual to find the right tire pressure for your tires. Tire pressure depends on the type of vehicle you have, the type of tire and the load. You should check your tire pressure regularly, especially before you take any long trips.
Don’t Miss: How To Measure Car Speakers Size
When Changing Your Tire Size Might Be Acceptable
It’s possible to change the size of your tires without actually changing the diameter. One example is if you want larger rims – you can buy tires that compensate for the larger rims by reducing the “height” of the outer tire. This is why the tires of cars with large rims have a much thinner “band” of rubber along the outside of the tire.
Other times you might want to change the size of your tires is when the factory-recommended size is rare and you want to find a more affordable option. Generally, you don’t want to go with tires that have a diameter that is more than 3% different from the factory tires. It’s also a good idea to consult with a trusted mechanic before switching to larger or smaller tires.
Where To Find A Car Tire Size
No matter what vehicle you drive, finding the manufacturer-recommended tire size should be easy. The best place to start looking is the owner’s manual.
Don’t worry if you can’t locate the manual you may also find a tire fit guide in these locations:
- The driver’s side door jamb
- Inside your glove box door
- Within your gas tank hatch
You can also find tire size data on the sidewall of your current tires . However, no matter where you find your tire size, you will have to decipher a sequence of numbers and letters. Don’t worry if it looks confusing at first â every letter and number has a straightforward meaning. Let’s break down how to read car tire size.
Read Also: Who Accepts Synchrony Credit Cards
Why Are These Numbers Important
Obviously, tires have to fit on the wheels, so the width is critical, but less obvious is the effect on various systems in your Toyota. If your car is specified to ride on P225/65R17 tires, changing to P225/55R17 which has smaller sidewalls will throw off your speedometer, which was calibrated based on the diameter of the P225/65R17 tires. Its also important to choose tires with similar or higher load and speed ratings to avoid the risk of a blowout due to under-rated tires.
Finally, getting the speed rating right is important because tires are under extreme stress when rotating at high speeds. The combination of centripetal force and centrifugal force is an important consideration for an engineer who is selecting tire speed ratings.
Shopping for new tires can seem to bring about a bewildering array of numbers and ratings and symbols, but understanding the basics and consulting with your certified Toyota technician will help clear up all confusion.
As the only interface between your Toyota and the road, tires are arguably the most critical wear item on any vehicle. Since each tires contact patch on the road is about the size of your hand, getting the right tire for the job is important.
How Do I Tell Wheel Size
If youre looking to learn the diameter of your stock vehicle wheels sometimes thought of as wheel height, or how tall the wheel is the easiest method is to review your tire size information.
The final number in your tire size denotes both tire and wheel size. In the diagram just below, the size is 17 which translates to 17″. This tire is fitted to a 17″ wheel.
Determining wheel width is a bit trickier. The tire section width, which is the first number in the tire size sequence and expressed in millimeters , hints at the wheel width, but does not give a certain or conclusive answer. This is because any given wheel width can accommodate more than one tire width. A 225 millimeter section width tire, for example, can be fitted to an 8″ or 8.5″ wide wheel.
To determine wheel width and the full specification details of your stock wheels, the dealership service department is often a good resource. Then with the full stock wheel specification in hand you can look for equivalents or close matches.
You May Like: Repairing Cigarette Burns In Car
Extend The Life Of The Vehicle
With a regular schedule, you are able to keep many vehicle problems at bay. When using your car, the last thing you want is for your car to break down, and regular maintenance can help you avoid costly breakdowns. This also keeps your cars value higher, because one of the first things people look for when buying a car is the internal condition.
Youre Our First Priorityevery Time
We believe everyone should be able to make financial decisions with confidence. And while our site doesnt feature every company or financial product available on the market, were proud that the guidance we offer, the information we provide and the tools we create are objective, independent, straightforward and free.
So how do we make money? Our partners compensate us. This may influence which products we review and write about , but it in no way affects our recommendations or advice, which are grounded in thousands of hours of research. Our partners cannot pay us to guarantee favorable reviews of their products or services.Here is a list of our partners.
Don’t Miss: How Much To Register A Car In Ca
Passenger Touring Vehicles: Sedans Cuvs & Minivans
The tires designed for this particular class of vehicles are generally engineered to deliver a smooth and quiet ride, reliable all-season traction, and a long lasting tread life. Luxury vehicles that fall into the passenger touring category can find luxury tire options in both the all-season touring and grand-touring categories. While most cars in this segment will conform to these types of tires, some vehicles are modified for enhanced performance, and will need more performance from their tires.
Tip #: Put It All Together: Understanding What Where & How You Drive
In addition to considering your vehicle type and the climate you typically drive in, think about the type of roads you frequently use and how you like to drive. Are you an avid off-roader that yearns to pioneer new paths? A sports car enthusiast with an itch for speed? A highway commuter that needs to maximize fuel efficiency? Each of these drivers could benefit from a different type of tire, despite their vehicle type. For example:The avid off-roader…needs a tire that can handle dirt, gravel, stone, sand and more, and may want a bigger tire with stiffer sidewalls and a wide tread pattern to help prevent punctures and maintain stability in uneven road conditions.The sports car enthusiast…needs a tire that’s ready for tight turns and quick acceleration, and may want a tire that has high-speed capabilities and special heat-resistant rubber.The highway commuter…needs a tire that’s reliable, comfortable, and efficient, and may opt for a fuel-efficient low rolling resistant tire.Contact an auto care expert at your local Tires Plus for help selecting the tire that’s right for you, or get started by browsing tires that fit your vehicle. Refine your search by brand, price, type, rating, mileage warranty, and more! You’re only a few clicks away from finding the tire that’s perfectly suited for you and your vehicle.
Recommended Reading: Fastest Jdm Car In Forza Horizon 4
Understanding Tire Load Index
Just after the tire size are some more numbers, commonly 100T. The 100 is the tires load index, and in the case of 100, it means by itself a properly inflated tire can hold up 800 kilograms . Four tires can hold 3,200 kilograms, which for many vehicles provides plenty of capacity for holding up the vehicle and anything that might be inside.
With each increase by one, such as 100 to 101, you would increase the load capacity of the tire by 25 kg .
Tip #: Know Your Vehicle Make Model & Tire Size
Whatever your vehicle type, you can guarantee there’s a tire that’s built for it. Narrow your search by only comparing tires that fit your vehicle. Check your owner’s manual for tire recommendations, or use our handy widget to narrow your search by vehicle type. Some drivers choose to replace their tires with tires of the same size, as your owner’s manual likely recommends. Other drivers prefer to upsize or downsize their tires. A driver may select a lower profile tire in order to improve the handling and stability of their car, especially if they drive a smaller vehicle. Other drivers upsize their vehicle’s tires to improve the vehicle’s overall appearance or to maximize the vehicle’s load carrying capacity. Upsizing is most commonly seen on trucks and SUVs. If you’d like to explore the different tire possibilities for your vehicle, give your local Tires Plus a call and talk to one of our certified technicians. They know tires!
Read Also: Average Commision For Car Salesman
Checking For Tire Recalls
The DOT regulates tire production and sales and tracks complaints about brands and tire models. Sometimes, regulations require a manufacturer to recall defective tires and repair or replace them.
Use our research tool to check for any manufacturer recalls on your car. Recall repairs are always free.
Many cars may be subject to a recall at some point in their lives. By law, manufacturers reach out to owners by mail to notify them of recalls. However, they dont necessarily have accurate addresses for everyone.
Locate The Tire Section Width
The section width is the number that comes immediately after the service type in a three-digit number. The section width indicates the tires overall width when it is mounted on a properly-sized wheel. It is measured by the widest point of the inner sidewall to the widest part of the outer sidewall. Wider tires will generally give more traction for the vehicle, but can be heavier and cause more fuel consumption.
Step 1: Read the first set of numbers after the letter. It will be three digits and is a measure of your tires width in millimeters.
For example, if the tire size is P215/55R16, the section width of the tire is 215 millimeters.
Don’t Miss: Who Owns Avis
Tire Pressure And Tread Depth
Since well-maintained tires are integral to a safe, fuel-efficient ride, make it a habit to visually inspect your tires often. Check the pressure in your tires every month, and before long trips or carrying extra load. Donât forget the spare. A tire pressure gauge will be needed to check your tire pressure. Also, during the colder months, note that tire pressure drops one pound with every 10 degree decrease in pressure. Your ownerâs manual will tell you how much air pressure your tire needs. You can check your tread depth using the simple penny method.
How To Choose Tires
What should you think about when choosing a tire?
Once you know what size tires can fit your car, you need to be able to choose among the different types of tires. Tires may look similar, but they can be optimized to perform for very different conditions and usages.
Think about the following things:
Read the rest of our tips to dive deeper into each question.
tip what should i think about when choosing a tire 680
Read Also: How To Keep Squirrels Out Of Your Car Engine
Determine The Service Type
The service type tells you what type of vehicle the tire is manufactured for. For example, some tires are designed for passenger cars, while others are designed for larger trucks. The service type is indicated by the preceding letter on the tire size and is marked on the tires sidewall.
While the service type isnt a measurement, it does help with finding the correct tire size for your car. There are differences that are tied to service type, such as the tread depth and how many plies are used to manufacture the tire, but these numbers arent used in determining the overall tire size.
Step 1: Locate the group of numbers on the side of your tire. The group of numbers is the tire size, indicated in a format such as P215/55R16.
Step 2: Determine the preceding letter on the tire size. In this example, the P is the service type indicator.
The letter tells you what category of vehicle the tire is designed for. Here are the possible letters that you will see for the tire service type:
- P is for a passenger car
- C is for a commercial vehicle
- LT is for light truck
T is for a temporary tire or spare tire
Note: Some tires dont come with a service type letter. If there isnt a service type letter, this indicates that the tire is Metric size. You will most typically see this type of tire for European cars.
New Tire Buying Guide: Everything You Need To Know
Follow this guide to make the right choice when you’re replacing or upgrading your car’s tires.
Buying new tires can be a daunting experience. You face a bewildering array of brands, sizes and tire types to choose from, so it’s easy to be confused. But don’t worry: this guide will provide you with the essential facts you need to in order to make the right tire choice for your vehicle at the price you want to pay.
Before you buy, you’ll need to know the answers to the following questions:
- What type of tires does my car need?
- How many miles will the tires I’m considering last?
- How much do I want to pay?
- Should I go with a straight replacement set or upgrade my tires?
Already know about tires and just want our top picks? Our favorites in each category are listed below. Further down, you’ll find more information about all-season, summer, and winter tires plus our top alternative picks in each category.
Recommended Reading: How To Notarize A Title In Az | <urn:uuid:817af550-ebaf-411e-9be9-3907483b11dd> | CC-MAIN-2022-33 | https://www.carproclub.com/what-kind-of-tires-does-my-car-need/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz | en | 0.93307 | 3,677 | 2.296875 | 2 |
How Hydroelectric Energy Works
By taking advantage of gravity and the water cycle, we have tapped into one of nature's engines to create a useful form of energy. In fact, humans have been capturing the energy of moving water for thousands of years. Today, harnessing the power of moving water to generate electricity, known as hydroelectric power, is the largest source of emissions-free, renewable electricity in the United States and worldwide.
Although the generation of hydropower does not emit air pollution or greenhouse gas emissions, it can have negative environmental and social consequences. Blocking rivers with dams can degrade water quality, damage aquatic and riparian habitat, block migratory fish passage, and displace local communities. The benefits and drawbacks of any proposed hydropower development must be weighed before moving forward with any project. Still, if it's done right, hydropower can be a sustainable and nonpolluting source of electricity that can help decrease our dependence on fossil fuels and reduce the threat of global warming.
The hydropower resource
On Earth, water is constantly moved around in various states, a process known as the hydrologic cycle. Water evaporates from the oceans, forming into clouds, falling out as rain and snow, gathering into streams and rivers, and flowing back to the sea. All this movement provides an enormous opportunity to harness useful energy.
In 2011, hydropower provided 16 percent of the world’s electricity, second only to fossil fuels. Worldwide capacity in 2011 was 950 gigawatts (GW), with 24 percent in the China, eight percent in the United States, and nine percent in Brazil . Globally, hydroelectric capacity has more than doubled since 1970.
In the United States, hydropower has grown steadily, from 56 GW of installed capacity in 1970 to more than 78 GW in 2011 . However, as a percentage of total U.S. electricity generation, it has fallen from 12 percent in 1980 to 7 percent in 2012, largely as a result of the rapid growth in natural gas power plants and other renewable energy technologies such as wind and solar .
Since hydropower depends on rivers and streams for generation, the potential to use hydropower as a source of electricity varies across the country. For example, the Pacific Northwest (Oregon and Washington) generates more than two-thirds of its electricity from hydroelectric dams . The Grand Coulee dam on the Columbia River in Washington is one of the largest dams in the world, with a capacity of more than 6,750 megawatts (MW).
In addition to very large plants in the western states, the United States has many smaller hydropower plants. In 1940 there were 3,100 hydropower plants across the country, though by 1980 that number had fallen to 1,425. Since then, a number of these small plants have been restored; as of 2013, there were 1,672 hydro plants (not including pumped storage) in operation . These plants account for only a tiny fraction of the dams that block and divert our rivers.
Converting moving water to electricity
In order to generate electricity from the kinetic energy in moving water, the water has to move with sufficient speed and volume to spin a propeller-like device called a turbine, which in turn rotates a generator to generate electricity. Roughly speaking, one gallon of water per second falling one hundred feet can generate one kilowatt of electricity.
To increase the volume of moving water, impoundments or dams are used to collect the water. An opening in the dam uses gravity to drop water down a pipe called a penstock. The moving water causes the turbine to spin, which causes magnets inside a generator to rotate and create electricity.
There are a variety of types of turbines used at hydropower facilities, and their use depends on the amount of hydraulic head (vertical distance between the dam and the turbine) at the plant. The most common are Kaplan, Francis, and Pelton wheel designs. Some of these designs, called reaction and impulse wheels, use not just the kinetic force of the moving water but also the water pressure.
The Kaplan turbine is similar to a boat propeller, with a runner (the turning part of a turbine) that has three to six blades, and can provide up to 400 MW of power. The Kaplan turbine is differentiated from other kinds of hydropower turbines because its performance can be improved by changing the pitch of the blades. The Francis turbine has a runner with nine or more fixed vanes. In this turbine design, which can be up to 800 MW in size, the runner blades direct the water so that it moves in an axial flow . The Pelton turbine consists of a set of specially shaped buckets that are mounted on the outside of a circular disc, making it look similar to a water wheel. Pelton turbines are typically used in high hydraulic head sites and can be as large as 200 MW.
Hydropower can also be generated without a dam, through a process known as run-of-the-river. In this case, the volume and speed of water is not augmented by a dam. Instead, a run-of-river project spins the turbine blades by capturing the kinetic energy of the moving water in the river. Hydropower projects that have dams can control when electricity is generated because the dams can control the timing and flow of the water reaching the turbines. Therefore these projects can choose to generate power when it is most needed and most valuable to the grid. Because run-of-river projects do not store water behind dams, they have much less ability to control the amount and timing of when electricity is generated.
Another type of hydropower technology is called pumped storage. In a pumped storage plant, water is pumped from a lower reservoir to a higher reservoir during off-peak times when electricity is relatively cheap, using electricity generated from other types of energy sources. Pumping the water uphill creates the potential to generate hydropower later on. When the hydropower power is needed, it is released back into the lower reservoir through turbines. Inevitably, some power is lost, but pumped storage systems can be up to 80 percent efficient. There is currently more than 90 GW of pumped storage capacity worldwide, with about 20 percent of that in the United States. The need to create storage resources to capture and store for later use the generation from high penetrations of variable renewable energy (e.g. wind and solar) could increase interest in building new pumped storage projects .
Environmental and societal concerns
While hydropower generation does not emit global warming gasses or other air pollutants, the construction and operation of hydropower projects can have environmental and societal consequences that greatly depend on where the project is located and how it is operated.
Dams that have flooded areas with live vegetation can emit methane, a powerful global warming gas, as that organic material decomposes. For example, the Tucurui dam in Brazil created a reservoir in the rainforest before clearing the trees. As the plants and trees began to rot, they reduced the oxygen content of the water, killing off the plants and fish in the water, and released large quantities of methane.
Hydropower projects can reduce the flows in rivers downstream if the upstream flows are trapped behind a reservoir and/or diverted into canals that take the water off stream to a generation unit. Lowering the flows in a river can alter water temperatures and degrade habitat for plants and animals. Less water in the river can also reduce oxygen levels which damage water quality.
Water is typically stored behind a dam and released through the turbines when power is needed. This creates artificial flow patterns in the downstream river that may be very different from the flow patterns a river would naturally experience. For example, rivers fed mostly by snowmelt may experience much higher flows in the winter and spring than the summer and fall. Hydropower operations may differ from these natural flow patterns, which has implications for downstream riparian and aquatic species. If water levels downstream of a hydropower project fluctuate wildly because of generation operations, fish could be stranded in suddenly shallow waters. If operations cause a more static flow schedule throughout the year than what the river would normally experience, the movement of sediment along a river section could be disrupted, reducing habitat for aquatic species. Fewer seasonal flow events could also cause a riparian corridor to thicken into a less dynamic channel as saplings that would usually be seasonally thinned by high flows are able to mature.
Dams can also block the migration of fish that swim upstream to reach spawning grounds. In the Pacific Northwest and California, large dams have blocked the migration of coho, chinook, and sockeye salmon from the ocean to their upstream spawning grounds. The number of salmon making the journey upstream has fallen 90 percent since the construction of four dams on the lower Snake River. Some steps are being taken to move fish around the dams, such as putting them in barges or building fish ladders, but success has been limited. Downstream fish passage can also be a challenge since young fish can be chewed up in the turbines of the dam as they head towards the ocean.
The flooding of land to create reservoirs can also eliminate areas where people live or grow crops. The Balbina dam in Brazil, for example, flooded 2,360 square kilometers, an area the size of Delaware . Population density is typically higher along rivers, leading to mass dislocation of urban centers. The Three Gorges Dam in China dislocated nearly 1.2 million people .
Wildlife habitats destroyed by reservoirs can be especially valuable. In South America, 80 percent of the hydroelectric potential is located in rain forests, one of the most rich and diverse ecosystems on Earth. The Rosana dam in Brazil destroyed one of the few remaining habitats of the black-lion tamarin, a rare and beautiful species of long-haired monkey.
In the United States, most non-federal hydropower plants are required to obtain an operating license from the Federal Energy Regulatory Commission (FERC). These licenses, which govern the operations of a plant for 30 to 50 years, play a large role in determining how a hydropower facility’s operations impact local environmental, cultural, and recreational resources. Therefore, the re-licensing process is an important opportunity to reassess and adjust, if necessary, the operations of a project to better align itself with the current needs and values of the environment and the public. Hydropower re-licensing processes across the country have resulted in increased flows to support aquatic and riparian habitats, better access and services to support public recreation on rivers, and protection of cultural heritage sites .
Low impact hydropower
While hydropower operations can cause negative environmental impacts, the way a project is operated can make a big difference in its degree of environmental footprint. Projects can manage flow releases from dams to ensure there is enough water in the river to support native species. Flows can also be scheduled to mimic natural flow patterns, which help transport sediment and mimic biological cues that would have been provided by the natural flow cycle. Retrofitting dams with fish passage equipment and even removing dams in some key river reaches can greatly improve access to upstream habitat.
Hydroelectric facilities that want to reduce their environmental impacts can undergo a voluntary certification program developed by the Low Impact Hydropower Institute (LIHI). LIHI is a nationally recognized independent nonprofit organization dedicated to reducing the harmful impacts of hydropower generation by creating a credible and transparent standard for consumers to use in evaluating hydropower. Through the establishment of the Low Impact Hydropower Certification Program, LIHI certifies hydropower facilities with environmental and social impacts that are low compared with other hydropower facilities based on objective criteria.
To be LIHI-certified, a facility must adequately protect or mitigate its impacts in the following areas: river flows, water quality, fish passage and protection, watershed protection, threatened and endangered species protection, cultural resource protection, recreation, and facilities recommended for removal. The certification criteria are based on the more recent and most stringent mitigation measures recommended for the hydropower project by state and federal resource agencies, even if those measures are not a requirement for operating the facility .
The future of hydropower
Advances in ‘fish-friendly’ turbines and improved data collection techniques to increase the effectiveness of fish passage technologies create exciting new opportunities for the hydropower industry. If constructed and operated in a manner that minimizes environmental and cultural impacts, hydropower projects can provide low-cost, clean sources of electricity to urban and rural areas throughout the world. Harvesting the power from our rivers can be part of a smart and diverse set of solutions for reducing our dependence on fossil fuels, and the impact they have on our climate and public health. The ability to ramp up and down hydropower generation is a valuable source of flexible generation on the electricity grid, which can directly displace coal and natural gas, and help integrate larger amounts of variable renewable energy resources, like wind and solar power.
Since most developed countries have already developed their most accessible areas for large-scale hydropower, growth of these projects will likely be concentrated in nations with growing populations and developing economies. According to the International Hydropower Association, more than 30 GW of new hydropower capacity was commissioned in 2012, with significant investment occurring in South America, Asia, and Africa . In Brazil, three large projects are under construction in the Amazon region totaling more than 22 GW of generation capacity.
The potential to develop new large-scale hydropower projects in the United States is generally low. However, the U.S. Department of Energy and the Oak Ridge National Laboratory released a hydropower mapping tool in 2014 that estimates more than 65 GW of potential new hydropower development across more than three million U.S. rivers and streams that currently do not have hydropower development . The study identified western states, including Alaska, California, Colorado, Idaho, Montana, Oregon, and Washington as having the greatest new hydropower development potential. The study builds upon a DOE-funded study released in 2012 that estimated 12 GW of hydropower potential at the nation’s 80,000 non-powered dams . There is also additional potential to increase electricity generation at existing hydropower projects by expanding storage, upgrading equipment, and increasing efficiency.
International Energy Agency (IEA). 2012. Key World Energy Statistics. Paris, France. Online at: http://www.iea.org/publications/freepublications/publication/kwes.pdf
Energy Information Administration (EIA). 2011. Electric Power Annual. Table 4.3. Existing Capacity by Energy Source, 2011 (Megawatts). Online at http://www.eia.gov/electricity/annual/html/epa_04_03.html
Energy Information Administration (EIA). 2011. International Energy Statistics. Renewables: Electricity Generation: Hydroelectric. Online at: http://www.eia.gov/cfapps/ipdbproject/iedindex3.cfm?tid=6&pid=33&aid=12&cid=US,&syid=1980&eyid=2011&unit=BKWH
Energy Information Administration (EIA). 2012. Electric Power Annual. Table 3.6 Net Generation from Hydroelectric (Conventional) Power. Online at: http://www.eia.gov/electricity/annual/html/epa_03_06.html
SNL data.
U.S. Department of Energy (DOE). Types of Hydropower Turbines. Online at http://www1.eere.energy.gov/water/hydro_turbine_types.html
The Role of Pumped Storage Hydro Resources in Electricity Markets and System Operation. National Renewable Energy Laboratory. May 2013. Online at: http://www.nrel.gov/docs/fy13osti/58655.pdf
Fearnside, Phillip M. 1989. Brazil's Balbina Dam: Environment versus the legacy of the Pharaohs in Amazonia. Environmental Management, July/Aug 1989, Volume 13, Issue 4, pp 401-423.
International Rivers. Online at http://www.internationalrivers.org.
Hydropower Reform Coalition. Online at http://www.hydroreform.org.
Low Impact Hydropower Institute. Online at http://www.lowimpacthydro.org.
International Hydropower Association. 2013 IHA Hydropower Report. Online at http://www.hydropower.org/report.
U.S. Department of Energy (DOE). New Stream-reach Development Resource Assessment. Online at http://nhaap.ornl.gov/nsd.
U.S. Department of Energy (DOE). An Assessment of Energy Potential at Non-Powered Dams in the United States. April 2012. Online at http://energy.gov/sites/prod/files/2013/12/f5/npd_report_0.pdf. | <urn:uuid:eef253bb-a1a5-4ad6-801a-77a417023e3b> | CC-MAIN-2017-04 | http://www.ucsusa.org/clean_energy/our-energy-choices/renewable-energy/how-hydroelectric-energy.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00392-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.930022 | 3,503 | 4.1875 | 4 |
Master American English and communicate with confidence
As an experienced student of English, you know the language can be a tricky one to learn with its complex grammar and its many "exceptions to the rule" rules.
Written by ESL guru Mark Lester--author of Grammar and Usage in the Classroom--this authoritative reference unravels these mysteries so you can take your English-language skills to the next level. You'll gain the confidence to speak English in any setting: in the workplace, at school, in social situations, and at home.
Master those troublesome subjects that baffle even native speakers of English:
articles * determiners * predicate adjective complements * post-noun modifiers * conjunctions * word order * verb tenses * modals * noun clauses | <urn:uuid:46f7f54c-67ba-4975-bc44-4a07b48719b7> | CC-MAIN-2016-44 | https://www.qbd.com.au/mcgraw-hills-essential-esl-grammar/mark-lester/9780071642347/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00497-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.919374 | 155 | 2.609375 | 3 |
Critical flicker frequency (CFF) of 40 men, 20 mentally retarded whose mean age was 22.0 yr. and 20 normal whose mean age was 21.5 yr., was measured under binocular viewing using the Lafayette Visual Perception Control with a display unit. Subjects had been previously tested for visual acuity and color blindness. Analysis showed a significant difference in… (More)
Three questions drawn from parental acceptance-rejection theory were addressed: (a) Are children's perceptions of parental acceptance transnationally associated with specific personality dispositions? (b) Are adults' remembrances of parental acceptance in childhood transnationally associated with these personality dispositions? and (c) Do relations between… (More)
The data for the Ebola outbreak that occurred in 2014-2016 in three countries of West Africa are analysed within a common framework. The analysis is made using the results of an agent based Susceptible-Infected-Removed (SIR) model on a Euclidean network, where nodes at a distance l are connected with probability P (l) ∝ l −δ in addition to nearest… (More)
We study the statistics of citations made to the indexed Science journals in the Journal Citation Reports during the period 2004-2013 using different measures. We consider different measures which quantify the impact of the journals. To our surprise, we find that the apparently uncorrelated measures, even when defined in an arbitrary manner, show strong… (More)
We study the statistics of citations made to the top ranked indexed journals for Science and Social Science databases in the Journal Citation Reports using different measures. Total annual citation and impact factor, as well as a third measure called the annual citation rate are used to make the detailed analysis. We observe that the distribution of the… (More)
To assess the relation between perceived parental control during childhood and sexual preferences of offspring during adulthood, 80 adult offspring of heterosexual orientation reported significantly lower parental control during childhood than 7 adult offspring with nonheterosexual orientation. | <urn:uuid:68e54dab-5325-4513-9e76-b66d8b1e6381> | CC-MAIN-2017-04 | https://www.semanticscholar.org/author/Abdul-Khaleque/2204344 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00099-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.925272 | 407 | 1.78125 | 2 |
Abortion Health Risks
- Self guilt – Depression – Repression of personality development
- Denial – Sleep disorder
- Suicidal ideation – Post Abortion Syndrome
- Substance abuse –
- Uterine perforation
- Ectopic pregnancies
- Infection – Infertility
- 30% elevated overall risk of breast cancer after 1st abortion
- subsequent birth prematurity
Below video – Hush – Cancer – Preterm Birth risk from Abortion
What Happened to Abortion Statistics?
Statistics Canada has lost credibility that reflects poorly on the democratic process that every Canadian holds dear. They have stopped reporting abortion statistics and the Canadian Institute for Health Information (CHHI) and the Abortion Rights Coalition of Canada produce them for the most part. There are huge gaps in their reporting as some provinces do not disclose any information or incomplete information regarding abortions in hospitals and clinics. CIHI has explored using fee-for-service (FFS) payments to produce more comprehensive induced abortion statistics but it varies significantly across the provinces and territories.
An abortion survey from the Canadian Institute for Health Information was purchased through Statistics Canada in 2007, showing 401 abortions past 21 weeks gestation. The numbers are suppressed as some procedures are marked as (X) and gestational unknown numbers total over half of the overall abortions that year. This excludes Canadian women going to the U.S. for late-term abortions.
These findings show the appearance of a decline in abortion numbers not to mention the number of abortions that are reported as something other than an abortion. Sloppy reporting sends a signal the issue of the destruction of preborn human beings is less and less significant. +
The Down-side of Assisted Suicide.
Everyone has the right to die with dignity. Human beings unlike animals have the ability to reason. This power allows one to choose natural death without the use of extraordinary means. No one needs to be kept alive artificially. Any medical doctor can attest that pain control is almost completely available and completely effective.
Most people accept the Spiritual element to human life that death is dignified through the belief that redemptive suffering has value in all circumstances. Canadian values were founded on Christian principles that clearly define that killing another human being or assisting the killing are morally wrong. A supreme court decision to change this truth does not make it OK.
Should doctors have the right to help someone die or lethally inject patients or be forced to refer when the patient is suffering physical or psychological pain? Should it be defined as “health care”? How will “at the end of life” be defined? Could it be extended to people with disabilities and children that aren’t dying?
Abuses in other jurisdictions and countries are clearly documented. i.e. Australia Judge decides man cannot inherit after assisted suicide
Palliative care although highly respected for end of life care is lacking in areas throughout Canada. In Quebec availability is 1 in 5 citizens. The Pallium Foundation of Canada has received the first installment of a 3-year commitment from the federal government of 3 million dollars per year for palliative care training. Canada should be spending a good deal more for palliative care for the dying and their families to provide respect and hope for the dying.
Why do euthanasia proponents not put their efforts into providing good end of life palliative care? It is the best option for the dying as they leave this world and enter the next. – Jane Richard | <urn:uuid:b44592fa-5a0e-4ec5-b75a-91d3cedab2ee> | CC-MAIN-2022-33 | https://kwrtl.ca/resources-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00278.warc.gz | en | 0.942557 | 724 | 2.171875 | 2 |
Capstone is a company that makes games for kids. They are looking to create a game where players can learn about different religions and cultures. This game will be part of the Capstone Kids App, which also includes games like math, science, language arts, and geography.
The www.capstone.com games is the website for a company that sells children’s games, toys, and other products.
This Video Should Help:
Welcome to www.capstonekids.com, your one-stop shop for fun and educational online games for kids! We have a wide variety of games that cover all subjects from math to science to history, and we’re always updating our library so you can find the perfect game for your child. Whether you’re looking for puzzles, word games, creative activities or just some fun learning opportunities, we’ve got you covered! Thanks for choosing www.capstonekids.com ufffd we hope you enjoy your stay!
www.capstonekids.com Games: A Comprehensive Guide
There are a ton of great games out there for kids, but it can be tough to find the right one. With so many options available, it can be hard to know where to start. That’s why we’ve put together this comprehensive guide to the best www.capstonekids.com games out there. Whether you’re looking for educational games, fun games, or just something to keep your kids entertained, we’ve got you covered.
ABCya is a great resource for finding educational games for kids of all ages. They have a wide selection of games that cover various subjects and topics, so you’re sure to find something that your child will enjoy and learn from. Best of all, ABCya is free to use, so you can try out as many games as you like without spending a dime.
PBS Kids is another excellent option for finding educational games for kids. They offer a wide variety of game types and levels, so there’s something suitable for every child. PBS Kids also has a great selection of online videos and activities, so even if your child isn’t interested in gaming they’ll still be able to stay entertained and learn something new. As an added bonus, most of the content on PBS Kids is ad-free, so you don’t have to worry about your child being bombarded with commercials while they play.
my capstone library:
If you’re looking for high-qualityeducationalgamesfor kidsthen my Capstone Libraryis definitely worth checking out. Allof their titles are created by leading educatorsand researchers toprovide childrenwith the best possible learning experience . What’s more , my Capstone Libraryis completely free touse , soyou can try as manygames asyou like without spending any money .
The Benefits of www.capstonekids.com Games
www.capstonekids.com games offer a number of benefits that can help kids in their school and learning lives. For one, these games can provide an engaging and fun way for kids to learn new concepts and ideas. They can also help kids practice and reinforce what they have learned in the classroom. Additionally, www.capstonekids.com games can help build important life skills such as problem-solving, critical thinking, and perseverance. Finally, these games can be a great way for kids to socialize and make friends with other children who share their interests.
The Top www.capstonekids.com Games for Kids
There are a lot of great games for kids available on www.capstonekids.com. Here are some of our favorites:
FactHound Games: These games are a great way to learn about different topics while having fun. There are games about animals, history, science, and more.
ABCya: This site has a ton of educational games for kids of all ages. You can search by grade level or subject to find the perfect game for your child.
PBS Kids: As you would expect, this site has a lot of great games featuring characters from PBS shows like Curious George and Arthur. You can also find games that teach math, reading, and other important skills.
My Capstone Library: This is a great place to go if you’re looking for eBooks and audiobooks for kids. There are also some fun online games that you can play with friends or family members.
PebbleGo: This website has tons of information about animals, plants, geography, and more. It’s perfect for kids who want to learn more about the world around them.
How www.capstonekids.com Games Can Help Your Child
When it comes to children and the internet, there are a lot of mixed feelings. Some parents feel comfortable letting their kids explore the online world, while others are more hesitant. However, there are many benefits to letting your child play www.capstonekids.com games. Here are just a few:
1. Games can help improve your child’s problem-solving skills.
2. Games can teach your child how to think strategically and plan ahead.
3. Games can help your child develop hand-eye coordination and fine motor skills.
4. Games can increase your child’s memory and concentration span.
5. Games can foster a sense of competition in a healthy way, teaching your child how to win and lose gracefully.
6. Games can be a great bonding experience for you and your child – after all, it’s always more fun to play together!
The Different Types of www.capstonekids.com Games
There are a variety of www.capstonekids.com games available for children to play. These games can be classified into four main categories: educational, entertainment, interactive, and social.
Educational www.capstonekids.com Games:
These types of games are designed to teach children specific skills or knowledge. They often incorporate educational content such as reading, math, science, or history lessons into the gameplay. Many educational www.capstonekids.com games are also designed to be age-appropriate for different learning levels.
Entertainment www.capstonekids.com Games:
These types of games are primarily designed for fun and enjoyment. They may include features such as characters, storylines, music, and sound effects that appeal to childrenufffds interests. While they may also contain some educational value, entertainment www..facthoundgames com are not typically focused on teaching specific skills or knowledge like educational games are..
Interactive www..pebblegogames com:
These types of games require active participation from children in order to progress through the game play..pbs kids Some popular examples of interactive www..abcya com include ufffdhide-and-seekufffd type activities where players must find hidden objects within the game environment or ufffdSimon Saysufffd style memory games where players must remember and repeat sequences of actions..my capstone library Interactive www…capstonekidswwwgames encourage children to use their motor skills as well as cognitive abilities..social
Social www…The Different TypesofwwwGames:
ManywwwGames promote positive social interaction between players by incorporating features such as chat rooms or multiplayer gameplay.. Some socialwwwalso help children develop important life skills such as cooperation and communication while working together towards a common goal..
www.capstonekids.com Games for All Ages
www.capstonekids.com is a website that offers a variety of games for children of all ages. The games on the website are divided into categories based on age group, so parents can easily find appropriate games for their children. There are also a number of educational games available on the website, which can help children learn new things while they play. www.capstonekids.com also offers a wide selection of books for kids, both fiction and non-fiction, so there is something for every child to enjoy.
The Advantages of www.capstonekids.com Games
www.capstonekids.com games offer a number of advantages that can be extremely beneficial for children. One of the biggest advantages is that they can help children learn new things and improve their cognitive skills. Games that require children to think strategically, solve problems, and remember information can all help boost brain power. Additionally, www.capstonekids.com games can also be a great way for kids to socialize and make friends. Playing multiplayer games online or in person can help kids interact with other people and develop important social skills. Finally, www.capstonekids.com games can be simply fun and entertaining! Whether your child enjoys puzzles, adventures, or racing games, there are plenty of options available on our website to keep them engaged and entertained for hours on end.
www.capstonekids.com Games: A Great Way to Learn
There’s no doubt that games can be a lot of fun. But did you know that they can also be a great way to learn? That’s right – www.capstonekids.com games are not only entertaining, but they can also help kids develop important skills like problem solving, critical thinking, and even teamwork.
So what are you waiting for? Check out our selection of www.capstonekids.com games today and start having fun while you learn! | <urn:uuid:a596cd92-61e8-4e1b-a689-78d35c6e20de> | CC-MAIN-2022-33 | https://captainclive.net/www-capstonekids-com-games/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00268.warc.gz | en | 0.941032 | 1,947 | 1.984375 | 2 |
To close an app normally, choose Quit from the app menu in the menu bar, or press Command-Q. If an app is unresponsive, you can force it to close using Force Quit:
- Choose Force Quit from the Apple menu, or press Command-Option-Esc.
This is similar to pressing Control-Alt-Delete on a PC.
- Select the unresponsive app in the Force Quit window, then click Force Quit.
- The Finder is an app that your Mac keeps open, so there isn't an option to quit or close this app. If the Finder becomes unresponsive, you can use Force Quit, after which the Finder opens again automatically. Select Finder in the Force Quit window, then click Relaunch.
- If none of your apps are responsive, you can force your Mac to restart. | <urn:uuid:d8eeb71f-2ab4-4a72-8b7e-8b145ad68bdf> | CC-MAIN-2017-04 | https://support.apple.com/en-us/HT201276 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00536-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.859078 | 169 | 1.984375 | 2 |
Set along the chassis of the vehicle, the Tow Hitch is mainly used for towing. The many forms may control the articulation of a trailer, featuring the tow-ball form, or the tow pin and jaw accompanied with a trailer hoop. The tow pin and jaw are usually used to pull large agricultural vehicles or any other over sized vehicles available for towing. With military vehicles, it’s a different thing. To tow military vehicles is using the towing pintail which hooks onto the military vehicle, pulling it down the road.
Different countries may refer to the Tow Hitch as something else, but in the United States it is keeps its’ name. Being the receiver used with other tools to tow, it is bolted to the chassis of the other vehicle. The SAE claims the Tow Hitch has four classes: I, II, III, and IV. With this, the tow hitch can be placed into separate categories and ordered on average. The different classes vary in weight, I being up to 1 ton, II 1 ½ tons, III 2 ½ tons, and IV up to 5 tons. These can suit up large trailers, campers, and particular types of motor vehicles that can be towed.
Vehicle manufactures define all mounting points upon advanced passenger vehicles. The tow-bracket manufacturer is responsible to use these mount points and prove the efficiency of their bracket. The efficacy for each bracket of the tow-ball is measured with a full rig-based fatigue test, to fit company standards and insure safety to all who have them with their tow hitches.
A trailer tongue may fasten over a tow-ball. There are many different forms of tow-balls and you must apply each point securely to guarantee safety for you, and other people on the road. The tow-ball is set to a ball-mount and must be applied with correct placing horizontally and vertically to prevent the chance of death or injury (especially the cases where the clients got injured in a truck accident or by something heavy and disastrous). And it is important to know about different forms of compensation before you file a suit for injuries sustained .
Read more information about how to tow and what you need when you need to tow on https://towingless.com. | <urn:uuid:eb30c017-650f-4724-9664-d21e20171402> | CC-MAIN-2022-33 | http://www.4x4truckstrailers.com/tow-hitch | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00071.warc.gz | en | 0.951398 | 455 | 2.4375 | 2 |
A previous study of military MCI regarding Thai military units in the southern trauma registry reported that mechanism of injury about 71%, blast injury and 29%, firearm or gunshot wound . This present study showed a higher ratio of blast injury (90.2%) while the second most common injury was gunshot wound (6.5%) implying that weapons of mass destruction (WMDs) will be one of the major concerns in our armed conflict casualties Inhibitors,research,lifescience,medical in the future even though the incident
was in the capital city. The previous study of southern conflict in Thailand demonstrated the anatomic distribution of injured body regions Autophagy inhibitor indicating head & neck was 21.8%, the torso (chest, abdomen, trunk and
pelvis) was 24.5% and the most common injured body region was the extremities 51.6% . Compared with a previous study, this represented a lower Inhibitors,research,lifescience,medical distribution, i.e., head & neck (5.1%), abdomen (7.9%) and chest (10.1%). Perhaps this is due to effective protective body armour vests and helmets. However, the injury to the extremities still exhibits a high percentage, 48.5% Inhibitors,research,lifescience,medical (134 of 276 injured body regions) implying that protection in this areas is not effective enough. In this study, prehospital treatment received cooperation from many government sectors and the Ministry of Defence to prepare field-operation military medical teams to transport injured soldiers to PMK Hospital where prehospital time was recorded Inhibitors,research,lifescience,medical by military health care officers. Although this MCI occurred April 10, 2010, many injured soldiers had to be transported at the same time, leading to unreliable accuracy of time recordings. Unreliable prehospital time data was found in 14 of 153 cases, so the prehospital Inhibitors,research,lifescience,medical time records of the remaining 139 cases were analyzed for accuracy. About 29% of injured soldiers presented to the hospital within the first hour of trauma care that may be inappropriate in prehospital transportation during this MCI because health care providers could
PDK4 not suddenly evacuate casualties during continuous firing and bombing in those dangerous areas and transportation was blocked by crowds. The analysis finally showed that the factors influencing ISS with a statistically significant difference at the 0.05 level were age (p = 0.04), abdomen injury (adjusted OR = 29.9; 95% CI, 5.8-153.5; P < 0.01), head & neck injury (adjusted OR = 13.8; 95% CI, 2.4-80.4; P < 0.01) and chest injury (adjusted OR = 9.9; 95% CI, 2.1-47.3; P < 0.01). This study emphasized report only MCI April 10, 2010. Soldiers with high ISS, more than 16 points, totalled 18 of 153 victims (11.8%). This low percentage of severe injury is the characteristics of this MCI; the protective equipments, that lower ISS, may be effectively used. | <urn:uuid:1a278d66-57d6-4f3d-921c-1627c1e1b40f> | CC-MAIN-2022-33 | https://ppar-signal.com/a-previous-study-of-military-mci-regarding-thai-military-units-in | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00070.warc.gz | en | 0.952915 | 653 | 2.3125 | 2 |
I hope y’all had a good Christmas. Me, I decided to go to the flicks and see Denzel Washington’s “The Great Debaters.” Figured I wouldn’t have to battle any crowds.
I was wrong.
In mid-afternoon, at a big Burbank shopping mall, there wasn’t a single free space in the parking structure. Boy, that pissed me off. I was like, “Why aren’t you motherfuckers at home? It’s Christmas!”
I don’t get it. The world used to take a break on Christmas Day. Instead, you got long lines at the Starbucks.
I guess the fact that Hollywood would open major motion pictures on Christmas Day means that I’m out of touch... that Christmas has been a big moviegoing day for a while. It’s a damn shame.
Anyways, “The Great Debaters” was effective, in a manipulative, almost hokey kind of way. The theater was packed, and people applauded at the end. So it will make money.
I was personally delighted to see one of the main characters sing a couple of verses of “Run, Nigger, Run,” a folk song I blogged about in detail back in September.
Tangentially, I also think I spotted a factual error in one of the main characters’ debate points. Jurnee Smollett said, if I heard right, that the New York Times decided to capitalize the “N” in Negro in 1920.
Actually, it was 1930. And the Times was one of the last New York newspapers to do so.
I began gathering string on that story back in the summer, while researching the “Giant Negro” phenomenon. I’ll write more about the capitalization of “Negro” in coming days. | <urn:uuid:f049d7cf-c803-4c7f-95c2-7a4d6473ac10> | CC-MAIN-2017-04 | http://undercoverblackman.blogspot.com/2007/12/what-has-become-of-this-holiday.html?showComment=1198728240000 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00187-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.951946 | 404 | 1.742188 | 2 |
It can feel pretty intimidating stepping into a pub or kicking back at a beer festival and having to choose a drink quickly from a huge list of craft beers, stouts and lagers without really knowing the difference between them all.
They certainly don’t educate you at school about the differences between beer and lager and if you went to University it’s likely that your drinking money mostly went on rounds of shots and cheap premixed alcopops. Fear not, we are going to expand your knowledge of these complicated alcoholic beverages with some beer drinking terms to impress your friends and make you sound like a real connoisseur!
Session beers are generally light in colour, full of flavour and tend to have low alcohol content in the region of 3-4% ABV range. The clue is in the name. Session or sessionable beers are particularly popular because of their ease of drinkability. They allow multiple pints to be consumed within a reasonable time frame without fear of becoming too intoxicated. We would highly recommend the Lizard Bitter as a good session beer.
High Gravity Beer
While you may feel a bit floaty like after sinking a few beers, the gravity of a beer purely refers to the density of it which is measured both before and after fermentation. High gravity beers are generally brewed with a higher density of wort (the liquid product formed by mashing barley) compared to water content. The result is a higher alcohol content than session beers and they can be produced much more quickly.
Filtered Beer refers to any lager, ale or fermented malt beverage where the sediment (hops, malt, yeast and microbes) that may be leftover from the brewing process, are removed. The filtering process produces a more consistent product which prevents refermentation in the keg or bottle.
Ales are brewed using a warm, fermentation method which produces a sweet, full-bodied fruity tasting beverage. Ales are more complex, full of body and can offer some surprising flavours. They come in many colours and strengths. We stock a fantastic selection of ales at Cornish Bottled Beer and Cider and if you are looking for a gift for an ale lover, take a look at our A Box Full of Lizards Ale Gift Box.
Lager is a type of beer that is conditioned at much lower temperatures, 7 to 15 degrees centigrade, compared to ales. It is probably the most popular, widely consumed beer and commercially available style of beer. Lager is heavily carbonated, light in colour and features a malt character. Top of our list is the Cornish Lager from St Ives Brewery.
Cask beer or cask-conditioned beer is unpasteurised, unfiltered and the yeast is usually still active in the cask when it leaves the brewery. It is served directly from the cask using a pump, without the need for refrigeration and with no additional nitrogen or carbon dioxide pressure. Any fizziness in the brew comes naturally from the yeast. Once a cask has been breached, the contents need to be drunk within 3 days before it turns flat. Cask conditioned beer is a truly British brew!
There are so many more varieties of beers available in bars, pubs and supermarkets now compared to 10 years ago. The choice has slowly moved on from European beers to speciality and evolving craft beers. We hope that these beer-drinking terms will have expanded your knowledge and have you set for the weekend. Browse our full range of beers here and remember, always drink responsibly! | <urn:uuid:7a492872-87c1-45d3-9d0a-e4e9d70aacf5> | CC-MAIN-2022-33 | https://www.cornish-bottled-beer.co.uk/blog/beer/6-beer-drinking-terms-you-need-to-know-about/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00478.warc.gz | en | 0.950989 | 737 | 2.046875 | 2 |
Ask a Dispatcher
Q. Is it illegal to wear headphones while driving?
Dear Juneau Resident,
Yes. Here is the CBJ ordinance and there is a reference to state code at the bottom.
72.04.260 - Television receivers and headsets.
A motor vehicle driven in this state may not be equipped with television-type receiving equipment located where the viewer or screen is visible from the driver's seat.
A driver of a motor vehicle may not wear a headset, headphones, or other headgear designed for receiving sound and transmitting sound to the driver, or wear ear plugs or a similar device which reduces the driver's hearing ability while driving a vehicle.
This section does not prohibit the use of television-type or headgear-receiving equipment used exclusively for safety or law enforcement purposes, used for and designed to improve a driver's hearing ability, or navigational devices such as Global Positioning System (GPS) or Loran.
(Serial No. 87-66, § 2, 1987)
State law referenceó Similar provisions, 13 AAC 04.260 | <urn:uuid:b394b96e-2723-4d7b-9e9d-e3a4a60720bb> | CC-MAIN-2017-04 | http://www.juneau.org/police/mobile/AD_viewind.php?UID=432 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00120-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.920255 | 224 | 1.960938 | 2 |
So who wants to stay in a hotel like this? Well, supermodel and eco warrior Helena Christensen for one!
Commissioned by Corona's Save the Beach campaign for World Environment Day, this pop-up rubbish hotel in Rome was created by German artist HA Schult to highlight the importance of preserving Europe's beaches. And it's built almost entirely from rubbish collected from the sands of our wonderful continent.
Although this two storey construction, which surprisingly can sleep up to 10 people, will only be in open until Monday 7 June, its message will last for longer. The Save the Beach campaign is inviting people across Europe to report and nominate endangered beaches throughout the summer, by visiting www.coronasavethebeach.org. The winning beach will be recovered and cleaned later this year by brewing company Corona. Last year, website users chose the Italian beach in Capocotta as the recipient of the Save the Beach clean up.
It's a shame I'm not in Rome for World Environment Day, which is in fact today. I won't be off to the beach either. I'll be digging my garden rather than the sands of Suffolk. But next time I go, I'll certainly pay closer attention and pick up even more litter than usual. And who knows, I may find enough to build a trashy hotel nearer to home. Now, I wonder who I could get to stay in my hotel. Alas, knowing my luck it would be the Chuckle Brothers. So while I ponder that malarkey, I'll leave you with a photo of the world's first ever rubbish hotel with its first ever guest.
|Helena Christensen at the Save The Beach Hotel in Rome|
More information about the campaign can be found at www.coronasavethebeach.org. | <urn:uuid:9c1ca106-c434-4c7c-805b-f0d1cc947388> | CC-MAIN-2017-04 | http://therubbishdiet.blogspot.com/2010/06/most-rubbish-hotel-in-rome.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00379-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.957369 | 365 | 1.984375 | 2 |
- Study protocol
- Open Access
Protocol for the atWork trial: a randomised controlled trial of a workplace intervention targeting subjective health complaints
BMC Public Health volume 16, Article number: 844 (2016)
Subjective health complaints, such as musculoskeletal and mental health complaints, have a high prevalence in the general population, and account for a large proportion of sick leave in Norway. It may be difficult to prevent the occurrence of subjective health complaints, but it may be possible to influence employees’ perception and management of these complaints, which in turn may have impact on sick leave and return to work after sick leave. Long term sick leave has many negative health and social consequences, and it is important to gain knowledge about effective interventions to prevent and reduce long term sick leave.
This study is a cluster randomised controlled trial to evaluate the effect of the modified atWork intervention, targeting non-specific musculoskeletal complaints and mental health complaints. This intervention will be compared to the original atWork intervention targeting only non-specific musculoskeletal complaints. Kindergartens in Norway are invited to participate in the study and will be randomly assigned to one of the two interventions. Estimated sample size is 100 kindergartens, with a total of approximately 1100 employees. Primary outcome is sick leave at unit level, measured using register data from the Norwegian Labour and Welfare Administration. One kindergarten equals one unit, regardless of number of employees. Secondary outcomes will be measured at the individual level and include coping, health, job satisfaction, social support, and workplace inclusion, collected through questionnaires distributed at baseline and at 12 months follow up. All employees in the included kindergartens are eligible for participating in the survey.
The effect evaluation of the modified atWork intervention is a large and comprehensive project, providing evidence-based information on prevention of long-term sick leave, which may be of considerable benefit both from a societal, organisational, and individual perspective.
Clinicaltrials.gov: NCT02396797. Registered March 23th, 2015.
Subjective health complaints (SHC), such as musculoskeletal and mental health complaints, have a high prevalence in the general population [1, 2]. SHC refers to complaints without a pathophysiological explanation or where the pathological findings are disproportionate to the illness experience . The complaints can be very troublesome, affecting the ability to function both at work and in social settings.
Non-specific musculoskeletal complaints and mental health complaints present a major public health problem and a high economical burden in western societies [4–6], and are the most frequent reasons reported for sick leave [7–9]. Sick leave is a multi-causal phenomenon and there are different opinions regarding which factors are most important for sick leave (e.g. [10–13]). However, there is considerably more consensus regarding the negative consequences of long-term sick leave, both in terms of the major costs for society and organisations and the serious consequences it may have for the individual (e.g. [5, 14, 15]). Accordingly, it is important to gain knowledge about effective interventions to prevent and reduce long-term sick leave - both from a societal and an individual perspective.
Preventing the occurrence of SHC is difficult, or may not even be possible. These common complaints seem to be inherent in human nature and a part of everyday life, regardless of society or modern civilisation [16–18]. However, it may be possible to influence the employees’ perception and management of SHC, which in turn can have impact on sick leave and return to work after sick leave .
Non-specific musculoskeletal disorders
Non-specific musculoskeletal disorders refer to pain or discomfort where it is not possible to identify an underlying cause of the pain, and back pain (BP) is the most common musculoskeletal complaint . A multitude of treatments have been developed for the prevention of BP, but the results have been disappointing . It seems difficult to prevent acute non-specific BP, but the consequences of the BP, such as fear of injury or activity, inactivity, and/or sick leave may be prevented . Development of maladaptive perceptions about the cause and prognosis of BP is associated with a poorer clinical outcome . The prevention of the negative consequences of BP can thus be seen as a way to improve the long term work participation for employees with BP, as well as decreasing the risk of the BP becoming chronic.
Brief Interventions (BI), based on the ‘non-injury model’ proposed by Indahl [22–26], have been among the most successful approaches to increase return to work for employees with BP [24, 25, 27–29]. According to this model, the spine is a strong and robust structure. Pain is not a sign of injury to the spine caused by any wrongdoing or ‘inappropriate’ behaviour. When a patient has the perception that the BP is caused by an injury to the spine and that the spine is likely to deteriorate with activity, inactivity is a rational choice. In the BI this illness perception is challenged by presenting a perception of BP as a painful, but benign and usually self-limiting condition. The treatment providers’ job is not to ‘cure’ the pain, nor to remove fear of activity, but simply to present the evidence for the benefit of being active and let the employee decide how to make best use of the information. The intention is to replace any maladaptive previous perceptions of BP. This non-injury model is consistent with the understanding and recommendations in the European Guidelines for the prevention of BP .
Common mental disorders
Anxiety and depression are often termed ‘common mental disorders’ (CMD), because of their high prevalence, affecting 20–25 % of the adult population [32–34]. CMD has emerged as a major public and occupational health problem in many countries [5, 35]. Depression and mild anxiety are the most common mental disorders among employees [35, 36]. As with other mental disorders, the core symptoms of anxiety and depression affect a person’s emotional, cognitive and social functioning, which also may have impact on the capacity for work . The increase in sick leave and work disability because of CMD has serious negative health and economical consequences calling for prevention [38–40]. Although mental disorders has become one of the greatest new social and labour market challenges in the OECD countries, little is known about the underlying causes of this phenomenon . The most straightforward explanation would be an increase in the prevalence of mental disorders, but that does not seem to be the case. Most of the studies that have examined this, find limited evidence to suggest an increase in the prevalence of mental disorders over time (e.g. [41–45]). It appears that the increased awareness of complaints that have always been there without really being acknowledged, also has led to more exclusion from the workforce for these problems .
There is a high degree of comorbidity between CMD and BP [46–48]. In the general population persons with BP are more likely to report CMD than persons without BP [48, 49], and few pathological findings by physical examination in patients with BP are associated with more psychiatric symptoms than for patients with an identified structural or organic cause for the BP [50, 51]. However, the relationship seems to work both ways; BP can precede CMD, and CMD can precede BP . Interventions targeting both BP and CMD should consider the high comorbidity between these conditions.
There is evidence that cognitive behavioural therapy and psychoeducational treatment for risk groups and individuals in an early stage of anxiety and depression may be effective [53–56]. However, reaching the majority of the population who are at risk of these disorders are difficult, because most people do not seek help until their problems are well advanced or do not seek help at all [57, 58]. Thus, population-based health promotion and prevention interventions targeting CMD may be useful, because it may be provided to everyone at risk, including those with no or very low risk. Population-based interventions are also found to be the most cost-effective interventions . The workplace is an ideal setting for such population-oriented prevention programs [60, 61]. Distributing knowledge about CMD at the workplace, expressed with respect for the participants, delivered in a way that normalises but at the same time does not trivialise the complaints, presents an opportunity to overcome widespread stigma and fears concerning CMD. Stigma and self-stigma is still prevalent across the OECD countries .
Social support and coping skills are important factors to increase resistance to development of mental disorders [54, 62, 63]. Prolonged stress activation as a result of lack of coping might lead to feelings of helplessness and hopelessness, both proposed as cognitive models of depression [64–66]. Coping seems to be a stronger predictor for health than socioeconomic status [67, 68], and interventions aimed at targeting these factors can be expected to produce benefits to employees’ mental health, and further induce a beneficial effect on organisational health. Interventions providing information about mental health and illness report significant gains in knowledge, improved health, greater confidence in seeking help and providing help to others, decreased stigmatising attitudes, increased use of positive coping strategies, and improved social skills [69–74].
The atWork intervention
atWork was established in 2007 as a new stepped-care approach to musculoskeletal complaints . The intervention consisted of three workplace information meetings about BP to all employees, in addition to peer support. The atWork intervention targeting BP reduced sick leave and myths about BP in a randomised controlled trial (RCT) . After this RCT the atWork intervention has been further developed with the goal to increase effect on health related measures. Because of the high comorbidity between BP and CMD, the high prevalence and the negative consequences of CMD, the atWork intervention has been modified to also comprise mental health complaints. A management seminar is also included, aiming to increase manager involvement and knowledge about the message distributed in the intervention.
atWork is a cognitive workplace intervention, based on the BI and the non-injury model [23–25]. atWork uses the workplace as an arena for health promotion. By focusing on altering employees’ beliefs and behaviour through evidence-based health information, atWork aims to enable employees to cope with the consequences of their health complaints . This is done by providing insight and understanding of BP and CMD to all employees and managers, based on the non-directive social support model and peer support . atWork also has a theoretical foundation from the Cognitive Activation Theory of Stress (CATS), where coping is defined as a positive response outcome expectancy, a belief that your actions or strategies will lead to a positive result . In addition to reaching out to all employees with the intervention, the aim of atWork is to reinforce an organisational culture where workers with health complaints are accepted as part of the normal work environment.
Aims and objectives
The main aim of this study is to investigate if modifying the atWork intervention to also comprise a management course and knowledge about mental health complaints will improve the effect on sick leave and other health related outcomes compared to the original atWork intervention. We aim to address the following questions:
Is the modified atWork intervention more effective than the original atWork intervention in terms of reducing sick leave?
Is the modified atWork intervention more effective than the original atWork intervention in terms of increasing coping expectancies, job satisfaction and social support?
Participants and recruitment
Eligible participants are private kindergartens, working with children from 0–6 years, in four Norwegian counties. In these four counties outpatient clinics and the necessary collaboration for implementing atWork are already established, so for convenience reasons we selected these counties for the trial. The first atWork trial was conducted on workplaces in the public sector . This trial will investigate the effect of atWork on workplaces in the private sector. In Norway women have a higher sick leave rate than men, and a higher prevalence of SHC [1, 7]. The kindergartens have a high percentage of women employed, and are therefore chosen as participants in this trial. Participants will mainly be recruited through The National Association of Private Kindergartens, but also through the Norwegian Labour and Welfare Administration (NAV) and Vestfold Hospital Trust.
The participating kindergartens will be randomly allocated to one of two groups, receiving different workplace interventions aiming to increase participation in working life and prevent sick leave (see Fig. 1). One group will receive the original atWork intervention (OAW), and the other group will receive the modified atWork intervention (MAW) . We firmly believe that one of the success criteria of the atWork intervention is that all employees get the same information. We therefore recommend that managers encourage all employees to attend the workplace sessions and facilitate their attendance. To ensure a high participation rate, the different workplace sessions will be held several times at the same workplace if necessary. All workplace sessions will last for approximately one hour, and will be conducted by healthcare workers from Vestfold Hospital Trust.
The original atWork intervention, OAW
The OAW intervention consists of three workplace sessions for all employees, and peer support .
The workplace sessions are for all employees at the workplace, also the managers. The first workplace session focuses on the prevalence of BP, what non-specific health complaints are, what the atWork intervention is and the reason for its development, and the selection of a peer adviser (see below). Questions are encouraged.
The second workplace session focuses on giving evidence-based information on spine and pain physiology, and how to cope with BP. The main message is the non injury model and the evidence for it, and emphasising the importance of staying active when experiencing BP. Questions and discussions on how the workplace may accommodate employees with BP are encouraged.
The third workplace session focuses on the quite widespread myths about BP, such as the consequence of inactivity and bed rest, or the value of imaging like X-rays and MRs. Questions are encouraged.
Peer support involves selecting a ‘peer adviser’ at each workplace. The peer adviser is a fellow worker, recruited among employees in each kindergarten during the first workplace session. Recruitment takes place either by volunteering or agreeing after being suggested by colleagues. All peer advisers will participate in two seminars at an outpatient clinic. The seminars will focus on more in depth knowledge about the spine and BP, and guidance on how to function as a peer adviser at the workplace. The peer advisers’ role is to give social support and to use their local knowledge of the working environment to help their colleagues stay at work despite the BP. The peer advisers are instructed not to give any medical advice or to recommend treatment options. If an employee has persistent BP, or is unsure about the nature of the BP, the peer adviser will guide the employee to make an appointment with their general practitioner. All peer advisers will be given contact information to the outpatient clinic, and may at any time contact healthcare workers for general help or help with specific cases. The peer advisers will also receive a booklet with information, and a book explaining BP in layman’s terms .
All seminars in the OWA will be conducted by healthcare workers from Vestfold Hospital Trust.
The modified atWork intervention, MAW
The MAW intervention includes one session for the managers and two workplace sessions for all employees. After these three sessions there will also be one additional session for the managers for the purpose of reflection and review of the content and use of the information presented in the intervention.
Session for managers
The first session is for managers’ at all organisational levels, health and safety representatives, and local union representatives, as these positions may function as facilitators for a good psychosocial workplace environment. The session provides an introduction to the atWork intervention, and informs the participants about what will be communicated to all employees. It is important that managers and workplace representatives understand and agree with the message distributed, to support the use of this knowledge at the workplace. The session also focuses on how to create a health promoting workplace perceived as welcoming to workers with health complaints, how to facilitate work for employees when needed, and where to get external support when needed. The support and consideration of managers is a strong determinant of job satisfaction and effective in alleviating employee strain in a wide variety of work settings . These seminars will be conducted by healthcare workers from Vestfold Hospital Trust, together with a consultant from the resource center for an inclusive working life at NAV. The purpose of this collaboration is to increase the organisational knowledge about how to cope with health complaints in the work setting.
The two workplace sessions are for all employees at the workplace, including managers, health and safety representatives, and local union representatives. The first workplace session focuses on evidence based information about CMD, including prevalence, physiology, anxiety, stress, depression, comorbidity, myths, and coping. The information will emphasise that these complaints are experienced by many people, with the purpose of increasing inclusion and social support, and decreasing stigmatising attitudes. Questions and discussions on how the workplace may accommodate employees with CMD are encouraged.
The second workplace session focuses on evidence based information about BP, including prevalence, spine and pain physiology, myths, comorbidity, and coping. The main message is the non injury model and the evidence for it, and emphasising the importance of staying active when experiencing BP. Questions and discussions on how the workplace may accommodate employees with BP are encouraged. Number of sessions targeting BP is reduced in the MAW compared to OAW. This is due to a low attendance rate on the last workplace sessions in the first RCT , and participants’ feedback. Employees have expressed that three sessions targeting BP leads to a great deal of overlap and repetition, and experience this as a waste of time in a busy work schedule.
Reflection and review session
The reflection and review session is for managers’ at all organisational levels, health and safety representatives, and local union representatives, and will be a meeting where reflection on how to implement the new knowledge at the workplace is encouraged. The aim of this meeting is to discuss how each particular workplace can create an inclusive culture, and what further assistance they may need to achieve this goal. Further assistance will mainly be given by NAV, as a part of their daily work as a resource centre for inclusive working life.
Peer support is not a part of the MAW. In the OAW the peer adviser was not frequently used . Companies have also reported that the role interferes with the management structure in the organisation, it takes too much time from work (the 2 days of qualification), and some of the tasks assigned to the role is perceived to collide with management responsibilities. The peer adviser is thus removed and a seminar for managers is added to the modified intervention.
Inclusion and exclusion
All private kindergartens in the four counties Telemark, Vestfold, Buskerud, and Akershus are eligible for participation in the study. All employees in the kindergartens participating in the study are eligible for participating in the survey.
The kindergartens will be randomised to one of the following two groups; 1) OAW or 2) MAW. This is done according to a computer generated randomisation list, generated by the trial statistician. The block randomisation is stratified by county and size of the kindergarten (small: <11 employees, large: ≥11). The randomisation and treatment allocation procedures are performed by a research technician at the randomising unit (Uni Research Health) and are concealed from the researchers and healthcare workers. The code for intervention allocation will not be revealed to the researchers or the healthcare workers until recruitment and baseline data collection are completed. The trial coordinator emails the randomisation unit with information about the name of the kindergarten, the county where it is located, and the size (small or large). Information about intervention allocation is emailed back. For obvious reasons there is no blinding to group assignment.
The Regional Committee for Medical and Health Research Ethics for South-Eastern Norway has approved the study (Registration 2014/162/REC South East). The research will be carried out in compliance with the Helsinki declaration. The participants are informed about the study from their manager and from an information sheet at the start of the electronic survey. In the information sheet the participants are told that by continuing to the questionnaire after having read the information, they are giving their informed consent to participate in the study. In the information sheet the right to withdraw from the trial at any time without any explanation is emphasised. The timeframe for questionnaire completion is estimated to approximately 20 min. All participating kindergartens are thoroughly informed about the random allocation to either OAW or MAW. OAW has been effective in reducing sick leave. MAW contains crucial elements from the OAW, and is modified with the aim to increase positive effect on health related variables. The companies receiving OAW during the study period will be offered the sessions that are unique for the MAW after the project is terminated.
Survey data will be collected from both groups at baseline and 12 month follow-up. Data will be collected electronically using secure survey software (Qualtrics®). The baseline questionnaire is administrated by email to the manager at each kindergarten immediately after enrolment. This email contains detailed information on the study processes and purposes, and a link to the study survey. The manager distributes this information to all employees, who then may make an informed choice on whether to participate. Recruitment and collection of baseline data started in November 2014. Recruitment will continue until a sufficient number of kindergartens are enrolled. In the baseline questionnaire all employees will be asked to enter their email address. The email address will be used to link answers from the baseline questionnaire with the follow up questionnaire. Follow-up questionnaires will be administered electronically to participants who provide their e-mail address at baseline. Participant will be assigned code numbers, and all data will be treated confidentially. Printed questionnaires will be an option for participants who prefer this to filling in an electronic version of the questionnaire.
Sick leave will be collected at unit level, through register data from NAV. This allows for complete and objective data and will be collected every quarter, from all kindergartens, with no loss to follow-up. Data will be collected for the year before and after the intervention.
The primary outcome of this study is sick leave at unit level, collected through register data from NAV. One kindergarten equals one unit. Because sick leave is collected at unit level, we will collect data from all employees in the participating companies, not only the employees responding to the questionnaires.
The secondary outcomes, coping expectancies, health, job satisfaction, social support, and workplace inclusion, will be measured through validated questionnaires, in addition to demographics and belief about BP and CMD:
Coping expectancies will be measured using the Theoretically Originated Measure of the Cognitive Activation Theory of Stress, TOMCATS . TOMCATS is a newly developed scale, designed to measure response outcome expectancies as defined in the Cognitive Activation Theory of Stress (CATS) . The scale consists of three factors, which represent the three response outcome expectancies in CATS: positive expectancy/coping, no expectancy/helplessness and negative expectancy/hopelessness.
Subjective health complaints will be measured using the Subjective Health Complaints Inventory, SHC . The SHC-inventory records complaints without asking for attributions or medical diagnosis. The selection of items is not based on any specific theory, but covers the most frequent health complaints and reasons for being seen by the general practitioner . The inventory has five subscales; musculoskeletal pain, pseudoneurological complaints, gastrointestinal complaints, flu, and allergy complaints, and covers the period of the previous 30 days.
Psychological distress will be measured by the Hopkins Symptom Checklist, HSCL-10 [79–81]. The HSCL-10 consists of 10 items derived from the widely used HSCL-25, a questionnaire designed to measure psychological distress, or, more specifically, mainly symptoms of anxiety and depression . The 10 items includes feeling panicky, anxious, dizzy, tense, sleepless, sad, worthless, hopeless, fault within self, and finding everything is a burden.
Job satisfaction will be measured using the Global Job Satisfaction, GJS [83–85]. The scale consists of 6 items to measure an employee’s general affective reaction to his or her job without reference to any specific facets.
Psychological demands, decision latitude and social support will be measured using the Demand-Control-Support-Questionnaire, DCSQ [86, 87]. DCSQ is based on the Demand–Control Model by Karasek and Theorell and the support dimension is added to the model by Johnson and Hall . The scale consists of three subscales; demands, latitude and support.
Social support will be measured using the 16-item Social Support Inventory (SSI) [90–93]. SSI will in this study be used to measure the participants’ perceptions of received directive and nondirective support in a workplace setting. The scale consists of four factors, with four items in each category; nondirective instrumental, nondirective emotional, directive instrumental and directive emotional.
Workplace inclusion will be measured using the Workplace Inclusion Questionnaire (Sveinsdottir V, Fyhn T, Opsahl J, Tveito TH, Indahl A, Reme SE; Development of the Workplace Inclusion Questionnaire, in preparation). The questionnaire examines attitudes towards including employees with various health complaints and/or limitations at the workplace. The questionnaire consists of short case stories describing people with various common diagnoses, such as BP and CMD, as well as common social groups that may be discriminated for other reasons. Employees and managers are asked to indicate how well the various individuals fit into their workplace. Each case story has four questions. The first two items addresses how well the person in the case story would fit into their workplace. If the respondent does not think the person in the case story fits well or very well into their workplace, the third item addresses the main barriers for this reason. The fourth item asks about the respondents’ previous experience with colleagues or employees that are similar to the case story in question.
Sample size estimation and power calculation
Our estimate of the sample size is based on the results from the project of Odeen et al. , where the same method of data collection was used. We will collect sick leave data at unit level from the participating kindergartens. Data will be analysed at the unit level, according to the principle of assessing effect of interventions at the same level that they are conducted . The data collected will be clustered by companies. Registered number of sick-leave days may follow a Poisson distribution. A straightforward sample size calculation based on an assumption of normal based data is therefore not valid for our project. Thus, we based our sample size estimation on the results from Odeen et al. , since the units we will include in this study are comparable to the units in the study of Odeen et al. They showed a significant change of 11 % in sick leave with 42 and 48 units. We plan to include a minimum of 50 units in each intervention group. If we base our calculation on an assumption that change in sick leave follows a normal distribution, a decrease of 20 % in the MAW group versus the OAW group (from 9.0 to 7.2 %, SD = 3) and a significance level set to 0.05, will have a power of 0.84. 100 kindergartens are estimated to comprise approximately 1100 employees.
Primary analyses of effect
A Generalised Linear Mixed-effects Poisson Model will be used to investigate a possible difference between the two intervention groups on sick leave. The model will estimate rate ratios and will account for the random variation in sick leave days between the participating units, measured repeatedly over time .
Secondary analyses of effect
Analysis of the secondary outcomes will be conducted on the individual level and will be based on changes from baseline. T-tests and chi-square tests will be used to investigate if there are significant differences between the two intervention groups.
The effect evaluation of the modified atWork intervention (MAW) is a large and comprehensive project. We have chosen a randomised controlled design to assess the effect of the MAW compared to the OAW, a design considered to provide the most reliable evidence on the effectiveness of interventions, because the used procedures reduce the risk of confounding factors influencing the results. When finished, the project it will provide evidence based information on prevention of long term sick leave, which may be of considerable benefit both from a societal, organisational, and individual perspective. The project will also generate knowledge on coping expectancies and social support, both strong predictors for health. However, if the MAW proves to be effective, the described study provides limited data to investigate why an effect occurred. Investigating more closely what the participants perceive as useful parts of the two interventions e.g. by focus group discussions, might add valuable insights to our research and intervention development.
The MAW is designed to further improve the effect on sick leave and other health related variables compared to the OAW. Mental health complaints is a frequent reason reported for sick leave and disability pension in Norway, and other interventions providing information about mental health and illness have reported positive outcomes such as decreased stigmatising attitudes, improved health and social skills, greater confidence in seeking help and providing help to others, and increased use of positive coping strategies. The OAW was effective in reducing sick leave and myths about BP, and our hypothesis is that adding information about mental health complaints to the intervention may produce additional positive effects.
Common mental disorders
Modified atWork intervention
Norwegian Labour and Welfare Administration
Original atWork intervention
Randomised controlled trial
Subjective health complaints
Trial management group
Trial steering committee
Ihlebæk C, Eriksen HR, Ursin H. Prevalence of subjective health complaints (SHC) in Norway. Scand J Public Health. 2002;30:20–9.
Indregard AM, Ihlebæk C, Eriksen HR. Modern health worries, subjective health complaints, health care utilization, and sick leave in the Norwegian working population. Int J Behav Med. 2013;20(3):371–7.
Ursin H. Sensitization, somatization, and subjective health complaints. Int J Behav Med. 1997;4(2):105–16.
Andersson GB. Epidemiological features of chronic low-back pain. Lancet. 1999;354(9178):581–5.
Wittchen HU, Jacobi F, Rehm J, Gustavsson A, Svensson M, Jönsson B, Olesen J, Allgulander C, Alonso J, Faravelli C, et al. The size and burden of mental disorders and other disorders of the brain in Europe 2010. Eur Neuropsychopharmacol. 2011. doi:10.1016/j.euroneuro.2011.07.018.
Knudsen AK, Harvey B, Mykletun A, Øverland S. Common mental disorders and long-term sickness absence in a general working population. The Hordaland Health Study. Acta Psychiatr Scand. 2012;127(4):287–97.
Legemeldte sykefraværstilfeller 4 kv 2005–2014. Diagnose og kjønn. Antall. https://www.nav.no/no/NAV+og+samfunn/Statistikk/Sykefravar+−+statistikk/Tabeller/Legemeldte+sykefrav%C3%A6rstilfeller+4+kv+2005-2014.+Diagnose+og+kj%C3%B8nn.+Antall.409372.cms. Accessed 30 Nov 2015.
Waddell G, Burton AK. Occupational health guidelines for the management of low back pain at work: evidence review. Occup Med. 2001;51(2):124–35.
OECD. Sick on the Job? Myths and Realities about Mental Health and Work: OECD Publishing; 2012.
Dekkers-Sánchez PM, Hoving JL, Sluiter JK, Frings-Dresen MH. Factors associated with long-term sick leave in sick-listed employees: a systematic review. Occup Environ Med. 2008;65(3):153–7.
Allebeck P, Mastekaasa A. Risk factors for sick leave - general studies. Scand J Public Health. 2004;32(63):49–108.
Dekkers-Sánchez PM, Haije W, Sluiter JK, Frings-Dresen MHW. A qualitative study of perpetuating factors for longterm sick leave and promoting factors for return to work: chronic work disabled patients in their own words. J Rehabil Med. 2010;42:544–52.
Aamland A, Malterud K, Werner EL. Phenomena associated with sick leave among primary care patients with medically unexplained physical symptoms: a systematic review. Scand J Prim Health Care. 2012;30(3):147–55.
Overland S, Glozier N, Mæland JG, Aaron LE, Mykletun A. Employment status and perceived health in the Hordaland Health Study (HUSK). BMC Public Health. 2006;6:219.
Melchior M, Ferrie JE, Alexanderson K, Goldberg M, Kivimaki M, Singh-Manoux A, Vahtera J, Westerlund H, Zins M, Head J. Using sickness absence records to predict future depression in a working population: prospective findings from the GAZEL cohort. Am J Public Health. 2009;99:1477–22.
Eriksen HR, Hellesnes B, Staff P, Ursin H. Are subjective health complaints a result of modern civilization? Int J Behav Med. 2004;11(2):122–5.
Eriksen HR, Ihlebæk C, Mikkelsen A, Grønningsæter G, Sandal M, Ursin H. Improving subjective health at the worksite: a randomized controlled trial of stress management training, physical exercise and an integrated health programme. Occup Med. 2002;52(7):383–91.
Wilhelmsen I, Mulindi S, Sankok D, Wilhelmsen AB, Eriksen HR, Ursin H. Subjective health complaints are more prevalent in Maasais than in Norwegians. Nord J Psychiatry. 2007;61(4):304–9.
Odeen M, Ihlebæk C, Indahl A, Wormgoor MEA, Lie SA, Eriksen HR. Effect of peer-based low back pain information and reassurance at the workplace on sick leave: a cluster randomized trial. J Occup Rehabil. 2013;23(2):209–19.
Burton AK, Balague F, Cardon G, Eriksen HR, Henrotin Y, Lahad A, Leclerc A, Muller G, Van Der Beek AJ. European guidelines for prevention in low back pain. Eur Spine J. 2006;15:136.
Foster NE, Bishop A, Thomas E, Main C, Horne R, Weinman J, Hay E. Illness perceptions of low back pain patients in primary care: what are they, do they change and are they associated with outcome? Pain. 2008;136(1–2):177–87.
Indahl A, Holm SH, Bogduk N. Sensory motor control of the spine - a Key to Low-back pain? Eur Musculoskelet Rev. 2009;4:44–7.
Sorensen P, Bendix T, Manniche C, Korsholm L, Lemvigh D, Indahl A. An educational approach based on a non-injury model compared with individual symptom-based physical training in chronic LBP. A pragmatic, randomised trial with a one-year follow-up. BMC Musculoskelet Disord. 2010;11(1):212.
Indahl A, Velund L, Reikeraas O. Good prognosis for Low back pain when left untampered: a randomized clinical trial. Spine. 1995;20(4):473–7.
Indahl A, Haldorsen EH, Holm S, Reikeras O, Ursin H. Five-year follow-up study of a controlled clinical trial using light mobilization and an informative approach to low back pain. Spine. 1998;23(23):2625–30.
Indahl A. Low back pain - a functional disturbance. Oslo: University of Oslo; 1999.
Brox JI, Storheim K, Grotle M, Tveito TH, Indahl A, Eriksen HR. Systematic review of back schools, brief education, and fear-avoidance training for chronic low back pain. Spine J. 2008;8(6):948–58.
Hagen EM, Eriksen HR, Ursin H. Does early intervention with a light mobilization program reduce long-term sick leave for Low back pain? Spine. 2000;25(15):1973–6.
Hagen EM, Grasdal A, Eriksen HR. Does early intervention with a light mobilization program reduce long-term sick leave for Low back pain: a 3-year follow-up study. Spine. 2003;28(20):2309–15.
Petrie KJ, Weinman J. Perceptions of health and illness: current research and applications. Amsterdam: Harwood Academic Publishers; 1997.
Malmivaara A, Hakkinen U, Aro T, Heinrichs ML, Koskenniemi L, Kuosma E, Lappi S, Paloheimo R, Servo C, Vaaranen V. The treatment of acute low back pain–bed rest, exercises, or ordinary activity? N Engl J Med. 1995;332(6):351–5.
Kringlen E, Torgersen S, Cramer VA. Norwegian Psychiatric epidemiological Study. Am J Psychiatry. 2001;158(7):1091–8.
Kessler RC, Berglund P, Demler O, Jin R, Merikangas KR, Walters EE. Lifetime prevalence and Age-of-onset distributions of DSM-IV disorders in the national comorbidity survey replication. Arch Gen Psychiatry. 2005;62(6):593–602.
Alonso J, Angermeyer MC, Bernert S, Bruffaerts R, Brugha TS, Bryson H, de Girolamo G, de Graaf R, Demyttenaere K, Gasquet I, et al. Prevalence of mental disorders in Europe: results from the European Study of the Epidemiology of Mental Disorders (ESEMeD) project. Acta Physiol Scand. 2004;109:21–7.
Sanderson K, Andrews G. Common mental disorders in the workforce: recent findings from descriptive and social epidemiology. Can J Psychiatry. 2006;51:63–75.
Andrea H, Bültmann U, Beurskens AJHM, Swan GMH, van Schayck CP, Kant IJ. Anxiety and depression in the working population using the HAD Scale. Psychometrics, prevalence and relationships with psychosocial work characteristics. Soc Psychiatry Psychiatr Epidemiol. 2004;39:637–46.
Harvey SB, Glozier N, Henderson M, Allaway S, Litchfield P, Holland-Elliott K, Hotopf M. Depression and work performance: an ecological study using web-based screening. Occup Med. 2011;61:209–11.
Wang JL, Adair CE, Patten SB. Mental health and related disability among workers: a population-based study. Am J Ind Med. 2006;49:514–22.
Laitinen-Krispijn S, Bijl RV. Mental disorders and employee sickness absence: the NEMESIS study. Netherlands Mental Health Survey and Incidence Study. Soc Psychiatry Psychiatr Epidemiol. 2000;35:71–7.
Stuart H. Mental illness and employment discrimination. Curr Opin Psychiatry. 2006;19(5):522–6.
Kessler RC, Demler O, Frank RG, Olfson M, Pincus HA, Walters EE, Wang P, Wells KB, Zaslavsky AM. Prevalence and treatment of mental disorders, 1990 to 2003. N Engl J Med. 2005;352(24):2515–23.
Richter D, Berger K. Are mental disorders increasing? Update of a systematic review on repeated cross-sectional studies. Psychiatr Prax. 2013;40(4):176–82.
Sandanger I, Nygård JF, Sørensen T, Dalgard OS. Return of depressed men: changes in distribution of depression and symptom cases in Norway between 1990 and 2001. J Affect Disord. 2007;100:153–62.
Simpson KR, Meadows GN, Frances AJ, Patten SB. Is mental health in the Canadian population changing over time? Can J Psychiatry. 2012;57:324–31.
Whiteford HA, Degenhardt L, Rehm J, Baxter AJ, Ferrari AJ, Erskine HE, Charlson FJ, Norman RE, Flaxman AD, Johns N, et al. Global burden of disease attributable to mental and substance use disorders: findings from the global burden of disease study 2010. Lancet. 2013;382:1575–86.
Reme SE, Tangen T, Moe T, Eriksen HR. Prevalence of psychiatric disorders in sick listed chronic low back pain patients. Eur J Pain. 2011;15:1075–80.
Haug TT, Mykletun A, Dahl AA. The association between anxiety, depression, and somatic symptoms in a large population: the HUNT-II Study. Psychosom Med. 2004;66(6):845–51.
Von Korff M, Crane P, Lane M, Miglioretti DL, Simon G, Suanders K, Stang P, Brandenburg N, Kessler R. Chronic spinal pain and physical–mental comorbidity in the United States: results from the national comorbidity survey replication. Pain. 2005;115:331–9.
Demyttenaere K, Bruffaerts R, Lee S, Posada-Villa J, Kovess V, Angermeyer MC, Levinson D, de Girolamo G, Nakane H, Mneimneh Z, et al. Mental disorders among persons with chronic back or neck pain: results from the world mental health surveys. Pain. 2007;129(3):332–42.
Mayr M, S H, Ghedina W, Berek K. Low back pain and psychiatric disorders. Lancet. 2003;http://dx.doi.org/10.1016/S0140-6736(03)12479-8.
Magni G, Merskey H. A simple examination of the relationships between pain, organic lesions and psychiatric illness. Pain. 1987;29(3):295–300.
Van ‘t Land H, Verdurmen J, Ten Have M, van Dorsselaer S, De Graaf R. The association between chronic back pain and psychiatric disorders; results from a longitudinal population-based study. Eur Psychiatry. 2012; doi:10.1016/S0924-9338(12)74324-9.
Compton SN, March JS, Brent D, Albano AM, Weersing VR, Curry J. Cognitive-behavioral psychotherapy for anxiety and depressive disorders in children and adolescents: an evidence-based medicine review. J Am Acad Child Adolesc Psychiatry. 2004;43(8):930–59.
Cuijpers P, Munoz RF, Clarke GN, Lewinsohn PM. Psychoeducational treatment and prevention of depression: the “coping with depression” course thirty years later. Clin Psychol Rev. 2009;29(5):449–58.
Dalgard OS. A randomized controlled trial of a psychoeducational group program for unipolar depression in adults in Norway. Clin Pract Epidemiol Ment Health. 2006. doi:10.1186/1745-0179-2-15.
Cuijpers P, van Straten A, Bohlmeijer E, Hollon SD, Andersson G. The effects of psychotherapy for adult depression are overestimated: a meta-analysis of study quality and effect size. Psychol Med. 2010;40(2):211–23.
Roness A, Mykletun A, Dahl AA. Help-seeking behavior in patients with anxiety disorder and depression. Acta Physiol Scand. 2005;111(1):51–8.
Thornicroft G. Most people with mental illness are not treated. Lancet. 2007;370(9590):807–8.
Andrews G, Issakidis C, Sanderson K, Corry J, Lapsley H. Utilising survey data to inform public policy: comparison of the cost-effectiveness of treatment of ten mental disorders. Br J Psychiatry. 2004;184:526–33.
Mykletun A, Harvey SB. Prevention of mental disorders: a new era for workplace mental health. Occup Environ Med. 2012;69:868–9.
Grønningsæter H, Hytten K, Skauli G, Christensen CC, Ursin H. Improved health and coping by physical exercise or cognitive behavioral stress management training in a work environment. Psychol Health. 1992;7:147–63.
Bovier PA, Chamot E, Perneger TV. Perceived stress, internal resources, and social support as determinants of mental health among young adults. Qual Life Res. 2004;13(1):161–70.
Goldberg D, Goodyer I. The origins and course of common mental disorders. London and New York: Routledge; 2005.
Abramson L, Metalsky G, Alloy L. Hopelessness depression: a theory-based subtype of depression. Psychol Rev. 1989;96:358–72.
Seligmann MEP. Helplessness: on depression, development and death. New York: W.H. Freeman and Company; 1975.
Ursin H, Eriksen HR. The cognitive activation theory of stress. Psychoneuroendocrino. 2004;29:567–92.
Ree E, Odeen M, Eriksen HR, Indahl A, Ihlebæk C, Hetland J, Harris A. Subjective health complaints and self-rated health: Are expectancies more important than socioeconomic status and workload? Int J Behav Med. 2013;21(3):411–20.
Odéen M, Westerlund H, Theorell T, Leineweber C, Eriksen H, Ursin H. Expectancies, socioeconomic status, and self-rated health: use of the simplified TOMCATS questionnaire. Int J Behav Med. 2012;20(2):1–10.
Christensen H, Griffiths KM, Jorm AF. Delivering interventions for depression by using the Internet: randomized controlled trail. BMJ. 2004;328(7434):265–8.
Kitchener B, Jorm AF. Mental health first aid training for the public: evaluation of effects on knowledge, attitudes and helping behavior. BMC Psychiatry. 2002;2(1):10.
Kitchener B, Jorm AF. Mental health first aid training in a workplace setting: a randomized controlled trail. BMC Psychiatry. 2004;4:23.
Mishara BL, Ystgaard M. Effectiveness of a mental health promotion program to improve coping skills in young children: Zippy’s Friends. Early Child Res Q. 2006;21:110–23.
Reavley NJ, McCann TV, Cvetkovski S, Jorm AF. A multifaceted intervention to improve mental health literacy in employees of a multi-campus university: a cluster randomised trial. J Public Ment Health. 2014;13(1):25–39.
Martin A, Sanderson K, Cocker F. Meta-analysis of the effects of health promotion intervention in the workplace on depression and anxiety symptoms. Scand J Work Environ Health. 2009;35(1):7–18.
Fisher EB, Greca AM, Greco P, Arfken C, Schneiderman N. Directive and nondirective social support in diabetes management. Int J Behav Med. 1997;4(2):131–44.
Indahl A. Når ryggen krangler. Vadisholm forlag: Rakkestad; 2003.
Mayo M, Sanchez JI, Pastor JC, Rodriguez A. Supervisor and coworker support: a source congruence approach to buffering role conflict and physical stressors. Int J Hum Resour Man. 2012;23(18):3872–89.
Eriksen HR, Ihlebæk C, Ursin H. A scoring system for subjective health complaints (SHC). Scand J Public Health. 1999;27(1):63–72.
Derogatis LR, Lipman RS, Rickels K, Uhlenhuth EH, Covi L. The Hopkins Symptom Checklist (HSCL): a self-report symptom inventory. Behav Sci. 1974;19(1):1–15.
Strand BH, Dalgard OS, Tambs K, Rognerud M. Measuring the mental health status of the Norwegian population: a comparison of the instruments SCL-25, SCL-10, SCL-5 and MHI-5 (SF-36). Nord J Psychiatry. 2003;57:113–8.
Haavet OR, Sirpal MK, Haugen W, Christensen KS. Diagnosis of depressed young people in primary health care—a validation of HSCL-10. Fam Pract. 2011;28:233–7.
Lipman RS, Covil L, Shapiro AK. The Hopkins Symptom Checklist (HSCL). Factors derived from the HSCL-90. J Affect Disord. 1979;1:9–24.
Quinn RP, Shepard LG. The 1972–1973 quality of employment survey. Ann Arbor: University of Michigan, Institute for Social Research; 1974.
Pond SB, Geyer PD. Differences in the relation between job satisfaction and perceived work alternatives among older and younger blue-collar workers. J Vocat Behav. 1991;39:251–62.
Fields D, Blum TC. Employee satisfaction in work groups with different gender composition. J Organ Behav. 1997;18:181–96.
Theorell T, Michelsen H, Nordemar R, Group SMS. Tre arbeidsmiljøindex som anvents i Stockholmsundersøkningen 1. In: Hagberg M, Hogstedt C, editors. Stockholmsundersøkningen 1 data från en tversnittsundersøkning av ergonomisk og psykosocial exponering samt sjuklighet och funktion i rørelsesorganen. Stockholm: MUSIC Books; 1991. p. 150–4.
Sanne B, Torp S, Mykletun A, Dahl AA. The Swedish Demand—Control—Support Questionnaire (DCSQ): Factor structure, item analyses, and internal consistency in a large population. Scand J Public Health. 2005;33:166–74.
Karasek R, Theorell T. Healthy work: stress, productivity and the reconstruction of workning life. New York: Basic Books; 1990.
Johnson JV, Hall EM. Job strain, work place social support, and cardiovascular disease: a cross-sectional study of a random sample of the Swedish working population. Am J Public Health. 1988;78:1336–42.
Fisher EB. Two approaches to social support in smoking cessation: commodity model and nondirective support. Addict Behav. 1997;22(6):819–33.
Harber KD, Schneider JK, Everard KM, Fisher EB. Directive support, nondirective support, and morale. J Soc Clin Psychol. 2005;24(5):691–722.
Fisher E, Everard K, Gabrielle J, Heins D, Jeffe D, Scott C, Walker M. Measuring Nondirective and Directive Social Support. In. Washington University: Division of Health Behavior Research; 2004.
Gabriele JM, Carpenter BD, Tate DF, Fisher EB. Directive and nondirective E-coach support for weight loss in overweight adults. Ann Behav Med. 2011;41:252–63.
Sorensen G, Emmons K, Hunt MK, Johnston D. Implications of the results of community intervention trials. Annu Rev Public Health. 1998;19:379–416.
We want to thank The National Association of Private Kindergartens for assistance with recruitment and for recommending the project to its members. We also want to thank all members of the research staff, the Norwegian Labour and Welfare Administration, and Vestfold Hospital Trust for their contribution to this project.
The project is funded by Vestfold Hospital Trust.
Availability of data and material
THT, AI, and TLJ designed the study. THT is the principal investigator, and TLJ is the project coordinator. TLJ drafted the manuscript, while THT, AI, VB, and HRE revised and commented on the script. All authors read and approved the final manuscript. The Trial Steering Committee (TSC) is the scientific advisory board responsible for the general overview of the project and progress. The Trial Management Group (TMG) is the project group responsible for the daily management and coordination of the trial. The TSC consists of: • Professor Torill Helene Tveito (principal investigator), • Professor Dr. Med. Aage Indahl (medically responsible doctor), • Professor Hege Randi Eriksen (overseeing the trial). The TMG consists of:• Principal investigator (Professor Torill Helene Tveito), • Trial coordinator (Ph.D.-candidate Tone Langjordet Johnsen), • Medically responsible doctor (Professor Dr. Med. Aage Indahl), • Trial statistician (Ph.D.Valborg Baste).
The authors declare they have no competing interests.
Consent for publication
Ethics approval and consent to participate
The The Regional Committee for Medical and Health Research Ethics for South-Eastern Norway has approved the study (2014/162/REK sør-øst). The research will be carried out in compliance with the Helsinki declaration. Personal confidentiality is guaranteed, and declarations of voluntary participation will be collected from each participant, emphasising the right to withdraw from the trial at any time without any explanation.
About this article
Cite this article
Johnsen, T.L., Indahl, A., Baste, V. et al. Protocol for the atWork trial: a randomised controlled trial of a workplace intervention targeting subjective health complaints. BMC Public Health 16, 844 (2016). https://doi.org/10.1186/s12889-016-3515-x
- Sick leave
- Subjective health complaints
- Mental health complaints
- Musculoskeletal complaints
- Back pain
- Workplace intervention
- Randomised controlled trial | <urn:uuid:170c31f1-84ca-46ab-850d-fa01cbc79c12> | CC-MAIN-2022-33 | https://bmcpublichealth.biomedcentral.com/articles/10.1186/s12889-016-3515-x | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00073.warc.gz | en | 0.888629 | 12,063 | 1.921875 | 2 |
Let's talk mental models. The biggest one we have in IT.
In the broad system of IT management, we often hear of three stages, “Plan/Build/Run.” We make plans for a new IT system, we construct it, and we run it.
IT organizations often structure themselves and communicate to a large degree along these lines. I’ve used them myself in any number of writings. However, I have come to question the usefulness of “Plan-Build-Run” (which I’ll abbreviate PBR) as a mental model for understanding and guiding IT management.
While it pervades IT management thinking, and can clearly be seen in the structures of frameworks like ITIL and COBIT, PBR is ill suited for the demands of 21st century IT management. I believe it is fundamentally a statement of waterfall thinking.
The major structures of Plan, Build, Run in my experience are framed as discrete, mutually exclusive states, with interfaces (information exchanges and control signalling) in between them. The model reflects IT's history of project-centric management, in which large batches of work are moved across those three phases. Since each large batch is fragile and the state transitions are risky and high ceremony, there is also concern for insulating each batch from outside "interference."
This results in systems being built in isolation from one another and without openness to feedback from later stages or other batches of work. Thus we also lose opportunities to learn from mistakes, leverage shared services and ensure architectural consistency across the IT estate.
Continuous improvement cannot be an afterthought. Yet when PBR is the fundamental model, continuous improvement activities are run as spreadsheet-driven initiatives, poorly resourced and in constant contention with the "real" work of Plan, Build, Run. (The classic example is the massive spreadsheet of Audit findings which becomes a political football in The Phoenix Project. Note that I advocate for a broad definition of continuous improvement.) I'd suggest these kinds of approaches are essentially "inspecting quality in" and therefore not what Deming would have wanted. ("We cannot rely on mass inspection to improve quality.")
Finally, is PBR the reflection of your organization's communication structures? Conway's Law would suggest that PBR is the reflection of embedded organizational communications structures - dating I would argue from the time of Frederick Taylor and the worst excesses of hierarchical, command and control management philosophy.
This is probably the most pernicious consequence - specialists in planning, building, and running, all trying to optimize their worlds, with the "planners" at the top, the "builders" in the middle and the "runners" taking orders at the bottom. The trouble is that this idealized hierarchical model is utterly ineffective. It certainly doesn't reflect military principles, often caricatured as "command and control" (see Reinertsen's discussion of military doctrine on decentralized control in Principles of Product Development Flow). Effective product and software development has also long eschewed it; much evidence demonstrates the futility of relying on "expert" opinion and planning in truly complex domains. (See this excellent discussion from a venture capitalist at Y-Combinator.)
Concepts like Lean Startup experimentation, generalizing specialists, and empowered 2-pizza product teams do not seem to reflect a PBR model. In an Agile world, the work boundaries blur across these phases. Those who plan, also build and run, and the primary planning of worth is planning the next experiment for testing.
Some will say this is unfair. One hears various responses:
- Iterate (with increasing speed), either the whole cycle or subsets
- Insert feedback loops.
- See the stages as overlapping
My question is, even with these enhancements, is this mental model the best foundation?
Let's look at the "fast PBR" response a bit more. Agile and Lean Startup arguably would call for many cycles of PBR, with each cycle constituting a test, or a story, or some other small grained delivery. Increasing the speed of this cycle is a widespread theme in discussions of Agile, DevOps, Continuous Delivery, and the rest.
Now if you are going to "spin it faster," a circular illustration would seem more appropriate:
But what happens when we spin this fast? Remember your elementary physics of color? It all blends together, just as we see boundaries blurring today between Dev and Ops:
And when the phases blur, what emerges? That's the question...
Now, I should say... IF YOU ARE LUCKY it all blends together. This assumes that you have somehow overcome the transactional overhead with those state transitions, information exchanges, and organizational handoffs, as you attempt to speed them up.
What if a given state change isn't needed for a particular cycle? You wind up fighting a system hard-wired to protect the role of each activity (and all their sub-activities). You wind up asking to "tailor" methodologies, to exempt your work from activities that are clearly non-value-add, and so forth.
Accelerating PBR isn't sufficient; it is still a sequential process with discrete steps and implications of information and control flow betwen each, reinforcing a dysfunctional division of organizational responsibilities. Can you get up to speed if people are trying to "optimize" the "plan," "build," or "run" phase independently? How can you optimize one third of a wheel?
I ask: is PBR how work really gets done? How value gets delivered? If it is how work gets done in your organization, how effective is it? If you are fortunate to be working in an organization using Agile approaches, can you in truth characterize them as simply "fast PBR"? Does this mental model fundamentally inform your daily experience?
I think "spin it faster" is an insufficient response. A continuous flow is needed. Go back to the blended circle above. We'll pick up there on the next post. | <urn:uuid:14f6ebe4-e366-4a43-abfe-65b586c92dd6> | CC-MAIN-2017-04 | http://www.lean4it.com/2014/05/from-planbuildrun-to-demandsupplyexecute.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00079-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.954168 | 1,230 | 1.8125 | 2 |
The small bushy tailed rust colored furry mammal they named the olinguito was a rare find the first new carnivore species found in the Western Hemisphere in 35 years.
Its discovery is a story that goes back a decade ago to efforts by Smithsonian zoologist Kris tofer M. Helgen to count the number of species of the olingo a member of the raccoon family. At the Field Museum of Chicago what he found in a drawer stopped him dead in his tracks.
The reddish orange pelts he saw were nothing like the skins of the larger brownish olingos. Searching further he found the anatomy of the skull was also different shorter snout dissimilar teeth.
I knew at that point it was a new species but I also knew I needed to be sure Helgen said. For years he toiled away to confirm that the olinguito was a new species with thorough investigation and DNA testing always afraid that another scientist would beat him to the punch.
Finally he called upon Kays the world s resident olingo expert to help him track down an olinguito in its natural habitat. The researchers along with Ecuadorian zoologist Miguel Pinto set off on a weeks long field expedition in 2006 to the Andes.
Among the treetops the team confirmed the existence of four distinct subspecies of olinguito. With its findings the team in the following years mapped out the animal s predicted geographic distributions reorganized the raccoon family tree using DNA sequencing and peered into every nook and cranny of their bones. Finally the team introduced the newly named creature on Thursday.
Getting a new scientific name out there is really fun Helgen said. It s almost like giving birth.
Olinguito is Spanish for little adorable olingo he said at a Smithsonian Institution news conference announcing the discovery. The researchers also published their findings online in the journal ZooKeys.
The discovery corrects a long running case of mistaken identity. For decades the animals had been observed in the wild tucked away in museum collections and even exhibited at zoos including the National Zoo.
In some ways this animal was hiding in plain sight said Kays director of the Biodiversity and Earth Observation Lab at the North Carolina Museum of Natural Sciences. Its pelts and bones were found stashed away in dusty museum drawers either mislabeled or not labeled at all.
One captured olinguito puzzled zookeepers because it refused to breed or mingle with other olingos.
They thought it was just a fussy olingo but turns out it was completely the wrong species Helgen said.
Weighing only two pounds about as much as a guinea pig the creature takes the title of smallest member of the raccoon family. It dines on fruits such as figs but also enjoys insects and plant nectar. Although the new animal is in the taxonomic order Carnivora a group of mammals that includes cats and dogs it is not carnivorous because it does not primarily eat meat. | <urn:uuid:537401da-1a2e-4d54-9112-1dbbe79033f8> | CC-MAIN-2017-04 | http://monicaburns.blogspot.com/2013/08/smithsonian-unearths-new-species-of_15.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00086-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.96436 | 623 | 3.1875 | 3 |
At any one point in time there are thousands of projects being carried out simultaneously across the world. Some will be highly visible projects like new roads or bridges, or a major sports tournament; others will only affect employees in a single organisation. Some will be highly visible failures or successes and others will drift to a completion without being either a true success or a failure.
There are many, complex reasons why projects fail but if you get the planning stage right then that is one more reason to help you succeed so your project does not become one of the ones that never delivered on its promises.
A lack of planning will always contribute towards an unsuccessful project whereas good planning leads to successful projects. By clearly defining the project aims in the planning phase, and by creating an achievable schedule you are more likely to succeed in delivering the project objectives. That sounds pretty simple yet so many project managers rush the planning phase – often due to external pressures – and the project is then set up for failure. A poor plan will never deliver good results.
A good plan will include milestones to help monitor progress and provide the opportunity to re-evaluate deadlines, scope and deliverables, if necessary, or provide confidence that the project is on track. It helps avoid bottle necks when there are complex inter-dependent tasks so ensuring the project can advance to successive phases. A good plan helps compare the original aims with current progress – it is highly likely that your plans will change during the course of the project (rarely do original plans deliver as expected) but a sound initial plan ensures smooth transition to a new plan that will deliver successfully, and will add certainty that the project has delivered successfully. This avoids the situation where a project is finished yet doesn’t “feel” like a success.
Projects often have several stakeholders with different priorities but a good project plan ensures all of their priorities are considered and included in the overall vision of the project. This helps ensure stakeholders are fully committed to the project and will work to drive progress forward – without this stakeholders can become disillusioned about the project and not be there when you need them.
Another element of good planning is incorporating a contingency – both within the budget and the schedule – to account for unforeseen problems that might arise, because things can always go wrong. Without a contingency plan the project is running a real risk of failing to deliver because no allowance for additional costs or time mean that scope and/or quality will suffer, resulting in a deliverable that does not satisfy anyone’s needs
A good project plan should provide a roadmap for every aspect of the project. Amongst other things, it:
- Defines what tasks need to be completed, how and when
- States who is responsible for each task
- Provides a mechanism to monitor and track progress
- Gains commitment from stakeholders
- Has a defined contingency plan for all eventualities
- Defines communication channels
Read our in-depth Guide To Project Management Qualifications for information about the range of professional qualifications that provide a progressive structure for project managers to boost your career prospects.
Learn More about Project Planning
Learn more about project planning with Parallel Project Training Courses | <urn:uuid:5ef334ad-2858-4d05-8563-177d265863d6> | CC-MAIN-2022-33 | https://www.parallelprojecttraining.com/blog/importance-project-planning-project-success/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00665.warc.gz | en | 0.932401 | 653 | 2.5 | 2 |
Rhinoplasty, commonly known as a nose job, is surgery to reshape your nose.
Being a central feature of your face, your nose influences your overall facial appearance and nose re-shaping and re-sizing is commonly performed for cosmetic reasons. It is also carried out for medical reasons such as a nose injury or breathing problems.
Often patients feel the size of their nose is disproportioned with their facial features. Nose surgery can modify the size, shape and overall appearance of your nose.
Your surgeon can make your nose smaller known as a reduction rhinoplasty, or larger by augmentation rhinoplasty. The size of your nose can be changed from your tip to your bridge including your nostrils. The angle between your nose and top lip can also be altered.
Rhinoplasty is usually carried out under general anaesthetic and takes between an hour and a half to three hours depending on how much of your nose needs to be altered.
A rhinoplasty involves either making one cut across the skin between your nostrils (open rhinoplasty), or tiny cuts inside your nostrils (closed rhinoplasty). A closed rhinoplasty will leave no visible scars and causes less swelling.
During reduction rhinoplasty surgery your surgeon may treat these areas of your nose to create your desired look:
The skin over your nose will shrink or expand to its new shape.
The benefits of a rhinoplasty are both cosmetic and medical.
Cosmetically, you may be self-conscious about the shape of your nose and choose rhinoplasty to improve its appearance and make your nose look right for you.
Medical reasons for reconstructive rhinoplasty may include correcting a nose injury where it has been broken or bent or your nasal airways that are causing breathing problems.
The cost of a rhinoplasty will depend on the exact procedure you have.
At Hestanbul we give all patients a written cost quote when they choose a nose job with us and this is guaranteed for at least three months.
Your fixed cost care package will include all of your hospital costs for a rhinoplasty, your cosmetic surgeon, and consultant anaesthetist fees. It also allows for any outpatient care required for 60 days after your discharge and one follow up consultation. without any extra costs.
We offer affordable, competitive and easy to arrange finance options to enable you to have a rhinoplasty without waiting.
You can expect to stay in hospital for one to two nights afterwards.
Your nostrils will be dressed and a protective splint held over your nose with tape to help it reset in the correct position. The splint will be removed after seven to ten days.
Initially you may have some pain and painkillers should control this.
You may also have some difficulty breathing completely from your nose. A nasal spray or drops may help. After three weeks you should be able to blow your nose and your breathing will clear.
Your sense of smell may be affected but will normally settle down after a few weeks.
You may have bruising where your nasal bone has been restructured but this should settle in a week to ten days.
Nasal bones take three months to heal and during this time you need to take extra care not to injure it.
When the splint is removed you will be able to see the major changes but your nose may still be swollen. Swelling will improve over time and the changes to your nose will become more apparent. | <urn:uuid:4765bba5-ccfd-4f0d-9309-ded1b2c1122e> | CC-MAIN-2022-33 | https://hestanbul.com/plastic-surgeries/rhinoplasty/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00271.warc.gz | en | 0.957086 | 727 | 1.695313 | 2 |
Negative swap spreads cannot be a good omen for the financial markets. Interest rate swaps are the most vanilla and widely used over-the-counter derivatives in the world. They are an effective tool in helping institutions hedge interest rate risks. When a company or bank issues floating rate debt but need a fixed rate profile, they can easily swap the floating rate payments to fixed payments. When a pension or insurance company has long duration (10+ year cashflows) and they cannot find any attractive long duration bonds to invest in, they can simply buy short cash bonds and overlay long interest rate swaps to hedge away that long interest rate exposure. Interest Rate Swaps are critical components of the derivatives and fixed income markets.
With that as the backdrop, when something looks strange in the interest rate swap markets I tend to pay attention. Back in July of 2009 I asked whether it made sense that 30 year interest rate swaps were trading at an interest level that was below 30 year government bonds. In fact, 30 year swaps spreads have traded as low as -60bps (-.6% to treasuries) and have bounced around the -17 bps to -4 bps level for most of 2009 and until recently.
I tried to explain away 30 year swap spreads being negative by suggesting that insurance companies and pension funds utilize swaps most aggressively to hedge their long-dated interest rate exposures because they do not require an outlay of cash and because they closely match the way liabilities are modeled (using the swap curve). I guess you could say that I convinced myself that eventually the abnormality would go away and it was a temporary supply/demand issue in the markets.
Today cannot be explained away. Ten year swap spreads have been positive throughout the crisis and remained so until yesterday. Right now, 10 year swap spreads have plummeted to an all-time low of -8.63bps.
The 10 year part of the interest rate curve is very liquid. Supply/demand issues cannot be the cause of this dislocation. So what does this all really mean?
Interest rate swaps are priced off of the LIBOR (London Inter-Bank Offering Rate) curve which is just a fancy way of saying that this curve represents the level of interest rates that banks and financial institutions of AA ratings quality are willing to lend to each other at. If this is the case, the simple fact that US treasuries are trading at interest rate levels that are higher than swap rates would suggest that the US Government has a credit quality that is lower than the AA rated financial institutions. In fact, it could be argued that the entire universe of financial institutions has moved lower in credit quality and may trade closer on aggregate to A+/AA- which would suggest an even lower credit rating for the US government.
I will not make a statement that the US Government is a single A rated entity, but it seems that the alarm bells should be ringing. I hope that this is not a concern over the financial solvency of the government and more of a technical anomaly driven by a glut of treasury supply. | <urn:uuid:eb01bb21-f585-4213-a9c8-e5d6a312b3c4> | CC-MAIN-2017-04 | https://www.bestcashcow.com/articles/us-government-single-a-rated-7847 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00098-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968082 | 619 | 1.953125 | 2 |
What is it?
A Chain of Prayer is when you attend a prayer meeting for a certain number of weeks without interruption in order to see a breakthrough in your life. Whether it is healing, a financial breakthrough or spiritual deliverance that you need, a Chain of Prayer helps you develop the faith and determination to overcome. Before starting a Chain you will need to decide what you want to fight for, and then decide the day, or days, that you will make your chain. A requirement to making a Chain of Prayer is that you attend a Sunday service every week.
Learning to release your faith
When a person makes a Chain of Prayer, their faith is encouraged, awakened and prepared to take possession of God’s promises. But due to the seriousness of their problems, some are so overwhelmed and worried that that they find it hard to use their faith in the first prayer meeting they attend. Though it does happen, only a few receive what they want on their very first visit. One prayer is not enough. Even Jesus taught us to pray always and never give up (Luke 18.1).
Before you start a Chain of Prayer, you should get your pastor’s advice. He will teach you, step by step, how to use your faith to overcome your problems. If you are attacked with doubt or confusion, or if your faith gets weak, do not hesitate to ask for help. Don’t be shy. One word of advice can prove to be invaluable, even more than a prayer. Just like a doctor gives you a series of treatments and monitors your progress until you are completely healed, our aim is to help you through your problems until you are strong enough to use your own faith and no longer need to depend on a pastor’s prayers. The essence of a Chain of Prayer is to teach you to be independent, to depend on yourself and God alone!
The success of a Chain of Prayer depends on your perseverance. If you’re not determined, it won’t work. When you begin a Chain, you are picking a fight with the root of your problems, and negative forces can try to stop you from completing the Chain, but no matter what happens, DO NOT BREAK IT! Be serious about this. It would better not to start a Chain than to start and not finish.
It’s up to you!
A Chain of Prayer is a biblical strategy for conquering blessings: God delivered His people from the Egyptians with 10 plagues; He told Joshua to march around Jericho 13 times; the prophet Elijah prayed for rain 7 different times. It works! It has worked for thousands of people just like you and it could also work for you. No matter how big your problem is, a Chain of Prayer will help you overcome. In fact, being faithful to a Chain of Prayer is proof of your faith to God. It’s time to declare war against your problems. Have you had ENOUGH of suffering? If so, start your Chain of Prayer at your nearest UCKG HelpCentre this week!
Take a look at our schedule of services and read the brief description for each day. | <urn:uuid:c34dc472-2b2e-4c9a-83da-11b4fbf93427> | CC-MAIN-2022-33 | https://www.uckg.org/make-a-chain-of-prayer-it-works-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00267.warc.gz | en | 0.956823 | 649 | 1.5625 | 2 |
Blog 7: 1.2.2 - 1.3.3
If my first question about God is "What is he?" then I am already mistaken. The really important question is "Who is he?"
"What is God like?" The biblical answer is that he is the fountain of all good and that he reveals himself as such in creation. Yes he is a Judge. The naïve reader would expect Calvin to stress that! But grasp this: God is in himself so very good that "even if there were no Hell Christian believers would shudder to offend him." Yes, he is that good!
Of course, all men know there is a God. (And, paradoxically, idolatry is one of the clearest proofs of that.) For a certain knowledge of him (albeit not covenant fellowship, not saving knowledge) is inescapable.
For one thing, we are his image. The sense of dependence on him and duty to him is engraved in us and can never be effaced, albeit we repress and stifle it. The echoes of our destiny and calling to live as God's image can never be silenced, never finally repressed, no matter how hard we try.
Moreover since the entire created cosmos is the theater of his revealed glory, there is no "where" we can go without being confronted by his handiwork. His autograph is everywhere. There is no "where" to hide. Take the wings of the morning, travel faster than the speed of light to the uttermost parts of the earth--and his revelation awaits us the moment we land! It is not just in Brooklyn that there is No Last Exit!
But why would we ever want to escape from the God who is the fountain of all good?
That is the question.
reformation21 is the online magazine of the Alliance of Confessing Evangelicals. It is supported only by its readers and gracious Christians like you. Please prayerfully consider supporting reformation21 and the mission of the Alliance. Please donate here. | <urn:uuid:6d5ab43d-a64f-41f2-a054-a61a2762b5c1> | CC-MAIN-2017-04 | http://www.reformation21.org/calvin/2009/01/blog-7-122-133.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00528-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.975695 | 413 | 1.9375 | 2 |
The UK marine ecosystem modelling community is working with the MSCC and MASTS to develop a five year strategy for ecosystem modelling. To realise the potential of UK ecosystem modelling, we have the following vision:
“To deliver world-class ecosystem modelling that supports our understanding, use, and management of the marine environment through impact on policy and regulatory decision making.”
To achieve this vision, the UK ecosystem modelling community needs to adopt 5 core principles:
- Maximise policy and regulatory impact – ensure policy makers know where and how ecosystem models can be used, and maximise the impact of existing models on policy and regulatory decisions.
- Build multidisciplinary communities – build multidisciplinary communities of policy makers, observationalists, modellers, data scientists, and socio-economists. These will speak a common language, have regular contact, share new policy requirements, and co-deliver ecosystem modelling.
- Deliver novel policy-relevant science through ecosystem modelling – maintain the UK at the forefront of ecosystem model development, horizon scan new science to maximise pull through of new techniques, and put in place programmes to fill existing knowledge gaps that could be addressed using models.
- Ensure quality and availability of model-derived products – define and employ rigorous quality standards to satisfy legal challenge in policy and regulatory decisions, and ensure that model-derived products are available and robust.
- Produce people with the right skills – assess existing UK ecosystem-modelling capacity and develop training programmes for new personnel with the right skills to ensure that the utility of ecosystem modelling is optimised in future.
Image: ERSEM schematic | <urn:uuid:d4f5b1df-75a1-423e-8e42-47d5990aae61> | CC-MAIN-2022-33 | https://masts.ac.uk/archives/the-future/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00671.warc.gz | en | 0.865624 | 328 | 2.09375 | 2 |
Lochcarron is to be a major transport hub for the UK following a major rethink of government policy. HS2 and HS3 will be extended from Leeds to Strathcarron and a new bridge will connect Strome to the Giant’s Causeway in Northern Ireland.
The threat of rockfalls on the A890 Stromeferry bypass will soon be a thing of the past, say Highland Council officials, welcoming today’s announcement. “We have considered several options but following discussions with Dominic Cummings, the Prime Minister has promised to ‘level up’ spending on infrastructure here in the North,” said a spokesperson.
Investment in the new high-speed rail link and bridge is expected to top £300 billion but experts have warned that this figure may treble within the next couple of years, if things go to plan.
Further proposals to expand the airport at Plockton have been described as “totally absurd” by green economists, since this would mean chopping down several more money trees to pay for the project.
Following the recent announcement, house prices on the Isle of Scalpay “went through the roof” for a couple of hours when residents were told that “£300 billion will be invested in HS4.” Prices, however, have stabilised since owners learned that HS4 refers to the new high-speed rail link, not their postcode. | <urn:uuid:cbacc5e0-4fdb-4e19-934d-accdec1d7f6e> | CC-MAIN-2022-33 | https://misguidedtours.co.uk/2020/02/23/hs4-new-solution-for-stromeferry-bypass/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00466.warc.gz | en | 0.968095 | 293 | 1.632813 | 2 |
jbrodkin writes "Google created Chrome OS because Windows is 'torturing users,' Google co-founder Sergey Brin says. Only about 20% of Google employees use Windows, with the rest on Mac and Linux, and Brin hopes that by next year nearly all Googlers will be using Chromebooks. 'With Microsoft, and other operating system vendors, I think the complexity of managing your computer is really torturing users,' Brin told reporters at Google I/O. 'It's torturing everyone in this room. It's a flawed model fundamentally. Chromebooks are a new model that doesn't put the burden of managing the computer on yourself.' Google claims 75% of business users could be moved from Windows computers to Chrome laptops." | <urn:uuid:5baa52af-b2ff-40f5-b4a4-3d64947cc786> | CC-MAIN-2017-04 | https://slashdot.org/~name_already_taken/tags/!darpagrndchlng | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00564-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.916487 | 152 | 1.789063 | 2 |
Carroll Quigley was a legendary teacher at the Georgetown School of Foreign Service. His course on the history of civilization was extra-ordinary in its scope and on its impact on its students. One of his students was future president Bill Clinton. Clinton named Quigley as an important influence on his aspirations and political philosophy. He mentioned Quigley during his acceptance speech to the 1...
Download Link Mirror Link
Go ahead, make his day. Most have been dreaming of this since they began playing in the youth leagues. These buildings were used during the Civil War. Cole (ThD, Australian College of Theology) is the dean and professor of biblical and systematic theology at Trinity Evangelical Divinity School. Download book The Evolution Of Civilizations An Introduction To Historical Analysis Pdf Epub. As a Caucasian father with a Chinese wife and two adopted children from China; a daughter adopted in 1994 (who is now 21) and yes a son adopted in 1995 (who is now 19) we saw first hand the neglect in the Chinese adoption area years before Jenny and Half the Sky started changing hearts and minds. She is a close student of the Dalai Lama, with whom she has coauthored several books. Indeed as Maurice Casey writes: ‘In attributing all his christology to Jesus, John followed a practice which is… typical of the culture to which he belonged… (namely) attributing the community’s beliefs to the fountainhead of their traditions, Jesus himself’ – thus collapsing, like all good fiction, the cognitive distance between reader, writer and subject. As an FBI expert on fine art crimes, her knowledge of Mayan antiquities could be written on a postage stamp. The book was very revelent, informative, and percise in regards to my research project. ISBN-10 4871873498 Pdf. ISBN-13 978-4871873
5) The layout of patterns is unique, easy to follow, easy to read and easy to find exactly what is needed for each pattern6) The charting/reading of patterns is easy no matter your preference7) Most cases the designer dialogues their thought processes on the pattern they contributed. This does not, however, put him in the camp of conservatives like Gertrude Himmelfarb, John Vincent, David Harlan and Keith Windschuttle. "Based on a workshop at the University of Hong Kong in 2012, The United States Between China and Japan is a thick volume of nineteen chapters that provides a comprehensive overview of the importance of the United States for Sino-Japanese relations. Scant mention of BitLocker in this book, one of its major shortcomings. Mary Kay has such a tremendous talent of "transporting" one back to their roots.
- The Evolution of Civilizations An Introduction to Historical Analysis epub
- Download The Evolution of Civilizations An Introduction to Historical Analysis pdf
- The Evolution of Civilizations An Introduction to Historical Analysis txt
- 978-4871873499 epub
- Download 4871873498 epub
Read Art o alice maness returns ebook allhugumokie.wordpress.com Download Deadly trail matt jensen the last mountain man no 2 pdf at bailanzenspys.wordpress.com | <urn:uuid:a79f44ca-9da8-4ac2-a101-7c6a1ea7a1e2> | CC-MAIN-2022-33 | http://nonballoting.duckdns.org/post/the-evolution-of-civilizations-an-introduction-to-historical-analysis | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00473.warc.gz | en | 0.943426 | 668 | 1.914063 | 2 |
The torch has been passed, but who will bear it?
Next generation of Kennedys displays range of talents, yet it’s unclear if this is end of a dynasty
Sooner or later, every political dynasty faces this question: Who are we now?
With the death of its patriarch, that moment has arrived for the Kennedy family. And so a clan that has been defined by the public offices it held must now set a future course without the standard-bearer for its political tradition, Senator Edward M. Kennedy.
It would be premature to declare an end to that tradition - speculation is rampant that the senator’s nephew, former US Representative Joseph P. Kennedy 2d, or widow, Victoria Reggie Kennedy, would run for his seat - but some observers predict a quiet transformation in the family’s identity now that its charismatic leader is gone.
“I have a feeling that many of them are going to opt for making contributions in fields other than politics,’’ said Philip W. Johnston, chairman of the board of the Robert F. Kennedy Center for Justice & Human Rights and former head of the Massachusetts Democratic Party. “They believe that there are many ways to make a contribution, and one doesn’t need to be in elective office to make a difference in the world.’’
To a large extent, that path is already being trodden by many of Kennedy’s two-dozen-plus nieces and nephews, who - with their uncle’s encouragement - have fanned out across the nonprofit, charitable, or private sectors.
Rory Kennedy, the daughter of Robert F. Kennedy and Ethel Kennedy, is a respected documentary filmmaker, while her sister, Kathleen Kennedy Townsend, who served as lieutenant governor of Maryland before making an unsuccessful gubernatorial run in 2002, teaches at Georgetown University’s School of Public Policy. Their brother, Robert F. Kennedy Jr., is an environmental lawyer, author, and radio host. Anthony K. Shriver, the son of Sargent Shriver and Eunice Kennedy, runs Best Buddies, a nonprofit for developmentally disabled people. Maria Shriver, a TV journalist turned author, is married to the Republican governor of California, Arnold Schwarzenegger.
Of the three children of Ted Kennedy and his former wife, Joan, only their son Patrick, a Rhode Island congressman, is in politics. Kara Kennedy worked for Very Special Arts (now known as VSA Arts), a nonprofit that promotes access to the arts for the disabled, while Edward M. Kennedy Jr., after working as a lawyer specializing in disability issues, founded a Wall Street investment firm.
For political junkies who have made a parlor game of guessing which Kennedy will run next, and for what office, it may be hard, even unfathomable, to accept the idea of them as primarily a family of private citizens, albeit public-spirited ones.
Yet the cold reality is that when analysts look up and down the Kennedy bench these days, they don’t see a wealth of political talent - an assessment solidified by Caroline Kennedy’s struggles during her brief interest in filling a US Senate seat from New York (she withdrew in January).
“Slowly fade away: That’s what dynasties tend to do,’’ said Thomas Whalen, a political historian at Boston University and author of “A Higher Purpose: Profiles in Presidential Courage.’’ “That’s what happened to the Lodges, whom the Kennedys overcame.’’ (In 1952, John F. Kennedy wrested a US Senate seat away from Henry Cabot Lodge Jr., whom he later appointed as ambassador to South Vietnam).
Even in Massachusetts, where Kennedys have served in Congress for all but two of the last 62 years, analysts say any family members trying to follow in Ted Kennedy’s footsteps may confront a new skepticism about dynasties.
“There might be enough goodwill, enough romance and nostalgia and so forth, to carry (a Kennedy) into office,’’ said Edward T. O’Donnell, a historian at Holy Cross who specializes in politics. “But the electorate could decide that this is the time to make a break. Leave the Kennedy phenomenon on a high note.’’
Even while he was alive, Ted Kennedy proved to be a hard act to follow. H.W. Brands, a historian at the University of Texas, said Caroline Kennedy’s aborted attempt at a Senate seat illustrated the burden of expectations any Kennedy carries into a political race. “You have no chance to make mistakes off-Broadway, so to speak,’’ observed Brands. “You’re going to be center stage right away.’’
What does history suggest about the fate of family political dynasties when the standard-bearer dies or leaves office?
Sometimes, a complicated stew of rivalries is the result. Brands, the author of “Traitor to his Class: The Privileged Life and Radical Presidency of Franklin Delano Roosevelt,’’ said there was “an ugly split’’ in the Roosevelt family when Theodore Roosevelt died in 1919. Franklin, Teddy’s cousin, quickly moved to establish himself as the family leader, irritating Theodore Roosevelt Jr. There was a period, Brands said, when the “Oyster Bay Roosevelts’’ (the Republican, Teddy-led side of the family) and the “Hyde Park Roosevelts’’ (the Democratic, FDR-led side) did not speak to one another.
In 1924, Eleanor Roosevelt went so far as to campaign against Theodore Roosevelt Jr. when he ran for governor of New York. “I haven’t seen one Kennedy campaigning against another,’’ noted Brands. (Though family members did line up on opposite sides during last year’s presidential race, with Ted Kennedy and Caroline Kennedy supporting Barack Obama and Kathleen Kennedy Townsend, Robert F. Kennedy Jr., and Kerry Kennedy backing Hillary Clinton.)
The issue of family political dynasties has been much talked about in recent years, but most of the talk has focused on two families not named Kennedy: the Bushes and the Clintons. Either a Bush or a Clinton occupied the White House from 1988 to 2008, and it became an issue during Hillary Clinton’s presidential campaign last year.
Nonetheless, speculation about her future presidential ambitions remains, and the name of former Florida governor Jeb Bush continues to be bandied about in Republican circles as a future presidential hopeful.
That suggests the idea of the family political dynasty has not yet run out of steam. Whether the Kennedys decide to test that proposition, or retreat into a more private life, will be answered in the months and years ahead. Johnston, for one, hopes that whatever road they travel, it will be under a lighter load.
“Many of them sometimes feel they haven’t succeeded if they haven’t made some major contribution to public life,’’ said Johnston. “And I feel bad for them.
“It’s unfair to think of them as one entity,’’ he added. “They’re individuals. Particularly for the next generation of Kennedys, or maybe the next couple of generations, the family should do what makes them happy as individuals.’’
Don Aucoin can be reached at [email protected]. | <urn:uuid:8beac01b-4329-4f9e-a9ae-97a141585bb4> | CC-MAIN-2016-44 | http://archive.boston.com/news/local/massachusetts/articles/2009/08/26/who_now_will_bear_the_torch/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00241-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.958468 | 1,569 | 1.640625 | 2 |
Natixis Investment Managers is releasing a series of interviews, inviting you to travel to the heart of the Digital and Environmental Revolution through its new video series Green Mirror.
Because many opportunities arise from the most profound upheavals, Green Mirror is the series that will revolutionise the way customers think about their investments.
Each week, its experts decipher worldwide trends and major changes to study how we can all contribute to a better world together.
EPISODE 7 | Green Robot
By Carmine de Franco, Research Director at Ossiam
What steam engines and electricity were to the Industrial Revolution in the 20th century, computing and data usage will be to the Digital and Environmental Revolution in the 21st century.
EPISODE 6 | Empowerment
By Nolan Hoffmeyer, Senior Manager at Thematics Asset Management
In the 21st century, we are now, more than ever, tenants of this planet. Our consumption patterns are changing, from possession to sharing. The subscription economy is a real vector of emancipation, for consumers as well as for producers...
EPISODE 5 | Diving into murky waters
By Arnaud Bisschop, Senior Manager at Thematics Asset Management
Nothing is more vital than Water... The evolution of our society and our consumption patterns are creating increasingly palpable tensions on the balance between the supply and demand of water. Our common survival depends on the challenge of managing this natural resource.
EPISODE 4 | The "New Green Deal"
By Suzanne Senellart, Head of Environmental Strategy at Mirova
The impact of Man is a threat to the planet, its biodiversity, its resources and its climate. Our economic model is set to undergo a profound transformation, with the generalisation of solutions in favour of decarbonisation and the preservation of ecosystems. Innovation is at the heart of the environmental transition.
EPISODE 3 | The hack of the century
By Matthieu Rolin and Frédéric Dupraz, Senior Managers at Thematics Asset Management
With the growth of digital, our lifestyles are changing and we are more vulnerable. There is an almost endless contact surface for hacking and new protection solutions are becoming essential.
EPISODE 2 | Ever Moore
By Karen Kharmandarian, CIO of Thematics Asset Management and Alexandre Zilliox, Manager at Thematics Asset Management
The power of exponential calculation enables artificial intelligence and robotics to profoundly transform all areas of the economy. Are humans in danger of disappearing in favour of algorithms?
EPISODE 1 | Behind the scenes
With Philippe Zaouati, CEO of Mirova
Social and environmental challenges reach a peak at the beginning of this millenium. We have our backs against the wall, faced with our responsibilities… | <urn:uuid:b6ac2d04-ccfa-4e46-a71c-5115e5de645b> | CC-MAIN-2022-33 | https://natixis.groupebpce.com/natixis/en/digital-and-environmental-revolution-watch-the-green-mirror-series-rpaz5_125014.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00274.warc.gz | en | 0.902318 | 584 | 1.539063 | 2 |
Learn about Vietnam war with Cu Chi private tour
If you are interested in war history, the Cu Chi tunnels is a perfect destination for you to visit. The tunnels used to be the headquarters of Vietcong troops during the Vietnam war where a lot of attacks on Saigon-the capital of the Republic of Vietnam were launched. Joining the Cu Chi private tour, you will get to see the tunnels system as well as the life of soldiers which will remind you about the splendid history of Vietnam.
What to see in Cu Chi tunnels?
Located in Cu Chi district, the Cu Chi tunnels is 70 km from Ho Chi Minh City. It takes you about 2 hours on the bus to get there. Visiting this place, you will have the opportunity to see a complex of underground tunnels which is 250km long. This has been a popular tourist attraction in Southern Vietnam which allows you to learn more about the Vietnam history, about how the soldiers functioned the tunnels as underground cities where they inhabited during the war.
The Cu Chi tunnels is a complex of underground tunnels
The tunnels were designed for small body sizes with narrow entrances and walls, there are even crawl parts of the tunnel that you will struggle to get through. The complex system also has a lot of U-turns and dead ends to make it difficult for American troops when they tried to attack the tunnels. To be able to live underground, they also created an amazing system of water drainage and ventilation holes. This system proves how smart the Vietnam soldiers were, as well as how hard their lives had been.
Additionally, with the Cu Chi private tour, you will see plenty of huge bomb craters. These are the damages caused by the heavy bombing campaigns in the region. Also, you have a chance to discover tiny chimneys under the ground which helped disperse smoke from the kitchens. There are some samples of the food that soldiers ate to survive. Take a tour around the underground tunnels, you will understand how hard life was during that period of time.
Explore the tunnels to learn about Vietnam history
Detail itinerary for the Cu Chi private tour from Ho Chi Minh City
At 8 am, you will be picked up at your hotel, or you can choose other meeting points which is convenient for you and/or friends. Of course you need to confirm with your travel agent where you want them to pick you.
Afterwards, you will be on a private car or minibus (depending on how many people you go with this tour). It takes you about 2 hours to get to the Cu Chi tunnels.
At 10 am, you arrive at the destination. Now you can explore this complex system.
At 12 pm, have lunch at a Vietnamese restaurant to enjoy local cuisine.
After lunch, have a walk around the area, buy souvenirs, then head back to Ho Chi Minh City.
With this tour, not only will you get a chance to see the complicated structure, but also the beauty of the natural environment and geography in the area. | <urn:uuid:88e25307-e7ba-4993-967a-2dbd20ab24ae> | CC-MAIN-2022-33 | https://ractravel.net/learn-about-vietnam-war-with-cu-chi-private-tour/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00267.warc.gz | en | 0.968575 | 613 | 2.0625 | 2 |
Even though Photoshop fails are ubiquitous, many of us still don't realize quite how much our ads and magazine spreads are manipulated.
One young women not only found this reality depressing, but also inspiring.
Anna Hill, a 24-year-old student at East Carolina University, created four images for her final project in an advanced digital photography class showing mock ads for Photoshop itself.
"I thought it would be fun to poke fun at how much beauty ads are overly manipulated," she told the Huffington Post in an email. "They really are altered so much, they may as well be advertising Photoshop rather than the products they actually sell."
Given that a worrying number of female consumers believe that advertisements depict models and celebrities as they seem in real life, these images are a refreshing reminder of just how far digital editing can go.
Hill first shared her images on Reddit, where she revealed how easy it was to see the altered images as more "real" than the originals.
"One thing I noticed when I was doing these that when I suddenly went back to the unedited [image], it looked so wrong and kinda gross," Hill said. "It made me extra aware of how skewed my perception was after looking at the edited ones for a while."
Hill is not alone in her critique of overly-altered marketing images. This year, women's magazine Verily pledged not to Photoshop any of the models featured in their publication. The magazine's founders told HuffPost: "The unique features of women, whether crows feet, freckles, or a less-than-rock-hard body, are aspects that contribute to women's beauty and should be celebrated -- not shamed, changed or removed."
We couldn't agree more. | <urn:uuid:683e05bf-c46a-411a-87c3-09020395a7ca> | CC-MAIN-2017-04 | http://m.huffpost.com/us/entry/4427839?ncid=edlinkusaolp00000003&m=true | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00120-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.975646 | 352 | 1.8125 | 2 |
285/70r17 tiresAug 4th, 2012 | By admin | Category: Automotive
One of the major problems that people face with their vehicles is with tires. Tires are probably the most important part of a vehicle. Tires have to be used properly, and according to the vehicle too. Lots of people debate on this matter of tire selection. There is always a chance that people use different tires on their cars that are wider than the usual tire size. The main problem here is that it is not always good to use different type of car tire on your vehicle. It can cause imbalance in the performance of the car. Therefore, you need to choose the appropriate tire for your vehicle to make up proper performance.
Now, for light trucks and SUVs, there is a particular width tire that is commonly used. These tires are 285/70r17 tires. These tires are most common types of tires that are used on light trucks in winters usually. These are not all season tires, but many people use them throughout the year. Many people do not know about these tires properly. Therefore, they always chose a wrong tire for the cars. This cause lots of problems with the vehicle. Usually, vehicles get imbalanced, and the control over them is lost. In such cases, you should always make proper selection of the tires.
285/70r17 tires are wider than other tires. They have large diameter and aspect ratio. These tires are not meant for speed. They are meant for better hold on the track. Mostly in winters, these tires provide excellent performance. They have improved snow and ice performances. These tires are ideal for such conditions. There are many manufacturers that manufacture these tires. Many big manufacturers are making these tires with lots of creativity and features. These tires are really good for any light truck and SUVs that run on icy surface.
285/70r17 tires are manufactured by Bridgestone, Goodyear tires and many others. These manufactures have changed the basic structure of these tires a lot. Now, there are lots of 285/70r17 tires selections that you can find in the market. A good way to get information about different tires is to check out the description and reviews online. You can check out different reviews given by the users on many websites. You can check out many websites that feature such reviews. To find them, you need to search online on Google or Yahoo, or any other web search engine. You can find lots of such websites that offer such reviews.
These reviews are really helpful for deciding the proper tire. As there are lots of tires that you see in the market, the selection becomes very hard. Thus, there are always problems to choose the proper tire for your vehicle. With the aid of these reviews, you can choose the tires easily. These reviews always help people, and they are best for other people to know the difference between different tires. If you are still not able to decide the proper selection of 285/70r17 tires, you should post your queries on forums to get further help. | <urn:uuid:684b42b9-93cb-43f4-9119-6359c12c5727> | CC-MAIN-2016-44 | http://www.ta-nehisi.com/2012/08/285-70r17-tires.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721387.11/warc/CC-MAIN-20161020183841-00447-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.970231 | 621 | 1.585938 | 2 |
Dora B. Montefiore, New Age August 1905
Source: New Age, p. 506, 10 August 1905;
Transcribed: by Ted Crawford.
What possible connection can there be between my remarks last week anent Queen Alexandra’s speech, calling on women to organise and help more efficiently our soldiers wounded in battle, and this question of the cotton crisis, which today culminates in a notice from the Employers’ Association to the Operative Spinners’ Association to the effect that there will be a reduction in wages of 5 per cent.? Why this connection? That there are other wars than those provoked by militarism; that there is industrial warfare, in which the suffering is prolonged and terrible, and in which the list of maimed, killed, and wounded mounts up to thousands and tens of thousands. That in this present case of reduction of wages, thousands of operatives, the majority of them women, will be affected, and that, as a strike seems inevitable, those women will need help and generous help from their more well-to-do sisters. This is a way in which solidarity amongst women can be most effectually shown, this helping financially of industrially organised women over difficult times. We are getting splendid help from these women in our agitation and propaganda for political equality of opportunity with men; let us not forget that it is in our power to repay in art that debt by quick and generous help in time of strike. Women’s Trade Union organisations are formed always under the greatest difficulties, and those members who persist represent the survival of the fittest (as unionists) amongst their class. Trades unionism is the woman factory operative’s school wherein she learns the nature of public institutions, their uses and necessities, as also how to defend her rights, and remedy her wrongs. Organised women workers have evolved to the stage not only of speaking for themselves collectively, but they have also sufficient individual development to speak collectively through a representative. If the present crisis develops unfortunately into a strike, we can trust the organised women workers of the North to prove their intelligent solidarity with labour. Will the middle and upper class woman prove her intelligent solidarity with womanhood?
I have been very gently called to task by a dear friend, whose opinion value very highly, for having recommended to my readers Miss Robins’ novel, The Dark Lantern; and have been referred to Mrs. Mona Caird’s criticism of the novel in question, in the July number of the Fortnightly. I have read the criticism, which is headed “The Duel of the Sexes,” but which deals for the greater part with an unregenerate article by Lucas Malet. Barely two pages are devoted to criticism of Miss Elisabeth Robins’ book, and I must confess that the perusal of those two pages has left me unrepentant as regards my recommendation to my readers. The book gave me intense pleasure as a work of art (I am not denying, there are, towards the end specially, one or two faults of taste), as a cleverly worked out study of character, and as a brave attempt to reflect a special phase of suffering and stultification that many women undergo as a result of sex repression. I fail altogether to put myself in the position of those people who judge a work of art dogmatically, because of what some of the characters say and do, or fail to say and do. It seems to me that as it takes many men and women to make a world, so it takes many men and women of different shades of thought, and of various temperaments, to make an interesting novel. I fail to see that the modern neurotic, spoilt, over-luxuriously tended and sheltered Katherine of Miss Robins’ story is a modern version of the Patient Griselda of mediaeval fiction. Katherine’s was a “free union” and, as such she, had grasped for herself, and could have made use of, had she chosen to do so, the equality of opportunity which the law denies to her more conventional sisters. I am not forgetting the fact that the couple were married eventually; but Katherine needed to justify to herself spiritually, as well as legally, the step she had taken. Given these factors in the inner drama that was being played out between the couple, it was not meekness, such as that of Griselda, that inspired Katherine’s tolerance of conditions that would have been otherwise unbearable, but pride, intense, scorching but adorably admirable pride, such as is only possible in a nervous, high-strung, exquisitely sensitive temperament, like hers. She loved and she needed to justify her love, not only to her friends, but to herself. Her keen, poetic imagination did not hide from her inner vision the failings of the man she loved; but she possessed a store of that imagination large enough to teach her that his virtues outweighed his failings, and that exterior ruggedness might be fused and melted away in the steady flame of friendship and understanding. Miss Robins, if I understand her aright, never was inartistic enough to wish to make Katherine stand as representative for her sex, but only as a type just as Ibsen depicted Nora and Hedda Gabbler as types. Once having created a type, the author must make him or her speak and act according to their temperament and character and the story must unfold on those lines. It does not follow – and it appears too simply elemental to need explanation, that it cannot follow – that the author, who is the interpreter only does not endorse every sentiment and every action which he describes. Life would be dull indeed if everyone agreed dogmatically, and novels, which should be the reflection of life, must, to be interesting, represent its every facet and phase. We can take our social, economic and political opinions in pre-digested tabloid form every morning in our halfpenny daily; but our mental and spiritual needs call for the strong meat of life, and its sauce piquante – Art.
If the House of Cecil cannot point to a recent record of a wise constructive policy, at least it can pride itself on its destructive capabilities During Friday’s discussion on the Unemployed Bill, Mr. Gerald Balfour moved to strike out of one clause the words sanctioning the use of rates for the payment of labour carried on by the unemployed in farm colonies. Keir Hardie protested against the change to be made in the Labour Bill as illogical, and remarked, “if Parliament realised how charity stank in the nostrils of the working classes, it would not assent to such an amendment.” Lord Hugh Cecil and the Prime Minister then spoke in support of the amendment, which, in spite of Keir Hardie’s statement that a penny rate in the pound would cover the expenses of wages, and Will Crooks’ argument that in a short time these farm colonies would be self-supporting, was carried by 182 against 108. I hope the workers won’t forget how Lord Hugh Cecil stated in Parliament that the payment of labour out of public money would be demoralising; and that the professional unemployed would then be as common as the professional writer of begging letters. Neither must the working woman forget that Keir Hardie moved “that the word workman should include workwomen, any law or usage to the contrary notwithstanding.” The women’s industrial and political champion was assured that the word workman did include workwoman; so when the farm colonies are established I hop, unemployed workwomen will not be backward in their demands for work.
DORA B. MONTEFIORE. | <urn:uuid:ab631aae-0ecf-44cd-bced-cda291b579a8> | CC-MAIN-2017-04 | https://www.marxists.org/archive/montefiore/1905/08/cotton-crisis.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00272-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.974279 | 1,589 | 2.6875 | 3 |
Methods to plan and write stable unit exams with Jest to your NestJS controllers when utilizing MongoDB and Mongoose
On this article, you’ll be taught, by instance, easy methods to plan and write stable unit exams with Jest to your NestJS controllers when utilizing MongoDB and Mongoose. Many of the testing strategies used right here might be utilized with out NestJS, utilizing different DBMS (Database Administration System) and even utilizing a testing library apart from Jest! These are getting used right here as a consequence of their relevance and due to how a lot work they simplify.
Earlier than leaping into the code, lets see a fast overview of the primary libraries used (set up them with NPM).
What will we need to implement and take a look at on this information? We are going to implement and take a look at two endpoints in a NestJS controller. A GET endpoint mapped to a way referred to as
getArticle and a POST endpoint mapped to a way referred to as
The codes and venture construction used listed below are simplified to give attention to the testing features. If you wish to see extra exams and code in a extra full venture context, consult with the next GitHub repository:
This was a problem from Coodesh. Merely put, the aim is to make an API able to interfacing CRUD (Create, Learn, Replace and Delete) operations on a database of area flight information articles.
How would you begin to write your code and the exams? If you have already got your code achieved, good! You’ll be able to write your exams. However I want to shortly discuss a great observe know as Check Pushed Growth (TDD).
In TDD, we observe these three guidelines:
1- You shouldn’t write any manufacturing code earlier than writing an unit take a look at that ensures the proper conduct.
2- You shouldn’t write extra exams than sufficient to the failure.
3- You shouldn’t write extra manufacturing code than sufficient to cross the take a look at.
These guidelines lead us to the next workflow:
First, we write the exams that guarantee the proper conduct of the algorithm we need to implement (“with the X enter, the exception, error, or end result anticipated is Y”). Then, we write simply sufficient code to cross the exams. Lastly, once we enhance our code, we return to step one and a cycle is created.
Instantly answering the query within the matter, we’ll begin from the exams.
The significance of this half can’t be overstated. If we plan our exams incorrect, our code may even be incorrect, thus making us waste effort and time.
The exams ought to mirror the necessities for the characteristic/performance you are attempting to implement. One other particular person should be capable of know what your code takes as enter, what it provides as output and when and the way it will fail. The take a look at is the most effective documentation doable to your code.
postArticle technique should obtain an article as parameter and return the saved model of the article or an exception, in case one other article with the identical title is already saved. The
getArticle technique should obtain a title as parameter and return the article with the corresponding title or
null. These are the behaviors we’re going to take a look at.
Observe: Right here we’re going to use the title of the article (string) as an identifier, however a much better concept is to make use of the personal database id (often a constructive integer).
The Controller, Module and Service
To begin from the scratch, your controller, module, and repair recordsdata ought to seem like the next:
NestJS could already put some easy strategies in your controller and repair recordsdata while you create them utilizing the Nest CLI, however take away them and their dependencies if that’s the case.
We need to save articles to our database, however what precisely is an article? We should outline the construction of an article.
Since we additionally need to persist (save) the articles in our MongoDB database, we should create the corresponding MongoDB schema.
When testing, we use “stubs”. These are situations, with predefined values, of the objects that we’re going to use when testing. It’s a good observe to create a folder referred to as “take a look at” within the root of your venture with a subfolder referred to as “stubs” and save your stubs there.
Since we’ll want an occasion of an article to check our code, lets make an article stub.
Discover that we’re exporting an occasion of the
ArticleDTO referred to as
ArticleSTOStub with predefined values.
We need to return an exception when somebody tries to save lots of an article with a repeated title, so lets write this exception.
We named it
ArticleAlreadyExists, outlined a customized error message (“Article already exists!”) and set the HTTP response code to 400 (Unhealthy Request).
The Database Connection
To setup the reference to the database, we may do one thing like this in our controller:
Mainly, we used the
MongooseModule to cross our schema with the
forFeature technique and the MongoDB connection URI with the
forRoot technique. Observe that right here we’re passing our connection URI by an surroundings variable to keep away from exposing it as a string in our code.
The Base for a Check File
First, lets create our take a look at file. If NestJS already created one for you, delete it and observe together with us. In case of unit exams, create the take a look at file in the identical folder because the file with the code to be examined and title it by appending the .spec suffix within the title of the file with the code to be examined. Jest additionally expects these conventions by default. So, if the controller is named
app.controller.ts, the take a look at file might be referred to as
app.controller.spec.ts and ought to be in the identical folder.
With the file created, lets begin writing some code.
Line 1: We imported a category referred to as
Checkand a kind referred to as
Line 2: We imported the controller we need to take a look at.
Line 3: We imported the service that our controller makes use of/relies upon.
Line 6: The
describefrom Jest creates a block of exams and allows you to cross a string as parameter in an effort to point out their normal objective. Since we need to take a look at our
AppController, lets simply write it.
Line 7: Quickly, we’ll instantiate our controller in an effort to entry its strategies (
getArticle), however lets declare it right here within the international scope of this block in order that we will consult with our controller inside any take a look at (since every take a look at might be a perform contained in the block with its personal scope).
Line 9: The
beforeAllfrom Jest creates a block of code that might be run earlier than any of the exams.
Line 10–15: We compile our utility (
app) passing the controller we need to take a look at and the suppliers it wants.
Line 16: From our compiled
app, we get the occasion of the controller we’d like (
If you happen to write
jest in your terminal and press enter to run, you will note an error, however for those who learn rigorously (all the time take note of the error messages), you will see that what the issue is: Your take a look at suite should include a minimum of one take a look at.
We did lay some foundations, however we nonetheless haven’t written any take a look at.
The Database Connection Drawback
We don’t need to mess with our manufacturing database when testing. You’ll be able to take into consideration organising a distant take a look at database, however that additionally has a number of issues corresponding to schema buildings mismatches, the lack to check offline and the dearth of management over the state of the database when a number of individuals are utilizing it.
Essentially the most used strategy is “mocking” the interactions with the database, that’s, setting predefined responses to the strategies concerned within the retrieval or alteration of knowledge with out actually relying in any type of database occasion.
This technique, nonetheless, often turns into complicated shortly and provides yet another layer of artificiality in your exams. A greater strategy is to run an on-demand and devoted occasion of the database in you RAM for testing. That’s what we’re going to do with
Line 17: We create a brand new MongoDB server and get the daemon (
Line 18: We get the connection URI for the MongoDB server we simply began
Line 19: We join and get the connection to the MongoDB server utilizing the URI
Line 20: Via the connection, we get the mannequin of the schema we need to manipulate (
Line 25: We offer our
Articleschema mannequin, akin to what we did beforehand within the
app.module.ts. The distinction right here is simply that this mannequin is from our short-term RAM database, and never from our actual database specified by the
Now, lets add two extra blocks from Jest, the
Line 31–35: Right here, we’re saying that in spite of everything our exams have run, we’ve to drop (delete) the database, shut the connection and cease the daemon.
Line 37–43: Now, we’re saying that after every particular person take a look at, we’re going to delete all entries (paperwork/knowledge) from our collections. On this case, we solely have one assortment (for the articles), however it’s a good observe to make it extra generalist. The thought is to all the time begin a take a look at with a clear database.
Now, we’re lastly capable of write a batch of exams for the
postArticle technique. Simply to recollect, this technique should obtain an article as parameter and return the saved model of the article or an exception, in case one other article with the identical title is already saved.
To create a batch of exams, we use a
describe block from Jest with a number of
it blocks. An
it block corresponds to at least one particular take a look at situation and may name the
count on perform at its finish to test the situation that validates the take a look at.
Based mostly on our necessities, we will assume in 2 easy take a look at situations.
1 — The article is legitimate and ought to be saved with none drawback.
2 — The article title is repeated and an exception ought to be thrown.
We are going to write one
describe block for the
postArticle technique with two
it blocks, one for every one of many exams.
Line 49: We cross our article stub to the
postArticletechnique and get the returned created article.
Line 50: We use the
count onperform to test if the title of the created article is the same as the title of the article we handed to be saved. The
toBetechnique specifies the logical comparability we need to carry out. There are a number of completely different strategies for quite a lot of checks. If this expression returns something apart from
true, the take a look at is taken into account failed.
Line 53: Right here, we save our article stub within the database utilizing mongoose (discover that we’re utilizing the
articleModel). We may use our
postArticletechnique to save lots of the article stub, however the technique may include extra logic than a easy save, thus introducing extra uncertainties once we merely need to put one thing within the database.
Line 54–56: Right here, we use the
postArticletechnique and attempt to save an article that already exists within the database, since we saved it within the line above, and test to see if the anticipated exception might be thrown. The
rejectstechnique is used while you need to cope with rejected guarantees and the
toThrowtechnique checks if the error is an occasion of
Do not forget that
postArticle nonetheless doesn’t exist, so your IDE may warn you about that and for those who attempt to run the take a look at file, additionally, you will get errors associated to that. Nonetheless, notice that now we already know the way the strategy should behave and we’ve a simple option to test that and present to others.
getArticle technique should obtain a title as parameter and return the article with the corresponding title or return
Based mostly on our necessities, we will assume in 2 easy take a look at situations.
1 — The article with the corresponding title is discovered and returned.
2 — There is no such thing as a article with the corresponding title and
null ought to be returned.
Let’s write the exams.
Line 62: Once more, it is very important not use the
postArticletechnique right here to save lots of the article. If you happen to used it right here and an error occurred within the
postArticletechnique, the take a look at would say that an error occurred when testing
getArticle, making issues extra complicated. All the time attempt to isolate what you might be testing.
Line 63: Right here we use
getArticleto seek for the title of the article we beforehand saved and retailer the return.
Line 64: Now, we test if the title of the article discovered and returned is the same as the one of many article we saved.
Line 67: With out beforehand saving something to the database (keep in mind that the
afterEachtechnique clears the database after every take a look at), we attempt to discover an article by its title.
Line 68: We use
toBeNullto test if the article article is
null, as anticipated.
Now that the exams are achieved, we should always write simply sufficient code to cross them, since passing the exams implies that the functionalities are full and correct.
The main target of the article was the exams, so there is not going to be a lot rationalization concerning the implementation of the strategies itself.
Now, while you execute
npm take a look at within the terminal, all exams ought to run and cross with out issues.
To see the take a look at protection, use
npm run take a look at:cov. The take a look at protection end result reveals how a lot of your code is examined by all of your exams and is an efficient metric for code high quality.
As a way to make your exams run routinely everytime you make adjustments to your code, use
npm run take a look at:watch. There are additionally some helpful VS Code extensions that can assist you monitoring your exams execution, such because the “Jest” extension from “Orta”. | <urn:uuid:b99ad3e6-9e27-41ed-a6fd-93193e65bbdd> | CC-MAIN-2022-33 | https://codinghero.live/testing-controllers-in-nestjs-mongo-with-jest/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00677.warc.gz | en | 0.900284 | 3,537 | 2.0625 | 2 |
Pierre-Antoine Baudouin, The Honest Model, 1769 gouache with touches of graphite on vellum. Overall: 40.6 x 35.7 cm (16 x 14 1/16 in.) framed: 57 x 53.3 x 6 cm (22 7/16 x 21 x 2 3/8 in.) National Gallery of Art, Gift of Ian Woodner
WASHINGTON, DC.- Some 135 of the most significant and beautiful drawings made over a period of three centuries by the best French artists working at home and abroad and by foreign artists working in France will be on view in Renaissance to Revolution: French Drawings from the National Gallery of Art, 1500–1800 in the Gallery's West Building from October 1, 2009, through January 31, 2010. This is the first comprehensive exhibition and catalogue to focus on the Gallery's permanent collection of French old master drawings, which is remarkable for its breadth, depth, and individual masterpieces.
"One of the true glories of the National Gallery of Art's holdings of graphic art is its outstanding collection of French old master drawings," said Earl A. Powell III, director, National Gallery of Art. "The exhibition Renaissance to Revolution and the accompanying catalogue celebrate the singular originality, elegance, and spirit of French draftsmanship."
Jean Poyet, The Coronation of Solomon by the Spring of Gihon, c. 1500. Patrons' Permanent Fund, 2006.111. National Gallery of Art
French Drawings at the National Gallery of Art
Among the National Gallery of Art's extensive holdings of approximately 100,000 works on paper, the collection of 6,000 European drawings includes more than 900 French old master drawings which stand out as a particular treasure. The French group has deep roots in the earliest days of the museum's existence, with the first of these works arriving in 1942, just a year after the Gallery opened its doors to the public. Over the next 67 years, thanks to the generosity of innumerable donors, the collection has evolved into one the Gallery's strongest and most comprehensive, and one of the finest in the Western Hemisphere.
Antoine Watteau, A Man Reclining and a Woman Seated on the Ground, c. 1716. The Armand Hammer Collection. 1991.217.12. National Gallery of Art
Organized chronologically, Renaissance to Revolution presents a visual journey through the development of drawing in France, from its first flowering during the Renaissance through its neoclassical incarnation during the political and social upheavals of the French Revolution at the end of the 18th century.
Lorrain, and Antoine Watteau, as well as many less well-known artists. All major stylistic trends and many of the greatest and best-known artists from these centuries are represented by a rich array of works executed in a variety of styles and media and covering a wide range of functions, subjects, and genres.
Benvenuto Cellini, A Satyr, 1544/1545. Woodner Collection, Patrons' Permanent Fund, 1991.190.2. National Gallery of Art
Many rare and extraordinary masterpieces are featured, such as the exquisite landscape watercolor that is the oldest work in the exhibition—The Coronation of Solomon by the Spring of Gihon by the miniaturist Jean Poyet (c. 1500), who worked for Anne of Brittany, queen of France.
Sixteenth-century highlights include Benvenuto Cellini's drawing of A Satyr (1544/1545), made in connection with a sculpture he designed for the entrance to King François I's chateau of Fontainebleau but never completed, and beautifully wrought designs for pieces of parade armor by Cousin and Étienne Delaune.
Jacques Callot, Gobbi and Other Bizarre Figures, 1616 /1617. Ailsa Mellon Bruce Fund. 2003.6.1.a. National Gallery of Art
Works from the 17th century include an excellent representation of the exaggerated version of mannerism that sprang up in the duchy of Lorraine, with important works by Jacques de Bellange and Claude Deruet, and an appealing group of studies by the exceptionally inventive printmaker Jacques Callot.
The turn to French classicism is demonstrated in stellar works by Simon Vouet and Laurent de La Hyre, while the timeless calm of Claude Lorrain's classical landscapes is beautifully represented in a group of drawings that includes the serenely evocative Landscape with Ruins, Pastoral Figures, and Trees (c. 1650).
Claude Lorrain, The Judgment of Paris, c. 1645. Gift of Mr. and Mrs. Eugene Victor Thaw. 1997.115.1. National Gallery of Art
Within the exceptionally rich collection of 18th-century drawings, the major artists— Boucher, Fragonard, Jean-Baptiste Greuze, Gabriel de Saint-Aubin, Hubert Robert, and Watteau, among many others—are each represented by several works of outstanding quality. Some magnificent pieces by less familiar masters are featured as well, including François-André Vincent's Drawing Lesson (1777), arguably the most perfect representation of 18th-century French elegance, taste, and gallantry; Étienne-Louis Boullée's monumental neoclassical design for a metropolitan church from 1780/1781; and a large and beautiful pastoral scene executed in pastel and gouache, Shepherds Resting by a Stream (1779) by Jean-Baptiste Pillement.
François Boucher, Apollo, c. 1752. Gift of Robert H. and Clarice Smith. 1980.64.1. National Gallery of Art
Also noteworthy is a striking group of portraits by several of the leading pastellists of the period, including outstanding examples by Maurice-Quentin de La Tour and Jean-Baptiste Perronneau, as well as a particularly dashing portrait of a young woman by Adélaïde Labille-Guiard from 1787. One of the youngest drawings in the exhibition is the neoclassical portrait Thirius de Pautrizel (1795) by David, an active participant in the revolution, made when he was imprisoned for his radical politics.
Jean-Honoré Fragonard, The Bedroom (Le Coucher or Ma Chemise brule), Samuel H. Kress Collection. 1963.15.10. National Gallery of Art
A particular strength within the Gallery's collection of French drawings is the genre of book illustration. This is represented throughout the exhibition beginning with the work by Poyet and includes distinctive pieces by such famous masters as Boucher, Fragonard, Jean-Michel Moreau the Younger, and Saint-Aubin, as well as outstanding examples by other supremely gifted but less widely known artists, such as Hubert-François Gravelot and Charles Eisen.
Etienne-Louis Boullée, Perspective View of the Interior of a Metropolitan Church, 1780/1781, pen and black ink with gray and brown wash over graphite on laid paper with framing line in brown ink, overall: 59.4 x 83.9 cm (23 3/8 x 33 1/16 in.) National Gallery of Art, Patrons' Permanent Fund
Jacques-Louis David, The Pantheon, 1775/80. Patrons' Permanent Fund. 1998.105.1.jj. National Gallery of Art
Jacques Androuet Ducerceau I, A Triumphal Arch with Caparisoned Horses and Ornamented Pinnacles, c. 1570. Ailsa Mellon Bruce Fund. 2006.107.1. National Gallery of Art
Jean-Baptiste Hüet, I, Market Scene with a Fantastic Sculpture, 1797/1798. Ailsa Mellon Bruce Fund. 1983.52.1. National Gallery of Art
Claude Déruet, Imperfectorum Academia (Academy of the Imperfects), c. 1619. Julius S. Held Collection. 1985.1.4. National Gallery of Art
Jean-Baptiste Pillement, Shepherds Resting by a Stream, 1779. Robert H. and Clarice Smith Fund. 1983.72.1. National Gallery of Art | <urn:uuid:ee1a92bf-0917-4bbb-821b-1ca07a4b8270> | CC-MAIN-2017-04 | http://www.alaintruong.com/archives/2009/10/04/15306984.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00566-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.904001 | 1,725 | 2.125 | 2 |
It’s no secret that industrial automation improves process efficiency with Digital Twinning and Artificial Intelligence (AI) being the two most notable emerging trends. Near-future expert forecasts predict a radical and permanent shift in product design and development. In its course, it will be up to the most innovative manufacturers to take advantage and benefit from the new product-centred technology.
Does the concept of digital twinning seem too far-fetched to be applicable for small- or medium-sized enterprises (SMEs)? Not really, but oftentimes it seems so. Yet, such businesses are the backbone of the UK economy, so innovative digital helpers, like IndustriGen are quickly filling the niche in supporting them throughout the entire digital transformation process with affordable software solutions. A challenging but truly rewarding endeavor.
What is a Digital Twin: Lifting the Curtains
Whenever there is a new trendy topic, we have to think about how it contributes to the world we live in. In the increasingly digitised communities, we live and work in, the challenge to adapt to new market conditions is present. However, digital twins are not entirely new. The concept dates back from 2002 when prof. Michael Grieves discussed the information mirroring model as part of product lifecycle management and postulated that each physical system also consists of virtual components. Later, NASA officially named the prototype concept “digital twin” while attempting to build a virtual system to control physical ones in outer space.
A digital twin is a real-time digital copy of physical products that helps manufacturers analyse product features, boost future performance and achieve continuous improvement. Digital twinning comes to aid those businesses that are closely intertwined with digital product development, monitoring & predictive maintenance. The true abundance of this technology lies in its vast use cases applied to manufacturing as entire processes gradually become dependent on modern technologies due to accelerated digital transformations. While decades ago, mechatronic systems used to be the gold standard of manufacturing, nowadays Industry 4.0 leads us to new generations of cyber-physical systems with machine-to-machine communication and integrated cloud services.
Who Uses Digital Twins and Should You too?
If you’ve read this far, perhaps you ask yourself what industries can benefit from a digital twin and whether yours is among them. Some major manufacturing industries that already utilise this technology are the automotive, food and beverage industries, aerospace engineering, metal processing etc. New research by Gartner revealed that 31% of surveyed companies adopted a digital twin as an additional Covid-provoked safety measure, allowing remote asset monitoring, while another 27% plan on using this technology autonomously. Think of a digital twin as a virtual data container of products or complex processes such as product design, quality inspection, packaging and performance optimisations – all at your disposal wherever you need it.
In today’s dynamic manufacturing arena having a digital twin means your factory is fully equipped with a mighty assistant in vital areas such as diagnostics, analytics and predictions. Among the many use cases applied to manufacturing is that digital twins provide you with timely performance reviews, an invaluable asset in production. Such reviews simultaneously help cut down manufacturing costs and act as a meaningful step in the decision-making process of production managers and process engineers.
New Emerging Market to Nourish Development
A digital twin can perform insightful simulations from various vantage points and deliver essential information of what’s available and what’s possible. All these lead to deeper product understanding and leaves the doors of optimisation opportunities wide open. This unique tool for virtual representation enables smooth information flow unlocking the full potential of entire manufacturing value chains. Running what-if scenarios boosted by AI capabilities can unfold previously unknown product utilisations.
Product development is inevitably dependent on in-depth market analysis and competition research. Alan Prior, a EuroNorth VP at Dassault Systèmes gives the example of airplanes and deodorants – the latter is quicker to design and run prototype tests on. However, when it comes to producing exceptionally large product quantities, it is essential to fully grasp the manufacturing process to shorten time to market, reduce risks and encourage sustainable production. With a digital twin on your side, you effortlessly run simulations and adapt to changing demands prior to actually implementing product modifications. Not only does this save you valuable time and financial resources in the long run, but you also serve your brand customers better.
While exploring prospective innovative technologies, decision-makers should concentrate on strategic long-term tech solutions that contribute to digital infrastructure. On the verge of Industry 4.0, digital twinning may as well turn out to be one of the best coping strategies for manufacturers to 2020’s powerful adaptation lesson. In case you don’t feel like walking on the untrodden ground anymore, we invite you to apply for our accelerator programme for UK manufacturers, starting in September. Application is open, hurry up as only selected manufacturers will have the opportunity to hear out our industry leaders.
Author Biography Aleksandrina Vasileva
Aleksandrina is a Content Creator at Dreamix, a custom software development company, and is keen оn innovative technological solutions with a positive impact on our world. Her teaching background, mixed with interests in psychology, drives her to share knowledge. She is an avid reader and an enthusiastic blogger, always looking for the next inspiration. | <urn:uuid:98388ff1-5032-4909-929f-d644b8711521> | CC-MAIN-2022-33 | https://industrigen.com/category/manufacturing/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00472.warc.gz | en | 0.916972 | 1,082 | 2.625 | 3 |
I am always shocked when I read or hear about the insect species that are lost and the insects that die because of the chemicals, pesticides and insecticides we use in agriculture and in our gardens.
Insects are extremely important in nature, for instance for the pollination of plants. Without insects many other species, including humans, would not survive. This is the reason we do not use any pesticides on our Succulents.
How to get rid of mealybugs in an environmentally safe manner?
Mealybugs are not uncommon in Succulents. You can brush them off with a little paintbrush or you can wash your plants in a soapy solution.
What you need:
1. Green soap
2. Methylated spirits
3. Warm water
We use approximately 20 grams of green / soft soap. This is old school soap. Do not use any synthetic modern soaps! Add 1 liter of warm water to the soap and 20-40 ml methylated spirits. It takes quite a bit of time before the soap is dissolved in the water. Break up the soap in smaller parts if possible and keep stirring.
Pour the soapy solution into a plant sprayer and spray your plants thoroughly to make sure the mealy bugs are soaking wet. Before you start try to remove any ladybugs or other friendly insects. Spray again daily for 2-3 days.
An even better method is to soak the entire plant in the solution for 10 seconds. Move and turn the plant well while it is under water. Make sure the soil of the pot does not leak out while you do this. I prefer to wash bare-root plants without soil and cuttings in this soapy solution. You can wash your plants whenever you think it is needed. We usually wash our plants 2-3 times a year. | <urn:uuid:9ebcefca-a68e-416a-9343-788334f5f546> | CC-MAIN-2022-33 | https://www.sunnyplants.com/sunnyplants-blog/succulent-care/mealybugs-succulents | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00673.warc.gz | en | 0.936883 | 380 | 2.640625 | 3 |
Network Entropy for the Sequence Analysis of Functional Connectivity Graphs of the Brain
Zhang, C., Cong, F., Kujala, T., Liu, W., Liu, J., Parviainen, T., & Ristaniemi, T. (2018). Network Entropy for the Sequence Analysis of Functional Connectivity Graphs of the Brain. Entropy, 20 (5), 311. doi:10.3390/e20050311
Liu, Jia |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This is an open access article distributed under the terms of the Creative Commons License.
Dynamic representation of functional brain networks involved in the sequence analysis of functional connectivity graphs of the brain (FCGB) gains advances in uncovering evolved interaction mechanisms. However, most of the networks, even the event-related ones, are highly heterogeneous due to spurious interactions, which bring challenges to revealing the change patterns of interactive information in the complex dynamic process. In this paper, we propose a network entropy (NE) method to measure connectivity uncertainty of FCGB sequences to alleviate the spurious interaction problem in dynamic network analysis to realize associations with different events during a complex cognitive task. The proposed dynamic analysis approach calculated the adjacency matrices from ongoing electroencephalpgram (EEG) in a sliding time-window to form the FCGB sequences. The probability distribution of Shannon entropy was replaced by the connection sequence distribution to measure the uncertainty of FCGB constituting NE. Without averaging, we used time frequency transform of the NE of FCGB sequences to analyze the event-related changes in oscillatory activity in the single-trial traces during the complex cognitive process of driving. Finally, the results of a verification experiment showed that the NE of the FCGB sequences has a certain time-locked performance for different events related to driver fatigue in a prolonged driving task. The time errors between the extracted time of high-power NE and the recorded time of event occurrence were distributed within the range [−30 s, 30 s] and 90.1% of the time errors were distributed within the range [−10 s, 10 s]. The high correlation (r = 0.99997, p < 0.001) between the timing characteristics of the two types of signals indicates that the NE can reflect the actual dynamic interaction states of brain. Thus, the method may have potential implications for cognitive studies and for the detection of physiological states. ...
MetadataShow full item record
Except where otherwise noted, this item's license is described as © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This is an open access article distributed under the terms of the Creative Commons License.
Showing items with similar title or keywords.
Chernogorov, Fedor (University of Jyväskylä, 2015)This dissertation is devoted to development and validation of advanced per- formance monitoring system for existing and future cellular mobile networks. Knowledge mining techniques are employed for analysis of user specific ...
Sustaining Attention for a Prolonged Duration Affects Dynamic Organizations of Frequency-Specific Functional Connectivity Liu, Jia; Zhu, Yongjie; Sun, Hongjin; Ristaniemi, Tapani; Cong, Fengyu (Springer, 2020)Sustained attention encompasses a cascade of fundamental functions. The human ability to implement a sustained attention task is supported by brain networks that dynamically formed and dissolved through oscillatory ...
Dissociable Effects of Reward on P300 and EEG Spectra Under Conditions of High vs. Low Vigilance During a Selective Visual Attention Task Liu, Jia; Zhang, Chi; Zhu, Yongjie; Liu, Yunmeng; Sun, Hongjin; Ristaniemi, Tapani; Cong, Fengyu; Parviainen, Tiina (Frontiers Media, 2020)The influence of motivation on selective visual attention in states of high vs. low vigilance is poorly understood. To explore the possible differences in the influence of motivation on behavioral performance and neural ...
Helske, Satu (University of Jyväskylä, 2016)
Spectral entropy based neuronal network synchronization analysis based on microelectrode array measurements Kapucu, Fikret Emre; Vornanen, Inkeri; Mikkonen, Jarno; Leone, Chiara; Lenk, Kerstin; Tanskanen, Jarno M.; Hyttinen, Jari (Frontiers Research Foundation, 2016)Synchrony and asynchrony are essential aspects of the functioning of interconnected neuronal cells and networks. New information on neuronal synchronization can be expected to aid in understanding these systems. Synchronization ... | <urn:uuid:c5cf4364-f553-41d2-bef4-b752cd525e33> | CC-MAIN-2022-33 | https://jyx.jyu.fi/handle/123456789/57786 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00065.warc.gz | en | 0.853848 | 1,017 | 1.507813 | 2 |
Looking to make your home a little smarter?
Smart home projects range from basic to extremely advanced. If you’re just looking to get started with some home automation technology, these 20 smart home project ideas will keep you busy if you’re a beginner.
Smart Home Projects Around the House
Affiliate Disclosure: This page contains affiliate links, which earn us commission from Amazon at no cost to you.
Set your coffeemaker (or grill, or lap or…) on an automatic schedule. Use Belkin’s WeMo Insight Switch to automate anything that plugs into an outlet. Set it on a schedule to turn on at a certain time each day, or connect it with Amazon Echo for voice controls. You can also see how much energy certain products use to figure out where your energy bill is going each month.
Smarten up your sprinkler system. Meet Rachio. It’s the highly rated smart sprinkler system that works with Echo, Nest, Wink, IFTTT, and others. If you’re asking why you would need a sprinkler system, then think of it this way: if it’s forecasted to rain, Rachio won’t water the lawn to conserve water. In other words, Rachio is one of those smart home device that eventually pays for itself while making your life easier.
Invent something smart! Whip out the littleBits Smart Home Kit to build your own garage door monitor, bark tracker, laundry alert, or literally anything else you can imagine. Yes, this might be marketed towards kids, but we are all kids at heart, especially when it comes to smart home projects this cool.
Monitor and secure your Internet. While Dojo is still only available for pre-order, we love the idea of a device completely dedicated to cybersecurity in the home. Dojo monitors your Internet so it can tell when something is different, such as a hacker trying to get into the system. It alerts you with in-app chat messages to help you squash any threats before they get into your network. How is this not already in every home?
Track Your Weight, BMI, Bone Mass, and other data with a smart scale. Fitness lovers and those looking to lose a little extra pounds should get the Easy@Home Bluetooth Smart Scale. Track your progress via the HealthKit app in the iPhone, which can automatically import the data into MyFitnessPal, a popular app for fitness that will motivate you towards health by working with friends and family.
WiFi Light Smart Home Projects
Automate your lights. Using in-app scheduling or IFTTT (If-This-Then-That), it’s super simple to have your smart lights turn on everyday at 8 p.m., or when you walk in the door. If you feel like getting creative, have them flash your favorite team’s colors after a touchdown. LIFX and GE Link are great, inexpensive bulbs to get you started with scheduling.
Illuminate walls with colorful, smart lighting. Lighting determines the entire ambience of your home. Philips Hue Bloom is designed to illuminate walls to make your home’s vibe whatever you want it to be: exciting, relaxing, or anything in between.
Set up voice-controlled light bulbs. “Alexa, turn the lights down to 10%.” “Alexa, turn off the kitchen lights.” Using Amazon Echo and smart light bulbs that are compatible with Amazon Echo like LIFX, you don’t have to fumble through a million apps on your phone or walk across the room to turn off the lights like the olden days. Voice commands are easier than ever.
Get inexpensive motion-detection lights. You may be shocked to know that you can get motion detection lights for under $20. XYMO’s battery-operated, LED motion-detection lights are perfect for stairs, restrooms, or other areas that need illumination at night. These aren’t technically “smart” since they aren’t connected to the Internet. For those, go with SmartThings sensors and compatible bulbs like LIFX or WeMo.
Use light strips to illuminate furniture and different areas of your home. This is one of my favorite smart home projects. Light strips add an entirely different dynamic to your home. With colorful, smart light strips like what is offered by Philips Hue, you can accent the unique features around your home with colors to match the mood–yellow in the morning to energize you, and cool blue in the evenings to calm you for some shut-eye.
Smart Home Projects: Thermostats
Regulate your home’s temperature. With a smart thermostat like Ecobee3, you can install sensors in each room of your home to monitor the temperature and automatically adjust the energy usage for each room. This is a great smart home project solution to that annoying cold room in your house that usually requires several blankets.
Have your thermostat turn itself down when you leave. This feature will save you energy and money. You can also set up notifications if your home gets above a certain temperature and adjust the thermostat remotely with your smart phone.
Connect your thermostat to your lights. Once you teach your Nest Learning Thermostat your schedule, it can control more than just your home’s temperature. Connect Nest with Philips Hue lights so that when your thermostat is set to away, it tells the lights to turn off via IFTTT.
Smart Cameras & Security
Download a free home monitoring app. How does a completely free smart home project sound? Manything (Monitor Anything) and Perch are two free apps that can turn a tablet or old phone into a security camera. You can even set up motion alerts and detection zones to get notified when movement happens in a certain area. They are both completely free, with optional upgrade plans for cloud storage and phone stands to hold the device in place.
Monitor air quality and security in your home with one device. All-in-one home monitoring devices like Canary do much more than just monitor movement. Canary uses HomeHealth to check for gasses in the air. Piper monitors humidity and temperature. Both have 90+ decibel sirens to scare off any intruders.
Automate your alarm so it arms when you walk out the door. Scout home security system, which monitors doors and windows and you can easily self-install, works with IFTTT can automatically arm when you leave for work. Canary also automatically arms when you leave and disarms when you arrive home.
Receive motion alerts. You can’t stare at your security camera all day. That’s why setting up motion alerts is critical. Whether you’re making sure your teenager isn’t ditching class, or keeping an eye out for intruders, you can receive a variety of alerts including email, phone calls, notifications, and anything else you can think of. Even some of the cheapest security cameras have motion alerts, but you can compare all your camera options here to find the best one for your budget.
Ditch your keys for keyless door entry. With August smart locks, you don’t need to fumble through your bag to find keys to unlock your front door. The smart lock replaces your current deadbolt and gives you complete control over who has access and for how long. It also can unlock when you walk up to the door for super easy, yet secure entry.
Smart Home Projects for Pets
Set up a camera that has a built-in laser to play with your pets while away at work. Yep, this actually exists. If you’re wanting to entertain your pets while you’re at work, IndieGoGo product iFamCare camera’s built-in laser pen is the smart home project for you. It can get your cat or dog running laps around the house for hours.
Get a super cheap pet cam. When you’re just watching your dog during the day to make sure they don’t destroy your home, a simple, inexpensive camera will do the trick. The D-Link DCS 932-L is a great example of a cheap camera—it’s usually just $40.
Feed your pet with a smart feeder. I still haven’t decided if this is the greatest invention of all time or completely unnecessary, but either way it’s pretty awesome. Smart pet feeders take the guesswork out of feeding your pet by tracking the calorie intake. The Feed and Go feeder has individual feeding compartments to provide a little bit of food at a time for your pet. It even has a built-in camera to watch your pet munch away, if your day job really is that boring.
What’s your favorite simple smart home project? Comment below and maybe we’ll feature it in our next blog! | <urn:uuid:5459d4c7-8370-476f-af67-65cc63d1c73d> | CC-MAIN-2017-04 | http://smarthomesolver.com/reviews/21-essential-smart-home-projects-for-beginners/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00564-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.920069 | 1,842 | 1.867188 | 2 |
Have you ever needed to capture a screen shot of an entire web page only to be frustrated because the entire page wouldn’t fit on the screen? I sure have, and it’s pretty frustrating indeed when you have to capture the page in segments and try to stitch them together later.
Well, now there’s a great web-based utility that’ll quickly create a screenshot of an entire web page, regardless of its length or width. You can then save the resulting screenshot image as a PNG file.
This awesome utility is simply called Screen Capture, and it works like a charm! Here’s how to use it to create a screenshot of virtually any web page:
1 – Visit the Screen Capture website by clicking here.
2 – Type (or copy and paste) the full URL of the web page you wish to create a screenshot of into the text box.
3 – Click the Capture Screenshot button.
4 – Click the Download Image button.
Important: Pay close attention to the wording on the download button so as to make sure you click the right one! ONLY the button labeled Download Image will allow you to actually download it.
5 – After you click the Download Image button a PNG image depicting the entire target web page will open in a new browser window. Right-click on that image and click “Save image as” to save the screenshot to your hard drive.
That’s all there is to it. I hope you find this awesome tool as useful as I do! | <urn:uuid:7f595a39-96b3-4b8b-a2bd-5c108ffb1a9a> | CC-MAIN-2017-04 | http://www.ricksdailytips.com/take-screenshot-entire-web-page/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00109-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.885582 | 316 | 1.820313 | 2 |
Happy Red Wine Day!
Whether you’re a wine connoisseur, a wine snob, or just a wine lover, go ahead and pour that glass of red as this Saturday is officially National Red Wine Day!
Did you know that there are around 10,000 varieties of wine grapes existing worldwide? Bet you can’t name them!
In the UK, each of us drink 120 bottles of wine every year on average. But don’t worry, we still consume less alcohol than the French, Germans and Spaniards, with us Brits opting more for Merlot, Cabernet Sauvignon, Grenache and Pinot Noir.
Wine has been around for centuries. It’s a complex drink that can take years to perfect. But did you know there is history and science inside every bottle?
- Wines are well attributed to positive health benefits.
Emerging research continues to suggest that red wine, drunk in moderation, offers several health benefits. It lowers your chances of having a stroke compared to nondrinkers. For men and women who drink moderately, it lessens their chance of developing Type 2 diabetes by 30%.
- Believe it or not, there are some people that have a fear of wine. It’s called “oenophobia”.
- 4 to 5 years – is the amount of time it takes for a fresh grape vine plantation to grow and become harvest-able.
- How do you hold a wine glass? There is a right and a wrong way. Wine glasses should be held by the stem, so that the hand does not raise the temperature of the wine.
- The oldest known wine cellar is on the Titanic. When divers went down to the wreckage, surprisingly most of the bottles were still intact.
- ‘Toasting’ started in ancient Rome when the Romans sustained the Greek tradition. They would drop a piece of toasted bread into the wine glass to soften unsavory tastes.
And finally, our favourite fact relates to the tradition of clinking glasses and saying ‘cheers’ and ‘to one’s health’ before taking the first sip.
It started during medieval times when poisoning wasn’t uncommon. When the glasses (or silver goblets) clinked together a little wine would fall from one glass into the other and vice versa. This meant both drinkers knew the other wasn’t trying to poison them!
Thankfully poisoning by wine is very rare these days!
So, choose your red wine and toast in celebration of this ancient drink. I for one will be enjoying a glass tomorrow night (27th August) whilst watching Kate Ferguson sing live here at The Cabin – Cafe & Bar. The weather looks good too…music, food, friends and a glass of wine…what a perfect start to a bank holiday weekend! Why not join us? Our Summer outdoor music events are free!
Happy Bank Holiday and see you at the Club soon, | <urn:uuid:c3e01d89-f20c-4915-b7cf-223079882f45> | CC-MAIN-2022-33 | https://www.china-fleet.co.uk/happy-red-wine-day/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00666.warc.gz | en | 0.94669 | 618 | 2.53125 | 3 |
Wednesday, July 23, 2008
Better By Bike
As reported by TreeHugger, Mexico City has a new bike rental program called Mejor En Bici or Better By Bike. "To use the bikes, users must register, sign a form, and leave a piece of identification and a deposit of 200 pesos (about $20), which is returned when the bike is dropped off at the same station. The bikes are available from Tuesday to Sunday 10 am to 6 pm."
While not quite bike-sharing as the three urban stations appear to be staffed and don't allow for a different drop-off location, bike use programs of all kinds such as this one and employer bicycle fleets (i.e., bicycle libraries) are gaining popularity around the world with the rise in the cost of energy and greater concern about the environment.
Image credit: Travesias | <urn:uuid:6fa35da7-973b-4138-bdca-1b1fc8302305> | CC-MAIN-2016-44 | http://bike-sharing.blogspot.com/2008/07/better-by-bike.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00065-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.952951 | 176 | 1.570313 | 2 |
None of these options are important for the normal use of Drive Snapshot;
usually you should use the default settings.
forces or disables use of VSS (Volume Shadowcopy Service); see also
Disk image files can become rather large, if saving big partitions.
However they should not be larger then certain limits, else they will not be usable by DOS (limit = 2047 MB) or will not fit on a CD-R/W (Limit 650-750MB)or an ISO-DVD (Limit 2048 MB).
So Snapshot will cut the disk image file after a preset size (default=650MB),
and create several files with extensions
SNA, .SN1,.Sn2,..,.SN9,.S10...S99,.100...999,.1000 etc
By default the limit is 1500 MB, so 3 image pieces fit on a DVD.
This saves each and every cluster on the disk, ignoring the free space
This has its use if you are trying some 'Data Recovery' Tool to recover
some data from a damaged disk, but want to be able to restore the original state
in case the 'recovery' fails.
Usually, with each full backup, also a .HSH hashfile is created, which is used for differential images.
If you don't plan to use differential backup, clear this option.
with [Create Hash file from full image] you can recreate a .hsh file from the full image.
Saves these settings to be used as new default settings. | <urn:uuid:23476d09-605c-4019-b8fb-40f3845bb181> | CC-MAIN-2022-33 | http://www.drivesnapshot.de/en/iadvbac.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00269.warc.gz | en | 0.86728 | 322 | 1.507813 | 2 |
Above: 📷 via canfocus.com
By contributor Kelly Whiteside
Time I started writing this article: 3:24pm.
Time I finished writing this article: 9:47pm. Time actually spent writing this article: 32 minutes.
Time spent scrolling through Facebook: Five hours, 51 minutes
It’s so easy to get lost in the vortex of social media. You’re just quickly checking what time that event is at tomorrow, but then that video on your news feed automatically starts to play and you find yourself watching it even though you don’t really care for the content but it’s already started playing so you might as well finish. Then after it’s done you casually scroll through the comments, amusing yourself with the petty arguments of strangers. Half an hour later, you’ve completely forgotten what you originally opened Facebook for, so you continue down the news feed, watching every video that pops up. An hour later, you’re creeping the Facebook profile of that person from high school you never really talked to, but you suddenly just remembered existed when you saw their name tagged in the comments of one of those videos, so now you need to know who they’re dating, and where they work, and how hot they’ve gotten. Two hours and 17 minutes later, all the creative DIY videos have you planning how you’re going to completely remodel your house. Four hours and three minutes later, you’ve given up all hope on anything creative and resorted back to scrolling through your Facebook feed. Four hours and 56 minutes later, you’ve watched precisely three videos on various recent “break-through scientific studies” and five videos on some cool new gadget which will be on the market later this year that you’ll never hear of again. Five hours and 12 minutes later, your Google history is looking extremely questionable. Six hours later, Facebook is now showing you advertisements for cancer treatment groups and trips to Vilnius, Lithuania and you’ve decided you’re going to quit your job and earn money by making pointless YouTube videos. | <urn:uuid:5abbac90-7b12-4e01-b553-7dfdb6d79294> | CC-MAIN-2022-33 | https://www.thenav.ca/2017/04/05/the-social-media-vortex/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00674.warc.gz | en | 0.933115 | 440 | 1.742188 | 2 |
12 things to know about Nigeria’s first digital currency eNaira can be accessed below.
Glamtush had earlier reported that President Muhammadu Buhari on Monday, launched Nigeria’s first digital currency, eNaira.
Buhari unveiled the digital currency at the State House, Abuja with top government functionaries in attendance.
The digital currency was flagged off with over N500m of the currency minted by the CBN.
Speaking during the unveiling, the Governor of the Central Bank of Nigeria (CBN), Godwin Emefiele, disclosed that 33 banks had been fully integrated and live on the pl atform.
However, as the new eNaira hits Nigerians, below are 12 things to know it.
- It is a digital storage that holds the eNaira.
- It is held and managed on a distributed ledger.
- It can be used for remittance, which includes a cheaper diaspora remittance option.
- It is traceable so fraudulent activities can be traced.
- It can be used for international and local trades.
- It has a unique identity and security structure.
- It is exchanged peer to peer.
- It is universal – anybody can hold it.
- It does not yield any interest.
- Payments can be made by scanning QR codes.
- You can monitor your e-wallet activities.
- First digital currency in Africa. | <urn:uuid:8f124388-244d-4ca0-9bcf-804f863431d9> | CC-MAIN-2022-33 | https://glamtush.com/12-things-to-know-about-nigerias-first-digital-currency-enaira/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00671.warc.gz | en | 0.925492 | 304 | 2.1875 | 2 |
Why I quit my job to work from home
My family and I had no choice but to get out of our jobs to get the energy we need, says energy assistance co-founder, Natalie Nelis.
“The idea of getting paid for something I am doing from home was unthinkable, but I was lucky enough to get a job with an affordable electricity plan and a good contract.”
Neles has been working in the energy sector for the past 10 years.
The 26-year-old originally joined the firm to help manage the transition from her previous role as a corporate lawyer to becoming a full-time energy assistance employee.
“There are a lot of companies who are trying to help you out, but the reality is you are not in a position to make that decision on your own,” she said.
“You have to be offered something.”
For many people the transition to the energy market is not an easy one.
Many people find it difficult to find a job that will enable them to stay on top of their bills and keep up with energy bills.
They often end up cutting back on activities they enjoy, such as travelling, working out and spending time with family and friends.
While the transition can be stressful for people, Nels said it can also be very rewarding.
“In the energy economy, people are really working hard to stay connected to their communities, to keep their home powered and to save for a long-term future,” she explained.
“We have seen the transformation of energy markets over the past few years, and the changes are starting to impact everyday people.”
She said she has seen many people come out of the energy assistance market, including former students and people who were employed, “because they can’t afford to keep the lights on”.
But Nelas said she would not recommend leaving the energy industry for any other reason than the sheer challenge of being able to live off-grid.
“It is a very unique position and it can be very stressful,” she added.
She is not alone in her enthusiasm for the energy-saving opportunities the energy assist industry offers. “
As a result, it is much harder to move on to the next level.”
She is not alone in her enthusiasm for the energy-saving opportunities the energy assist industry offers.
Neli has spoken at international energy industry conferences around the world, and has even received a call from a potential employer.
“I was so excited when I heard it was an opportunity, but then I heard from my company and they were like, ‘You have two months to make this decision’,” she said, adding she would be happy to talk to them again if they are still interested in the position.
She said the energy aid industry has also been helping her in the last few years by helping her find the right fit for her career, and by providing financial support.
“Being an energy assistance worker is incredibly rewarding and rewarding to be in,” she told MTV News.
“But it can definitely be a struggle.”
Nellis has been fortunate to have been able to transition to working from home, and she said that, although the transition is not a smooth one, it has helped her with her financial needs.
“What I have found is that being an energy assist worker has been great,” she admitted.
“Because I am not the kind of person to be too picky, I have managed to save up on energy bills and also on rent and utilities.”
The experience has also helped Nelises learn more about the energy markets.
“A lot of people get stuck in the middle of things, and it takes a lot to get things moving,” she pointed out.
“That is why we need to be looking for solutions, and there is nothing worse than someone that has to find themselves in that position.”
Nels said her company is now working with other energy assistance providers to find out how to best support energy assist workers.
“Energy assistance is a great thing to do because it brings people together, it helps to connect people, and I think it is great for people,” she concluded. | <urn:uuid:ab189675-b551-4735-a5df-0803f92ca860> | CC-MAIN-2022-33 | https://b2becworld.com/tag/bang-energy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00465.warc.gz | en | 0.986833 | 899 | 1.664063 | 2 |
Addictive disorders are medical diseases that are common in America. Approximately 10% of American’s will have an addictive disorder in their lives. Many of these will require medical treatment. This is what I offer in an office/clinic setting.
Behavioral disorders commonly occur with addictive disorders. These conditions can include depressive anxiety and bipolar diseases. It is essential that these medical diseases be treated as well. It is a difficult to achieve and maintain sobriety without treating these disorders. | <urn:uuid:c79ce0a5-8573-46b1-bb6c-81850c72c4f4> | CC-MAIN-2017-04 | http://suboxonewilmingtonnc.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00019-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.970792 | 99 | 2.1875 | 2 |
Peace and Justice for Guam and the Pacific.
It is still online and features more than a thousand articles from a variety of sources dealing with issues of peace, militarization and culture primarily in Guam, but also in the wider Pacific. I was working on the draft of an article recently talking about Nasion Chamoru and their effect on Chamorro activism and Guam society. I found on that blog several articles and I wanted to share some of them below.
Mayors shuns Chamorro Nation
By Mar-Vic Cagurangan
Variety News Staff
July 16, 2007
senators yesterday gave the Japanese delegation a rundown of demands
that they want from the U.S. government in exchange for hosting the
8,000 troops that will be relocated from Okinawa, while Chamorro
activists told the delegation that they don't want the Marines to come
to Guam at all.
The delegation, however, declined to give audience to Chamorro Nation.
for infrastructure developments, healthcare, new schools, new
hospitals, environmental protection, social stability and peace: these
are among the things that senators said they expect the U.S. government
to provide to Guam.
All these, plus transparency. There are so
many questions left unanswered, Sen. Tony Unpingco, R-Santa Rita, said,
adding that Guam has not received enough information about the troops
"You've experienced what it's like to live in a
military base. We want to learn from you, so that when they come here,
they don't create the same problems," Unpingco told members of the Local
Government Mayors Association of Central Okinawa who are on Guam on a
"It's important for us to know what it's
like to have a big military base on a small island. We're hoping that
you can tell us its negative impact," minority leader Judi Won Pat,
Vice Speaker Eddie Calvo, R-Maite, said the business community sees the economic opportunities offered by the military buildup.
has different views about the relocation. Some people see this movement
as a positive development. I'd like to hear the perspectives on your
side," Calvo told the delegation.
But Okinawa City Mayor Mitsuko
Tohmon, head of the 18-member delegation, said her group is on Guam to
gather information pertinent to the military relocation.
purpose of our visit is to listen to your opinion," Tohmon said through
an interpreter. Japan and the US agreed to relocate 8,000 Marines and
their 9,000 dependents to Guam so we want to hear what's going on in
Guam. "We are representatives of our citizens. We are here to listen to
Among the senators, only Won Pat came on time to meet the
delegation members who arrived at the Legislature ahead of the 1:30 p.m.
schedule. The rest of the senators walked in 15 to 20 minutes late into
While waiting for the rest of the senators, Won
Pat allowed members of the Chamorro Nation to join the roundtable and
speak to the Okinawa officials.
"We're not invited to this
meeting, but we have to say how we feel because two big powers are
negotiating our future. Please step in and support us," activist Trini
Cathy McCollum said she laments that some people
only see the dollar sign without thinking that we want to go home to our
own lands that the federal government took away.
"Tell me, if
you know, the reason behind this military relocation. Guam is not ready
for this massive military buildup," said Ben Garrido, Maga'lahi of
Tohmon said she was confused by the presence of Chamorro Nation at the meeting.
thought we were to meet only with the Speaker and the senators. We want
to speak to the speaker and senators only, she said. We have heard
about what the Chamorro Nation has to say. We want to know your own
opinion as senators."
Won Pat gently asked the activists to
leave the roundtable. Shortly after, activist Howard Hemsing walked into
the session hall bringing a bunch of anti-military placards.
Won Pat said testimonies from Chamorro Nation indicate that Guam does not have a unanimous stance on the military expansion.
are those who want the Marines to come here because of the economic
benefits that the buildup offers. But not everyone on island wants them
here. There's a lot of people with a lot concerns about the impact of
increased military population on island," Won Pat said.
The delegation, which arrived Wednesday, leaves Guam today.
Activists demand back story on Marine migration
by Michele Catahay, KUAM News
Thursday, July 12, 2007
of I Nasion Chamoru ("The Chamorro Nation") were at the Chief Quipua
Park in Hagatna late yesterday afternoon to protest various concerns in
the community, most notably the upcoming massive military buildup on
Guam. The organization's, maga lahi (the highest ranking male), Vicente
Garrido, believes the buildup is not a good thing for the island.
a Japanese delegation visiting from Okinawa is on Guam, Garrido says he
wants them to tell the local community the real reason the Okinawans
want United States Marines to move out of their island. "There must be a
good reason why," he suggested. "Otherwise, if it's really good for
them, they're not going to send those Marines to Guam because it's going
to help the economy...that's what they say. There must be some reason
why. I want those people in charge of Okinawa to tell us why they want
those Marines out of Okinawa."
While some continue to fight
against the move, others are more concerned about the taking of land at
Ritidian and Tiyan. One such activist, Katherine McCollum, continues to
fight against the taking of indigenous land. "We are threatened
everyday; Tiyan, especially with the enclosure that the Guam
International Airport Authority has put on the families up there in
closing their properties with the fences and there are issues about
sewage problems. My family is being charged for sewage, which are
services they're not getting," she told KUAM News.
when people suffer it hurts families, adding that she wants to see these
families build homes and live in their homes as equal private property
owners. Meanwhile, the group continues to fight for self-determination,
return of lands and vows to continue to fight against what they feel is
the military contamination of the land.
'It's better being poor than dead'
THE Congressional hearing on
August 13 on the military buildup on Guam was intentionally planned as
to who should be allowed (now "invited") to testify. That's why there
was no mention in our local media about the deadline to submit your name
and testimony if you wanted to participate.
I "thank" our
delegate, Madeleine Bordallo and this administration for barring certain
activists such as Nasion Chamoru, who have been the most vocal and
outspoken against this impending catastrophe.
leaders know very well that they don't want the Virgin Islands delegate,
Donna Christensen, and the rest of the "Team U.S.A." Resources
Subcommitte members, to see and hear Nasion Chamoru testify that this
massive military buildup will ruin Guam. They only want to hear from
people who will give their "amen" and "sweet" testimony about how good
this military buildup will mean to our island, for the so-called
economic boom and opportunities.
Our senators who were "invited"
to participate in this field hearing should refuse the invitation since
it is not totally open to the community for public participation.
see this hearing, except for a few individuals, as nothing more than a
gathering of the puppets and carpetbaggers to show their commitment to
the military and in the interest of their deep pockets.
people, we are in a very critical crisis. Whereas, I say that this
massive military buildup will ruin Guam, I also say it would be better
being poor than dead!
Fan Ma'naitai (pray) yan si Yu'os enfanbinindisi. Biba Chamoru! Biba Taotao Ta'no!
VINCENTE "FA'ET" GARRIDO
Maga'lahi, Nasion Chamoru
The Marianas Variety
August 10, 2007
DEIS gives rise to a new breed of local advocates
Wednesday, 10 February 2010 04:03
by Zita Y. Taitano | Variety News Staff
A new voice to reckon with
draft environmental impact statement, released to the public in
November, sparked a wide array of concerns and serious inquiries from
residents and activists. It also gave rise to a new group of advocates
for local issues who have immediately made their mark in the community.
as We Are Guahan, the coalition is comprised of individuals from
various ethnic backgrounds. They are people who were either born and
raised on Guam or those who now call the island their home.
But group members Melvin Won Pat Borja and Victoria Leon Guerrero said they don’t want the group to be portrayed as “activists.”
admirable but to say We Are Guahan is an activist group is inaccurate;
we stray away from activism. Our goal is to inform; our goal is to
unite,” said Leon Guerrero.
Borja said their intention is simply
to be educated on the document, read it and then comment on it. “I think
that if we see what the plan is really about, the more informed we
are,” he said.
Borja said the
group actually started out with a bunch of friends who wanted to dissect
the draft environmental impact statement in order to understand what is
really being said in the 11,000-page document.
From there, the
group set up at various venues to promote residents to learn more about
the draft study. That was the goal of the Guam Music Festival held last
December at the Paseo Stadium.
Guerrero and other members including Monaeka De Oro informed
individuals they met about the document and passed out flyers on the
effects the buildup would have on Guam.
When the hearings began,
the group took a few steps further and spoke out against the buildup.
They set up tables and posters pinpointing sections of the draft study.
Among the posters that were on displayed was the name of the coalition.
“We felt the community really needed to be informed. We couldn’t be voiceless,” Leon Guerrero said.
They organized a hike to Pagat, where the military plans to build a firing range.
“We kind of switched gears and became more active in speaking out on these issues,” Leon Guerrero said.
From there, We Are Guahan was born.
Flores Mays speaks before a crowd on board the Atlantis Submarine prior
to Sunday’s snorkeling trip to Apra Harbor’s Western Shoals, where the
military plans dredging activities to accommodate more military vessels.
Leon Guerrero said the group, which has about 5,000 members,
started with members aged between 20s and 30s. The group membership has
since expanded to a wider spectrum.
“It’s really a diverse group,” Leon Guerrero said.
The group also includes biologists, educators and social workers, who are helping in the dissection of the huge draft report.
what’s cool about We are Guahan. We are all inclusive,” Leon Guerrero
said. “We welcome all perspectives and for people who are part of this
island, who have been part on this island and want to be part of this
island in the future.”
Are Guahan has received high praises from veteran activists including
Josephine Jackson, Danny “Pagat” Jackson, Hope Cristobal and Trini
“I give them kudos. I’m very proud of what they’re
doing,” said Josephine Jackson, a member of the Taotaomona Rights Group
and Nasion Chamoru. “We want our youth to go out. I’m so glad that they
did this that they came out to speak out on the draft impact report.”
She explained that the younger activists made it easier for manamkos such as herself to understand the draft study.
For more information about We Are Guahan, residents can log onto their website at www.weareguahan.com. | <urn:uuid:f3838fdf-a3e9-4a5d-b892-851b44a2bac8> | CC-MAIN-2017-04 | http://minagahet.blogspot.com/2015/09/nasion-chamoru.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00229-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.953643 | 2,705 | 1.585938 | 2 |
Dental implants are a common choice for bringing back lost teeth. Many patients are extremely pleased with their new implants, thanks to their numerous benefits. However, the implication and the treatment for placing them are not well comprehended by the general public. Therefore, there are numerous misunderstandings about them.
Myths Surrounding Dental Implant
Dental implants have entirely changed the game when it involves tooth replacement. However, although this sophisticated dentistry strategy has assisted numerous patients in regaining beautiful, full smiles, numerous myths continue about it in public awareness. Here are four misunderstandings regarding dental implants you can dispel relating to restoring lost teeth.
Use these details in conjunction with valid data to effectively restore your smile’s health, fullness, and beauty.
Myth 1: Dental Implant Procedure Is Risky
The success rate of dental implants is exceptionally high, ranging from 95% to 99%. However, a detailed consultation, exam, and planning process will happen before the implant procedure to ensure a satisfying outcome. Therefore, it is essential to find a dentist from Las Vegas dental care clinics you can trust and have them perform a detailed evaluation to ensure your oral health is in good working order before they even consider suggesting this operation.
Myth 2: Dental Implant Surgery is Painful
Dentists utilize current anesthesia, sedation, and surgical procedures and technology to let patients recover from dental implant surgery as quickly as possible. In many cases, implantation is an outpatient procedure that can be completed under local anesthetic using sedation dentistry.
Regular doses of over-the-counter pain medication, paired with easy self-care activities like washing with salt water, are often all that is needed in the first couple of days. Many individuals return to work and normal tasks within two to three days of the surgery. If you have still doubts about the procedure, you can look for tooth implants testimonials to know their experience with this surgery.
Myth 3: Dental Implants Are Pricey
“It’s extremely costly to get implants for your teeth” That’s what every person assumes, all the time. Although dental implants are much more pricey at first than other tooth-replacement selections, there are substantial advantages that make dental implants less expensive over time. Dental implants are a long-lasting choice for people who have lost their natural teeth. Dental implants keep your jawbone from atrophying, sparing you money in the long run.
There will be no more dental consultations that are as well pricey. If you can not spend for dental implants ahead of time, many flexible financing choices are offered to you, including short- and long-term programs. On the other hand, if you do not have a sufficient budget, you can have the best dentures for the meantime while saving up to get a dental implant.
Myth 4: It Looks Unnatural and Feels Fake
Dental implants are nearly indistinguishable from natural teeth in both look and function. The titanium rod is put into the jawbone immediately. As the roots of a normal tooth do, the two turned into one with time. Prosthetic teeth consist of lasting products that thoroughly copy the appearance of your real teeth, so even someone checking out them attentively should not see the difference.
It is difficult to compare dental implants and natural teeth while eating and speaking.
Do not be controlled by the erroneous information that is being spread. An experienced dentist can give you with valuable understanding of the dental implant process if you’re curious about it. In this manner, you can analyze whether this is the best solution. | <urn:uuid:9c22ea4a-bb15-414a-b3a3-a402c20e22a5> | CC-MAIN-2022-33 | https://osoleil.ca/dental-implant-four-widespread-myths-that-arent-true/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00265.warc.gz | en | 0.93619 | 741 | 1.992188 | 2 |
An Anti-Defamation League Report
Download the whole report Murder and Extremism in the United States in 2016 (PDF).
One word looms over the landscape of deadly extremism and terrorism in the United States in 2016: Orlando.
The June 2016 shooting spree at the Pulse nightclub in Orlando, Florida, by Omar Mateen—who killed 49 people and wounded 53 more—dwarfed in its lethality all other extremist-related murders this past year.
Mateen, who claimed his attack in the name of ISIS, though there are no known connections between him and that terror organization, achieved the dubious distinction of being the deadliest domestic terrorist since Timothy McVeigh bombed the Murrah Federal Building in Oklahoma City in 1995.
ADL’s preliminary tally of extremist-related murders for 2016 is already at 69, a figure that includes the 49 killed by Mateen as well as 20 other murders committed by white supremacists, anti-government extremists such as sovereign citizens, and black nationalists. This grisly toll puts 2016 as the second deadliest year for domestic extremist-related deaths in the United States since 1970, the earliest year for which ADL maintains such statistics.
Were it not for the Orlando shootings, 2016 might have been considered a “mild” year for extremist-related deaths. Including Orlando, there were only 11 lethal incidents in the U.S. in 2016 that can so far be connected to extremism, compared to 29 incidents in 2015. Moreover, the number of incidents involving multiple fatalities in 2016 was only five, half the number of such incidents in 2015. The Pulse massacre was a single event so egregious in its casualty tolls that it can actually distort statistics and perceptions surrounding the extremist landscape.
The Pulse nightclub shootings also represented the only lethal incident involving domestic Islamic extremists in 2016, though a particularly deadly one. As with all extremist movements, it is important to note there were also other incidents in 2016 where domestic Islamic extremists attempted or plotted at deadly violence, but were unsuccessful.
Over the past 10 years (2007-2016), domestic extremists of all kinds have killed at least 372 people in the United States. Of those deaths, approximately 74% were at the hands of right-wing extremists, about 24% of the victims were killed by domestic Islamic extremists, and the remainder were killed by left-wing extremists.
Though not the most lethal, in some ways the most troubling extremist-related murders that occurred in 2016 were the murders of police officers at the hands of black nationalists. Eight police officers were killed in two incidents in which extremists deliberately targeted police officers for murder. In July 2016, Micah Xavier Johnson, who had ties to black nationalist groups such as the New Black Panther Party, killed five police officers (and injured nine others) in Dallas, Texas, in an ambush attack aimed at police maintaining public order at a Black Lives Matter protest. That same month, Gavin Eugene Long ambushed and shot six police officers, three of them fatally, in Baton Rouge. Long was an adherent of black nationalism as well as the anti-government sovereign citizen movement. Both incidents were acts of retaliation against police officers in response to controversial police shootings of African-American men.
The year 2016 was unusual in that right-wing extremists did not dominate the murder statistics, as they have each year for more than 30 years. Anti-government extremists and white supremacists were responsible for only a minority of extremist related deaths in 2016, though they did commit two triple homicides. These low figures also occurred during a year in which non-violent right-wing extremist activity was high, in large part due to agitation and propaganda by the so-called alt-right and other extremists in connection with the 2016 presidential election.
Because extremist murder statistics are volatile and can vary considerably between any two given years, the relatively low numbers of deaths connected to right-wing extremists should not yet be taken as indicative of a trend, particularly given the high numbers in recent years. Similarly low numbers in 2017, however, might indicate some sort of shift. | <urn:uuid:1ae16bed-153a-4eb3-8a9d-ef9806471ab1> | CC-MAIN-2022-33 | https://www.adl.org/resources/report/murder-and-extremism-united-states-2016 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00265.warc.gz | en | 0.97527 | 815 | 1.632813 | 2 |
For Immediate Release, February 26, 2014
Contact: Tierra Curry, (928) 522-3681
Endangered Species Act Saves Two Plants Unique to California's Death Valley
LOS ANGELES— The U.S. Fish and Wildlife Service announced today that Endangered Species Act protections have successfully recovered the Eureka Valley evening primrose and Eureka dune grass. Both plants grow on sand dunes in the area of Death Valley National Park and nowhere else on Earth; they were protected under the Act in the late 1970s because of threats from off-road vehicle recreation. Protecting their habitat from vehicles allowed their populations to stabilize, leading to today’s proposal to remove them from the endangered species list.
|Eureka dune grass photo courtesy Flickr Commons/Dean Wm. Taylor. Photos are available for media use.
“These two unique California plants join the long list of species the Endangered Species Act has saved from extinction,” said Tierra Curry, a senior scientist at the Center for Biological Diversity. “From the blue whale to Eureka dune grass, this remarkably successful law has prevented the extinction of our country’s most vulnerable wild heritage for 40 years now,”
The plants were protected in 1978, and the Fish and Wildlife Service published a recovery plan in 1982 outlining actions to improve their status. Endangered Species Act protection spurred the Bureau of Land Management and the National Park Service to implement on-the-ground measures to protect the plants from off-highway vehicles. A 2007 status review indicated the plants were no longer in danger of extinction.
Other habitat protections for the plants will remain in place, including Death Valley National Park’s Wilderness and Backcountry Stewardship Plan, which will guide park management for the next 20 years. The plants are still vulnerable to climate change, seed predation and invasive plants, so their status will continue to be monitored.
“Though the primary threat from off-road vehicles has been removed, we remain concerned about invasive plants and potential effects of drought and climate change. Ongoing funding will be needed for removal of exotics and for monitoring to make sure the plants are protected for future generations,” added Curry.
The evening primrose grows to 2.5 feet tall and has white flowers that fade to pink as they mature. The flowers provide nectar for butterflies and bees in the desert sand dunes. The number of primroses in the population fluctuates yearly with rainfall. In 2013 more than 20,000 of the primroses blossomed in the park.
Eureka dune grass grows in clumps that trap sand at its base, forming mounds or hummocks. The grass is unique in that it can live for decades and reproduction is slow. Its seeds provide food for insects and small mammals in the desert. More than 8,000 dune grass plants are estimated to live in the park today.
These two plants join a growing list of species that have been declared no longer in danger of extinction in recent weeks. Two fish from California and Oregon were also recently proposed for delisting, the Modoc sucker and the Oregon chub, which benefited from habitat improvements, scientific recovery plans and officially designated critical habitat protection.
The Center for Biological Diversity is a national, nonprofit conservation organization with more than 675,000 members and online activists dedicated to the protection of endangered species and wild places. | <urn:uuid:ca4b1d66-51f2-4f11-aa22-a4f49afc7878> | CC-MAIN-2017-04 | http://www.biologicaldiversity.org/news/press_releases/2014/death-valley-plants-02-26-2014.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00064-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.929813 | 705 | 2.9375 | 3 |
|Ned Batchelder : Blog | Code | Text | Site|
» Home : Text
Created 31 July 2005, last updated 10 August 2005
This is a programming project I undertook with my 13 year old son. Madlibs is a story game for kids: a story is written and a few dozen important words are taken out, replaced by blanks. The blanks are labelled with their part of speech or other category ("noun", "adjective", "an animal", and so on). One kid reads out the categories, another kid (or kids) supply new words without knowing the story. When all the blanks have been filled in, the story is read out, usually with comic results.
(For more about how we chose Madlibs as a subject, see my blog entry Programming with kids: Madlibs.)
I started by talking with my son about how the program would have to work. We talked about the structure of the story itself. It was a list of things. He said there were two types of things: static pieces and dynamic pieces. We talked about how a story was constructed: by looking at each piece in turn.
"And what should it do with each piece?" The first idea was that for static pieces, print the text, and for dynamic pieces, print the category and collect an answer. Son realized that this would expose the story as it went along, before the questions were answered. Here he was stuck.
I explained that we could build up the story in memory, and print the whole thing at the end. Eventually, we sat down at the computer and created this program:
I supplied the tricky parts (get_input, and the textwrap business), and suggested the technique of making the story list be a list of tuples. But my son did a lot of the thinking through what had to happen. The "dynamic" function is there because he wanted to use a function.
This program worked, and was a source of much joy. It did something interesting, and my son eagerly encouraged everyone to try it out. He really seemed pleased by the work he had done, and I was pleased that we could talk through some of the coding challenges and find answers together.
The first change my son wanted to make was to have the program ask the questions in a random order, so that the player had less chance of second-guessing the intent of the author. I had imagined a number of ways to expand on the program, but this wasn't one of them, so I was psyched: the Madlibs genre was going to be a fertile one!
In preparation for the feature, I thought it would be good to get us onto a more modern architectural foundation. I explained about classes and objects, and refactored our program into this:
There was a side discussion that didn't survive in the code. I showed how to use the same storylist variable two ways, first to play dynamically, with the program asking questions and producing the finished story, and second to play on paper, with the program printing a play sheet suitable for use with pencil and paper.
To do the random questioning, we'll need to split the main loop into two passes: one to get the dynamic pieces, shuffle them, and get the answers, then another to build the story. The dynamic pieces will have to store their answers between the two passes.
To store the answers, we talked about member variables. We had used them to store the prompt before, but the __init__ methods seem formal and uninteresting, and their values are constants. It wasn't until we got to prompting the user and storing the answer in a member variable that we were really talking about variables.
Here's the third version of the program. We make two passes over the list, first to collect the pieces that ask questions. Then we shuffle that list and have each slot ask its question. Then we walk the whole story from beginning to end building the finished story. It's important to understand the relationship between a list and the objects it contains. The two lists point at the same objects, otherwise the program wouldn't work.
Now the program asks for words in random order, making it more difficult for the player to second-guess how his words will be used.
The next feature to tackle was re-usable slots. For example, after asking for "an adjective", the word could be used twice or more in the same story. To make this work, we had to expand the types of objects in the storylist. We could have gone two different ways: add two new objects (one for the reusable word, and one for where it was reused), or add just one new object (the reused word) while expanding the dynamic slot to be reusable. Son decided to go the four-object route.
We also had to introduce the concept of dictionaries, so we could name and store the reusable words:
The end result works well, and everyone (mom, brothers, and so on) were pleased with the results. Stylistically, the reusable and dynamic classes are too similar. Eventually I'll probably encourage a refactoring to reduce the duplication.
One interesting feature was how we chose the pieces to shuffle and use in the first pass. Originally, the code was:
Son asked if we could combine the two clauses (good instinct!). So we simplified it to:
and then, using isinstance more cleverly, to:
This isn't bad, but I took the opportunity to advocate encapsulation and polymorphism. The fewer places we talk explicitly about classes, the more flexible the code will be. I pointed out that the only thing we did with the elements of dynamiclist was to call askUser on it, so why not just pick out the things that have an askUser method. Along the way, we changed the name to asklist to better reflect what it's doing:
The last feature was storing the story in an external file. This makes it possible to edit the story without changing the program, and allows us to have a number of stories we can choose from at run time.
The story is stored in a text file, usually with a file extension of .mad (the boy was very excited about having our own file extension!). For example:
The text is used verbatim. Slots are in square brackets, with the prompt inside them. A colon indicates the internal name of the value provided, which can be reused by a slot with no prompt, just a value name.
Here's the next version of the madlib code:
The getStoryPieces function does the work of reading the text format. This could probably be cleaned up, but it works. We had to do a lot of careful thinking about where in the string each variable pointed, and about the different forms of slots the parser might encounter. Personally, I would have made the story file name be an argument on the command line, but the son liked prompting better, so prompting it is. Here's a sample run:
I think we are probably done with madlibs, but there are more possibilities for future work that we've talked about:
I really liked this project: it has enough interest to keep the son motivated, but is simple enough that an hour or two of talking and typing produced an interesting result. | <urn:uuid:fd3cf9a1-e245-4690-9de7-fe193f1e3f24> | CC-MAIN-2017-04 | http://nedbatchelder.com/text/madlibs.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00169-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.972825 | 1,507 | 3.046875 | 3 |
Though you may not have known it, the federal government is responsible for the fees that prevent consumers from making huge withdrawals from their savings accounts. This policy, known as Regulation D, limits a person from making more than six withdrawals a month from their savings account. However, there is more at stake than fees when it comes to excessive withdrawals — a person’s savings account is threatened.
Checking account fees are not the only charges consumers should be be conscious about when conducting banking matters. Though many feel they will probably never experience excessive savings account withdrawals, it’s important to be aware of the possible consequences. After all, when times get tough, it is sometimes necessary to make constant withdrawals from a savings fund.
However, many people will be surprised to find out, that depending on their bank, they could be subject to pay fines, or worse, have their account closed. The reason for this is because savings accounts were designed to keep money in the bank to build interest, not to be used to make constant withdrawals from.
Restrictions that apply
Each bank has certain restrictions that apply to excessive withdrawal fees. Most banks do not charge a fee until more than six withdrawals are made. Withdrawals include pre-authorized withdrawals, check withdrawals, overdraft protections, online banking, and more. Anyone interested in learning more information should contact their local branch to learn about savings regulations that apply.
Below is a list of excessive withdrawal fees from the top 10 banks.
Bank of America $3 after 3 withdrawals (waived if balance is above $2,500)
Chase Plus Savings $5 (waived if balance is greater than $15,000)
Chase Savings $5
Wells Fargo $15
Citibank $0, but account is subject to close after 3x's over the withdrawal limit in 12 months
U.S. Bank $15
Capital One $10
SunTrust $4 after two transfers or withdrawals out of savings per month
TD Bank $15
PNC Bank $15, or $3 for each withdrawal over 3 withdrawals if balance is below $1,500
Practice caution with savings withdrawals
Most banks will convert a savings account into a checking account if excessive withdrawals are constantly made. For instance, Citibank does not charge a fee after the first six withdrawals. Instead, the bank sends two warning letters for the first two withdrawals made after the limit has been reached. The savings account is closed and converted into a checking account if another withdrawal is made after the second letter is issued.
People should avoid withdrawing from their savings account too many times, at the risk of having it converted and losing the benefit of holding that money in an account specifically designated to build a good amount of interest. Luckily, a conversion from a savings account to a checking account does not produce a negative mark on a person’s ChexSystems record.
Avoid savings withdrawal fees
There is a way to still take money out of a savings account without racking up withdrawal fees. Banks do not consider withdrawing money directly from a branch or ATM, as part of an excessive withdrawal fee. To avoid the possibility of conducting too many withdrawals within a month, head to the bank directly to take out cash. | <urn:uuid:8cf4e3bf-7f93-4002-a7df-a4770edfd239> | CC-MAIN-2017-04 | https://www.mybanktracker.com/news/2013/11/21/comparing-excessive-withdrawal-fees-savings-accounts/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00247-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964782 | 663 | 2.03125 | 2 |
Jump to:Page Content
“Meeting students at the University of Baghdad was just like meeting students anywhere,” says Melodye Wehrung MC/MPA 1997, who in January travelled to Iraq to help expand capacity at the University of Baghdad’s College of Management and Economics. “They seemed very similar to American students,” she adds, describing them as eager to learn, dedicated to their studies, and respectful of their professors. During seven days in the city, Wehrung would come to know the diverse community in and around the university.
This trip—the first of several in the next year and a half—was sponsored by USAID’s Iraq financial development unit. Wehrung went to the war-torn nation as part of a team from Shippensburg University in Pennsylvania, where she works as executive director for social equity. Their goal is to help Iraqis rebuild business and management education at the country’s premier university.
“Iraqis are eager to increase their participation in the global economy,” she says. “They have a can-do spirit and want to be able to take care of themselves well.” Her initial visit included meetings with Musa Al-Musawi, the university’s president, Abdul Jabbar, the dean of the business college, and various faculty members. Discussions centered on the college’s curricular needs and helping to determine what resources faculty and administrators required to move the university back to regional prominence.
“Infrastructure is a problem,” says Wehrung. “They’re very interested in technology and making use of computers and the Internet, but when the electricity goes out everything goes down. They’re making progress, but it’s slow.” The library, for example, was damaged in the war, with books knocked off the shelves and covered in desert sand. “They’re dusting off the university, literally and figuratively,” she says.
Wehrung says her Kennedy School education was crucial in helping her work with individuals from different backgrounds with different perspectives. “The training in becoming an effective American and global citizen was invaluable, as were the relationships I developed with individuals from the Middle East when I was at the Kennedy School,” she says.
USAID coordinated all the logistics of her trip, from transportation to security. Despite the obvious dangers, Wehrung was more excited than nervous about her first visit to Baghdad. “We had a sense that we’re on a mission to be helpful. We did travel with very high security—bulletproof vests and cars and so forth—but we felt very secure in our compound.” She and her team did not stay in the international Green Zone but in a private complex surrounded by blast-proof walls. Although trips were carefully orchestrated days in advance, information on the ground sometimes changed their plans, requiring University of Baghdad officials to come to their compound in lieu of campus visits.
Wehrung’s interests include enhancing outcomes through international and domestic diversity—the idea that a variety of perspectives will generate better solutions in the business community than an individual limited to his or her own experiences. Wehrung says her work in Iraq will bring together differences in gender, religion, and ethnicity to improve the University of Baghdad. “Collective wisdom is greater than any single person,” she says.
Wehrung is optimistic. “The Iraqis I met were very open and very proud of their university, and rightly so. But of course there’s been lots of devastation.” She is hopeful that she, her Shippensburg partners, and her newfound Iraqi colleagues can bring transformative change to the University of Baghdad.
Melodye Wehrung MC/MPA 1997 (R) pictured with John Kooti, dean of Shippensburg University’s John L. Grove College of Business.
“Iraqis are eager to increase their participation in the global economy,” says Wehrung. | <urn:uuid:83d1f181-0622-4843-9709-990bb2bf70ef> | CC-MAIN-2017-04 | https://www.hks.harvard.edu/news-events/news/alumni/melodye-wehrung | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00263-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967382 | 842 | 1.867188 | 2 |
Q. What keeps squirrels from gaining huge amounts of weight as they gorge on acorns and nuts each fall?
A. In fact, many squirrels do achieve huge weight gain ahead of the privations of winter.
Common gray squirrels may increase their weight by 25 percent in the harvest season. But not because they hibernate — they don’t.
Winter foraging is hard, and gray squirrels tend to spend the winter months mostly in their nests. But they must make forays every few days to seek squirreled-away food and other nourishment.
Among hibernating squirrels, much of the stored nourishment is needed to survive the cold season without foraging. A study of the Arctic ground squirrel found extreme weight gains during the active season: 42 percent among males and 63 percent among females. They slow their activity drastically before hibernating in order to maintain peak mass.
While some do emerge from winter lighter, a significant share of their fat stores may remain.
Source : Nytimes | <urn:uuid:5b308f9b-982b-4ec6-a0f4-ee7c01ac3603> | CC-MAIN-2022-33 | https://www.oneworldmedia.us/news/think-youve-gained-weight-this-winter-check-out-these-squirrels/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00676.warc.gz | en | 0.96379 | 212 | 3.5625 | 4 |
This month, a small fraternity of field inspectors will gather in Paris for an annual brush-up on the latest techniques in testing synthetic turf. The goal is to establish consistency among the entities entrusted by FIFA to conduct lab and field tests on synthetic turf product and the finished pitches that seek the world soccer governing body's stamp of approval. Using highly specialized instrumentation, FIFA-endorsed labs test everything from a fiber's melting point to a finished field's interaction with players' feet.
Backpedal almost a dozen years to 2001. That's when FIFA introduced the FIFA Quality Concept for Football Turf in response to rapidly evolving synthetic turf technology and its ever-widening creep into the elite sports landscape. An internationally recognized quality standard for turf fields was a logical step forward, and the program has hit its stride - at least in some corners of the world (read on). "With the deployment of football turf," FIFA president Joseph Blatter states on the association's website, "FIFA has recognized the enormous benefits artificial pitches would bring to the global development of football, not only because artificial turf can be used in more extreme climates, but because where a pitch is used intensively it can be used almost 24 hours a day and seven days a week."
Since July 1, 2004, recommended turf fields have been approved for use in FIFA tournaments, including World Cup qualifying matches. UEFA, the FIFA confederation serving Europe, began using synthetic turf in competition during the 2005-06 season.
"The English Premier League and the highest levels of soccer are still played on natural grass, and they want to stay on natural grass," says Dave Nardone, a sports group leader in the Boston office of architecture and engineering firm Stantec, which has worked on several FIFA-approved projects. "If you talk to any purist coach out there, he or she would prefer to be on natural grass. But coaches understand that, depending on their facility needs, synthetic turf just makes a lot of sense."
The FIFA Quality Concept, launched to compare the characteristics of synthetic turf to those of natural grass, has evolved to consider the varying needs of fields. A one-star rating indicates that a field has been tested and found suitable for national training and match play, as well as municipality use. A two-star rating recommends a field for international match play.
There's a difference in terms of both durability and playability. A two-star field will exhibit a softer touch on the professional slide-tackler's skin, but a one-star field will endure the near-nonstop pounding of multiple youth and adult leagues. "Clients think, 'I want two-star. I want my field to be better,' "
Nardone says. "In reality, if they're making an investment for eight to 10 years or more, they want one-star, because it's expected that a stadium field is going to get replaced every two, three or four years. It's not going to go the 10 years."
The two-star field, particularly if it's located within a stadium, is "going to get a different type of use. It might be used for concerts," Nardone continues. "It's going to have a different demand on it, but the end user is going to want the high-quality surface to maintain its characteristics. That's actually a big topic right now in the industry - retesting - because in order to maintain your FIFA star or two, you need to retest."
Indeed, ratings have a shelf life - one year for two-star fields and three years for one-star fields. Once a field's two-star rating expires, it automatically falls into the one-star category, but fields can be (and have been) tested multiple times.
Lab tests for durability involve simulating years of cleat traffic and climate, and literally tearing the turf system's bonded material components apart. (A manufacturer must be registered with FIFA to have its products undergo testing, and currently FIFA lists 28 producers in its database.)
Performance factors such as shock absorption, vertical deformation, vertical ball rebound, rotational resistance (to a player's pivoting foot), slip resistance (to a player's acceleration and deceleration) and skin abrasion are all tested in the lab and repeated in the field post-installation - all with natural grass test results as their benchmark. Each measurement must fall within an acceptable range produced by natural grass in ideal conditions, with tolerances tighter for aspiring two-star installations versus would-be one-star fields.
FIFA has made it clear that player safety is paramount, and most performance criteria become a balancing act between staving off injury and inducing fatigue. A field can't be too hard, or it potentially damages players' joints, but it can't be too soft, either. "You can pass G-max all day long, but your field can be too soft - your deformation can be too great - so it's like you're running around on the beach or on a trampoline," Nardone says. "In some respects, you can make these fields super safe, but we're not trying to create playgrounds. We're trying to create high-performance fields."
And the quality-assurance mission of FIFA testers doesn't end in the field. Says Nardone, "They also take back samples of what was installed to make sure it matches that original fingerprint, that what had been sent to FIFA originally is what was put in the ground."
Two-star pitches are being put in the ground not only in professional stadiums, but at parks, soccer complexes, high schools and colleges. So just where are the word's finest synthetic fields, at least according to FIFA, concentrated?
As of September, the FIFA confederation serving Europe boasted 510 FIFA-recommended one-star pitches, more than double the number of the remaining five FIFA confederations combined. Its 291 two-star pitches were more than four times the sum total of the others.
Of those five non-European confederations, the one serving North America, Central America and the Caribbean (CONCACAF) placed third behind Asia's and Africa's confederations with 64 one-star pitches. Its two-dozen two-star pitches topped Asia by nine, and half of those could be found in Canada. In fact, there were as many FIFA-recommended two-star pitches (five) between two locations in Ontario (a university and a sports complex) than in the entire United States. (Note that numbers were destined to change as some FIFA ratings were due to expire last month.)
"It hasn't been widely accepted in the United States," Nardone says of the FIFA Quality Concept. "I know from traveling Europe and looking at fields over there, there are definitely cases where the community group, the soccer club or the small town decides they're going to put in a synthetic turf field, and they like to have FIFA as a guarantee that when it comes to what they spent their money on, they got what they paid for. In Canada, I think it's been a little bit more performance-based - 'We want a high-performing field, so we want a FIFA field.' "
Theories abound as to why the U.S. has lagged behind its neighbor to the north and the rest of the world, and they tread beyond synthetic turf's playability in adverse weather conditions. "There have been two barriers," says Darren Gill, vice president of global marketing for FieldTurf, manufacturer of six of the eight one-star fields in the U.S. and three of the five two-star fields. (As of this writing, FieldTurf's installation at Gillette Stadium in Foxboro, Mass. -
a project that also included Stantec - was due to see its two-star rating expire, automatically dropping it to one-star status.) "First off, the acceptance of FIFA in North America has not been strong. The market is largely driven by football, not soccer. Secondly, the cost to perform FIFA testing is viewed by some as being quite expensive."
FIFA testing can tack $10,000 onto a project's cost - still a small percentage considering that a complete synthetic turf installation can easily fall between $1 million and $2 million. "It's not a huge number when you look at the whole budget," says Steve Bendo, an Ontario-based sports group leader at Stantec. "I always tell clients it's a cheap insurance policy to ensure you're getting a good quality field."
More interested observers - from architects to end users - are beginning to see a broader value in FIFA's performance-based standards, says Gill. "The FQC has done a good job to define standards that can be applied for all sports," he says. "For example, specific tests like vertical deformation and rotational resistance are criteria that can be used for any sport."
Meantime, manufacturers such as FieldTurf, one of nine FIFA Preferred Producers and the company that developed the slogan "Looks Like Grass, Feels Like Grass, Plays Like Grass," will continue to push their products toward even greater grass-like performance. Still others will try to compete as startup companies. "The turf companies are changing things all the time, and it makes our job harder with all the contractors jumping into and out of the marketplace. And that's where FIFA also helps," Nardone says. "We have had some clients - educated and savvy - come to us and say, 'We want a high-quality soccer pitch. What should we do?' And, you know, we talk about FIFA with them, and we talk about the manufacturers that have focused on passing FIFA." | <urn:uuid:4a950f22-8f6a-421a-96e2-b8599082ee18> | CC-MAIN-2016-44 | http://www.athleticbusiness.com/stadium-arena/fifa-program-certifies-synthetic-turf-performance.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00417-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.970914 | 1,999 | 1.96875 | 2 |
Increasing job opportunities was the single most cited motivation for wanting to sign up for business school and a degree in postgraduate management education, according to a GMAC survey of almost 12,000 prospective students released earlier this week.
The prospect of accelerating one’s career and securing an MBA job post-graduation has also come out as the top motivation among prospective MBA students in each of the last three editions of the QS Applicant Survey, picked out by more than 60% since 2012.
From the 2014 edition’s survey of approximately 5.5k MBA applicants attending the QS World MBA Tour in various locations around the globe, we also know that about 50% see an MBA as a means of building and developing a professional network. We also know that a little over 40% regard the qualification as an opportunity to enact a career change. Both these motivations also feed into the importance of recruitment and the post-MBA job search throughout a person’s time at business school.
Five tips from Mason School of Business alumnus
Montique Warren, a full-time MBA graduate from last year’s Mason School of Business class at the College of William and Mary, points out in this video that the act of finding your ideal MBA job doesn’t just start once the program is nearing its conclusion. Instead, he explains that it’s an ongoing process from at least the program’s beginning, and sometimes even before you step onto campus.
As a first-year student, Warren received an award for his positive contribution to the school’s MBA community and, since graduation, he’s worked for the Mason School of Business’ career management center – so, he’s certainly well-placed to talk us through recruitment in the context of a business school environment, as well as the approach that students might want to consider taking to land the perfect MBA job once they graduate… | <urn:uuid:2451f32a-9c54-491b-aae0-a5e03bf3878a> | CC-MAIN-2017-04 | http://www.topmba.com/admissions/videos/5-tips-finding-perfect-mba-job-video | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00038-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.966189 | 394 | 1.71875 | 2 |
Tag archives for classroom activity
As many of you know, I’m a big fan of do-it-yourself biology. Digital biology, the field that I write about, is particularly well-suited to this kind of fun and exploration. Last week, I wrote some instructions for making a phylogenetic tree from mitochondrial genomes. This week, we’ll continue our analysis. | <urn:uuid:679eedda-56d6-4e7d-b526-c1a85930e914> | CC-MAIN-2017-04 | http://scienceblogs.com/digitalbio/tag/classroom-activity/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00182-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.894458 | 80 | 2.484375 | 2 |
FINLAND - The Finnish meat industry has been given the go-ahead to export pork to China.
Atria and HKScan, two Finnish companies, have gained permits to export pork to China.
Finnish Agriculture Minister Petteri Orpo said the meat exports to China may, in the long term, offset the losses caused by import restrictions levied by Russia.
Exports to China will be viable despite the costs of the long transportation chain, local media reported.
HKScan pork slaughtering plant in Forssa will be receiving the export certification from the Chinese food authorities following inspections carried out in August 2014.
The launch of Finnish pork exports to China will be a major milestone in HKScan’s strategy to expand its export footprint, said Jukka Nikkinen, head of HKScan’s exports and Away from Home business.
Direct exports of Finnish meat to China were not possible before certification.
In addition to pork, HKScan has long-range plans to begin exporting other meat products suited to local culinary preferences. These include poultry meat, processed meats and convenience meals.
“We devoted much time and effort into preparing this export project together with the authorities. The strong support of the Finnish authorities and close collaboration between our industry, political decision-makers and officials have been crucial to its progress”, added Mr Nikkinen.
“After the forthcoming official export certification, we will continue our efforts to gain similar approvals for Swedish exports.”
HKScan exports pork to a number of EU countries and to long-haul markets including New Zealand and Japan. Russia was formerly another major export destination. The opening of a new export market for Finnish foodstuffs is important in the wake of the import bans imposed by Russia last January.
Markku Hirvijarvi, a director from Atria, said the decision was "a very positive message", Finnish national broadcaster Yle reported.
Last summer, Chinese officials toured Finland and inspected slaughterhouses and meat processing facilities.
Besides pork, the Finnish food industries are also seeking possibilities of exporting other food products. However, any fast relief to the dairy sector is not expected from the Chinese market, Yle reported.
The Finnish dairy industry has been hard hit by Russian import restrictions, levied as anti-EU countermeasures after the crisis in Ukraine.
TheMeatSite News Desk | <urn:uuid:db83f4e1-4e7a-4ea6-b3c6-049cf144dfe9> | CC-MAIN-2017-04 | http://www.themeatsite.com/meatnews/26656/finland-to-export-pork-to-china/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00073-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.94038 | 482 | 1.664063 | 2 |
Accreditation is a process of external quality review which serves to assure students, parents, policymakers, the broader educational community, and the general public that an institution has met high standards of effectiveness. Both federal and state government consider accreditation to be a reliable authority on academic quality. The federal government relies on accreditation to assure the quality of institutions and programs for which the government provides federal funds and for which the government provides federal aid to students. Most state governments will initially license institutions and programs without accreditation. However, states will subsequently require accreditation to make state funds available to institutions and students. States often require that individuals who sit for state licensure in various professions have graduated from accredited institutions and programs. Accreditation also helps to ensure that credits and degrees are recognized for purposes of employment and transfer or admission to other institutions. No institution in the United States is required to seek accreditation, but because of the recognized benefits of the process, most eligible institutions have sought to become accredited. The WASC Senior College and University Commission (WSCUC) is one of seven regional accrediting agencies in the U.S. and is the accrediting body for Cal State LA. For more information on accreditation, see the Overview of U.S. Accreditation by the Council of Higher Education Accreditation or the Handbook of Accreditation by WSCUC.
Every six, eight, or ten years, institutions accredited by WSCUC are reviewed to reaffirm their accreditation status. The two- to three-year process of reaffirmation of accreditation usually involves the completion of an institutional self-study and institutional report, an off-site review by WSCUC, and an on-site visit by a team of WSCUC service members. Cal State LA concluded its most recent Accreditation Visit on March 1, 2019. In June 2019, Cal State LA will receive an action letter from the Commission with details on Cal State LA's next reaffirmaiton of accreditation cycle. | <urn:uuid:59e62043-9681-41b9-8714-db31be2ec7ab> | CC-MAIN-2022-33 | https://training.calstatela.edu/apra/about-accreditation-and-wscuc | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00678.warc.gz | en | 0.958735 | 401 | 2.21875 | 2 |
Israel rebels against Rehoboam 10 1Rehoboam went to Shechem, for all Israel had gone there to make him king. 2When Jeroboam son of Nebat heard this (he was in Egypt, where he had fled from King Solomon), he returned from Egypt. 3So they sent for Jeroboam, and he and all Israel went to Rehoboam and said to him: 4‘Your father put a heavy yoke on us, but now lighten the harsh labour and the heavy yoke he put on us, and we will serve you.’ 5Rehoboam answered, ‘Come back to me in three days.’ So the people went away. 6Then King Rehoboam consulted the elders who had served his father Solomon during his lifetime. ‘How would you advise me to answer these people?’ he asked. 7They replied, ‘If you will be kind to these people and please them and give them a favourable answer, they will always be your servants.’ 8But Rehoboam rejected the advice the elders gave him and consulted the young men who had grown up with him and were serving him. 9He asked them, ‘What is your advice? How should we answer these people who say to me, “Lighten the yoke your father put on us”?’ 10The young men who had grown up with him replied, ‘The people have said to you, “Your father put a heavy yoke on us, but make our yoke lighter.” Now tell them, “My little finger is thicker than my father’s waist. 11My father laid on you a heavy yoke; I will make it even heavier. My father scourged you with whips; I will scourge you with scorpions.”’ 12Three days later Jeroboam and all the people returned to Rehoboam, as the king had said, ‘Come back to me in three days.’ 13The king answered them harshly. Rejecting the advice of the elders, 14he followed the advice of the young men and said, ‘My father made your yoke heavy; I will make it even heavier. My father scourged you with whips; I will scourge you with scorpions.’ 15So the king did not listen to the people, for this turn of events was from God, to fulfil the word that the Lord had spoken to Jeroboam son of Nebat through Ahijah the Shilonite. 16When all Israel saw that the king refused to listen to them, they answered the king: ‘What share do we have in David, what part in Jesse’s son? To your tents, Israel! Look after your own house, David!’ So all the Israelites went home. 17But as for the Israelites who were living in the towns of Judah, Rehoboam still ruled over them. 18King Rehoboam sent out Adoniram,[T] who was in charge of forced labour, but the Israelites stoned him to death. King Rehoboam, however, managed to get into his chariot and escape to Jerusalem. 19So Israel has been in rebellion against the house of David to this day.
New International Version (Anglicised) / © 2011 by Biblica, Inc. About | <urn:uuid:9201426b-cec9-4bb6-81de-143d68155671> | CC-MAIN-2016-44 | http://www.just1word.com/nivuk/2_chronicles/10 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722951.82/warc/CC-MAIN-20161020183842-00211-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.984723 | 709 | 1.9375 | 2 |
Cutinase thermostability is important so that the enzymes can function above the glass transition of what are often rigid polymer substrates. A detailed thermal inactivation analysis was performed for two well-characterized cutinases, Aspergillus oryzae Cutinase (AoC) and Thiellavia terrestris Cutinase (TtC). Both AoC and TtC are prone to thermal aggregation upon unfolding at high temperature, which was found to be a major reason for irreversible loss of enzyme activity. Our study demonstrates that glycosylation stabilizes TtC expressed in Pichia pastoris by inhibiting its thermal aggregation. Based on the comparative thermal inactivation analyses of non-glycosylated AoC, glycosylated (TtC-G), and non-glycosylated TtC (TtC-NG), a unified model for thermal inactivation is proposed that accounts for thermal aggregation and may be applicable to other cutinase homologues. Inspired by glycosylated TtC, we successfully employed glycosylation site engineering to inhibit AoC thermal aggregation. Indeed, the inhibition of thermal aggregation by AoC glycosylation was greater than that achieved by conventional use of trehalose under a typical condition. Collectively, this study demonstrates the excellent potential of implementing glycosylation site engineering for thermal aggregation inhibition, which is one of the most common reasons for the irreversible thermal inactivation of cutinases and many proteins. Biotechnol. Bioeng. 2017;114: 63–73.
- thermal inactivation
ASJC Scopus subject areas
- Applied Microbiology and Biotechnology | <urn:uuid:87b16553-375e-4781-a019-34e571dd019d> | CC-MAIN-2022-33 | https://nyuscholars.nyu.edu/en/publications/comparative-thermal-inactivation-analysis-of-aspergillus-oryzae-a | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00273.warc.gz | en | 0.902625 | 373 | 2.3125 | 2 |
Hi, we have planted three crab apple saplings this year and they are doing very well. They are now bearing, what looks to be a heavy weight of fruit which is arching the branches right over. Will this damage the branches?,would I be better off removing the fruit to help more root growth?. We will in time make crab apple jelly, but while the trees are young we don't mind removing the fruit earlier if it helps the trees.
Any advice welcomed. | <urn:uuid:b472f170-6408-46b7-bf2d-002a017cca3e> | CC-MAIN-2016-44 | http://www.gardenersworld.com/forum/plants/crab-apple-saplings/141325.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00064-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.957142 | 97 | 1.789063 | 2 |
The territory of Armenia, along with Azerbaijan and Georgia, was annexed by Bolshevist Russia on March 4, 1922. Part of the territory of present-day Armenia was controlled by Russia, and another part was controlled by Turkey, that was stated in the Turkish-Soviet Treaty of Kars. In 1936 the Armenian SSR was officially established. The years of Soviet era featured stability and economic growth in Armenia. The years of political instability began in the 1980 after implementation of various reforms.
Then General Secretary of the Communist Party Mikhail Gorbachev was unable to deal with growing tensions in Armenia, that resulted in establishment of the New Armenian Army, leading the country toward its independence.
Armenia declared independence on August 23, 1990 but it was recognized as a sovereign country only on September 21, 1991 after dissolution of the Soviet Union. This day is annually celebrated in Armenia as Independence Day.Remind me with Google Calendar
- Public Holidays
- independence day in armenia, holidays in armenia, public holiday, national holiday | <urn:uuid:d10aac24-d9b6-4391-a44d-4ad6f1f86c3a> | CC-MAIN-2016-44 | https://anydayguide.com/calendar/1160 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725475.41/warc/CC-MAIN-20161020183845-00510-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.974866 | 210 | 3.609375 | 4 |
Ask any kid: Grandparents rule. They're known worldwide as great companions and often shower their grandchildren with special treats and lots of love. Some kids live far away from their grandparents so they stay in touch by phone, through email, and with letters. Other kids live close to their grandparents, making it easy to visit often. And still other kids — more than 5 million in the United States — live with their grandparents.
Sometimes, the family is sharing the grandparents' house and sometimes the grandparent moves into the family's house or apartment. Maybe your grandmother moved in with your family because she was having trouble living alone. Or maybe your grandparents take care of you in place of your mom or dad.
Being a grandparent is a big job, but grandparents have a lot of experience. They raised and cared for your parent when he or she was a kid! And grandparents have been the heads of households since the beginning of time. In many cultures — Native American and Chinese, for instance — grandparents are looked up to as a source of wisdom.
When a Grandparent Moves In
Any change can be difficult to adjust to. So even if you love your grandfather, it may be tough when he moves in. Your grandfather will need a room to sleep in and everyone will have to learn to share the bathroom and the TV. Try to be as nice as you can during this time. Your grandparent may have trouble settling into a house that isn't his or her own.
After the adjustment period, you might find you enjoy having someone else in the house and a new person to spend time with. Grandparents often tell the best stories, like interesting tales about when they were kids. You might start by asking how many miles they had to walk to school each day!
If your grandparent needs help, you might be the one to lend a hand. And your grandparent might be able to help you by playing a game with you or fixing you a snack after school. If your grandparent needs a lot of help or is ill, your parents will help care for him or her. In some cases, a nurse might visit your house.
As your household gets bigger, you may feel left out or decide you need more of your parents' attention. Share your feelings if you feel this way. Maybe your mom or dad can schedule some special time with you. Your parents will appreciate it if you pitch in around the house and do a few more chores than usual. This can be really helpful when there's so much to do.
When You Move In With a Grandparent
Quite a few kids live with grandparents who take care of them in place of their moms or dads. These are often loving relationships, but it can be a challenging situation for both the kid and the grandparent. Kids who live with grandparents might miss their moms or dads and wish they could live with them instead. The grandparent may find it difficult to keep up with a kid and all of his or her needs.
Talk with your grandparent, or another trusted adult, if you have some of these feelings. Often the solution is that both the kid and the grandparent work together. The grandkid can help by working hard in school, staying out of trouble, and helping around the house. The grandparent can try to be understanding about what it's like to be a kid these days. Loving and caring for each other can be the glue that keeps everything together.
And one more thing: You might want to put the first Sunday after Labor Day on your calendar. Why? It's Grandparents Day!/p> Back to Articles
Welcoming a New Baby Into Your Family
Babies are wonderful, but what is it like when a new brother or sister comes home? Find out in this article for kids.Read More
Living With a Single Parent
Millions of kids live with just one parent. Are you one of them? Find out more in this article for kids.Read More
Living With Stepparents
Do you have a stepmom or stepdad? Lots of kids do. Find out more in this article for kids.Read More
What Is a Divorce?
Divorce is tough for everyone involved, including kids. Find out more in this article.Read More
Talking About Your Feelings
Noticing your feelings and saying how you feel can help you feel better. This article for kids has ideas on how to practice talking about feelings and emotions.Read More | <urn:uuid:3a5a3510-01b2-4c1e-9f7b-403f28e3148f> | CC-MAIN-2022-33 | https://nortonchildrens.com/health-library/article/?url=/en/kids/grandparents.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00474.warc.gz | en | 0.965724 | 916 | 2.796875 | 3 |
Fall break activities
For more families this year, fall break lasts two weeks. And if you're staying at home, that means finding more ways to entertain the family. But what if you could also avoid the crowds? Some "insider" advice will add to your enjoyment of some of the area's top attractions.
The Children's Museum is a very popular place this time of year because of it's Halloween attractions. Starting Saturday, the "Wicked Workshop" gets underway.
To avoid crowds, the best time to arrive during the week is 10:00 a.m. Also, get your pass for the shows at the planetarium and theater as soon as you arrive, because they are in limited supply. And check the website before you go. Remember, the Museum is closed on Monday.
If you want to take in the Indianapolis Zoo, you will find crowds smaller than in peak summer hours, and the animals are a bit livelier in the fall. You can also get a $2 discount off a general admission purchase. That's new this year.
At Conner Prairie, the traditional Headless Horseman rides again. Marsh offers discount tickets.
If you have memberships to any of these attractions, you'll save money. But there are also a lot of other free events around town.
But what about the teenagers? Your middle and high school age children may be a little tougher to entertain.
Zombies might get their attention. The Marion County Public Library is offering a program that will teach them how to draw a Zombie poster, and, it's free. Art With a Heart is working with the library teaching them the art of the undead.
"We're going to teach composition--text for imaging--how to make it pop for the wanted poster," said Scott Kruger of Art With a Heart. "It will be effective."
The library is hosting a list of free activities over the next two weeks that's 39 pages long, and it covers everything from zombies to friendly haunted houses to Legos. So if you are on a budget, this is the perfect solution.
Check out these links for fall break activities: | <urn:uuid:8a38f974-0dea-421d-bb6c-cd518edd9049> | CC-MAIN-2017-04 | http://www.wthr.com/article/fall-break-activities | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00375-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.962309 | 437 | 1.710938 | 2 |
Thunderstorms that threatened Blacksburg throughout Friday evening did not dampen spirits or tassels as Virginia Governor Bob McDonnell told nearly 3,000 graduating Virginia Tech students, “I am confident that, even in a tough economy, you will find great opportunities in New York, Beijing, London, Los Angeles, and more importantly, in Richmond, Roanoke, Reston, and Radford.”
Violent weather throughout the area delayed graduation ceremonies until 8:30pm as nearly 25,000 supporters gathered in Lane Stadium to honor the graduates. Camera flashes inside the stadium rivaled lightning flashes in the distance as Governor McDonnell recognized the four graduates in the audience who were injured during the April 16, 2006 shootings. “Life is short and all too fleeting,” McDonnell said. “It can be taken in the quickest of moments, and in ways that we will never be able to understand. This community knows that all too well. Eight chairs are empty today. In each of them would have sat a fellow graduate ready to embrace the challenges and opportunities of the world. Instead, their lives were cut tragically short on that chilly April day in 2007. That pain is still real.”
McDonnell avoided political overtones in his speech, instead delivering a concise and seemingly heart-felt instruction for successful living. The governor stressed working hard, dreaming big and living each day to the fullest. “To put it simply, character counts, results matter,” McDonnell told the graduates.
McDonnell acknowledged the four shooting survivors who received degrees Friday; Undergraduates Heidi Miller and Hilary Strollo and graduate students Justin Klein and Kevin Sterne. One other survivor, Derek O’Dell, is currently a student in VT’s Veterinary School.
Bob McDonnell is the sixth newly-elected Virginia governor to give Virginia Tech’s commencement address since 1990, a tradition that began with former Governor Douglas Wilder, a Democrat and the first African American elected governor in the United States. McDonnell, a Republican, served in the Virginia House of Delegates and as state attorney general before stepping down to run for governor.
While McDonnell has cited education and economic development as priorities of his administration, by 2012 Virginia Tech is expected to lose up to $75 million in state funding for instruction and operations. Meanwhile, the United States Graduating Class of 2010 faces unemployment rates of nearly 10 percent nationally, according to April figures from the U.S. Bureau of Labor Statistics, and 7.6 percent in Virginia.
McDonnell ended his remarks by challenging the newest Hokie graduates to go forward and change the world. “2010 graduates of Virginia Tech, leaders of the Hokie Nation, congratulations. I commend you on what you have accomplished. With hard work and divine providence, you will succeed in making your mark in this world, and Virginia and America will be better places because of you. God Bless you, and Go Hokies!”
Within minutes after the graduation ceremonies concluded a gentle rain began to fall on Lane Stadium as lightning diminished on the distant horizon. The Hokie Class of 2010 had prevailed again, together, through their final storm at Blacksburg.
Clarke County’s Virginia Tech Graduates:
Shane Cochran (Class of 2005) – Mechanical Engineering and Civil Engineering
Matt Hoyt (Class of 2005) – Finance
Daniel Miller (Class of 2005) – Biology and Spanish
Mary Margaret Morris (Class of 2006) – Psychology
Jesse Racer (Class of 2006) – Computer Engineering
Emily McWhinney (Class of 2006) – Psychology
Ashley Shim (Class of 2006) – Biology
Ashley Devereux (class of 2006) – Management
Edward Michael Leonard (Class of 2006) – Psychology
Hanne Ailes Small (Class of 2006) – Wildlife Science | <urn:uuid:07d2c263-bbcd-418a-96c0-26b62c609eb0> | CC-MAIN-2017-04 | http://www.clarkedailynews.com/hokies-graduate-ten-from-clarke-county/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00041-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.949251 | 783 | 1.523438 | 2 |
Scientific Investigations Report 2011–5062
As much as 57 million acre-feet of groundwater may be stored in the subsurface of the New Mexico part of the Salt Basin in southern Otero County, New Mexico. Recharge to a system such as the Salt Basin aquifer can result largely from focused recharge of surface water in channels and at mountain fronts. The Salt Basin is a closed basin that covers about 2,400 square miles of southeastern New Mexico and continues across the State line into Texas. A graben underlies the central valley, which is buried by hundreds of feet of alluvial deposits. Bedrock that underlies the alluvial deposits and forms the surrounding plateaus is composed primarily of carbonate and mixed carbonate/evaporate units that can be karst forming in places. Karst features in the downstream parts of some areas of the Salt Basin also may provide opportunities for substantial recharge. Annual recharge to an aquifer such as the Salt Basin aquifer is commonly estimated in groundwater models by mean-annual streamflow. In 2009, the U.S. Geological Survey, in cooperation with the New Mexico Interstate Stream Commission, estimated mean-annual streamflow for selected channels in the Salt Basin.
Mean-annual streamflow was estimated for four main subbasins in the internally drained Salt Basin in southeastern New Mexico. These four main subbasins account for 30 percent of the Salt Basin area in New Mexico. Estimates of mean-annual streamflow were generated at multiple sites down the length of each basin by using two regional regression equations based on channel geometry and one based on the basin characteristics of area and precipitation. Results indicate that, on average, an estimated 60,414 acre-feet of flow is generated annually among the four main subbasins in the New Mexico part of the Salt Basin.
The use of the channel-geometry method at multiple locations down the length of each channel also provided information on the locations of flow accumulation and losses. By contrast, application of the basin-characteristics method will always produce increased runoff estimates with downstream distance in a single basin; therefore, the method is not sensitive to flow losses. Channels that were measured achieved maximum active-channel widths from 6 to 16 stream miles upstream from the locations in which channels bifurcate and lose shape altogether when they reach the lowlands of the internally drained basin. Active-channel-width measurements indicate that each of the four main subbasin channels studied loses between 27 and 56 percent of annual flow from the point of maximum active-channel width to the most downstream measureable section in the channel.
First posted June 6, 2011
For additional information contact:
This report is presented in Portable Document Format (PDF); the latest version of Adobe Reader or similar software is required to view it. Download the latest version of Adobe Reader, free of charge.
Tillery, Anne, 2011, Estimates of mean-annual streamflow and flow loss for ephemeral channels in the Salt Basin, southeastern New Mexico, 2009: U.S. Geological Survey Scientific Investigations Report 2011–5062, 20 p.
Methods Used To Estimate Mean-Annual Streamflow
Estimates of Mean-Annual Streamflow and Flow Loss
Comparison of Annual-Flow and Flow-Loss Estimates | <urn:uuid:9021c55f-c1b0-434f-b6d4-1ef09251873b> | CC-MAIN-2017-04 | https://pubs.usgs.gov/sir/2011/5062/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00505-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.92751 | 676 | 3.390625 | 3 |
APC Accelerator Hardener
Epoxy Accelerator is a high amine content curing agent to be added to existing hardener in order to reduce drying time in situations where a faster cure is required.
Due to its yellowing nature, this should only be used as a Primer/Base Coat or in Mortars & Crack Repair.
APC Epoxy Accelerator is for use on mineral based substrate such as:
- Epoxy Modified Mortars
WARNING: APC Accelerator is extremely corrosive and is recommended for professional use only. Always read the TDS & SDS prior to use.
Note: The more accelerator used the more brittle & yellow the cured epoxy becomes.
*Read the TDS and SDS prior to use *Devices such as digital cameras,computer monitors, printers, and scanners produce colour differently. Therefore, the sample or product may not look exactly like the image that you see on your screen. *Coverage rates for coatings are based on smooth dense surfaces. The surface texture and porosity of the concrete can vary considerably and allowances should be made for this. | <urn:uuid:1c720bd1-ddc0-4112-8a62-88cbea790a93> | CC-MAIN-2022-33 | https://www.epoxysupplies.com.au/additives/epoxy-accelerator-hardner-5L-epoxy-supplies | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00465.warc.gz | en | 0.916698 | 238 | 1.726563 | 2 |
Imani Coker dreamed of getting her license starting in middle school. It was all she could think about for years.
“I can’t wait till I’m 15,” she told her friends.
When 15 arrived, Imani had a change of heart. Driving wasn’t much on her mind anymore.
Now 16, she has yet to even get her learner’s permit.
“Getting my permit leads to getting my license. If I get my license, my parents will suck the fun out of driving by sending me places. I have friends who drive. Not to mention insurance is expensive as heck. The streets are filled with crazy drivers, and I don’t want to become one of them.”
Coker, who lives in Richmond Heights, is among a growing number of teens for whom driving has taken a back seat. So as students start their summer break, many will be catching rides to jobs, camp, the beach, the mall.
Driving has been a traditional rite of passage — learner’s permit at 15, full license at 16. So why are teens putting off what used to be a lifelong dream?
As Coker put it: Too many headaches, not enough benefits.
Coker has plenty of company. According to a study by the University of Michigan’s Transportation Research Institute, the number of American teens getting their license is dropping more and more each year. Between 1983 and 2010, the number of 17-year-olds who got a driver’s license plummeted from 69 percent to 46 percent.
Miami-Dade and Broward mirror the national trend. In 2007, for instance, 15,000 16-year-olds got their driver’s license. That number dropped to 11,000 in 2014, according to the Florida Department of Highway and Motor Vehicles.
“As Florida’s population grows, we have noticed a drop in the number of youth licenses,” said John Lucas, a spokesman for the agency.
Twenty years ago, 70 percent of 18-year-olds had their license. Today, only 54 percent do.
But in some cases, it isn’t the teen that’s making the choice.
High gas and insurance prices are taking a huge toll on parents’ decisions to keep their teens in the passenger seat.
“I want to get my daughter a car, but with such high prices, it would be best to wait until the start of the new school year,” said Marie Fernandez of Palmetto Bay, whose daughter Natalie attends Florida Christian School.
A teen driver can be added to either a parent’s insurance policy or start one of his or her own. Either way, Florida requires teens to have insurance.
“It’s usually cheaper to add a teen to his or her parents’ policy rather than buy a separate policy,” said Mike Barry, a spokesman for the Insurance Information Institute.
Keeping insurance rates down is one reason some parents want their teens to keep their learning permits longer.
But why does a premium soar when teens are added? It’s all in the statistics: Teen drivers 16 to 19 are three times more likely to be involved in a fatal crash than drivers 20 and older, according to the Insurance Institute for Highway Safety, an industry group based in Virginia. And adding a teen driver typically increases an insurance premium by 83.94 percent in Florida, according to a study from InsuranceQuotes.com.
Auto insurance companies including Geico, State Farm, Allstate and Liberty Mutual offer various discounts on teen insurance policies.
Good grades? Discount. Educated driver? Discount. Low-mileage driver? Discount. “Driving training” grad? Discount.
Then there’s the cost of gas to worry about, as well as parking, tolls and maintenance costs. But those aren’t the only obstacles.
Household income plays a huge role in whether or not teens will be licensed drivers. In homes with an annual income of $20,000 or less, only 25 percent of teens are likely to get their license. Some 75 percent of teens are likely to get their license if they live in a home with an annual income of $100,000 or more, according to a AAA survey.
Then there’s parental angst over Miami-area traffic as well as distraction from studies. Stephanie Cravez is concerned with the safety and grades of her daughter Jessica Cravez, who attends Killian High. “If her grades are slipping, I take the car keys away, simple as that.”
Waiting to get a license isn’t necessarily safer, the experts say. “We are worried that those teenagers 18 and over who get their license without [instruction] are missing out on important driving skills and behaviors,” said John Pecchio, AAA Manager of Traffic Safety.
To help, AAA has several programs, including Auto Club South, which is focused on promoting safety and encouraging good driving habits.
Instruction also is available at school, although fewer high schools are offering driver’s education courses because of budget cuts. Forty years ago, almost every student took a driver’s ed course. Now, fewer than 40 percent do, according to a study by Dan Carsen at the Southern Education Desk at WBHM Radio.
Schools in Miami-Dade that have a driving range and permit test preparation include Killian, Ferguson, Hialeah, North Miami Beach, Hialeah-Miami Lakes and Miami Beach high schools. Broward high schools that offer a full driver’s ed range include Coral Glades, Coral Springs, Cypress Bay, Deerfield Beach, Everglades and Plantation.
Juliana Nicholls, 16, who doesn’t have a license, says she would benefit from having a driver’s ed program at her school, Cooper City High. “It would give me more of a driving experience to move me toward getting my license.”
Out on the range, students practice basic skills such as parking, reversing, three-point turns and the essential features of a car with the driving instructor guiding them from the passenger seat.
While in the classroom, students are taught road rules and important tips to being a great driver. Many schools encourage their students to take a driving course on Florida Virtual School as an alternative to a face-to-face driving experience. FLVS’ online driving course can’t teach a student how to drive but offers a drug and alcohol education program for teens to get their learner’s permit. Students have to practice driving on their own in their parents’ cars — which is not part of the course.
“Students learn road rules, complete the drug and alcohol course and prepare for their final permit exams at no cost. Doing this means that the majority of the driving instruction is taught at school, giving parents one less thing to worry about,” said Cathy Ricke, a driver’s ed instructor at Killian High. “Most importantly, students build up their confidence. It’s better for them to learn to drive in a closed course than venturing off onto streets they’ve never driven before.”
So how do teens forgoing a license get around? With other teens that do have a license, of course.
“The majority of my friends drive,” said Cynthia Mejia, 16, who goes to Miami Killian Senior High. “I usually hitch a ride from them since we all live in the same Kendall area.”
Another Killian student, Kelly Alvarez, 17, feels the same way. “Why would I want to have the responsibility and cost of having a car when I have friends who live near me and are willing to drive me around?”
And with texts and tweets, driving to a friend’s house just isn’t as urgent anymore.
Killian student Skylar Agosto, 17, who doesn’t have her license, depends on her parents for transportation. “If my mom can’t go, neither can I.”
A survey by ZipCar, an organization geared toward reducing the amount of cars on the roads using carpooling, found that social media is preferred to getting behind the wheel to meet friends, however. Out of the 294 18-34 year olds interviewed, 68 percent say they would rather spend time with friends online instead of driving to see them.
“The problem with today’s youth isn’t that they are allowing texting to interfere with their driving, it’s that having to drive is interfering with their texting,” said Michael Sivak, research professor and author of the University of Michigan Transportation Research Institute’s study. “It is possible that the availability of virtual contact through electronic means reduces the need for actual contact among young people.”
“Information and mobile technology provide ready alternatives to travel,” said Nancy McGuckin, a travel behavior analyst.
Despite the dropoff in young drivers, some teens still jump at the chance to hit the road.
Justin Leary, 17, of Miami Palmetto Senior High, got his license two days after he turned 16 — only because the DMV was closed on his birthday. He had a new car waiting for him at home. “My parents saw that I was responsible and thought I could handle having my own car.”
Killian student Michelle Goldgewicht, 17, also got her car shortly after getting her license. “My grandpa surprised me with a brand new car. He and my parents wanted to give me more responsibility and independence because I earned it.”
There are benefits to having an extra driver in the house.
“Whenever my mom is running late to pick up my brother from practice, I’m the one who has to go get him,” said Sara Matthews, 17, who also goes to Killian. “Having my own car is a huge help to my parents sometimes because I can go to doctor appointments and run last-minute errands by myself.”
Having one teenage driver and a forthcoming driver is a total stress-reliever for single mom Gina Picos, who lives in the Falls area. Driving in this household is definitely a family affair.
“I gave my oldest daughter the privilege to drive because of all of her after-school activities that my mom would have to drive her to. She deserves the independence and freedom that comes along with driving.”
Gaby Alonso, 17, who goes to Coral Reef, is accepting of the responsibility that her mother gives her. “But I pay for my own gas because my parents think some of the costs should be split between us.”
Shortly after Gaby got her license, younger sister Isa Alonso, 15, who also attends Coral Reef Senior High, shortly followed in getting her permit.
“I noticed the freedom and responsibility my sister has with her car. I want that, too.” | <urn:uuid:17fa07da-84e1-4b2f-8668-53283efe8ce2> | CC-MAIN-2017-04 | http://www.miamiherald.com/news/local/community/miami-dade/article1965650.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00063-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968147 | 2,318 | 2.265625 | 2 |
Decision Support News
D. J. Power, Editor
July 20, 2014 Vol. 15, No. 15
1) What is decision automation?
2) Recent DSS News Headlines
3) Upcoming Decision Support Conferences/Call for Papers
What is decision automation?
by Daniel J. Power
Decision automation means software is used to make decisions. The concept
is deceptively simple and intriguingly complex. On the surface the idea is
to write a computer program that uses rules and criteria to make decisions.
A decision automation system replaces and eliminates the need for a human
decision maker in a specific decision situation. Business rules and programmed instructions are triggered by inputs and events and then the program "makes" contingent choices. The greatly expanded and evolving computing infrastructure makes it increasingly cost effective to apply decision automation in situations where that had been prohibitively costly. A decision automation system is NOT a decision support system.
Continue reading at
Click for more Frequently Asked Questions
2) Recent DSS News Headlines
07/18/2014 Sabre Hotel RFP simplifies hotel negotiations, drives
cost savings with upgraded online interface and new hotel consulting services. Check release.
07/15/2014 Teradata and Forbes Insights release new study exploring
the business impact of marketing silos. Check release.
3) Upcoming Decision Support Conferences/Call for Papers/Books
1. August 7-10, 2014, AMCIS 2014 - Savannah, Georgia. Click here.
2. Nov. 22-25, 2014, 45th Annual DSI meeting - Tampa, FL, Click here.
3. Dec. 28-29, 2014 “Big Data and Analytics For Business(BDAB-2014)”,
New Delhi, India. Check the website Click here.
4. May 27-29, 2015 ICDSST 2015 organized by the EWG-DSS/ The theme is “Big Data Analytics for Decision Making”, Belgrade, Serbia. Check the website Click here.
Order Dan Power's new book: Decision Support, Analytics, and Business Intelligence, Second Edition
Become a Business Expert Press author
You may leave the DSSNews list by sending a message to: [email protected]
where the body of the message contains: UNSUB dssnews
Please tell your friends they may join the list by sending a
message to: [email protected] where the body of the message
contains: SUB dssnews
About Decision Support News |
Decision Support News is copyrighted (c) 2014 by D. J. Power.
your questions to [email protected].
Daniel J. Power at http://www.linkedin.com/in/danpower
The mailing list is hosted by the University of Northern Iowa in the
spirit of cooperation with the network community. The opinions
expressed by contributors do not necessarily reflect those of the
University or its employees. The University shall not be liable for
any damages which may result directly or indirectly from errors
or omissions in or application of information distributed via
this group. Thanks to University of Northern Iowa.
Thanks for supporting Decision Support News (aka DSS News) and DSSResources.com. | <urn:uuid:f0f3a118-c713-446f-8176-0a76fda190ce> | CC-MAIN-2017-04 | http://dssresources.com/newsletters/375.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00298-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.820329 | 689 | 1.921875 | 2 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.