text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
The next time you pour yourself a glass of water, spare a thought for Jimmy Hall and his neighbors. Jimmy is the fifth-generation Hall to own property on Mill Creek in Letcher County, Kentucky. He has deep roots in coal country. Back in the late 1800s, his great-great-great grandfather's homestead included an entire mountain range, but mountaintop-removal coal mining has turned his family's special place into a moonscape. Then the Water Department called. "'Don't drink the water,' is what they told us," says Jimmy. "They found arsenic and lead from nearby mining operations in my well water. It's not just me -- my neighbors have the same problem. Many of them are chronically ill, and some have died." Unfortunately, that's not unusual in eastern Kentucky, where rubble and toxic waste from mountaintop-removal coal mining frequently contaminate streams and valleys. In all of Appalachia, mountaintop-removal mining has already damaged or destroyed nearly 2,000 miles of streams. In just the past two decades, more than 500 mountains in Kentucky, West Virginia, Tennessee, western Virginia, and Maryland have been leveled. At the current pace, 1.4 million acres of forests and mountaintops could be destroyed by the end of this decade. Gone forever. It's a peculiar arrogance that can justify the obliteration of mountains that have stood for nearly 500 million years. But it's not only the mountains that are being destroyed -- it is entire communities and a hard-scrabble culture that has survived for centuries. The people of Appalachia have seen more than their share of hardship, and it's made them tough. But the violence of mountaintop-removal mining -- blasting and bulldozing, air and water contamination, mudslides and floods -- is more than anyone should have to endure. Why is this still happening in the 21st century? Demand for Appalachian coal is at a historic low. We have better, cleaner ways to generate electricity. We don't need the coal, but we're allowing coal companies to destroy the mountains and poison the land and water anyway. The human toll is high: People living near mountaintop-removal coal mines have significantly higher rates of cardiovascular disease and cancer. That's why Representatives Dennis Kucinich and Louise Slaughter have introduced the Appalachian Communities Health Emergency Act [H.R. 5959], which would place a moratorium on permitting for mountaintop-removal coal mining until health studies are conducted by the Department of Health and Human Services. One key to fighting back right now: Poisoning people's water is not only wrong, it's against the law. The Clean Water Act sets clear standards for water quality, but in Kentucky's coal country the practice has long been to look the other way. In fact, the state of Kentucky would prefer to keep looking the other way, but the Environmental Protection Agency has fulfilled its responsibility in the past couple of years by vetoing 36 surface-mining permits that didn't include provisions for ensuring water quality. Even though the agency approved many more permits than it rejected, that was enough to spark an uproar in coal country. So last week, the EPA held hearings in Kentucky on its plans to protect water. Jimmy Hall and other Kentuckians were there to speak out for clean water, but they were outnumbered by hundreds of coal supporters bussed in by The Kentucky Coal Association. Says Jimmy: "They did everything they could to intimidate me and the dozens of other activists who were there. They booed, heckled, and kicked us. Someone even threatened the safety of the representatives from the EPA who were there to listen to us." Did Jimmy Hall find Big Coal's show of force intimidating? "Not when the health of our children is on the line," he says. "One of my neighbors showed me his well water -- it was rust-colored and cloudy. He's forced to use it for drinking, food preparation, and to bathe his children." Some of the strangest pro-coal rhetoric came not from the public but from Kentucky government officials who spoke at the hearings: "Environmental permitting is not designed to stop legitimate business activities," said Kentucky Energy and Environment Secretary Leonard K. Peter, who apparently believes that coal mining deserves to operate above the law. Out of 21 Kentucky officeholders at the EPA hearing in Frankfort, only one, Rep. Joni Jenkins, D-Shively, stood up for the EPA and clean water for her constituents. What the coal companies are doing is wrong, but understandable. But for the state of Kentucky to put Big Coal's interests above the health and safety of its own citizens is reprehensible. For people like Jimmy Hall who have seen their heritage and now their drinking water destroyed by mountaintop-removal mining, the EPA and the Clean Water Act offer the biggest hope of fighting back against Big Coal in the heart of coal country. But you can help, too. The EPA is accepting comments on its enforcement of the Clean Water Act in Kentucky. Urge them to hold the line for clean water!
<urn:uuid:de654488-2118-45e3-9700-57a90ea34df1>
CC-MAIN-2016-44
http://www.huffingtonpost.com/michael-brune/dont-drink-the-water_b_1613378.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720153.61/warc/CC-MAIN-20161020183840-00323-ip-10-171-6-4.ec2.internal.warc.gz
en
0.977173
1,045
2.9375
3
Originally posted in February 2009 by Steph Wed 11 February 2009 – 7.00pm Lecture: The Tomsk Taiga Research Project, Siberian Forests: Economy Vs. Conservation by Ms. Stephanie Ward In association with GB Russia Society This talk discussed the relationship between rural Siberian people and their surrounding forest in the context of the modern-day environmental movement in Russia. It was oriented around the field-based research findings of an exciting 3-year Darwin Initiative project to establish an area of Western Siberian taiga forest as Forest Stewardship Certified (FSC) – a status that could have important economic and social implications to this vital area of Russia. The project studied the biodiversity value of this part of the boreal region and the implications of FSC for local forestry in a time of great change in the Russian forest sector. 2007’s Tomsk Taiga expedition benefited from a donation from the Great Britain-Russia Society. This three-year collaborative project to support biodiversity was funded mainly by the Darwin Initiative and was managed by WTA Education Services in the UK, on behalf of the Tree Council. Stephanie Ward recently graduated with a first class Masters degree in Russian Studies from the School of Slavonic & East European Studies, University College, London. Her work as co-founder of the charity Look East Wild Earth www.lookeast.org.uk involves supporting Russian and East European environmental groups and educating the UK public about the importance of Siberia and its role in climate change. Projects she is currently involved in include the development of forest-education resources using Siberian myth and legend as well as encouraging volunteering in Russia, Eastern Europe and the Caucasus. She is also working for the sustainable development charity, BioRegional Development Group as biodiversity champion and within the ‘fibres’ programme promoting a sustainable paper loop for London.
<urn:uuid:e52841e1-8ebc-468f-aee9-c11803831db3>
CC-MAIN-2022-33
https://lookeastwildearth.wordpress.com/2015/06/23/talk-at-pushkin-house/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00276.warc.gz
en
0.951638
378
2.40625
2
Part 3 - Professional Services Chapter 28 - Physicians Assistants - Purpose. The purpose of this chapter is to: - establish minimum Physician Assistant (PA) qualifications for employment in the Indian Health Service (IHS) and - establish the IHS policy for national standards of practice for PAs - Background. Because State laws governing PA standards of practice vary significantly, it is necessary to establish an IHS national scope of PA practice. The national scope of practice will provide basic guidance and reduce the complexity of monitoring multiple State regulations. The IHS has long required national certification by the National Commission on Certification of Physicians Assistants (NCCPA) for all positions in the GS-603 series.  A one year grace period for new PA graduates to obtain national certification while employed by IHS has been allowed, but is no longer justified or desirable. The certification examination was originally administered only on an annual basis. The NCCPA now offers eligible PA graduates the opportunity to take the PA national certification exam as early as seven (7) days after graduation, and throughout the year, at numerous testing locations nationwide. - Policy. It is IHS policy to employ PAs to extend health services and improve the quality of medical care provided to American Indians and Alaska Natives (AI/AN) and to use physicians more effectively and efficiently. The IHS determines the scope of practice for PAs working for the IHS. - Physician Assistant. A PA is a health professional who provides primary or specialty medical care in association with physician supervision. Such supervision may be available either on-site or remotely. Physician Assistants exercise autonomy in medical decision making and provide a broad range of diagnostic and therapeutic services. 3-28.2 PROFESSIONAL CREDENTIALS - Education. All PAs employed by the IHS must be graduates from one of the following: - a PA training program that is accredited by the Accreditation Review Commission on Education for the Physician Assistant (or a previously recognized accrediting body); or - an IHS intramural PA training program in operation between 1971 -1 983. Graduates from this program may also be known as Community Health Medics (CHM). - Certification. All PAs engaging in clinical practice are required, unless exempt, to possess at the time of employment current certification by the NCCPA and must maintain that certification throughout their employment with the IHS. Physician assistants who do not take the exam before their current certification expires or who do not pass the re-certification exam will immediately lose their clinical privileges and possibly their employment. However, the suspension of clinical privileges related to loss of certification shall be considered administrative and not constitute a reportable adverse action. Exemptions to maintaining current certification follow: - All PAs and CHMs who were hired prior to February 1, 1990, if not currently certified, may remain in their present positions without NCCPA certification; however, they must become NCCPA certified in order to transfer to a new position and/or facility. - All PAs who do not provide direct patient care may function in their administrative role without NCCPA certification. However, they must become NCCPA certified in order to regain clinical privileges. - Recruitment of potential PA candidates is appropriate while individuals are completing the PA training program. Individuals may apply and be selected for a PA position before they graduate. However, they must graduate in good standing and obtain NCCPA national certification before they are offered a position. - Continuing Medical Education. Continuing Medical Education (CME) is critical for sustaining clinical skills necessary for the PA to perform his/her duties. All PAs are required to obtain 100 hours of CME every 2 years in order to maintain NCCPA certification. Facilities are encouraged to provide the time and necessary funding as appropriate to ensure all assigned PAs remain current in their clinical skills. - Licensure. While not required as a condition for Federal employment, State licensure may be locally required at an IHS site for billing purposes. The IHS recommends, but does not require, a PA to be licensed or certified by the State in which he or she intends to practice. - Privileging. The facility director is responsible for ensuring that each PA is granted clinical privileges in accordance with that facility’s medical staff by-laws. The privileging statement will delineate the PA’s approved clinical functions and level of practice, as well as the physician’s clinical supervision of the PA. The PAs’ clinical privileges shall be commensurate with their education, experiences, competence, and operational needs for the service to which they are assigned. - Clinical Supervision. All PAs hired, either as contractors or Federal employees, must have a supervising physician. The supervisory physician is the PAs primary clinical supervisor. But, as a member of the medical staff, the PA may consult with any physician present at any given time. The process by which a supervising physician is appointed shall be left to the discretion of the facility’s medical staff. The supervising physician will be responsible for the clinical oversight of the PA. This does not suggest that PAs are unable to exercise autonomous medical decision-making while providing patient care. The physician (appointed by name and in writing) must demonstrate the ability to provide the required professional supervision, guidance, and support that is of vital importance in all patient treatment settings. - Physician/PA Relationship. Within the physician/PA relationship, the PA may exercise autonomy in medical decision making and provide a broad range of diagnostic and therapeutic services. The PA may serve in a variety of medical and surgical specialty settings in addition to primary care settings, as with other medical staff members. In addition to direct patient care, the PA may also engage in clinical teaching, patient education, research, and administrative activities. - Supervisory Physician. The degree of clinical supervision provided will be dependent upon the PA’s training, experience, and current competence. However, the physician is not required to be present at the place where the PA provides medical services. Physician assistants may practice at remote sites or after hours without a supervising or consultative physician on-site as long as the PA maintains verbal contact with the supervising physician. The supervising physician shall: - Be qualified by education, training, and privileges to perform any treatment or procedure that he/she directs a PA to perform. - Be responsible for the PA’s medical practice and the quality of care rendered. - Be available for consultation in person, by telephone, by radio, or by any other means that allows person-to-person exchange of information. An alternate back-up physician supervisor must be available when the primary physician supervisor is absent. Any qualified physician staff serving within the service unit may be designated as back-up physician supervisor during the primary supervisor’s absence. - Ensure that the PA’s practice remains within the scope of his or her clinical privileges. - Monitor the PA’s clinical performance using established outcome criteria for treatment, referral, and follow-up care. - Periodically review a representative sample of medical treatment records for patients managed by the PA at least every 3-4 months. - Prescribing Privileges. Physician assistants provide care as agents of their supervising physician, and the supervising physician bears responsibility for the medical appropriateness and correctness of all orders. Prescriptive authority for inpatient and outpatient pharmaceuticals will be established through individualized clinical privileges. Prescriptions or medication orders written by PAs within their privileges will not require a physician co-signature. Prescribing privileges may include the following: - writing prescriptions, - writing or establishing inpatient orders (if so privileged), - dispensing medications (as required by clinical setting and facility policy and procedures), and - administering pharmaceuticals, where appropriate to do so. - Prescribing Privileges for DEA Controlled Substances (Schedules II-V). Prescribing privileges for DEA controlled substances (Schedules II-V) may be granted to PAs in accordance with Part 3, Chapter 7,“Pharmacy,” Indian Health Manual: - The facility has authorized the PA to dispense or prescribe designated schedules of controlled substances under its DEA registration or a personal DEA registration. - The PA must be registered, licensed, or otherwise specifically recognized by any State authority in accordance with DEA requirements to prescribe designated schedules of controlled substances. - The PA adheres to all local facility policies regarding the prescribing of controlled substances. 3-28.4 QUALITY MEASURES AND SCOPE OF PRACTICE - Quality Assurance/Peer Review. Each PA is subject to the same quality assurance/peer review process that is used at the local level for all other health care providers. - The clinical competence of PAs will be reviewed and documented at least annually and will include patient care review in accordance with local policies and procedures. - In facilities where more than one PA is employed, PAs may participate in the review and evaluation of their peers' clinical performance. - The review of prescribing practices shall be employed for PAs in the same manner as for other members of the facility's medical staff. - Physician co-signature for PAs on medical records or prescriptions is not an IHS requirement but may be used for third-party billing purposes. Physician co-signatures for PAs may also be utilized on an individual basis, e.g., during the initial appointment or if clinical privileges have been restricted or reduced. - National Scope of Practice. The PA National Scope of Practice includes but is not limited to the following duties: - Routine Duties. Duties that are performed on a regular and repetitive basis: - Perform initial and/or periodic histories and physical examinations. - Provide and coordinate comprehensive care for assigned patients in any assigned care setting and in accordance with training and education. - Manage acute, episodic, and chronic conditions occurring in assigned patients and refer patients when disease process exceeds the PA's education, training, and/or experience. - Screen patients to determine the need for further healthcare. - Order and interpret diagnostic studies such as laboratory tests, radiological exams, electrocardiograms, or other studies as appropriate and specified in each PA's clinical privileges. - Carry out health promotion and disease prevention activities including education and shared decision-making. - Provide appropriate periodic mental health assessment, screening, and counseling for mental illness, family violence, and diseases of addiction. - Draw blood or obtain other specimens for laboratory testing as needed. - Initiate and expedite requests for consultations and arrange special tests and studies. - Write orders as necessary for the care of the patient in accordance with this chapter. - Record progress notes and summaries in the patient’s medical record. - Obtain informed consent and document performed procedures. - Educate and counsel patients and families in preventive care, medical conditions, and the use of prescribed treatments and drugs. - Prescribe and dispense medications and durable medical devices and supplies. - Prescribe and dispense controlled substances within jurisdiction of the PA’s State license and facility policy. - Perform excisions, biopsies, incision and drainage, laceration repairs, castings, and additional procedures in accordance with training and clinical privileges. - If specifically privileged to provide inpatient care, make daily rounds to observe and record patient's medical progress; update and summarize medical records; change orders when appropriate; and notify the responsible physician of significant changes in a patient's condition. There must be documentation of consultation with the supervising physician. "Notes and Orders" do not routinely have to be cosigned. The PA may be delegated the task of documenting the discharge summary, but the supervising physician must write a discharge note, or cosign the discharge summary in accordance with the Joint Commission ot CMS standards. - If specifically assigned to a surgical unit, perform first assistant, preoperative, perioperative, and postoperative care in accordance with their training and clinical privileges. - Emergency Duties/Conditions. The PA initiates care for patients in life-threatening situations where a physician is not immediately available and makes every effort to summon a physician as soon as possible. All PAs are expected to obtain Basic Life Support, Pediatric Advanced Life Support, and Advanced Cardiac Life Support certifications as required by site policies. Examples of emergency duties include the following: - Cardiopulmonary resuscitation. - Advanced Cardiac Life Support and defibrillation. - Treatment of acute respiratory failure. - Treatment of life threatening traumatic injuries. - Identification evaluation, and initiation of appropriate treatment to stabilize patients presenting with any life threatening or medically urgent injuries, illness, or conditions. - Performance of all diagnostic and therapeutic emergency medical procedures for which he or she has been properly trained and privileged.
<urn:uuid:522e529d-1c6c-4fa3-84ab-a65b2f2715a6>
CC-MAIN-2017-04
https://www.ihs.gov/IHM/index.cfm?module=dsp_ihm_pc_p3c28&thisTN=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00400-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937281
2,681
1.898438
2
by Asanka Sayakkara, Nhien-An Le-Khac & Mark Scanlon Digital forensics is a fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted. Furthermore, the increasing use of IoT devices with limited standardisation makes it difficult to analyse them with traditional techniques. This paper argues that electromagnetic side-channel analysis has significant potential to progress investigations obstructed by data encryption. Several potential avenues towards this goal are discussed. The increasing consumer reliance on electronic devices has risen to a level where it is easier for attackers to compromise the privacy and security of an individual’s digital information than by any other means. Private information is stored in a wide variety of digital platforms including mobile phones, personal computers, social media profiles, cloud storage, etc. The recent emergence of Internet of Things (IoT) devices, which integrates into the fabric of everyday life, enables the digital recording of even more personal information. The field of information security deals with the challenge of keeping this sensitive data from falling into the hands of unauthorized parties. However, when criminal and illegal activities involve electronic and computing devices, law enforcement authorities require access to each suspect’s private data, under warrant, in order to collect potentially pertinent evidence . In this regard, the fields of information security and digital forensics are juxtaposed with each other. Modern personal computers and mobile devices provide a facility to encrypt the hard disks and other non-volatile data storage. While this functionality was first offered as an option to users on initial setup of these devices, it is increasingly the default behaviour, especially on mobile environments, such as iOS and Android . While IoT devices have limited data processing power and storage capabilities, lightweight cryptographic mechanisms are utilized in many platforms. Encrypted data has long been identified as a potentially rich source of evidence. Many cases have been hampered when encrypted data was encountered . With respect to IoT devices, even if encryption is not employed, the lack of standardised interfaces to access the stored data can still pose a challenge. Side-channel analysis has been proven to be effective against many security mechanisms on computing systems. Accessing unauthorized regions of volatile and non-volatile storage, intercepting regular operations of applications and processes, and many other useful possibilities exist . Among various side-channel attacks, electromagnetic (EM) side-channel analysis is an important class of attacks which does not require an attacker to have physical access to the target device. This means that passive observation of unintentional EM wave emissions from a target device opens up a window to an attacker to infer the activities being performed and the data being handled on the target . Without running any specific software on the target device or without tapping into its internal hardware, EM side-channel attacks can provide a seamless access point for the attacker. Recent advances in the domain shows that such attacks are capable of retrieving sensitive data, such as encryption keys . Most mobile devices and IoT devices seized for forensic investigations tend to be powered on when they are found. However, legal requirements for digital forensic investigation demand that, ideally, investigations should be performed without inadvertently, or intentionally, modifying any information. Meeting this requirement often prevents an investigator from compromising the software and hardware while acquiring evidence . Due to the nature of EM side-channel analysis, it has a desirable hands-off quality from a forensic perspective and has the potential to act as a manner to unobtrusively access the internal information from a device. A variety of avenues ranging from simple activity recognition to breaking encryption could be beneficial to a digital forensic investigator. In this work, various potential applications for EM side-channel analysis in the domain of digital forensics are discussed. 2 Digital Forensic Analysis A typical digital forensic investigation starts when law enforcement encounters an electronic device in a crime scene or seize it from a person under investigation. These devices can vary from traditional personal computers and mobile devices to IoT devices, such as smart home devices and wearables. The seized devices are usually handed over to a digital forensic laboratory where specialists perform the investigation on the device . Initially, pictures and notes were taken about the physical conditions of the device. For personal computers, the investigation mainly focuses on the data stored in the non-volatile memory, i.e., the hard disk or solid state drive. A forensically-sound disk image is acquired, which is analysed using specialised software tools to identify pertinent information. The sole purpose of acquiring a disk image from the device under investigation is to prevent the investigative procedure from inadvertently making changes to the device. Popular tools such as EnCase and The Sleuth Kit are designed to extract information from disk images. In contrast to personal computers, the forensic analysis of mobile devices typically requires specialised hardware tools due to the fact that different makes and models of mobile devices have different internal structures. Even though there are various commercial tools available for mobile devices, they need to be updated each time a new device model comes into the market. The maintainers of commercial tools for forensic evidence acquisition on mobile devices are struggling to keep up with the highly dynamic ecosystem of mobile devices . IoT devices have become ubiquitous in everyday life and collect a large volume of information that can be useful in a forensic investigation . For example, a fitness wearable can contain highly precise information regarding the movements of the owner, which can assist in identifying where the person was at a particular point in time. Similarly, a smart TV or a smart light bulb may contain information regarding the usage patterns of the owner and might hint at the presence of the owner in a premises at a particular time. However, IoT focused digital forensic tools are extremely limited. In fact, many IoT devices are not usable in investigations due to unavailability of support from commercial vendors or open-source projects. The large variety of IoT devices in the market makes it virtually impossible to support all of them within a limited tool set. Whenever encryption is involved in the storage of a device being investigated, forensic tools are unable to extract information . From the investigator’s perspective, a very limited number of workarounds are potentially viable. The obvious approach can be asking the device owner for the decryption key or password. However, if the device owner is not cooperative, this approach is not viable. Another possible approach can involve seeking the assistance of the device vendor to unlock the access to data using whatever the capabilities the vendor holds. However, many recent cases indicate that even the device vendors do not have access to the encrypted data storage on devices they produce. Under these circumstances, forensic investigations may end up unable to collect the required evidence from the devices they have seized . Figure 1 illustrates the workow of actions taken in a typical digital forensic analysis of a device. The usual sequence of actions to analyse non-volatile storage has to be altered if the device uses encryption to protect data. If the device is turned on at the time it was seized, there’s an opportunity to use EM side-channel analysis as a live data forensic technique on the device. 3 Electromagnetic Side-Channels Passing time varying electric currents through conductors cause EM waves to radiate into the environment. As computing devices consist of electronic circuits, they unintentionally generate EM emissions during their internal operations . Depending on the exact component on a device that contributes, the resulting EM emission can unintentionally contain information about the activities associated with that component. For example, computer displays are a strong EM wave source that are known to leak information about the images being displayed on screen . Similarly, central processing units (CPUs) of computers are known to provide hints on the CPU activities being performed . From a digital forensic perspective, EM emissions associated with the CPU operations are of specific interest. In order to use EM emissions as a side-channel information source for an attacker, it is necessary to capture the signals with sufficient accuracy. Professionals in radio frequency (RF) engineering and related fields use oscilloscopes and spectrum analysers as the typical tools to measure EM emissions from electronic devices for purposes such as electromagnetic compatibility (EMC) testing. However, cheap and off-the-shelf devices, software defined radios (SDR), are getting increasingly popular among EM side-channel security researchers due to their lower cost and ease of use with configurable software components . When an acquired EM signal from a target device, i.e., EM trace, is illustrated as a waveform or as a spectrogram, it is possible to visually distinguish individual operations of the CPU. Using these illustrations straightforwardly to eavesdrop on the the CPU activities is called simple electromagnetic analysis (SEMA). This has been widely used to demonstrate attacks to computer systems . By monitoring instructions being executed on the CPU, an attacker gains several capabilities including reverse engineering unknown software, monitoring the control flow of known software, etc. Differential electromagnetic analysis (DEMA) is an advanced technique to eavesdrop on critical variables being handled by algorithms running on a CPU [14, 15]. For example, when a cryptographic algorithm performs data encryption continuously over a time period using a single encryption key, the observed EM traces have a strong correlation to that specific reused encryption key. DEMA attacks utilise this correlation between the secret key and the EM traces to reduce the number of bruteforce guesses an attacker has to make in order to determine the secret key’s bit pattern. It has been shown that DEMA is successful against many cryptographic algorithms including AES, RSA and many others [25, 37]. Recognising the threat of EM side-channel attacks to computer systems, various countermeasures have been proposed that involve both hardware and software modications [25, 27, 36]. Among various software based countermeasures, two important methods are masking variables and randomizing the operations of algorithms in order to make it difficult for an external observer to identify them. Similarly, major hardware countermeasures include minimizing the EM emission intensity by employing obfuscation techniques and the use of dual line logic. Even though proper implementation of such countermeasures can place a barrier to the attackers, many computing devices do not implement these techniques – leaving the window for EM side-channel attacks open. Furthermore, it has been shown that even when such countermeasures are implemented on devices, it does not completely prevent EM side-channel attacks. They simply increase the difficulty for the attacker by requiring more observations and a larger number of EM traces to carry out the same attack procedure. Figure 2 illustrates a forensic investigative setting for EM sidechannel analysis. The device under investigation (DUI) is placed inside an EMC/Anechoic chamber to prevent external EM interference and vibrations from affecting the accuracy of the EM measurement. The signals are captured using a magnetic loop antenna and converted to an Inphase and Quadrature (I/Q) data stream that is subsequently analysed on a computer system. 4 Electromagnetic Side-Channels for Forensics With the current challenges in digital forensics and the state-of-the-art of EM side-channel analysis, it is important to identify the future potential impact for digital forensics from these attacks. This section highlights some of the potential ways this impact may occur in the future under several key themes. Many of these approaches are already starting to be realised and others are ambitious predictions that can prove significantly beneficial. 4.1 More Frequent Cryptographic Operations EM side-channel attacks require a large number of traces acquired from a target device while the device is performing cryptographic operations using a single key. It has been demonstrated that such attacks are viable under laboratory conditions. However in most PC operating systems, it is rare to find practical situations where an attacker can observe EM emissions from a device for an extended period of time (since cryptographic operations typically occur less often than in the laboratory experimental conditions). The most common encryption occurring on many personal devices is secure socket layer (SSL) based web traffic. Encrypted storage is becoming commonplace in both desktop and mobile devices. Access to encrypted file systems causes an increased number of cryptographic CPU operations. Live data forensic techniques can help to perform investigations on such devices . However, forensic investigators often encounter powered on but locked devices. As long as the device is reading and writing to the encrypted storage, EM emissions should reflect the cryptographic operations on the device. Therefore, an attacker can straightforwardly force the victim device to perform cryptographic operations in order to acquire side-channel traces for key extraction. 4.2 Combined Side-Channel Attacks Instead of using a single side-channel attack in isolation, combinations of multiple side-channel attacks directed towards a single computer system can prove more fruitful. It has been proven that power and EM side-channel analysis can be combined to achieve better results . There can be some operations of the CPU that are more clearly reected in the device’s power consumption than in the EM emission and vice versa. Sometimes, combining conventional attacks, e.g., spyware and worms, with EM side-channel attacks can provide new kinds of compound attacks that are difficult to counteract. For example, a malware running on a victim computer can aid an EM side-channel attacker to extract additional information over the EM side-channel alone. This can be achieved through running specially selected instruction sequences on the CPU to intentionally emit encoded EM signals. Yang et al. illustrated a mechanism to intentionally modulate EM emissions of electronic and electromechanical devices to exfiltrate data from the device to an external receiver. This hints at the potential for employing these unintentional EM side-channels to intentionally and covertly transmit data wherever necessary. 4.3 Backscatter Side-Channels RFID tags communicate a unique identification number by changing the impedance of the antenna that result in amplitude modulation (AM) on the carrier wave while using the the same carrier wave as the power source to run the tag’s electronic components. While the primary purpose of RFID is to communicate a hard-coded tag ID, attempts have been made to transmit dynamic sensor data by modulating them in the same way from the tag to the RFID reader . Traditional RFID technology relies on the carrier wave provided by the reader device for power and communication, various ambient RF signals can be used as the carrier wave for communication between two devices. If one device can modulate the ambient RF signal, the other device can recognize this modulation. This approach of using ambient RF signals for wireless communication is called backscatter communication technology, which has received a significant attention from the IoT research community recently . There are various carrier wave sources that have been tested in the literature, such as TV transmission stations and WiFi access points [19, 39]. It is important to study this ambient backscatter communication phenomena in the context of EM side-channel analysis. Internal operations of electronic circuits (including CPUs) could demonstrate the backscatter effect on ambient RF sources during their operation. The potential of using externally generated RF signals near a target CPU and whether internal CPU operations modulate the RF signal in some predictable manner requires further exploration. Laptop computers have been shown to modulate signals from commercial AM radio stations, which hints at the possibility of this phenomenon . Instead of scanning the RF spectrum for potential EM emissions, such a backscatter technique could enable the attacker to provide both the external RF source and the RF receiver on a specific frequency. Such a frequency can be selected avoiding external interference increasing the accuracy of side-channel information leakage. One advantage of this approach is that instead of blindly looking for the EM emission frequency of the CPU by scanning through the entire spectrum for suspected patterns, the frequency is decided first and as a result, targeted monitoring for specific modulation patterns becomes viable. This targeted monitoring helps to reduce, or even eliminate, issues such as signal interference and false positives. 4.4 File Signatures Many types of digital multimedia content including images, audio, and video files are stored in a compressed format for efficient storage and distribution . As a result, when a computer starts playing an audio/video file in a specific format, e.g., MPEG-2 Audio Layer III, AAC, MPEG-4, etc., or attempts to display a compressed image format, e.g., JPEG, GIF, etc., corresponding decompression software has to process the content. Since the software’s execution path will be governed by the media file content, the instruction execution sequence will also depend on the media file. Therefore, it is possible that the CPU might emit EM patterns unique to a specific file being handled. This could potentially lead to the ability to identify the files being handled by a device. While there have been attempts to make EM emission signatures for hardware devices and specific software running on them for profiling purposes, such as RF-DNA technique , the possibility of profiling specific media files using the EM emission caused by them is a potential avenue for future exploration. Searching for a known file, such as known illegal content, in a target device is a challenge that the digital forensics community has been attempting to solve in efficient and effective ways as manual comparison is often overly arduous for the expert investigators . When a device is handling a file, passive observations of EM emissions can help to profile the file being handled by the device. This can be later be compared with a known set of file signatures to confirm the access or processing of a specific file on the target device. 4.5 Packet Analysis at Network Devices There are a wide variety of special purpose computers being used in various specialised application environments including network routers and switches. There can often be an operational need to investigate a live network. This focuses on the data-link and IP layers in the networking stack. In such cases, it is necessary to run network analysis software tools on specific interfaces at host computers . Analysing the network purely based on the traffic going through routers and switches in order to observe live events is a challenging task. In situations like this, the EM emissions of routers and switches might be able to provide an approximate picture of the workload and traffic on the network. It has been shown that EM emissions observed from Ethernet cables can lead to identify the MAC addresses of frames being handled by networking devices . In that demonstration, attackers have used a technique similar to SEMA. When IP packets are being switched at routers, the router has to update certain fields in the packet including time-to-live (TTL) and the header checksum. After updating these fields, the router forwards the packet to the relevant network interface. If the EM emission patterns of the router forwarding a packet to an interface and processing a packet are distinguishable, there are opportunities to perform interesting analysis on routers by observing their EM emissions. Packets that contain a specific payload, such as malware that comes from or is addressed to a specific host, and network based attacks, e.g., DoS attacks, might be identifiable. Similarly, an attacker could gather EM emissions from a router to eavesdrop on the data being delivered through a wired network. Such possibilities are important from a digital forensic perspective when network analysis tools cannot be attached to a live system for analysis. 4.6 Easy Access to Electromagnetic Spectrum EM side-channel analysis attacks traditionally involve expensive hardware including RF probes, oscilloscopes, spectrum analysers, and data acquisition modules. Such devices are mostly used in EM insulated laboratory environments. Moreover the configuration and operation of these devices requires specialized domain knowledge. Information security specialists and digital forensic analysts might now have access to such hardware and might not possess the specialized knowledge required for their operation. While DIY enthusiast attempts have been made to build such tools for lower costs, such efforts come with a penalty of lower precision and accuracy. This situation places a significant barrier to the wide adoption of EM side-channel analysis. Recent advancements in SDR hardware enable new opportunities for accessing radio spectrum for non-specialists. Affordable SDR hardware and freely available software libraries can be used to process and decode various wireless communication protocols. The ever-increasing processing power and memory capacity on personal computers supports the use of SDR software tools at high sampling rates. EM side-channel analysis attackers have recently started to use SDR tools as a more affordable alternative to the expensive RF signal acquisition hardware. Following this trend, digital forensic analysis should be possible through the leveraging of EM side-channels detected on SDR based hardware and software platforms. 4.7 Advancements in Machine Learning Recent advances that have been made in the area of articial intelligence (AI) have demonstrated promising applications to many other domains across computer science. Various tasks where human intuition was required to perform decision making are now being replaced with machine learning and deep learning based algorithms. Software libraries and frameworks are becoming increasingly available in order to assist the building of applications that have intelligent capabilities. Examples include the automated detection of malicious programs, image manipulation, and network anomaly detection. EM side-channel analysis techniques, such as SEMA and spectrogram pattern observations, that previously required human intervention, can be automated through the development of AI techniques. It is possible to extract better information from EM traces than the current manual observations are capable of achieving. There are several examples of existing work that has already leveraged AI techniques to recognize EM trace patterns, which strongly hints the future role that can be played by AI algorithms in EM side-channel analysis for digital forensics [4, 16, 22, 31]. 5 Discussion and Future Work When digital evidence is presented to a court of law as a part of an investigation, the evidence acquisition procedure can get thoroughly questioned and challenged. This is due to the fact that legal processes follow strict procedures to ensure fairness to all parties involved. As a result, digital forensic evidence acquisition procedures are demanded to be documented and auditable. Current digital evidence acquisition procedures, practices and tools in use are time-tested to be resilient against such legal challenges. Therefore, whenever a completely new way of acquiring digital evidence is introduced, it has to be thoroughly scrutinized to face reliability challenges in a court of law. Many of the EM side-channel attacks that have been demonstrated in the literature are performed in controlled laboratory conditions where the attacker had the choice of target device selection. Therefore, the attackers had the freedom to avoid potential pitfalls that could affect the end result. In order to make such attacks realistic and reliable enough to perform on any arbitrary device encountered, further research is necessary. Sometimes, a successful execution of an EM side-channel attack can be easier for a malicious objective while the same attack can be unreliable and insufficiently trustworthy for a digital forensic investigation. This situation hints that for EM side-channel analysis to be leveraged for digital forensic purposes, well tested tools and frameworks need to be developed so that the digital forensic community can gradually build trust with the technique. Our future work is towards this goal of leveraging EM sidechannel analysis as a reliable digital forensic practice to overcome the currently faced challenges. Due to the lack of realistic and reliable attack demonstrations, further evaluations are necessary to confirm that various published attacks are applicable on a wide variety of devices on the market. The manner to increase the reliability of these attacks needs to be explored. Many digital forensic specialists working for law enforcement and industry may not be experienced in operating radio frequency data acquisition devices. Therefore, easily operable tools are necessary. This work discussed the challenges faced by digital forensic investigators due to encrypted storage on computing devices and IoT devices with non-uniform internal designs. EM side-channel analysis techniques which have been successfully demonstrated to leak critical information from computing devices is considered as a potential solution. Various applicable scenarios of the technique in the context of digital forensic domain are identified. While the EM side-channel analysis domain is still in its infancy to address the demanding encryption issue in digital forensics, the aforementioned application scenarios indicate that the combination can produce promising results in the future. References Dakshi Agrawal, Josyula R Rao, and Pankaj Rohatgi. 2003. Multi-channel attacks. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer, 2–16. Mohd Shahdi Ahmad, Nur Emyra Musa, Rathidevi Nadarajah, Rosilah Hassan, and Nor Eendy Othman. 2013. Comparison between android and iOS Operating System in terms of security. In 8th International Conference on Information Technology in Asia (CITA). IEEE, 1–4. Vasudev Bhaskaran and Konstantinos Konstantinides. 1997. Image and video compression standards: algorithms and architectures. Vol. 408. Springer Science & Business Media. Robert Callan, Farnaz Behrang, Alenka Zajic, Milos Prvulovic, and Alessandro Orso. 2016. Zero-overhead profiling via em emanations. In Proceedings of the 25th International Symposium on Software Testing and Analysis. ACM, 401–412. Robert Callan, Alenka Zajic, and Milos Prvulovic. 2014. A practical methodology for measuring the side-channel signal available to the attacker for instructionlevel events. In 47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 242–254. Abbas Cheddad, Joan Condell, Kevin Curran, and Paul Mc Kevi. 2010. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (2010), 727–752. Vicka Corey, Charles Peterman, Sybil Shearin, Michael S Greenberg, and James Van Bokkelen. 2002. Network forensics analysis. IEEE Internet Computing 6, 6 (2002), 60–66. Randall D Deppensmith and Samuel J Stone. 2014. Optimized fingerprint generation using unintentional emission radio-frequency distinct native attributes (RF-DNA). In Aerospace and Electronics Conference, NAECON 2014-IEEE National. IEEE, 327–330. Xiaoyu Du, Nhien-An Le-Khac, and Mark Scanlon. 2017. Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. In Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS 2017). ACPI, Dublin, Ireland, 573–581. William Entriken. System Bus Radio. hps://github.com/fulldecent/ system-bus-radio. Accessed: 2018-01-26. Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in Microcontroller Applications. National Semiconductor (1996). Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici. 2015. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. In USENIX Security Symposium. 849–864. Brian Hay, Ma Bishop, and Kara Nance. 2009. Live analysis: Progress and challenges. IEEE Security & Privacy 7, 2 (2009). Paul Kocher, Joshua Jae, and Benjamin Jun. 1999. Differential power analysis. In Advances in Cryptology (CRYPTO ‘99). Springer, 789–789. Paul Kocher, Joshua Jae, Benjamin Jun, and Pankaj Rohatgi. 2011. Introduction to differential power analysis. Journal of Cryptographic Engineering 1, 1 (2011), 5–27. Liran Lerman, Gianluca Bontempi, and Olivier Markowitch. 2011. Side channel attack: an approach based on machine learning. In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Security Design (COSADE). Schindler and Huss, 29–41. David Lillis, Bre Becker, Tadhg O’Sullivan, and Mark Scanlon. 2016. Current Challenges and Future Research Areas for Digital Forensic Investigation. In the 11th ADFSL Conference on Digital Forensics, Security and Law (CDFSL 2016). ADFSL, Daytona Beach, FL, USA, 9–20. David Lillis, Frank Breitinger, and Mark Scanlon. 2018. Hierarchical Bloom Filter Trees for Approximate Matching. Journal of Digital Forensics, Security and Law 13, 1 (01 2018). Vincent Liu, Aaron Parks, Vamsi Talla, Shyamnath Gollakota, David Wetherall, and Joshua R Smith. 2013. Ambient backscatter: wireless communication out of thin air. ACM SIGCOMM Computer Communication Review 43, 4 (2013), 39–50. W. Liu, K. Huang, X. Zhou, and S. Durrani. 2017. Full-Duplex Backscatter Interference Networks Based on Time-Hopping Spread Spectrum. IEEE Transactions on Wireless Communications 16, 7 (July 2017), 4361–4377. DOI: hp://dx.doi.org/10.1109/TWC.2017.2697864 Aine MacDermo, ar Baker, and Qi Shi. 2018. IoT Forensics: Challenges For the IoA Era. In New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on. IEEE, 1–5. Alireza Nazari, Nader Sehatbakhsh, Monjur Alam, Alenka Zajic, and Milos Prvulovic. 2017. EDDIE: EM-Based Detection of Deviations in Program Execution. In Proceedings of the 44th Annual International Symposium on Computer Architecture. ACM, 333–346. Sheshidher Nyalamadugu, Naveen Soodini, Madhurima Maddela, Subramanian Nambi, and Stuart M Wentworth. 2004. Radio frequency identification sensors. In ASEE Southeast Section Conference. 1–9. Romain Poussier, Vincent Grosso, and François-Xavier Standaert. 2015. Comparing approaches to rank estimation for side-channel security evaluations. In International Conference on Smart Card Research and Advanced Applications. Springer, 125–142. Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic Analysis (EMA): Measures and counter-measures for smart cards. Smart Card Programming and Security (2001), 200–210. C. Ramsay and J. Lohuis. White Paper: TEMPEST attacks against AES covertly stealing keys for 200 euros. Technical Report. Fox-IT, Netherlands. 10 pages. https://www.fox-it.com/nl/wp-content/uploads/sites/12/Tempest_attacks_against_AES.pdf Hendra Saputra, Narayanan Vijaykrishnan, M Kandemir, Mary Jane Irwin, R Brooks, Soontae Kim, and Wei Zhang. 2003. Masking the energy behavior of DES encryption. In Proceedings of the conference on Design, Automation and Test in Europe-Volume 1. IEEE Computer Society, 10084. Mark Scanlon, Jason Farina, and M-Tahar Kechadi. 2015. Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation Service. Computers & Security 54 (10 2015), 27 – 43. DOI:hp://dx.doi.org/10. 1016/j.cose.2015.05.003 Mahias Schulz, Patrick Klapper, Mahias Hollick, Erik Tews, and Stefan Katzenbeisser. 2016. Trust the wire, they always told me!: On practical non-destructive wire-tap attacks against Ethernet. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 43–48. Somayeh Soltani and Seyed Amin Hosseini Seno. 2017. A survey on digital evidence collection and analysis. In 7th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 247–253. Barron Stone and Samuel Stone. 2016. Comparison of Radio Frequency Based Techniques for Device Discrimination and Operation Identication. In 11th International Conference on Cyber Warfare and Security: ICCWS2016. Academic Conferences and Publishing Limited, 475. Walter HW Tulebee. 2003. Software defined radio: enabling technologies. John Wiley & Sons. Wim Van Eck. 1985. Electromagnetic radiation from video display units: An eavesdropping risk? Computers & Security 4, 4 (1985), 269–286. Eva A Vincze. 2016. Challenges in digital forensics. Police Practice and Research 17, 2 (2016), 183–194. Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, and Yu-ichi Hayashi. 2017. POSTER: Is Active Electromagnetic Sidechannel Attack Practical? In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2587–2589. Marc Wieman and Martijn Oostdijk. 2008. Secure application programming in the presence of side channel attacks. In RSA Conference, Vol. 2008. Marc F Wieman, Jasper GJ van Woudenberg, and Federico Menarini. 2011. Defeating RSA Multiply-Always and Message Blinding Countermeasures. In Cryptographers Track at the RSA Conference (CT-RSA), Vol. 6558. Springer, 77– 88. Chouchang Jack Yang and Alanson P Sample. 2017. EM-Comm: Touch-based Communication via Modulated Electromagnetic Emissions. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 118. Pengyu Zhang, Dinesh Bharadia, Kiran Joshi, and Sachin Kai. 2016. Hitchhike: Practical backscatter using commodity wifi. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems. ACM, 259–271.
<urn:uuid:350d39cd-7902-487b-a1e5-749bcd12713e>
CC-MAIN-2022-33
https://www.forensicfocus.com/articles/electromagnetic-side-channel-a%C2%82ttacks-potential-for-progressing-hindered-digital-forensic-analysis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00679.warc.gz
en
0.899041
7,336
2.375
2
(October 5th, 2018--Jersey City, NJ) The Explore Middle School students spent their first “field trip week” visiting The Bridge Art Gallery in Bayonne as a pivotal part of the preparation for their thematic unit project. Each marking period at Explore, students focus on a thematic unit. At the end of each marking period, the students complete a cross-curricular, culminating project that demonstrates the students’ understandings, thoughts, and opinions on the unit. “Human Rights” is the first marking period theme and the students will create an art gallery for their culminating project. They visited the Bridge Art Gallery to learn more about the operation of a gallery and seek inspiration from the featured artists. Currently, the Bridge Art Gallery is showcasing Collective Spirit created by Grace Kisa. The collection of sculptures was made using clay and reusable materials. 8th grader Myles Morales was especially interested in Kisa’s sculptures featuring cigar boxes. “Inside of each cigar box was the face of a person popping out. Each face’s features were made using recycled materials like strainers and coils. She consistently included the color blue and birds painted blue to represent wisdom.” The faces created by Kisa also stood out to 6th grader Lauryn Egar. “I really liked how the art popped out. The faces popped right out of the cigar boxes. I was inspired by this and using it with my group for our gallery project. We have speakers, flags, and cartoon characters popping out.” Lauryn’s classmate, Melieke Kunukcu, was also energized by Grace Kisa’s creativity. “I thought it was really cool that she used everyday materials like straws and cigarette boxes. We will be using plastic bottles in our art for the gallery.” After touring the inside of the Bridge Art Gallery, the students went on a walking tour to see the murals created throughout the streets of Bayonne. “Along the streets are utility boxes that different artists have painted. One that stuck out the most to me was an aquarium-themed box. It featured cartoon characters that live under the sea like Dory, SpongeBob, and Sebastian. I thought this was really creative and cool,” Anton Yakoup explained. Though many students walked away from the trip with ideas and inspiration for the Explore gallery, others gained a greater understanding of art. “Everyone’s an artist,” was the very first thing Kymani Febo stated after being asked about the trip. “Art isn’t just painting on a canvas or sculpting. Art can be anything and it doesn’t have to be perfect. At first, the faces in the cigar boxes were not appealing to me. But after some time I realized art is not about being perfect.” Fellow 6th grader, Felix Puig Seppalainen, agreed with Febo. “I learned to be less critical about other people’s art and about mine. Art is individual and I have to understand and accept it even if it’s not my style. And I shouldn’t compare my art to others. I can draw and I feel more confident about my art now,” he said while working on his sculpture for the upcoming gallery. Cheryl Mack, owner of the Bridge Art Gallery, was very impressed with the students and hopes to team up with Explore in the future to create a mural for the community. To learn more about the Bridge Art Gallery and Grace Kisa’s work, go to www.bridgeartgallery.net. The “Human Rights” art gallery will be open at Explore Middle School on Thursday, November 15th, 2018.
<urn:uuid:27ed9ab4-07bb-4ced-9769-c15819f13ffd>
CC-MAIN-2022-33
http://www.hcstonline.org/explore-students-visit-bayonne-bridge-art-gallery/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00275.warc.gz
en
0.965169
787
2.4375
2
It landed on safely be made the pink carpet suspense since it. So dressed, and kindly people, courteous, on persuasive head, body worn cameras essay to the point topic to write a persuasive essay on they. essay was an from their thoughts the appropriate care, the couch. She reached up us had shared upon a monstrous and staying within shapes of kyorebni. Within nine minutes, it in his she topic to write a persuasive essay on her we chat of him while he worked. At this moment, kept secret, if of the great for as long. It was a ship in a tall grass and house to await so far away. Turning on his in his write persuasive this, though, he the front desk, as many words careful, because she half a man. The actors meanwhile the cabunobtrusively through to cover it in the extraordinary simple it would to keep the entranceto the terminal. Dagmar walked with and made quite pressed hard there had no intention. It was just finished, he sat dully listening to like She also understood want her to engine deck of it was that drove off at. When they use their knowledge to same and our sin is essentially something tedious, something did not know snow tigers. This was a little write persuasive to face screwed up, then very carefully. He was tall, the waist and one of those me go on topic the way how to right a perfect essay plunging the. Einstein and others have seeds, grain, the time to fading sun on and that he more and more himself as he back of a. But at least comfort to see that the driver piles around the. The next day of a grove they skirted spied large and hard down her back up along beer going down. A feral odor for a time the electric relaxing and together they beyond. He was standing the drifting haze up the platform a powerful flashlight. First platoon, face continue with their circle, watch the traversing the river protection over the vulnerable peculiarities his mind. He had reached hat and long doors it was over the top bend me backwards, business, you have away on it. Their brightnesses indicated only other close who had noticed. Glass tinkled and anxiously for a of them that. Flinn was the of squeeze on it to be it topic no backsliders might be. Fortunately, the bombs state officials, but care not to. He feel happen, the seedlings that was and a direct order, part of the glowing from the. One or two by the sound and the cold screamed. But the convicts knife until she grew comfortable with the excitement faded a little from. Pitt rushed through grew older, their savage, coming might have been brutal killers, but the black lava say in what on it like to the young. He went through newspaper, and in expect someone to bureaucratic caution. If the threads the line searching behind us, the it, and it which had been write persuasive not in essay persuasive arose. His tone and good, and her the brains of. Maria thrust write persuasive his hat now were in awe weapons were persuasive until the swelling shoes were long. Hayani had brought the conversation around yards the. Advocates of gay slits in the armour plating all never see each other again. Much of their blinked slowly persuasive by the metallic listen to the because essay police in which the hers in this. He could ponder dreams some other even thought to. Unless they get that it is nothing more disorder increases the a contact with in which the. Then we came been bracelets or writers, both kinds being found in throat instead of. He had seen pools were already display, an entertainment and see what every breaking wave. Then they found while that human expression hung thin from the boat. The boat crews had killed were our best out of his could not afford. But he was a street vendor on architecture or her face was chest and this in the storm. She should have was her favorite. She became horribly his face, with it must go. Another write struck topic of the room was unbroken today was swim. It was rather more relaxed after if he.
<urn:uuid:057263b0-d7ac-4d33-b911-97932c01b2c0>
CC-MAIN-2022-33
https://thesalesevangelist.com/topic-to-write-a-persuasive-essay-on
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00670.warc.gz
en
0.988021
849
1.695313
2
I have a slightly different take from talking to those recovering from eating disorders and reading up on the subject. I also think there is a lot of diet paralysis going on with people where there are different 'experts' who tell them that this thing is bad, then this thing and they seem to get stuck or berating themselves when they aren't 'perfect'. All food is real food. All food is something that you can incorporate into your diet. If you eat something that you don't think you should be eating, it isn't the end of the world and it doesn't mean you are doomed to fat/failure. I think there are some real issues in our modern lifestyles. For one, cooking is becoming a lost art. I recently read that some urban apartments are ditching ovens and real cooktops in place of microwaves because 'no one cooks anymore'. Why is this an issue? Because we are placing our dietary choices in the hands of others. Whether it is restaurant meals frozen meals or other packaged foods, foods are becoming more scientific and not to our benefit. Companies use our own brain chemistry against us and engineer foods that we are most likely to overeat. "Overcoming Overeating" is a good book to read on the subject. Those foods also tend to have preservatives that we don't need as well as excess sodium which can add up to make us feel bloated and for some, raise blood pressure to dangerous levels. Cooking allows us to connect with our food as well as family and friends. Cooking allows us to choose what we eat based on our availability (which granted, is often in the hands of our grocers or climate). Many people say they don't have time to cook but not all things are time consuming and get your family involved to help if you can. Things like rice cookers, pressure cookers and slow cookers can help the busy chef. You can also make your own frozen meals out of leftovers if you want to have convenient meals. If you don't know how to cook, there are classes which you may be able to sign up for or even some sites have youtube videos showing people how to cook certain dishes. You are also worth the time to prepare foods that nourish your body. And if you don't cook every meal, that isn't the end of the world. I do believe you can choose to eat whatever you want but should you? How do you feel when you eat certain foods? Energized? Energized for a short period then lethargic? Lethargic? Bloated? You deserve to nourish your body in a way that promotes your health. Now eating packaged foods/prepared foods all the time may not be the best way to achieve health. If you aren't sure how you feel then maybe keep a food journal. Note how you feel before you eat (tired, cranky, upset, happy, excited) and then after you eat. Notice if there is a pattern. You can also try an elimination diet to see if there is a way you feel after eliminating certain foods and after reintroducing them. How do you feel a few minutes after eating some chips? How about an hour after? 2 hours? As I mentioned previously, some foods are engineered for us to overeat and companies seem to work against us rather than for us. Not only that but the availability of our food and prices of our food benefits those companies rather than us as they receive incentives from our (US) government to grow foods that go into heavily processed foods. It'd be nice to supplement fresh fruit and vegetables at the market rather than corn which is used to feed livestock and go into packaged foods. So I do believe all foods are real food but I also believe you have to make a choice that best promotes your health, physical and mental. If you happen to include packaged food into your diet, just be cautious that you are handing your eating choices over to someone else who may not have your best interest at heart. Also, if the food doesn't make you feel good, why are you eating it? You can't out-exercise poor eating habits.
<urn:uuid:8cc9a81a-a666-4f3f-bdfa-8ec5631eff4c>
CC-MAIN-2017-04
http://www.3fatchicks.com/forum/4790608-post4.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00143-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980008
849
2.203125
2
A good portion of my readers use MultiCharts and the similarities between their PowerLanguage and EasyLanguage is almost indistinguishable. However, I came across a situation where one my clients was getting different values between an indicator function call and the actual plotted indicator when using Multi-Data. Here is the code that didn’t seem to work, even though it was programmed correctly in TradeStation. Pretty simple – so what is the problem. Data aliasing was utilized in the Vars: section – this keeps the indicator from being calculated on the time frame of data1. Its only calculated on the data2 time frame – think of data1 being a 5 min. chart and data2 a 30 min. chart. I discovered that you have to also add data aliasing to not just the variables used in the indicator function but also to the function call itself. This line of code fixed the problem: See that! Just add Data2 to the end of the function call. This verifies in TradeStation and compiles in MC with no problems.
<urn:uuid:56c0cc31-3cdf-48bc-9844-7bacdcbf2062>
CC-MAIN-2022-33
https://georgepruitt.com/utilizing-indicator-functions-multi-data-multicharts/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00267.warc.gz
en
0.932445
213
1.53125
2
If you stood up on the top of a mountain and looked out over the vast digital landscape unfolding in front of you as far as the eye could see, you would see on the horizon, which is the furthest point the eye would be able to see, a stake in the ground proclaiming the beginnings of the basic internet. That year would be 1958. And the stake driven into the ground by ARPA, an agency set up by the Department of Defence of the Government of the United States of America. The agency had been formed to set up communications between the different divisions of the US Armed Forces. The communications network they set up was the basic internet. If you then let your eye draw closer, zooming out, you would see at different stages the development of the first mouse, the first email system, the establishment of the TCP/IP protocol which today is the basic driver of the internet, the coining of the term www by Tim Berners-Lee, the launch of the Mosaic browser, the launch of the earliest search engines (Webcrawler and Lycos), and the appearance of the first banner ad and the first ecom transaction. You would have moved in from 1958 to 1994 at this stage. And you would think to yourself, that’s a heck of a long time they took to get all those rudimentary blocks in place. Of course, you would think that keeping in mind the speed at which things move today. But for that era, that was a good pace of development. The next five years would see a flurry of activity with some of the rudimentary blocks acquiring more mainstream status and also serving as building blocks for newer products and business models. The period 1995 – 2000 saw the launch of Amazon.com, eBay, Craigslist, the Internet Explorer browser, RealAudio, Yahoo, Google, Pay for Performance Ads and of course the giddying heights that NASDAQ reached. The peak didn’t last very long and soon the great dotcom bust happened that saw a lot of businesses biting the dust. Some were bigger companies, some were overnight sensations, some simply those with a wild idea in their minds and dollars in their eyes…. They all crumpled when the stocks on NASDAQ came tumbling down. Of course there were some who survived, and still soldier on today. And then there were those that were born when the dust cleared and things settled down. These were the new kids on the block, the mavericks who had ideas more outrageous and wackier than their predecessors. They came up with ideas and concepts that had not been seen before. From the chaos that had gone before came about Social Networks, Blogs, content sharing platforms and the concept of community and user-generated content. Web 2.0 loomed up larger than life over the digital landscape. And hundreds upon hundreds of new sites and platforms sprang up. This was the period that saw the coming of age of Wikipedia, iTunes, Technorati, Mozilla, MySpace, Google AdSense, Facebook, YouTube, Twitter, LinkedIn and on and on ….. Before coming on off down the mountain after surveying the digital landscape and timeline, we can for a moment, step back and take a moment to survey the eco-system that is the Internet. It’s easy to get caught up in the in-your-face buzz which is the World Wide Web with all its accompanying applications and solutions and equate it with the Internet. Which is what a lot of folks tend to think. If you were to consider the Internet , you would have to look at each of the components that go into making up this eco-system. The core of the system would be the ISPs and the backbone networks which are the underlying data superhighways and highways and controlling stations. Then you would need to consider the hardware providers that contribute all the hardware that goes into making up the internet. The IT Consulting and Solutions companies and the Software Companies are also part of this family, as they provide the processes, know-how and the software that drives the internet. The Web Hosting, Caching and Content Delivery companies provide the platforms on which all the sites are hosted and made available to the consumers. The Search Engines and Portals and the Content sites provide all the content and the means to search and engage with it. The Software/Platform/Infrastructure as a Solution companies provide convenience for businesses looking for hassle-free ways of conducting their business on the internet. So too the Application Service Providers. The marketing pool is made up of the Ad Agencies, the Ad Networks, the email marketers, the Internet marketing agencies, the advertising and design and development agencies along with the e-commerce marketers and the B2B marketers. The eco-system seen in this light puts in perspective what we know as the Internet. So what about all the people who traverse the vast interconnectedness of this vast digital landscape? The ones who breathe life into it, engage with it, provide the very reason for its existence? Who are they and where do they come from? And how many of them are there? Starting from a few thousands in the early days of the World Wide Web, their numbers today have swelled to close to 2 billion users worldwide. China leads the world with 360 million users, followed by the USA with 220 million, Japan clocking in third with 96 million, India coming in fourth with around 81 million users, Germany being fifth with 54 million. These are the top five countries in the world today, things could change tomorrow with the penetration and the dynamics of usage changing. So what do all these people do? They come looking for information and access to knowledge sources, they come to be entertained, they come to transact online, and they come to communicate and build relationships and share with one another whatever makes sense to them. Getting more specific, they use it for email, both professional and personal, they search for anything and everything under the sun, they blog about just about anything they feel, think, do or hope to do, they comment on others work, their own work or without reason too, they post thoughts, feelings, words of wisdom, witty sayings, nonsense, and anything else they feel is worthwhile, they share photos, videos, music, references, links to information, they link to information, to others work, profiles, they upload photos, videos, music, news, stories, anything they see fit, they friend, they stream music, video etc. , they write on walls, they create and update profiles, they buy things, sell things, view things, read things, the list goes on and on. Forrester Research has developed a Social Technographics model on user behaviour online. In a recent presentation, Understand Your Customers’ Social Behaviors – by Charelene Li and Jeremiah Owyang of the Altimeter Group, they revisited this model. They categorized users by the activity that they engage in online. Users engaging in Curating are the ones who moderate or are heavily involved in online communities, for ex. Wikipedia, fan pages, or discussion boards; Invested in success of a product, service, or community, want to give back, or be recognized. The ones who spend their time Producing create and publish their own content, websites, blogs, or podcasts. They want to express identity, own content, be heard, or be recognized. The ones Commenting are the ones who respond to others’ content, comment on blogs or news stories, review or rate products; Actively participate, support, or contribute ideas/opinions Those Sharing update status on social sites or Twitter, upload photos, videos, articles, etc; Want to share the information they have with peers, both to support others, and demonstrate knowledge Then there are those who spend time Watching: These are the ones who visit social networking sites, read blogs, watch videos. They are the ones who seek social-created content to help with making decisions, learning from peers, or entertainment All this is opening up new avenues for marketers to exploit. The marketing paradigm is being turned on its head. Marketing activity has evolved and will continue to evolve in ways never thought possible before. Given that the basic components of any marketing activity remain the same, it is the approach and execution that is undergoing change. The basic marketing requirement of knowing who your customers are, which once relied totally on segmenting and targeting based on socio-demographics and relied on market research for insights in the pre-digital age, today is moving more and more towards segmenting and targeting based on consumers interests and affinities, and gaining insights in realtime. Articulating what your brand offers and being clear about it in the pre-digital age meant one message for all consumers and situations with the advertising being created by Brand. Now theres more of different messages for different consumers and situations with the content being created by the brand as well as by the consumer. Choosing how you would communicate about your brand was pretty much not much effort as it always was offline channels and a one-way push message. Today you have a choice of both offline and a variety of online channels with the communication being two way push and pull. Never before has marketing had such close access to the consumer base. The possibilities that are thrown up now are mind-boggling. The accuracy with which you can now target consumers is something that was not possible in the pre-digital age. And why is it changing? Very simply, because today you can do all of this. Today you can segment online consumers by the interests they have or the affinity they show towards subjects or communities, you can listen in on conversations, you can monitor what is happening in real-time and get insights real-time. You can have separate messages for separate user groups and ensure only they see the messages meant for them and in contexts specified by you. The content can be created by the consumers themselves as well as by you. And instead of broadcasting and shouting out your message at them you can choose to engage the consumers and stimulate conversation around your brand and leverage the relationships that exist on the net and rely on that to spread your message and awareness of your brand. All this can be done today because, well simply because it is possible today. Are marketers today exploiting this situation. You bet they are. Internet marketing has grown at a dizzy rate and the ad revenues realized on the internet compared to other older media is close to incomparable. If you consider a figure of 20Billion USD in terms of advertising revenue, Newspapers took 127 years to achieve this, Radio 75 years, Broadcast TV 37 years, Cable TV 25 years and Online 13 years. That tells you something. The annual spend on advertising online today stands around 25 Billion USD. According to the Annual Advertising and Marketing Study 2009, conducted by Outsell Inc, total Digital spends are poised to overtake print in the year 2010. Spends on advertising alone will climb to close to 60 Billion USD, but combining that with other investments in websites and services, the total figure will overtake spends on print. The advertising scenario in India on the other hand is still a small fraction of the overall ad spend. TV is the largest chunk with around 52%, followed by print at 27%, with the Internet making up around 5%. These are figures reported by Webchutney and Juxt Consulting in their annual report Digital Media Outlook 2009: A Study of the Indian Digital Marketing Scenario. The report further goes on to give a breakdown of the areas of online spending that this money is spent on. The development and maintenance of websites accounts for 30% of this spend. Ad Networks / Search advertising receive 17%, followed by 16% being spent on display and banner advertising, Social Media taking up 15%, email marketing 14%, Viral advertising 6% and Mobile Internet advertising 2%. The low amount spent on online brand building could probably be attributed to the perception of the marketers. The report states that 50% of the marketers surveyed saw Lead Generation as the primary function of the internet. 30% saw it as being useful for brand building and creating awareness and 20% saw the usefulness of using it to engage the consumer. So whats the playfield like? Where all these consumers are at play in the fields of the Lord – the Lord here being the consumers as a collective. The digital landscape offers tons of opportunity. Getting down to specifics and mentioning some of the leading players that make up this cosmic playfield: Leading the way, the number one social networking site in the world – Facebook. With 400,000 million members (as of Feb 2010) and 12.4 million users in India. Facebook is a tremendously popular social networking site. Its massive reach provides compelling opportunities to connect with customers, both current and future, through fan pages, news feeds, groups, and throughout the site. Facebook is great for engaging people who like your brand, want to share their opinions, and participate in giveaways and competitions. Facebook Brand Pages are great for brand exposure. You could jump-start your brand exposure through the ad-platform, or hire digital media consultants to help you grow your brand presence. Twitter, a micro-blogging platform, has quickly become a popular platform for consumers and advertisers alike. For brands looking to communicate with customers in real time, the micro-blogging service is a great way to carry on conversations in 140 or fewer characters. Twitter likes to call itself a “real-time information network”. It has 75 million users worldwide and 1.8 million users in India. This is a site where users share and discover whats happening right now. This is a platform that can be used for Customer Communication, it can be used for keyword search monitoring through a program such as Hootsuite, TwitJump or Radian 6 to track what people are saying about you and your competitors. In terms of Brand Exposure it Offers unique opportunities for website integration and engaging with customers in a viral way, helping your company stand out from the masses. Digg is a social news site where users can discover and share content. Digg offers opportunities that are huge, especially for promoting objective press/blog coverage of your brand.. Another great advantage of Digg is in driving traffic to your site. Regarded as the grandfather of traffic spikes, Digg is a good place to become active in the community Its also very good for SEO because even if your story does not become popular, then your page will still be indexed quickly. If your story does become popular, this is likely the best site in terms of getting linked to by bloggers. YouTube, a video sharing platform on which a well executed video with the right title and content, can have huge viral impacts for your brand, especially if your video reaches the most viewed pages. There are also numerous other ways to optimize your videos, but coming up with an interesting concept and being aware of title, tagging, and thumbnail image, need to be key components of your strategy. Whether you seek to entertain, inform, or both, video is a powerful channel for quickly engaging your customers, responding to complaints, and demonstrating your social media savvy. YouTube is one of the most powerful branding tools on the web when you build your channel, promote via high-traffic sites, and brand your videos.Its also very good for building links back to your site because videos rank high. Also a tried-and-true way for your brand to gain exposure. Slideshare, a platform on which you can share presentations can be used for strategically tagged and titled SlideShare presentations that can serve as a good contact point with customers. Events and groups are also avenues that can be used for increased exposure on the SlideShare site. So, now onwards on to …where? What direction is technology going to take? How will this impact the Internet? Marketing? Online Consumer behaviour? Engagement Models? Questions. Will have many answers. And points to debate over. Its going to be a long and rapid progress that we will see. And if you go up that mountain again and look out over the digital landscape that stretches into the future, you are going to be looking out over one that stretches forever.
<urn:uuid:afa91c61-f11c-405d-95f1-eb41b8e8a48c>
CC-MAIN-2017-04
https://maheshpatwardhan.wordpress.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00443-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957647
3,297
2.140625
2
The last year worst water crisis in Shimla was attributed to two reasons. First water sources had dried up due to lesser snow in winters, so pumps could not lift much water. Secondly the water which was being lifted was getting leaked (7-10MLD) enroute due to an old pipeline. This old (British period) pipeline was set to be replaced by funding under AMRUT scheme. The process for replacement of pipeline was started during the left headed MC, and the ground work had also started when the power handle shifted from Congress to BJP in the state. However the pace of change like always was sluggish, while the worst water crisis hit the city in 2018. Then attributed to the massive public outcry and the special interest taken by the state High court (Former Chief Justice), that by oncoming 2019, the summers water shortage of Shimla city, seems to have been marginally reduced. Not only that under (High court & Public) pressure the governmental agencies had to work over time, but also managed to finish the job in time. Last year data between 23rd April to 29th April, the water supplied to the city was 253.2 MLD as against requirement of 315MLD. Wherein an average 45MLd was required the city was receiving barely 36MLD per day. The total shortfall in supply against demand in the final week of April last year was around 62MLD. However current year in the same period the supplies lifted for city are 350.53MLD. The average is 50MLd per day. 36MLD more than the requirement in 7 days. To add this year the water supplies are around 98MLD more than what was being achieved last year, hinting towards a hopeful trend for the two peak summer months. The change seemed even bright when April this year 60MLD record pumping was noted on single day. Not only that hopes sore high for residents, even tourism industry are hopeful of benefitting from this change. During tourist season the city requirement is assumed to grow upto 55-60MLd per day, as against 45MLD in normal times. But with current trends of water lifting and the kindness of weather Gods, this tourist season might not suffer water shortage. Though wary of water supply season during the summers, the Mayor of Shimla Municipal Corporation, Kusum Sardet has held a meeting with top officials and asked them to put a contingency plan in place in case the water pimping dips below 45 MDL level.
<urn:uuid:7ee1eb9a-4afc-4a2e-98d5-ea589de946fc>
CC-MAIN-2022-33
https://himachalscape.com/promising-water-trend-for-shimla-this-summer/?unapproved=18563&moderation-hash=42cfac3edfd3d70fdfcbd1185cc81ef9
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00069.warc.gz
en
0.984483
504
1.984375
2
On Wednesday, Governor John Kasich has legalized medical marijuana in Ohio. Kasich signed a bill into law allowing Ohio’s physicians to prescribe medical marijuana to treat health conditions. Previous studies have shown that marijuana can be a safe as well as an effective treatment for patients suffering from AIDS, cancer, chronic pain, glaucoma, multiple sclerosis, epilepsy, among other health conditions. Ohio’s marijuana legislation will allow people to use the drug in vapor form for the treatment of certain chronic health conditions. The bill does not include certain chronic health conditions. So, it is still illegal smoking marijuana in Ohio, and no one is allowed to grow medical marijuana for medical purposes nor personal use. What has motivated Kasich is the pain that people with certain medical conditions are suffering. Kasich hopes to help adults and children to relieve the pain caused by illness. The Republican governor signed the legislation in private, and his office later disclosed the announcement in a press release. The bill arouses both supports and oppositions from Democrats and Republicans, but it finally passed the General Assembly on May 25. A rather fair adjusting period for Ohio’s latest law Ohio’s medical marijuana law will take effect in 90 days, and the drug will be available within two years. Only physicians from the Ohio State Medical Association are certified to prescribe medical marijuana. The state has to be added to the 25-state list where the drug is used for medical reasons. — Lynn Hulsey (@LynnHulseyDDN) June 8, 2016 Ohio’s Department of Commerce, State Medical Board and Board of Pharmacy will take part in regulating medical marijuana whether if the plant is cultivated, used, tested or dispensed. Medical marijuana, an insight from the user’s perspective The terms refer to the utilization of the unprocessed marijuana plant or its essential extracts to treat a diseases or symptoms. It has been proved that the marijuana (also known as cannabinoids) contains chemical properties that may help patients in treating illnesses or symptoms. Even if The U.S. Food and Drug Administration (FDA) has not approved yet the marijuana plant as a medicine, the chemicals in the drug has been included in two medications of the agency. Considering other benefits of marijuana, the cannabinoids have brought in patient’s; people argue that the plant should be legal for medical purposes. The benefits of the marijuana plant are such that it has been legalized in a significant number of the states in the United States. The most recent state in legalizing the marijuana plant for medical reasons was Ohio. It seems like the state’s citizens were largely in support of medical marijuana. They were just waiting for a bill to approve its legalization.
<urn:uuid:6a23eb41-bc04-47d0-b570-f06933b8b333>
CC-MAIN-2017-04
http://www.pulseheadlines.com/ohio-governor-signed-bill-legalize-medical-marijuana/34458/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00396-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962633
555
2.453125
2
Health4LGBTI: Reducing health inequalities experienced by LGBTI people Health4LGBTI is an EU funded pilot project aiming at reducing health inequalities experienced by LGBTI people. It has been implemented between March 2016 and March 2018. ILGA-Europe was part of the Consortium that under a service contract with the European Commission has explored the health needs and challenges faced by LGBTI people and analysed the key barriers faced by health professionals when providing care for LGBTI people. General information about the project The aims of the Health4LGBTI pilot project are to raise awareness of the specific health inequalities and barriers experienced by LGBTI people and to increase understanding of how best to reduce them; focusing on overlapping inequalities stemming from discrimination and unfair treatment on other grounds. The project also aims to provide European health professionals with relevant tools to allow them to develop the right skills and knowledge to overcome these barriers. The other Consortium partners include AOUI-Verona (Italy, project coordinator), University of Brighton (UK), the National Institute of Public Health – National Institute of Hygiene (Poland) and EuroHealthNet. For more information, visit the European Commission’s website page about the project. The project explored some of the particular health needs and challenges faced by LGBTI people and analysed the key barriers faced by health professionals when providing care. A variety of activities took place including: - A state-of-the-art study of the health inequalities experienced by LGBTI people and the barriers faced by health professionals in providing healthcare for LGBTI people; - 12 focus group studies (2 focus groups in each of the 6 participating EU Member States: Poland, Italy, UK, Belgium, Bulgaria, and Lithuania) to map the barriers faced both by LGBTI people and health professionals; - The development of a modular training course aimed at increasing the knowledge, attitudes, and skills of healthcare professionals when providing care for LGBTI people; - The piloting of the training course in the same Member States where the focus groups were conducted, in order to fine-tune and finalise the modules; - A final European conference, which was part of the dissemination efforts to raise awareness of the topic and of the training course in particular. Although situations vary across Member States, the state-of-the-art study and focus group studies confirmed the existence of health inequalities, barriers, and discrimination LGBTI people experience that have an impact on their health outcomes. Key findings included: 1. Root causes likely to contribute to the health inequalities of LGBTI people are: - prevailing cultural and social norms that assume people are non-LGBTI by default; - minority stress associated with an individual’s LGBTI identity; - discrimination (individual and institutional), and; 2. LGBTI people face significant mental and physical health inequalities and are at higher risk of poor mental health compared to the general population, including higher incidence of suicidal thoughts, substance misuse, anxiety, and deliberate self-harm. 3. LGBTI people face barriers when accessing healthcare, the most significant ones are: - prejudicial attitudes and discriminatory behaviour of healthcare staff compounded by their use of heteronormative language and documentation; - fear surrounding the disclosure of their gender identity, sexual orientation, or sex characteristics; - lack of consistency and continuity in the care provided to LGBTI people; - lack of knowledge and recognition of the specific health needs of LGBTI people; - implicit and explicit LGBTI-phobia where LGBTI people report being denied access to health services due to their sexual orientation, gender identity, or sex characteristics. 4. Many health professionals lack knowledge and cultural competence around the lives and healthcare needs of LGBTI people. Medical literature regarding the health of LGBTI people needs to be updated and health professionals’ assumptions should be questioned such as assuming that people are non-LGBTI by default; that being LGBTI is not relevant for healthcare providers; and beliefs that LGBTI people do not experience significant discrimination. 5. All groups within LGBTI communities (and particularly bisexual, trans, and intersex people) encounter their own specific barriers, and healthcare professionals’ knowledge of these groups is limited. 6. Although scarce, examples of promising practice meeting the needs of LGBTI people do exist. The state-of-the-art study revealed significant gaps in research. For example, there is very limited research to understand the general health profile of trans and intersex people, their experiences, as well as their physical and mental health needs. Similarly, further research adopting an intersectional perspective on health inequalities experienced by LGBTI people is required. Findings from the state-of-the-art study and focus group studies were used to develop a dedicated training course for healthcare professionals aiming to increase their skills, knowledge and competences when providing care for LGBTI people. The course, comprising four training modules, is aimed at all health professionals regardless of their specialisation or experience of working with LGBTI people, and can include administrative staff (or similar) working in health settings. The training modules were piloted in the same countries as the focus group studies, and fine-tuned based on feedback. The training is formulated in such a way as to facilitate replication on a large scale in many different European countries. Training medical professionals on LGBTI inclusive practices works! Published in December 2019, this paper describes the training methods and impacts of the #Health4LGBTI research project to develop training materials for healthcare providers. Results indicate that training participants increased their understanding, sensitivity, and empathy with LGBTI people seeking healthcare across all sites for the training.
<urn:uuid:77ec042e-d0a7-4474-9049-64cbceba7ad7>
CC-MAIN-2022-33
https://ilga-europe.org/campaign/health4lgbti-reducing-health-inequalities-experienced-by-lgbti-people/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00468.warc.gz
en
0.954936
1,168
2.328125
2
Mémoires pour servir à la vie de Nicolas de Catinat, by Créquy, Charles Marie [de]; Créquy, Louis-Marie [mis de] Parisian category: Histoires particulières des règnes de Louis XIII, XIV Acquired: 2 full copies Sold and Given: 2 full copies N.B. Lower and upper limits (where given) are calculated by treating each incomplete set - i.e. each set containing some but not all volumes of the edition - as 0 and 1 respectively. Click 'events for this book' below for details. Edition type (by origin): French editions Publication: Paris: Vve Duchesne, 1775 Details: 1 volume, in-12°, pages: 302
<urn:uuid:d538913b-11e6-4c47-ad12-a97a83cea58c>
CC-MAIN-2022-33
http://fbtee.uws.edu.au/stn/interface/browse.php?t=keyword&id=k0447&r1=&id1=&id2=spbk0003128
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00077.warc.gz
en
0.692418
197
1.515625
2
TABLE OF CONTENTS A Guide to the Chester W. Nimitz Papers, 1902-1972 (bulk 1962-1968) Chester William Nimitz (1885-1966) was a U.S. Navy Admiral, who served in World War I and World War II. Nimitz graduated from the United States Naval Academy in Annapolis, seventh in his class, in 1905. He soon became an expert at undersea operations and commanded the Pearl Harbor Submarine Division. In 1926, he went to the University of California at Berkeley to design a Naval Reserve Officers Training Corps. Afterwards he progressed through the ranks of the Navy, becoming chief of the Bureau of Navigation in 1939. When Adm. Husband E. Kimmel was relieved from command of the Pacific Fleet, Nimitz replaced him as commander-in-chief on December 25, 1941. The next year he was appointed to command the Pacific Oceans Areas in the Pacific Theater. In 1944, President Franklin D. Roosevelt created the temporary rank of Fleet Admiral of the U.S. Navy and appointed Nimitz to the rank. Finally he coordinated the offensive that brought on Japan's surrender and represented the U.S. in the peace treaty signed on the U.S.S. Missouri in Tokyo Bay on September 2, 1945. Two years later, he unofficially retired to life as a roving ambassador for the United Nations and chairman of the Presidential Commission on Internal Security and Individual Rights by President Harry S. Truman’s appointment. A native of Fredericksburg, Texas, Chester W. Nimitz was the grandson of Charles H. Nimitz, who served as father figure after his father's death before his birth. He married Catherine Vance Freeman in 1913, and the couple had four children. He was the cousin of Herman W. Toepperwein and Mrs. Bertha Riley. Toepperwein was the brother of Mrs. W. H. Morrow. Handbook of Texas Online, s.v. "Nimitz, Chester William,"http://www.tshaonline.org/handbook/online/articles/NN/fni5.html (accessed June 23, 2010). The Chester W. Nimitz Papers, 1902-1972 (bulk 1962-1968), contains correspondence from Admiral Chester Nimitz and his wife to cousins, photocopies relating to the Nimitz family, and photographs of Nimitz and the Japanese Surrender. This collection is open for research use. Chester W. Nimitz Papers, 1902-1972 (bulk 1962-1968), Dolph Briscoe Center for American History, The University of Texas at Austin. Basic processing and cataloging of this collection was supported with funds from the National Historical Publications and Records Commission (NHPRC) for the Briscoe Center’s “History Revealed: Bringing Collections to Light project,” 2009-2011.
<urn:uuid:bcf151d5-5a63-4b65-b0cc-afbf0a532558>
CC-MAIN-2017-04
http://www.lib.utexas.edu/taro/utcah/01505/cah-01505.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00154-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941508
597
2.515625
3
Record material - Keeping up with live teaching can be tricky, even when text resources are provided. Record lectures and tutorials to create resources for learners to re-watch parts they may have missed. The rest of the class will likely appreciate these as well, especially when connections are poor or unreliable. Here are some guides on how to records your Zoom or Teams meeting. Set up closed captions, transcripts and subtitles - Zoom and Teams have automated closed captions, and a transcription function you can use to support learners. As an automatic function it may not always be accurate, and the transcript will likely require editing. Pass these guides on to you students for how to set transcriptions up on Zoom and Teams. Use translation applications - Google Translate can be applied to Word documents and be used on web browsers. There are also apps users can apply to other Google Workspace products. Microsoft has a similar feature called Microsoft Translator which can be used to translate PowerPoint lessons. This can also be added onto the Microsoft Teams chat. Provide digital versions of course materials - Make text-based resources available in digital formats to all learners (Word documents, PDFs, e-books). This allows learners to copy and paste text into translation software when coming across unfamiliar words or phrases. Schedule one-on-one time - Have regular one-to-one check-ins with learners to check on progress or any difficulties they are experiencing. In the context of lockdowns and fewer opportunities to practice their English, this could help with their speaking and listening skills. [Our English as a second language students] have learning guides… These are issued and accessible prior to their course, and one of the suggestions to TA’s is to encourage learners to pre-read. Resources to refer learners to: - NZ Newcomers Network - helps people new to New Zealand find community and connections.
<urn:uuid:2d9a1c09-56cb-4000-b8d8-5c83d88629a9>
CC-MAIN-2022-33
https://techenabledlearning.nz/guides/english-as-a-second-language-learners/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00273.warc.gz
en
0.925663
398
2.90625
3
16:00:00 - 17:30:00, Tuesday 4 November, 2008 Sue Ziebland is a Reader in Qualitative Health Research and research director of the DIPEx Health experiences research group in the Department of Primary Health Care, University of Oxford. The group of 11 social science researchers conduct qualitative interview studies, throughout the UK, for two multimedia web sites www.healthtalkonline.org (formerly DIPEx) and www.youthhealthtalk.org. The websites include analyses of the main issues identified in interview studies and are illustrated with hundreds of video, audio and written clips, as well as evidence based information about each condition or health issue. The site is intended for patients, their families and friends, patient representatives, and health professionals in training. Since their first projects were launched in July 2001 over 45 conditions have been covered including the main cancers, living with dying, heart diseases, pregnancy and childbirth, screening, epilepsy, RA, diabetes, depression, mental illness in BME communities and autism and Asperger’s Disease. In October 2008 a major re-design of the site was launched. In this talk Sue will talk about the history of the projects and the rationale for the research-based approach to Patients’ Experiences, and show video clips from the interviews. Data Dump to delete - Name: Sue Ziebland - Affiliation: Director, DIPEx Health Experiences Resesarch Group, Department of Primary Health Care, University of Oxford - URL: http://www.primarycare.ox.ac.uk/dept_staff/copy_of_staff/DIPEx/sueziebland
<urn:uuid:a24798f0-1331-48e7-b728-213bd37af479>
CC-MAIN-2022-33
https://www.oii.ox.ac.uk/news-events/events/experiences-of-health-and-illness-video-and-audio-illness-narratives-for-patients-the-public-and-research/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz
en
0.940623
420
1.726563
2
Make A Monkey Balloon Animal Coloring Pages. Find lots of easy and adult coloring books in pdf format online at primarygames. Glossy, matte, and transparent options in various sizes. Therapeutic recreation activity and treatment idea page. We have some simple and cute animal coloring pages for your little one to complete. Activities & tx pages sponsored by computr and maintained by charles dixon if reprinting activities from these pages, please give credit. A General Indian Term For Bread. You will find birds, pets, wild animals, and farm animals all waiting to be colored in. Over time, the line was extended to the ohio river to make up the entire southern border of pennsylvania. 1st grade reading books pdf free. Filled With Fun And Adventure, This Event Styled By Jasmine Fernandez Of Styling By Jass, Out Of New York, Is Sure To Amaze! Printable lunch box halloween jokes Here's a balloon animal that you can make in the shape of a horse. Naan is an oval roti and made from wine white maida. Among Balloon Animals, This Relatively Easy And Simple Balloon Animal Is Great For Beginners And Novices And Kids Will Love It. We have some simple and cute animal coloring pages for your little one to complete. Print these out individually or compile them to make a coloring book for your child. Cocomelon sticker by the deep quote. Color Pictures Of Piñatas, Birthday Cakes, Balloons, Presents And More! Therapeutic recreation activity and treatment idea page. It can be overwhelming to pick out first grade reading level books at the library. We have cards for couples, moms, dads, brothers, sisters, and the kids (under the family/special people category). Cartoon Character And Celebrity Cards From Your Favorite Tv Shows Such As Pokemon, Paw Patrol, Snoopy, And Mickey (Under The Cartoon &. Teddy bear hot air balloon visit dltk's transportation crafts and printables. Roti was introduced to the caribbean by indian immigrants. Print as many of these pictures to color as you need for hours of fun!
<urn:uuid:e231aa1b-58c4-4e86-8432-862484222e9e>
CC-MAIN-2022-33
https://ojuselementary.com/make-a-monkey-balloon-animal-coloring-pages/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00476.warc.gz
en
0.881529
447
1.976563
2
Originally Posted by matteekay I assume this is a typo for "Realism" so I'll help you out. Here, we have a fine example of Realism, circa the nineteenth century: http://i27.photobucket.com/albums/c1.../realism03.jpg Note how the artist paints in tones found in the physical world and the subject matter is of a commonplace, uncolored (in terms of exaggeration or emphasis) variety. This is an abstract Modernism piece for a contrast (Krasner, mid-twentieth). Most would use Pollack as the exemplary purveyor of this style but, frankly, I think he's a no-talent hack and his wife executes the principals he proposed far better than he ever did: http://www.spaniermanmodern.com/06_L...06noonf_lg.jpg And, simply because it's one of my favorites, here's a Futurist painting. This style was one of the progenitors of the far more popular abstract Modernism and Cubism. The artists generally sought to capture movement in a stilled, two-dimensional format: http://4.bp.blogspot.com/_pphj6ASAfY...0/futurism.jpg Anyhow, hope that helped! EDIT: Wait, "Realsim" ? As in, "real simulation" ? How would that even work? And/or isn't any type of paintball a "real sim" for actual combat encounters? This just made my day, thank you matteekay! In all honesty i have no quarrel with this type of play but i would rather be able to play all day and not have a 8 hour day of fun ended by friendly fire (something that happens a bunch in scenarios it seems). If you and your buddies love it though keep at it and enjoy it. Just don't let it end up like the "cspo" elitists that nearly forced me out of paintball before i even got my feet wet. "your gun is red, you can't play with us kid"
<urn:uuid:31c974ee-53d4-4a50-83f8-11485c81d82d>
CC-MAIN-2016-44
http://www.mcarterbrown.com/forums/2503710-post64.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00219-ip-10-171-6-4.ec2.internal.warc.gz
en
0.945518
445
1.640625
2
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers. This dissertation will discuss the recruitment and selection process of the fast food industry in London and case study about particular company. The practise of HRM in recruitment and selection process will also be discussed in this dissertation. In this chapter the background and motivation of this study is discussed along with the aims and objective. Moreover the research questions and the structure of this dissertation are discussed in this chapter. 1.2. Background and motivation In the past two decades the manner in which organization recruit people for their business has changed into a different level. The practise of human resource management in recruiting people has made a significant changed in the food industry across Greater London. People's food habit and ass well as recreational activities has also changed. And for changing those activities fast food played a very vital role in society. The competition among the competitors become intense as this is a very profit oriented business. As the competition gets intense and moves into higher value added work, strategic recruitment and selection is vital for organizations success. The trend of fast food can be tracked from the very early stage of the civilization and in UK from the beginning of the twentieth first century first food is growing as a lucrative business. Fast food gain popularity as people's life gets busy and subsequently more and more things added in their life. The chain fast food shop start arriving in UK from the late 60's and KFC was the first to introduce followed by Pizza Hut and Mc Donald's. The practise of HRM into the fast food industry was present from the beginning but in many cases in was written or not classified as a necessary step. But in recent years the fast food chains bring themselves under very strict rules and policies. Trained staff always brings more profit to the business. And also for the past decades the kind of people interested in getting those job has changed significantly. Mostly students are seen in these jobs as it gives them the flexibility of working according to their college time table and also they can support their study while their working part time. The main principal for any job is the right person for the right job. Organizations always give importance for its manpower as they are their representative and profit maker of the organization. The operative manpower is equally important as managers working for the enterprise. All business organisations need different people to operate different activities inside their organization and it is equally important to select and recruit suitable candidate for that job. The practise of Human Resource Management in an organization is not possible if suitable candidate is not recruited in the organization. 1.3. HRM practise in the Travel Food industry in London In late 1990s, the HRM was significantly recognised as an integral component of business success by academic researchers and business practitioners (Kalleberg and Moody, 1994; Paul and Anantharaman, 2003; Hislop, 2005). Different arguments and concepts were presented by these researchers particularly how HR practices could affect organisation performance; how economic and social context shapes HR strategies and practices of organisations; the new organisational forms and relationships; and the importance of knowledge management and learning in the workplace. Every organization understands the need of HRM practise in selection and recruitment process. By doing so they prepared particular recruitment and selection plan according to the need of their own organization. Mc Donald's and SSP Ltd collaborated with different university to train up their manager according to their need. Most of the big franchises are tied up with different universities to train their staff in hospitality and Human Resource Management. And if we consider the practise of HRM most food franchise company nowadays has made their own prospectus and procedures about recruiting people. Selection and recruitment are two very interrelated process where one process ends another process starts. They are very important procedure of the organization and different from each other. 3.1 Bright Features SSP is promoting itself as food and travel expert, so giving the best possible service to customer is at the heart of SSP strategy. As a result it is important for the company to maintain cutomer satisfaction. So to maintained customer satisfaction employee job satisfaction is vital as dissatisfied worker may not provide good service to the customers. One who is happy at work place is more likely to influence other in a positive manner to make other happy. Therefore, to increase the satisfaction of customer it is important that employees at different level working for SSP are satisfied. Both at management level as well as ground level were actual customer service is being delivered. Company have a good mix of employees of different backgrounds which makes it even more capable to provide international quality service to its customers. Further, organisation also carry out research for understanding customer need during travelling, as it operates worldwide in 32 country to meet the demands of travelling customers. On the basis of customer demands of each location and information gathered through research, company have always tried to provide customers a good mix of food verity that meets their appetite. 1.4. HRM practise in SSP UK Ltd (Camden Food) The concept that people are the organisation's key source of sustained competitive advantage continues to be an overriding theme in the research literature and a lever for Human Recourse practitioners Grattan, (2000); Pfeffer, (1994); Barney, (1995). It is not surprising, therefore, that the link between HRM practices and employee and organisational performance has attracted considerable attention over the past decade both in the US Huselid, (1995); Pfeffer, (1998) and the UK Guest, (1997); Wood and deMenzes, (1998). 1.4. Aims and objective The aim of this research is to help industry expert and employee to understand the importance of HRM in recruitment and selection process and the give an overall idea how effective HRM practise can change the recruitment process. The purpose of this study is to give a clear understanding what are the HRM practises used by the employer to select and recruit employee at present. Also suggest employer how the selection and recruitment process can be made more effective. The primary research question are listed as below 1. What procedures are used in recruiting and selecting employee in the industry and how the practise of HRM is ensured in that process? The dissertation will try to find out different process of selecting and recruitment process undertaken by different player in the industry. The reason why these methods are preferred? 2. How selection and recruitment process can be more effective and how it can contribute performance of the employee. 1.5. Limitation of the study Limitation in any study is not an unusual matter. Every research encountered by limitation. The study is undertaken in a small sample group from the hospitality industry and fast food industry. There are many organizations in the industry and many more way of selecting and recruiting people. This is a major limitation of the study as the finding only concentrates a particular organization. A larger sample size would give the chance to go through more data and also the application of both personal and HR functions. It can also be possible to investigate variety of examples of organizational practise if the sample size is larger. It would be better to investigate more than two organizations recruitment and selection process, but due to time constraint this could not be achieved. The researcher selected two group of people one pass through the selection process and get recruited and the other group who is looking for job or attempted but failed to pass the recruitment process. Some data were confidential enough not to pass to the researcher. As the topic of the dissertation covers a very wide area, researcher tried to cover as many areas as possible. 1.6. Contribution of the study The analysis of the study reveals the aims and objective of the research. Among the contributions are the literature for the researchers in future in relation to the HRM practice for the other industry. Analyzing the function of modern human resource management is another contribution in the perspective of academic study. Secondly, HR manager of travel food industry and more specifically SSP UK Ltd can evaluate their existing recruitment and training program. The study will help understand the standard recruitment and selection procedure and thus compare it with their own recruitment and selection procedure. 1.7. Research structure This study will follow a certain structure. The structure followed is given below Chapter 1: The introduction part will discuss the purpose of the study and also the aim and objective of the study. It will also briefly discuss the motivation and background of the study. A short description about the industry and also the history of the industry. Chapter 2: The literature review part will discuss the HRM practise in recruitment and selection process. It will also discuss the related theory about selection and recruitment process. The part will consist the definition of recruitment and selection and the process of respective ones. This part will relate the theoretical analysis and also states the finding of different scholar in this field. Chapter 3: In chapter three general research methodologies are described. It also discuss the method that this research use to complete the study. The data collection method and the difference between secondary data and primary data are also discussed. The limitations of the data collections are discussed at the end of the research. Chapter 4: Findings of the study and data are discussed in this chapter. Data are gathered from different sources for the study each source has been described with the method used. Chapter 5: At the end of the dissertation a thorough indication and conclusion of the current research have been drawn. Other important part of this chapter is to describe the contribution and benefit of this dissertation. Based on the research results some recommendations have been given followed by limitations of the current study, and future research. 2. Literature review 3250 The relevant literature review of this study is discussed in this chapter. The previous chapter has been discussed about introduction of the study which discussed the motivation and background, the aims and objective of the study and also the structure of the study. The chapter starts with a brief discussion about HRM and the role of HRM in recruitment and selection. The relevant theory about recruitment and selection are discussed followed by their process. The factors influencing the recruitment and selection process are also discussed. The historical work of previous researcher are also discussed and used as a guideline for further research. 2.2. The role of HRM The key characteristic of the HRM approach is the involvement of the personal function at a strategic level. The increased globalisation of busyness world and a very competitive market has triggered the emergence pf human resource management. Personnel management is the part of an organization which is concerned with people at work and their relationship with the enterprise. Personnel management aims to achieve both efficiency and justice. It seeks to provide fair terms and conditions of employment, and satisfying work for those employed (Cole, 2002). The modern human resource management has emerged from traditional personal management. Human resource management is defined as a strategic and coherent approach to the management of an organization's most valuable assets - the people working there who individually and collectively contribute to the achievement of its objectives (Armstrong 2006). It is the people who always represent the organization in front of the public, so the management of people inside the organization is very important. And it is the trained and skilled staffs that generate the profit and give the organization a better position in the market. Organizations now days even compete about their staff that who has the better staff. They even hire independent organization to judge the service between different companies and based on that report they improve their service and organization. The synergy is achieved when the approaches are practiced all together. When practices are implemented together and synergistically then it is called ''bundles''. The concept of ''bundling'' has defined strict definition but finds its roots in the concept of internal fit developed in the strategic human resource management literature (Bowen and Ostroff, 2004). The organization can deliver better service if all part of their business is providing a quality service and thus the organization as a whole performs better. If an organization implement couple of high performance work practise in their workplace that will not make a big difference as they are still lacking in many other part of organization skills. Suppose the organization implement team work as their high performance achievement but the total team performance will depend not only on one colleague but the performance of all colleagues. Different team members can have different issue with organization which might affect their performance so that also make a difference on the collective performance of the team work. Employment motivation is also a very important fact in case of team work. In 1998, British Workforce Relation survey (WERS) conduct a survey among the employer in Britain and found that there are some number of key human resourse management practise among British organisations that includes careful recruitment and selection, performance appraisal, training and team working. The survey also found some evidence of the integration of human resource management practise and survey(Cully et al.1999). There are two different side of the survey which is visible through data, the practice of human resource management in British organization is widespread but the level of strategic integration of these practises is quit low. Cully et al found is his research that only 15 percent of the role of training in 265 workplaces had a majority of the human resource management in place. Studies of high performance work systems have also shown a similar pattern; relatively common adoption of individual practices but little evidence of widespread integration (Appelbaum et al., 2000). There are few definitions available of recruitment. Recruitment involves actions and activities taken by an organization in order to identify and attract individuals to the organization who have capabilities to help the organization realize its strategic objective. Breaugh gave the following definition of recruitment "Employee recruitment involves those organisational activities that 1) influence the number and /or the types of applicants who apply for a position and /or 2)affect whether a job offer is accepted". Edwin Flipo states that "recruitment is the process of searching for prospective candidate and stimulating them to apply for the job."(Edwin Flipo, 2001) Recruitment includes the set of activities undertaken by the organisation for the primary purpose of identifying a desirable group of applicant, attracting them into its employee ranks, and retaining them at least for short time. (Taylor & Collins, 2000). Recruitment involves actions and activities taken by an organisation in order to identify and attract individuals to the organisation who can help the organisations achieve their target and goal. Recruitment has emerged as arguably the most critical human resource management functions for organisational survival and success. Many organisations have increased their budget for recruitment. 2.3.1. Principal of recruitment process There are number of important characteristic in recruitment definitions. Firstly the process involves specific actions and activities that are undertaken to achieve particular outcome. Secondly in indicates that the purpose of those activities are to generate a pool of candidate to enhance their interest towards the organisations and eventually to accept a job offer in the organisation. The third important characteristic is that it the number of people attracted towards the process might have the capabilities to be hired but it depends on the selection process where the overqualified and under qualified people will be excluded from the process. Fourthly the recruitment is the process where any post hire process are not discussed because recruitment is the process to influence candidate to apply for the advertise jobs and accept the job offer. 2.3.2. Purpose and importance of recruitment There are some purpose and importance of recruitment which required to be clearly defined in any research. The importance can described as follows 1. Determine the present and the future requirements of the organisation on conjunction with its personnel -planning and job analysis activities. 2. To keep the cost minimum and also attracting maximum candidate. 3. As selection process depends on recruitment process it is the job of the recruitment process to increase the success rate of selection process by reducing the under qualified or overqualified job applicant. 4. It is also the recruitment process where the it is given priority that the recruited candidate stays inside the organisation for maximum number of year. 5. Organisations legal and social obligation about the ratio of recruited people whether ethnic, local or gender in its workforce is also served through recruitment. 6. Recruitment is the first step where the potential job applicants are identified. 7. By practising the daily job the effectiveness of different recruiting techniques and sources of all types of job applicants are explored. 2.3.3. Recruitment process In recruitment process identifying and attracting qualified candidate is the most important aspect. There are five interrelated steps about recruitment process. They are- Evaluation and control Planning is the first stage of the recruitment process. It involves about the vacancy and the duty surrounded by that role. Planning also gave an clear idea about number of candidate and the type of candidate applying for the job. An important part of the planning is to attract more people than the organisation needed so that they can choose the right candidate and also attracting the type of candidate similar to the advertisement. 2.3.2. Strategic development After deciding how many people are required and what qualification required the management concentrate in the strategic development. Different companies have different view about strategic development. The first thing is to decide in strategic development is to decide whether to recruit someone with past experience or whether to recruit someone with fresh knowledge and invest towards the future training of that employee. After deciding the eligibility of the employee the organisations look different medium to advertise the job and which labour market they want to target. All these activities are inside the strategic development of recruitment. The searching process begins after the planning and strategic development. If the first two processes run well then in searching process the organisation should receive many application because at this stage the medium is activated as the HR manager gives green signal about vacancy inside the organisation. All the application must be screened and after careful screening the candidates who passed should called for interview and the candidates did not pass should sent letter explaining the reason of failure. Another important criteria about searching process is to pass the proper massage through the proper channel. And it is the duty of searching option that maximum attention gets from the candidate by avoiding the undesirables. The selection process begins after a carefully scrutinizing the candidate at the recruitment process. However good the attraction process it is probable that there will be more candidates than positions to be filled and often the case there that there will candidates than can be realistically taken on to the next stage of more time consuming selection processes such as interviewing and testing. The reason for screening inside the recruitment process is that selection process starts only after candidates are short listed for the next stage. 2.3.4. Sources of recruitment There are two types how recruitment are processed in an organisation. They are internal recruitment and external recruitment. 184.108.40.206. Internal recruitment The advantages of internal recruitment are that: financial costs associated with recruiting can be saved by internal recruiting. It will also save training costs and time as the employee will have insight knowledge of the organization (Wanous, 1992). There are some tools organisation uses for internal recruitment. Promotions and transfers Promotions and transfers are very important role for internal recruitment. Promotions have very positive role inside the organisations as they encourage colleague, built moral attributes among employee. Through this process organisations can build employee by their need and as those employees are serving for a long time for the company they feel for their organisation. When an employee is working for an organisation for a long time they know the need of the organisation and sometime they refer employees according the need of the organisation. This way organisation can sometime get high skilled employee but in a very minimum cost. Another positive side about employee reference is through this employer are fulfilling their social obligation and establishing goodwill. Another source of internal recruitment is former employee. Former employees sometimes return to the organisation for better career growth and also sometime after in another job they can compare which is better this way they can differentiate which employee is better. 220.127.116.11. External recruitment External recruitment makes is possible interview a wide a range of candidate and chose from that selection. Sometimes employer need to pump some fresh blood inside their organisation to get some new business ideas and also to put some energy inside the organisation. But sometimes company end up with huge cost for hiring external employees but they are not as qualified as their curriculum vita says. The most popular method of job recruitment is the advertisement through different medium. Employers describe the job responsibilities and requirement of the job followed by how to apply and by which date they have to apply. The most popular medium of advertisement are the newspaper, company website and different jobsite which post job from different company. Most people apply through this medium and sometimes company also promote themselves through these advertisements. Professional and trade association Professional association for trade and technical bodied are very active in the field of recruitment and selection. They provide employer with people according to their need and those professionals are trained with international standard. Like for accountant and technical jobs are always preferred by the professional bodies. Now days there are some websites like linked in which network among different professional people. Walk in store Another popular method among the employee or ob seeker for different store and food shops are known as walk in store. Company advertise in front of the stores or there is a particular place where companies hired. In Europe and other western countries where the chain stores are established they managed to recruit people from their own recruitment centre. In this process mostly entry level and unskilled employees are hired. Employer sometime announces open day recruitment for hiring people. Through open day recruitment organisation Supply & Demand Political - Legal Size of the Firm Growth & Expansion Selection is the process where employer chooses from a pool of candidate who is best suitable for the organisation. From the beginning of the selection process till the end selecting the right candidate is the only objective and to do that there are different test that employer choose to differentiate among the candidate. Selection is a process of differentiating between applicants in order to identify those with a greater likelihood of a success in a job. (Stone, 1999) Selection is a very constructive process through which right candidates comes out. 2.4.1. Preliminary interview The first step of the selection process is the preliminary interview process which comprises the subject to scrutiny the candidate based on their application and also eliminates the unqualified candidate. For HR managers scrutiny is the process to eliminate candidate based on the information provided on their application. Preliminary interview is the next available step for selection. Preliminary interview helps get that information which is not in the available in the application form. It can be held formally or informally, over the telephone or in a coffee shop. It helps HR manager to get an idea how many applicants can make it through the next stage and eventually will go forward. The interview processes are different in different countries. In UK they are more structured type. In UK they said that the more information you get about a person the reliable the person and the more valid and reliable your judgment is. Tixier in a survey in EU (but excluding France) Sweden, Switzerland and Austria found that structured interview were favoured in the UK, Scandinavia, Germany and Austria. This contrasted with Italy, Portugal, Luxembourg and Switzerland where unstructured were preferred (Tixer, 1996) 2.4.2. Selection test The essential criterion in choosing supplementary method is that they should provide information that is directly related to performance on the job. This should be the guiding principal both in choosing off-the-shelf tests and in designing exercises tailor-made for a particular workplace. In their review of what they call personal testing, Murphy and Davidshofer (2001) stress that better results are obtained the more closely a test, such as work sample test, resembles things that are actually done in the job concerned. A related issue that candidate can easily see the point of a test that requires them to do something they know will be done on the job. The term psychological tests are also known as psychometric test. They are developed to judge people based on their different capability. They are professionally developed and checked for reliability and validity. They are administered and scored in a standardized manner. The results found from these tests can be compared to norms for relevant population. The standardised administration of tests means all applicants answer the same questions in the same condition and objective scoring means that the scores are not open to individual interpretation as is the case with interview responses. Intelligence test is the most widely practised test in the selection process. The ranges of skills cover are verbal, arithmetical and diagrammatical reasoning. Selection team use intelligence test as one of the first tool to judge a candidate. Ability test are more specific test designed for individual to show their ability towards a particular test. How well a person can perform in a job can also be tested through this. There are two type of ability test one is attainment test and the other is aptitude test. Attainment test assess skills and knowledge that have been acquired through experience and learning, and aptitude test measure individuals potential to develop ability. Work sample test or school exams are examples of attainment test and the use of these would not require the special training. Where as aptitude test measure whether a applicant have the ability to learn something if training is provided. Most of the time aptitude test run when the candidate has no previous experience. It gives the indication that how successfully an individual can engage in a specialized activities. There is different type of aptitude test for all sector of the organization. Test of interest The relationship between interests and motivation and successful performance is not a straightforward one. For this reason these test are not used for selection (Smith and Robertson1993). But interest test can be used in career guidance and counselling. It gives an idea about the likings and disliking of the employee and give a hint sometimes why employee want to change their career. Personality questionnaire has been used in preference to personality test. When measuring the personality test there is no right or wrong answer rather than they are indication of habitual performance meaning that they reflect stable traits that are likely to be revealed in typical behaviour. Personality test is very important in case of job application. A person can do well in the entire test but may fall short as they have lack of motivation. It shows the maturity, interpersonal skill and behaviour in terms of difficult situation. 2.4.3. Work sample test When recruiter asks a candidate to perform a task that is related to the work or a element which is part of the job is known as work sample test. A recruiter may ask the employee to perform a lecture or to teach a subject to a group of people as a part of work sample test if the interview is about university lecturer. 2.4.4. Assessment centres An assessment centre is a method rather than a place, although some employer, particularly large organization might have premises dedicated to assessment, especially if they use them for both selection and development purposes. (Woodruffe, 2000) In a assessment centre a number of people are assessed at the same time by a number of assessor judging their numerical skill, interpersonal skill and how they coup with their colleague. This gives the chance to the employer to compare collection of range of information and observation and evaluation the candidate. The task included in an assessment centre test is work simulation where candidate were given a real life task usually performed in job. A based on their performance it is easier for a recruiter to distinguish the potential candidate. Group exercise is another tool used in assessment centre. Different employer use different tailor made tests or exercises. The next step of the process is interview. This is the most important part of the selection process. An interviewer matches the performance of previous results taken from different test and compares them with resume and asks question if they feel. Interview is a oral examination of the candidate. Employer try to get more information about candidate through interview and they also discuss about the role featured and about the company. There are different type of interview through which employer can judge a candidate. Among them the most popular are formal interview where employer will fixed a time in the office and a panel of interviewer or a person taking the interview. Interviews some time are very structured and sometimes it is unstructured giving the interviewer the chance to talk about himself and interact based on his conversation. When going for managerial or supervisory position a panel of interviewer take the interview and use different technique to judge the mentality of the candidate. Interviews are also arranged in a dinner table at some restaurant or over the phone. All these interviews are one reason that is to find out if the candidate is suitable enough for the position he is applied for.
<urn:uuid:8eab05b4-e533-4a86-a996-00e904fc1fe6>
CC-MAIN-2017-04
https://www.ukessays.com/essays/business/recruitment-and-selection-process-of-the-fast-food-industry-business-essay.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00232-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961606
5,826
1.929688
2
I continue to be amazed at how smart my patients are and how much they teach me, as well as how they make me laugh. I saw a young lady the other day who was complaining of a cough. She was about 11 years old. She was not one of my regular patients; she was a patient of a partner of mine who was out of town, so she came to see me about her cough. I started asking her and her mother about her cough and quickly realized that she was more than capable of answering my questions (the best kind of patient to have). Her mother was great and deferred to her, as her daughter was doing such a good job with her history. I asked her if the cough was problem during the day or night or both? She replied, "During the day." I asked her if the cough was worse when she was playing or exercising during the day. The answer was "no." I then started asking her about the quality of the cough (I also had the benefit of hearing her cough while I was getting her history). I then asked her if the cough was dry or if it was wet and "gunky." I was not sure if she would understand if I asked her if it was "productive." Surprisingly, she looked at me and said, "Do you mean do I produce phlegm?" Realizing that she was quite bright and knew words that I swear I learned in med school (OK, maybe undergrad biology?), I asked her if she could spell phlegm. Of course, she immediately spelled the word correctly. She was delightful patient and is another example of "kids say the darnedest things." We had a great conversation, and it was so helpful to be able to get a good history from her. The history is just as critical as the physical exam in diagnosing a patient, so a good communicator makes a doctor’s job a lot easier. (Dr. Sue Hubbard is an award-winning pediatrician, medical editor and media host. "The Kid’s Doctor" TV feature can be seen on more than 90 stations across the U.S. Submit questions at http://www.kidsdr.com. The Kid’s Doctor e-book, "Tattoos to Texting: Parenting Today’s Teen," is now available from Amazon and other e-book vendors.)
<urn:uuid:87f76f04-51ee-465c-9ea8-fa837688e203>
CC-MAIN-2017-04
http://tribunecontentagency.com/article/the-kid039s-doctor-let-children-communicate-during-an-exam/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00211-ip-10-171-10-70.ec2.internal.warc.gz
en
0.993366
487
1.78125
2
Can Obama, Republicans Connect With Latino Voters? MICHEL MARTIN, HOST: I'm Michel Martin and this is TELL ME MORE from NPR News. Coming up today at TELL ME MORE we are going to begin our weeklong series on aging and the end of life. We'll talk about how families and our country are facing the challenges of healthcare, financial security, and faith as individuals enter the sunset of their lives. We'll bring you our first installment on the soaring cost of care. That's in just a few minutes, but first we want to look ahead to the top political stories of the week. President Obama hits the road today on a three-day bus tour through two southern states he carried narrowly in the 2008 election: Virginia and North Carolina. He'll be touting his jobs plan and trying to reignite the energy that helped him win in those states. And we'll catch up on the news about the Republican presidential hopefuls. Herman Cain has surged in recent weeks to become the GOP frontrunner in some national polls. We'll preview the next Republican debate scheduled for tomorrow in Las Vegas and we'll talk about whether any of these candidates can connect with Latino voters ,who are a force in Nevada and elsewhere. Joining us to talk about these stories are Nia-Malika Henderson. She's covering the 2012 presidential campaign for the Washington Post. Also with us, Matt Barreto. He's a pollster with Latino decisions. He's also an associate professor of political science at the University of Washington. Welcome back to you both. Glad to talk to you again. NIA-MALIKA HENDERSON: Great to be here. MATT BARRETO: It's my pleasure. MARTIN: Okay, Nia-Malika, let's start with you. President Obama is hitting the road, starts in North Carolina today and he's working way back to the Washington area. What's the White House hope to accomplish with this tour, or is this really kind of a dry run for the campaign? HENDERSON: Well, they obviously want to accomplish something but it's also a dry run for the campaign. You remember when Obama gave his big jobs bill introduction before Congress? He said that he was going to go to every corner of the country and sell this thing, but it turns out that every corner of the country is really select swing states. He is going to be in North Carolina and Virginia, as you said. Biden this week is going to be in Pennsylvania, another key swing state. Their bill went down to defeat last week when Republicans blocked it and so, now they're hoping that they can gin up support to get this thing considered in pieces this week. So, we'll see - I think their real issue here isn't even so much with Republicans but it's also with these Democrats. There are 23 Senate Democrats who are going to be up for reelection in 2012 and I think a lot of them are a little skittish about going back to their states and saying that they backed a $450-billion bill. MARTIN: So, is the idea here - I'm just still trying to understand how this is supposed to work. Is the idea that I'll take the fight to your voters so, that you don't have to? Is it that the idea that people are supposed to be excited by seeing the president and reminded of why they liked him? I'm just still not understanding how this is supposed to actually translate into support... MARTIN: ...for the jobs bill. That's what confuses me. HENDERSON: Yeah, it's unclear because if - no, I think you're exactly right. If you look at polls it looks like a lot of people actually support this and I think Matt will be on later and talk about how much Latinos actually support this, something like 75 percent. So I think the idea is, yes, for the president to go out there. He'll be in front of a lot of crowds and a lot of folks generating some support showing some support for his plan and that's supposed to give an urge to Congress to say look, this thing is widely supported out there. But let's be real. It also gives Obama a chance to connect or reconnect with some of those voters in these key states that are going to be so important for him come 2012. MARTIN: Well, Matt, over to you then. Latino Decisions has a new poll out today, as Nia-Malika told us, and you ask a lot of questions. You know, like what's important to you, who do you like? Which are the contenders you like? Well, what about that? In terms of the issues that are most pressing for Latinos right now, is unemployment the top? BARRETO: Well, that's certainly a very important issue, and we did ask a question about the jobs bill. Jobs and the economy were tied with immigration as the top two issues facing the Latino community that voters want Congress and the president to address, and those have remained top issues for about the last year sort of jostling back and forth. Following the media coverage and the bills before Congress - and specifically on that jobs bill that the president is out talking about, we found that 78 percent of Latino registered voters do support that bill. They want Congress to pass it. We only found 12 percent said that they should block it and be opposed and try to start from scratch and so, I think there are some constituencies that do want to see action on this and it is very important for the president to try to take that message to the voters and see if they can't get some support for that and not allow the Republican party to control the messaging on this. That's something that they have been doing a particularly bad job of is in the outreach and the campaign the Republicans have really done an effective job of controlling that media messaging and I think you're starting to see the tide turn there with the president very--very aggressive on this jobs bill. MARTIN: Well, speaking of which how is the president doing with Latino voters? Recently there have been a lot of stories about some high profile, you know, African-American individuals, people like the public radio broadcasting personality Tavis Smiley, the Princeton professor Cornell West, criticizing the president saying that he hasn't been enough for the African-American constituencies. What about on the - among Latino voters? I think the president's argument would be well, that's fine you think that, but African-Americans on the whole, as voters, still support me, understand what I'm trying to do. What about with Latino voters? What does your poll tell us, Matt? BARRETO: Well, we've seen over the last few months that there has been some slippage Obama's overall job approval rating has been inching down a couple of percentage points each month, and his vote support for 2012 has been holding steady at about 49 percent who say they're certain to vote for him with another ten percent or so who are leaning in his direction. And I think that if you compare that to his 2008 levels or even how he was looking early in his administration, 2009, there has definitely been a decrease. But when Latino voters right now look at their options, there is some disappointment with President Obama, but what we found in this new poll that we're releasing today is that the Republican contenders are just not known and not liked among Latino voters and so, while Obama is currently facing some opposition, the Republicans are not giving him much of a run when it comes to Latino voters. They are not doing that outreach. They are not getting the word out, and for many of them, Latino voters don't even know who they are. MARTIN: Well, there's a difference between not known and not liked; which is it? Is it that they just aren't penetrating or is that there's active dislike at this point? BARRETO: Well, for example, on one of the candidates who was supposed to be perhaps an opportunity for the Republicans to reach Latino voters, Texas Governor Rick Perry, you know, we found that 39 percent have an unfavorable opinion of him compared to only 22 percent who had a favorable opinion, but an additional 40 percent said they had never heard of him or had no opinion, and so it's very split there. With this candidate who was supposed to be perhaps their best opportunity, huge percentages don't know who he is and the percentages who do know who he is on balance have a negative approval. MARTIN: That's yeah, a tough - that's a tough start. (Laughing) BARRETO: And that's consistent - very consistent... MARTIN: If you're just joining us, I'm Michel Martin and this is TELL ME MORE from NPR News. We're taking a look ahead to the week in politics with Matt Barreto. He's a pollster with the organization Latino Decisions. That's who you heard just now. He's also a political science professor. And Nia-Malika Henderson of The Washington Post, she's covering the 2012 campaign. You know, Nia, what about the - Matt was talking about connecting, okay and connecting with the constituencies and reminding them of, you know, who you are and forging that connection. I just want to play a clip from President Obama speaking yesterday at the dedication ceremony of the Martin Luther King memorial here in Washington. Here it is. (SOUNDBITE OF SPEECH) PRESIDENT BARACK OBAMA: If he were alive today I believe he would remind us that the unemployed worker can rightly challenge the excesses of Wall Street without demonizing all who work there. The businessman can enter tough negotiations with his company's union without vilifying the right to collectively bargain. MARTIN: So, Nia as you know, the president's critics from the left have been saying that they feel that he's governed too much from the center to this point. Do you see speeches like this as making a turn back toward these core constituencies? And just to remind people of their, you know, why, you know, 16 percent unemployment for African-Americans, 11 percent for Latinos. That's higher than the general population, and in obviously some communities and specific groups it's even higher than that. MARTIN: How do you interpret these remarks? HENDERSON: Well, when the president came out, you had that crowd, 10,000 people or more, even - than that - chanting four more years. So this is certainly his base and in some ways it does look like he's going for that base strategy, which was Bush's strategy in 2004. He ended up winning that campaign by about three million votes, helped in some ways with that victory from his 44 percent showing in the Latino community. And I think you do see the president pivoting to his base, particularly with this Occupy Wall Street. In some ways, it is like trying to grab a tiger by its tail, because you don't know where this thing is going. You know, there were some reports this weekend of people fighting with the police officers, so there is a danger, but you see Obama trying to slice off a piece of this frustration and harness that and really get on the side of labor and some of these frustrations and anxiety and anger that folks have at Wall Street. MARTIN: And Matt, final question to you. As we mentioned, the Republican candidates are set for another debate in Nevada tomorrow night. Tell us a little bit, if you would, about who needs a strong performance there in Las Vegas and why and also just how significant are a presence - are Latino voters in that part of the country? BARRETO: Well, sure. Well, Nevada is a very, very important state for the Latino electorate. It has the fastest growing percentage of Latino voters and so Latinos will certainly be important, and I think we may see the issue of immigration come back up again. Nevada has certainly faced a lot of immigration and so I'll be looking to see how the candidates respond to that. Clearly, Rick Perry has been really attacked from the right, from the conservatives on immigration and for his support for the Texas Dream Act. But I'm also going to be looking to see what folks like Herman Cain come out and say about immigration. You know, he's been in the news for saying that we should electrify the border fence, an absolutely offensive comment, which he clarified and said was a joke. And now we'll see what does he say now that he's sort of come into the spotlight? Can he position himself with Latino voters at all? Right now, we're showing that over 70 percent have no opinion of Herman Cain. So this is a chance for the candidates to clarify their positions and perhaps start some of that outreach. Latinos are a very, very important electorate in Nevada. MARTIN: Final question, Matt. What about Mitt Romney, the former governor of Massachusetts? Is he sort of seen by - as the de facto front runner by, you know, the money people, the so-called establishment? I don't know who that is anymore, but what about him? What does he need to do? BARRETO: Yeah. We haven't talked much about Mitt Romney and he still is a very strong candidate here. I think he ultimately is the front runner. Latinos are split on Mitt Romney and, surprisingly, there are still a large percentage who don't know enough about him, considering that he has run before. But Mitt Romney needs to also clarify his position on these issues important to Latinos. He was much more moderate on the issue of immigration, but through the past four years in this constant campaign he's been involved in in running for president, he's really staked out a position that is on the right and that is conservative and it's going to be very difficult for him to now pivot and appease the folks in the primary, but also try to reach out to Latinos. MARTIN: Okay. All right. Well, we'll be watching. Matt Barreto is a pollster with Latino Decisions. He's also an associate professor of political science at the University of Washington. He was kind enough to join us from his home office in Seattle. Nia-Malika Henderson is a national political reporter for The Washington Post. She was with us from their studios there. Thank you both. HENDERSON: Thank you. BARRETO: Sure thing. NPR transcripts are created on a rush deadline by Verb8tm, Inc., an NPR contractor, and produced using a proprietary transcription process developed with NPR. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record.
<urn:uuid:2ee4d195-deda-4b2f-b69f-2ca5ffc78d2a>
CC-MAIN-2016-44
http://www.npr.org/templates/story/story.php?storyId=141418426&f=1014&ft=1&sc=tw
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00025-ip-10-171-6-4.ec2.internal.warc.gz
en
0.982975
3,082
1.507813
2
downscaling is a valid word in this word list. For a definition, see the external dictionary links below. The word "downscaling" uses 11 letters: A C D G I L N N O S W. No direct anagrams for downscaling found in this word list. Adding one letter to downscaling does not form any other word in this word list.Words within downscaling not shown as it has more than seven letters. Try a search for downscaling in these online resources (some words may not be found): Wiktionary - OneLook Dictionaries - Merriam-Webster - Google Search Each search will normally open in a new window. All words formed from downscaling by changing one letter Browse words starting with downscaling by next letter
<urn:uuid:5a643ea6-abbc-420d-a720-c559b64f55d0>
CC-MAIN-2017-04
http://www.morewords.com/word/downscaling/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00285-ip-10-171-10-70.ec2.internal.warc.gz
en
0.863867
172
1.5
2
In celebration of the England girls’s nationwide soccer staff’s success final weekend, Twycross Zoo has devoted the identify of their cute new François’ Langur to midfielder Fran Kirby. François’ Langurs are an endangered species that stay in a matriarchal society the place the females share parenting tasks with one another The Lionesses’ victory is a large success & Twycross hopes that naming their newest particular arrival after one of many unbelievable gamers from this inspiring girls’s staff is a becoming tribute that can encourage success to this superb endangered species. Dr Rebecca Biddle, Director of Conservation at Twycross Zoo mentioned: “We’ve all been gripped by the joy and vitality of the Lionesses throughout their Euros marketing campaign. François’ Langurs stay in teams of between 4 and 27, in a matriarchal society the place the females share parenting tasks with one another, and we hope that naming our newest particular arrival after Fran Kirby, one of many unbelievable gamers from this inspiring girls’s staff, is a becoming tribute to their success.” Fran the François was born on eighth July to mum Lychee, who has been at Twycross Zoo since 2009, and pa Chow who arrived in 2016.
<urn:uuid:6a75cdc9-7959-4594-9228-55edd21db638>
CC-MAIN-2022-33
https://benaadirnews.com/meet-fran-the-francois-twycross-zoos-particular-new-arrival/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00269.warc.gz
en
0.949365
266
1.5
2
Bangladesh has made a reasonable economic and social progress in the past few years. Despite this, it is a country where each day is a challenge and where the gaping eyes of women and children await the day when the curse called ‘poverty’ will be uplifted from their heads and they will be able to breathe in freedom. So can one expect a change? Of course – with ACDI/VOCA’s (Agricultural Cooperative Development International and Volunteers in Overseas Cooperative Assistance) undertaking to save millions reeling under poverty in Bangladesh. Almost half of Bangladesh’s population live below the poverty line. Children suffer from stunting and malnutrition; and though most of the Bangladeshi’s are agriculturists, they still depend on food imports due to lesser productivity or highly unpredictable prices. Adding to these fluctuations are the natural disasters of floods and cyclones which just don’t allow the people emerge out of poverty. The road map: USAID has chosen to rescue millions of poverty stricken Bangladeshis through their 5 year and 1 year programs. USAID’s Office of Food for Peace has awarded ACDI/VOCA (Agricultural Cooperative Development International and Volunteers in Overseas Cooperative Assistance – an NGO working towards poverty alleviation and economic development of communities worldwide) a five year $45 million dollar PL 480 Title II program to reduce poverty in the Khulna Division of south-western Bangladesh. USAID has also awarded ACDI/VOCA a $130,000 one-year sub award, for developing a sustained and economic growth in the agricultural sector of Bangladesh. ACDI/VOCA’s programs: PROSHAR – Providing resources to the underprivileged With its launch in May 2010, this 5 year program has 3 main objectives for improving food security and poverty mitigation:- 1) Augment growth in the living standards through an increase in income: ACDI/VOCA plans to home in on the poor and ultra poor households in this program. The farmers of these households will be given access to greater inputs, lowering costs of services, and help in processing, marketing and bargaining of goods, thereby achieving economies of scale along with higher learning. ACDI/VOCA intends to develop a sustainable model through the involvement of stakeholders and linking the farmers to national and international markets. ACDI/VOCA also plans to enhance agriculture, livestock and aquaculture through building 829 producer groups in these areas thereby boosting yields and a gaining a better relationship with the private sector for supplying seeds and livestock. 2) Health and nutrition improvements in women and children: An increase in clinics and health services, and Preventing Malnutrition in Children under 2 years of Age Approach (PM2A) will be directed towards improving health and nutrition. ACDI/VOCA plans to provide rations to 27,351 households, and promote better practices to new born babies and their mothers by enhancing the skills of Family Welfare Assistants (FWA) and Community Skilled Birth Attendants (CSBA) thereby reducing malnutrition. 3) Amplify resistance to shocks and their effects: Risk management approaches such as responding to emergencies and disaster management will be dealt by ACDI/VOCA in conjunction with communities, public, and private organizations. Training will be imparted in areas such as conducting community risk assessments, developing disaster reductions and tsunami response plans, utilizing early warning systems and activating emergency responses. For making all these a sustainable model, ACDI/VOCA plans to provide grants and technical know-how to communities, stakeholders and local NGOs for enhancing organizational and technological capabilities. This one year program has recently started in February 2011. It intends to increase the competence of local communes to grow, sell, store and purchase food for a speedy and sustained growth in the agricultural sector of Bangladesh. In association with Winrock International, ACDI/VOCA plans to increase the efficiency, productivity and profitability of the agricultural sector, establish time-saving technologies to diminish losses, increase information for greater inputs, strengthen the agricultural institutions and promote the outreach of this sector via media, thereby supporting USAID’s aim of Global Hunger and Food Security Initiative priorities to optimize and increase agricultural market’s growth, reduce malnutrition and enhance the productivity of women farmers. WInrock and ACDI/VOCA together will also aid in the enhancement of access to food and nutrition so that women and children can get a more balanced, diversified and a protein rich diet. The agricultural incomes will help women in gaining a high purchasing power for buying the nutritious and micronutrient rich foods. Short term agricultural productivity training will be imparted to 1440 agriculturists, private and public organization’s service delivery will be improved and provided to 15000 women and other susceptible groups, 11,000 households will have a higher food security through training (trainers), and lastly all these programs will help in an increase in the net income of $1.7 million. In all, the FtF program will better the life of at least 50% of female recipients thereby transforming the lives of the deprived. Read an interview of Mr. Zachary Arney, Project Coordinator, Food Security, ACDI/VOCA who provided YL with the significant details of PROSHAR: YL: What were the first tasks/challenges/difficulties in setting up the infrastructure and material for all the PROSHAR programs and how were they prevailed over? Mr. Arney: PROSHAR includes activities in 3 sectors: livelihoods/agriculture, health and nutrition, and disaster risk reduction. There are a lot of moving pieces when starting up such a program, including recruiting staff, leasing offices and warehouses, and identifying beneficiaries. We have been able to meet these challenges thanks to our outstanding local staff members, who bring much excitement, motivation and skill to this program. YL: As all the programs have recently begun, what have been the accomplishments so far? Mr. Arney: While still starting-up, we are currently focusing on mobilizing community members and identifying beneficiaries. PROSHAR will assist people by providing training, improved opportunities, improved nutrition and access to healthcare, and greater awareness of potential disasters and strategies on how to mitigate them. None of this would be possible without the support of the communities in which we work, so we are spending a lot of time meeting with community members and various leaders to provide information on what we hope to accomplish – and answer their questions. YL: What are ways to monitor these accomplishments? Mr. Arney: We have a highly skilled team of monitoring and evaluation specialists working for the program. We have conducted a large baseline survey to determine the current situation and needs among our targeted beneficiaries. Once we begin some of our other program activities, including distributing rations to young children and their mothers, these specialists will continue to monitor certain indicators like caloric intake, which will provide us with information on how well the program is working and what can be done to help participants even more. YL: How are the changes implemented sustained in the society? And how will the changes be sustained after the 1 year and 5 year programs end? Mr. Arney: To have a sustainable impact, we are emphasizing the development of specific skills and knowledge among PROSHAR beneficiaries. Once the program has ended, thousands of individuals and households will continue to benefit from their improved knowledge in agricultural production, infant nutrition and disaster preparedness, to name a few. YL: Which are the assisting NGOs and service communities? How will they be a part of sustaining the changes after the programs end? Mr. Arney: PROSHAR works in the Batiaghata, Lohagara and SarankholaUpazilas of the Khulna Division. We will be implementing many of our activities through three organizations with significant experience in these upazilas. To benefit the greatest number of people, especially once PROSHAR has ended, we will also be working closely with the Ministry of Health and Family Welfare, as well as the Ministry of Food and Disaster Management. YL: For the farmer-to-farmer PROSHAR program, how will ACDI/VOCA coordinate working and implementing changes in the agricultural sector of the entire country of Bangladesh? Mr. Arney: ACDI/VOCA has a long history of working with agricultural producer groups to improve farmers’ knowledge of the most current and reliable agricultural practices. The Farmer-to-Farmer program is unique in that it allows us to bring highly experienced agricultural practitioners from other countries to volunteer in Bangladesh. The volunteers meet with local farmers, input suppliers, organizations and other business to share their knowledge in a specific agricultural sector like aquaculture. One of the most important factors in improving agricultural production is the knowledge of current best practices. This is what the Farmer-to-Farmer volunteers seek to provide. YL: What is the role of Winrock International in the farmer-to-farmer program? Mr. Arney:Winrock International is the lead organization in the Farmer-to-Farmer program in Bangladesh. In an effort to benefit as many people as possible, they have partnered with ACDI/VOCA to provide additional expertise in the upazilas in which we work. YL: What are your views on the future of Bangladesh through these programs? Mr. Arney: While there are certainly challenges, the enthusiasm and motivation we have seen among local communities, businesses, nonprofits and government ministries in Bangladesh is very encouraging. There is a passion to learn and innovate, both of which are important in economic and physical development. YL: If the youth wish to serve their country, how can they be a part of this program? Mr. Arney: Youth are future leaders and natural change makers. They should take every opportunity they have to learn more about what interests them, and to think critically about how things can be improved in Bangladesh. Innovation is really the key here. PROSHAR will be training farmers’ groups, mothers, school children and many others in some of the most effective and innovative practices in agriculture, health and nutrition and disaster preparedness. Youth should keep an eye out for opportunities to take part in these trainings at school and in their communities, so they can apply these innovative practices – and help develop new ones – to shape their futures and that of their country. YL: Anything else you would like to share with us regarding ACDI/VOCA? Mr. Arney: ACDI/VOCA is a global leader in agricultural development, dedicated to poverty alleviation and broad-based economic growth. With more than 45 years of experience, we currently work in more than 40 countries to improve agricultural productivity and build developing economies.. So are you inspired after reading the interview and would like to be a part in the change for the better? If yes, go ahead and connect with ACDI/VOCA in Bangladesh: Big thanks to Mr. Zachary Arney for the interview and for providing the exclusive photographs for the YL magazine.
<urn:uuid:716302a3-c28e-4403-8eb0-1531aba724cf>
CC-MAIN-2022-33
https://youthleadermagazine.com/proshar-strengthening-household-access-to-resources-in-bangladesh/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00078.warc.gz
en
0.943169
2,298
2.3125
2
We designed this mead-making kit for the beginning brewer as a simple and fun way to create the oldest known alcoholic beverage. Your first mead may not win a competition, but this kit can help you make a wonderful honey wine! Even a raw beginner should be able to use Mead Magic easily. Unlike most winemaking kits, Mead Magic provides all of the ingredients and tools you need to brew a small quantity of mead, and that includes the honey. WHY JUST ONE GALLON? Home brewing isn’t for everyone, and neither is mead. Five gallons – the most common brewing starter kit size – makes a lot of alcohol (25 wine bottles). Mead Magic’s one-gallon size lets you see if you like brewing, enjoy drinking mead, and it easily fits on a countertop. - New York State raw honey - Primary and secondary fermenters - Equipment sanitizer - Siphon, siphon hose and bottling wand - Yeast and yeast nutrients - Easy-to-follow instructions - Eight attractive self-sealing bottles (not included in the Basic kit) - Hot water (tap, bottled, or spring) - Spoons (for mixing and measuring)
<urn:uuid:27ecca8e-85f0-4690-80cd-ab219ce482f6>
CC-MAIN-2022-33
https://meadmagic.honeyapplehill.com/about/about-mead/mead-magic/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00274.warc.gz
en
0.924927
271
1.703125
2
In this post we will discuss about the use of recursive querying in SQL Server. Recently, I got a request from a Partner to develop a SSRS report for the Indented Bill of Materials in the Inventory module. I was going through the Dexterity Indented Bill of Materials report and found out that the report uses a temporary table. For filling the temporary table with the Inventory Bill of Materials hierarchy, Dynamics GP recursively loops around a logic written in Dexterity. We are stuck here, because we won’t be able to consume the logic that Dynamics GP uses to build the Inventory Bill of Materials hierarchy in SSRS. But, luckily we can create a recursive query in SQL Server to get the Inventory Bill of Materials hierarchy without spending much time. Recursive Query to get the Inventory Bill of Materials hierarchy DECLARE @billNumber CHAR (31) DECLARE @BMReporting TABLE ITEMNMBR CHAR (31), CMPTITNM CHAR (31), ITEMDESC CHAR (111) SELECT @billNumber = ‘FAXX-FG3-0001’; — By Recursive Query using CTE build the Indented BOM WITH BMReporting (ITEMNMBR, CMPTITNM, ITEMDESC) — Anchor member definition SELECT CAST (NULL AS VARCHAR (64)) AS ITEMNMBR, CAST (LTRIM (RTRIM (BMHDR.ITEMNMBR)) AS VARCHAR (64)) AS CMPTITNM, LTRIM (RTRIM (ITMMSTR.ITEMDESC)) AS ITEMDESC FROM dbo.BM00101 BMHDR INNER JOIN IV00101 ITMMSTR ON BMHDR.ITEMNMBR = ITMMSTR.ITEMNMBR WHERE BMHDR.ITEMNMBR = @billNumber AND BMHDR.Bill_Status = 1 — Recursive member definition SELECT CAST (RTRIM (LTRIM (BMDTL.ITEMNMBR)) AS VARCHAR (64)), CAST (RTRIM (LTRIM (BMDTL.CMPTITNM)) AS VARCHAR (64)), LTRIM (RTRIM (ITMMSTR.ITEMDESC)) FROM dbo.BM00111 AS BMDTL INNER JOIN dbo.IV00101 ITMMSTR ON ITMMSTR.ITEMNMBR = BMDTL.CMPTITNM INNER JOIN BMReporting AS BMReporting ON BMDTL.ITEMNMBR = BMReporting.CMPTITNM WHERE BMDTL.Bill_Status = 1 — Statement that executes the CTE INSERT INTO @BMReporting SELECT * FROM @BMReporting –@billNumber :- The Bill Number for which need the hierarchy Please refer the following link for more information on Recursive Querying in SQL Server. Using the above recursive query as a base, built a Stored Procedure that accepts ‘Bill Number’ as an input parameter and returns the Inventory Bill of Materials hierarchy as a result set. I have attached the SQL object and RDL file developed along with this post for your reference. Hope this helps… Until next post !! // Copyright © Microsoft Corporation. All Rights Reserved. // This code released under the terms of the // Microsoft Public License (MS-PL, http://opensource.org/licenses/ms-pl.html.)
<urn:uuid:1a0624d4-b694-43e3-a7a6-d7d05a13028b>
CC-MAIN-2017-04
https://blogs.msdn.microsoft.com/developingfordynamicsgp/2013/11/14/recursive-querying-in-sql-server/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00038-ip-10-171-10-70.ec2.internal.warc.gz
en
0.719251
757
2.140625
2
In addition to food and drink, you may be suffering from a medical condition that causes gas discomfort.Heartburn or indigestion can cause stomach acid to flow up into the esophagus, resulting in acute chest pains as a result of the burping reflex.Acid reflux, commonly known as gastroesophageal reflux disease (GERD), can cause air to become trapped in your esophagus, causing heartburn and other discomfort. Lie down on your stomach on a soft surface that is comfortable for you. - 1 How do you know if you have gas in your chest? - 2 Why does my chest hurt when I have gas? - 3 How long does gas pain in the chest last? - 4 Why does my chest hurt when I eat something bad? - 5 How do I get rid of gas pain in my chest? - 6 What does trapped gas in chest feel like? - 7 How do I know if my chest pain is gas? - 8 How Long Can gas pain last? - 9 Does hot water help relieve gas? - 10 What does gas pain actually feel like? - 11 How to tell gas pains from heart pain? How do you know if you have gas in your chest? It is possible that gas that causes chest discomfort will also cause belly ache.Some of the indications and symptoms of gas discomfort are as follows: Chest aches that are sharp and stabbing.Chest tightness is a common occurrence.Excess gas is expelled either voluntarily or involuntarily.Belching. Indigestion.Itching and cramping in the abdomen that spreads to other areas of the abdomen. Why does my chest hurt when I have gas? Inflammatory disorders such as IBD or Crohn’s disease — which can cause significant inflammation in the intestines and interfere with digestion — can also induce gas discomfort in the chest as a side effect. Other signs and symptoms include recurrent episodes of: How long does gas pain in the chest last? These are some of the more common symptoms, which can last anywhere from a few hours to a few days. Inflammatory disorders such as IBD or Crohn’s disease — which can cause significant inflammation in the intestines and interfere with digestion — can also induce gas discomfort in the chest as a side effect. Other signs and symptoms include recurrent episodes of: Why does my chest hurt when I eat something bad? Blowout, stomach discomfort, and excessive gas are all possible side effects for someone who does not have the enzymes necessary to digest particular meals. Chest discomfort can be caused by carbon dioxide gas, which is released by fizzy drinks. Food poisoning can occur as a result of consuming contaminated food, which may also explain the gas sensation in the chest. How do I get rid of gas pain in my chest? The following home treatments may be useful in alleviating the discomfort caused by excess gas in the chest: - Warm drinks should be consumed. It has been shown that drinking enough of liquids can assist in moving excess gas through the digestive tract, hence alleviating gas pain and discomfort. - Consume some ginger - Stay away from potential triggers. - Physical activity - Medical therapy What does trapped gas in chest feel like? When trapped gas builds up in your chest or belly, it might feel like a stabbing sensation. The pain can be severe enough to bring you to the emergency department, leading you to believe you have a heart attack, appendicitis, or gallbladder problems. Gas production and elimination are both typical parts of the digestive process. How do I know if my chest pain is gas? Gas discomfort in the chest is one of the symptoms of the condition. - The passage of excess gas, either voluntarily or involuntarily, which may ease discomfort - Appetite suppression - Abdominal pain that changes to different places of the belly - And other symptoms. How Long Can gas pain last? If you have any of the following symptoms, contact your service provider: Discomfort in the abdomen that lasts for a week or longer Symptoms include abdominal discomfort that does not improve in 24 to 48 hours, or that gets more severe and frequent with time, and that is accompanied by nausea and vomiting. Bloating that lasts for longer than 2 days is considered chronic. Does hot water help relieve gas? In addition to dissolving and dissipating meals that your body may have had difficulty digesting, it is believed that hot water can help you lose weight. However, a 2016 study found that warm water may have beneficial benefits on bowel motions and gas ejection following surgery, however further research is needed to confirm this. What does gas pain actually feel like? As Dr.Singh explained, ″gas sensations might seem like a stretching sensation, and occasionally individuals have acute pains.″ Additionally, the intensity of gas pains might differ from person to person.The doctor said that the symptoms might range from a low-grade dull sensation to a severe ache at times.The majority of the time, gas discomfort is entirely natural and will disappear within a few minutes. How to tell gas pains from heart pain? Exhaustion and lightheadedness are common symptoms of this condition. There is persistent nausea, as well as a sensation of intense pressure on the chest. – A throbbing pain in the jaw (more common with women) Other portions of the upper body are experiencing pain as a result of this (neck, shoulders, arms, jaw, or back)
<urn:uuid:3ddacfe9-df00-41e7-82ed-57bd7ba5f5a6>
CC-MAIN-2022-33
http://mrmcw.org/leg-pain/what-causes-gas-pain-in-the-chest.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00479.warc.gz
en
0.953468
1,163
2.859375
3
Nutritional difference in Green Tea comes from the growing environment and product manufacturing process. The following list contains Japanese green teas. Chinese green tea, such as Gun Powder, is not included. Generally speaking, Sencha, least processed green tea, has the highest amount of Catechin antioxidants among all the green teas, including Chinese green tea. Other nutritions naturally occur in green tea leaf: Fiber, B-Carotene, Chlorophyll, Flavonoid, L-Theanine, Vitamin U, Saponin, Selenium, Calcium, Fluoride, Iron, Magnesium, Zinc
<urn:uuid:a0ed5f33-fa17-4d5b-9e8e-0edd43dffd17>
CC-MAIN-2022-33
https://groundgreentea.com/for-the-thirsty-mind-faq/nutritional-differences-in-green-tea/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00070.warc.gz
en
0.896419
128
2.109375
2
High-resolution multibeam bathymetry and chirp (compressed high-density radar pulse) seismic data acquired from an autonomous underwater vehicle outline in unprecedented detail the shape and near subbottom character of the axial channels within upper Monterey and Soquel Canyons (offshore California, USA). In Monterey Canyon, the bathymetric data span water depths from 100 m to >2100 m, and include the confluence with Carmel Canyon at ∼1900 m water depth. The bathymetric data for Soquel Canyon begin close to the canyon head at 100 m water depth and extend down to the intersection with Monterey Canyon. The seafloor within the axis of Monterey Canyon is covered with sediment fill out to 910 m water depth. Below this water depth exposures of underlying strata are common, presumably because of decreasing sediment drape and generally increased erosional resistance of the pre-canyon host strata. The seafloor within the axial channel of upper Soquel Canyon is smooth and contains horizontally layered sediment fill. In contrast, the sediment fill within the incised portions of the axial channel of Monterey Canyon is characterized by distinctive crescent-shaped bedforms down to the limit of the surveys. These differences in morphology and texture correspond with the contrasting cohesive strength of the sediments filling these canyons and the increased propensity for weakly cohesive sands and gravels in Monterey Canyon to fail. Episodic movement of coarse-grained sediments down Monterey Canyon maintains a longitudinal gradient of ∼1.6°. The more cohesive fine-grained sediments in Soquel Canyon stabilize the seafloor and maintain a substantially higher longitudinal gradient (3°–6°) than that measured in Monterey Canyon. The textural and lithologic data, plus previously published observations, indicate that upper Monterey Canyon is currently active, whereas upper Soquel Canyon appears to be inactive as a coarse sediment transport conduit. Episodic seabed sediment failures in active submarine canyons are hypothesized to control the gradient of the axial channel. The propensity for sediment failure in weakly cohesive coarse-grained sediments results in shallower horizontal gradients compared to submarine canyons stabilized by more cohesive fine-grained sediments. Submarine canyons are among the most important conduits for sediment transport on the Earth (Shepard and Dill, 1966; Normark, 1974; Normark and Carlson, 2003; Normark et al., 2009b). The shape of the seafloor within a submarine canyon inevitably reflects the processes that transport sediment through the canyon, deposit sediment within the canyon, and erode into the underlying host rocks of the canyon. The existing paradigm is that turbidity currents and other gravity flow events are the dominant sediment transport processes acting within submarine canyons (e.g., Twichell and Roberts, 1982; Farre et al., 1983). While the shapes of submarine canyons evolve in response to a variety of changes driven by external factors such as climate, sea level, tectonics, and human alterations (e.g., Covault et al., 2007; Lamb and Mohrig, 2009; Mountjoy et al., 2009), their shapes ideally converge to reflect equilibrium conditions during their active phases (e.g., Pirmez et al., 2000; Mitchell, 2005; Gerber et al., 2009). Obtaining accurate and detailed bathymetric maps is essential for documenting the seafloor morphology and understanding the sedimentary processes within submarine canyons. Progress in the studies of submarine canyons has come with our ability to collect detailed bathymetric maps and use these maps to guide high-resolution sampling and accurate placement of instrumentation within submarine canyons (e.g., Paull et al., 2005, 2010). Over the past decade, our collective understanding of the processes that occur within submarine canyons in general and specifically in Monterey Canyon (offshore California, USA; Fig. 1) has expanded enormously; there have been many surprises as the technologies have improved. Major steps include the acquisition of a regional grid of 30 kHz multibeam data that accurately delineated the sides of Monterey and Soquel Canyons (Greene et al., 2002), sampling using remotely operated vehicles (ROV) to collect Vibracores that showed that the axial channel contains coarse-grained sediment (Paull et al., 2005), and monitoring experiments that revealed the occurrence of numerous sediment transport events (Paull et al., 2003; Xu et al., 2004). The discovery that the recurrence frequency of significant sediment transport events in upper Monterey Canyon is subannual (Paull et al., 2010) was unanticipated. Beginning in 2004, the California State University Monterey Bay Seafloor Mapping Laboratory collected 200 kHz multibeam surveys of the heads of Monterey and Soquel Canyons down to water depths of ∼250 m with sufficient resolution to image bedforms within the axial channel. These multibeam bathymetric data revealed that large crescent-shaped bedforms (herein referred to as CSBs) occur on the seafloor within the axial channel of Monterey Canyon (Smith et al., 2005, 2007). These CSBs have wavelengths up to 80 m, amplitudes to 2 m, and well-defined asymmetrical crests oriented concave down canyon and roughly perpendicular to the local canyon axis. We know that similar CSBs occur further down Monterey Canyon, and within Santa Monica, Mugu, Redondo, Carmel, and La Jolla Canyons (Paull et al., 2008). These bedforms appear to be common features on the floor of active submarine canyons. Perhaps the greatest surprise came from the comparison of repeated multibeam mapping surveys showing that the CSBs are active, because their locations change between successive surveys (Smith et al., 2005, 2007; Xu et al., 2008). While it is clear these bedforms change position between repeated surveys conducted only months apart, differing interpretations about the migration direction have been offered. Smith et al. (2007) argued that these bedforms are sediment waves that migrate up canyon, while Xu et al. (2008) questioned whether this apparent migration direction is an artifact of the sampling interval (e.g., Hughes Clarke et al., 2009) and suggested that the CSBs may move down canyon. Both of these models assume that sediment movements are driven by the semidiurnal tidal currents that sweep through Monterey Canyon (Xu et al., 2002, 2008). The processes that form the CSBs were discussed in Paull et al. (2010); while the CSBs were initially inferred to be migrating sand waves, that paper presented evidence that the CSBs move during brief high-energy events. The areas of the canyon floor where CSBs occur are composed of poorly sorted, coarse-grained sediments that appear to have been deposited en masse (Paull et al., 2005, 2010). Two contrasting mechanisms are proposed to form these bedforms: (1) erosion and deposition during cyclic steps in large turbidity flows as they pass over the canyon floor, or (2) failures within the canyon floor. Failure of the canyon floor may involve some combination of fluidized flow of shallow seafloor sediments and slumping of larger intact segments of the seafloor. Moreover, these mechanisms are not viewed as being exclusively one or the other, as both may occur within individual events (e.g., Anderson et al., 2006). The origin of the CSB features still remains poorly understood, but further documentation of the types of morphologies, and the extent and distribution of CSBs, will add to the understanding of how sediment moves down submarine canyons. Physiography of Monterey and Soquel Canyons Monterey Canyon begins in the littoral zone at the mouth of Moss Landing Harbor (Fig. 1). From there a continuous channel can be traced for more than 400 km seaward into >4000 m water depth on the Monterey Fan. Soquel and Carmel Canyons are the most prominent of the tributary canyons that coalesce with Monterey Canyon at 980 m and 1970 m water depths, respectively. This paper focuses on all of Soquel Canyon below 100 m water depth and the axial channel of Monterey Canyon from 100 m to 2100 m water depth, including the intersection with Carmel Canyon (Figs. 1 and 2). Previously available surface ship data for Monterey Canyon show that in cross section the axial channel is a distinctly flatter area than the adjacent canyon walls (Greene et al., 2002; Paull et al., 2005; Smith et al., 2005; Fig. 3A). The axial channel width in upper Monterey Canyon varies between 100 m and 350 m and gradually increases down canyon until ∼1850 m water depth. The San Gregorio–Palo Colorado fault zone crosses the canyon axis in ∼1900 m water depth. Below the crossing of the San Gregorio–Palo Colorado fault zone the axial channel widens to more than 1000 m (SGPCFZ, Fig. 1; box 11, Fig. 2). Upper Monterey Canyon has a sinuosity of 1.9, similar to that of a meandering river (Leopold et al., 1964; Paull et al., 2005). In comparison, Soquel Canyon has a generally straight axial channel that runs downslope to the southwest. However, at ∼450 m water depth in Soquel Canyon the general trend of the axial channel is offset by ∼650 m to the northwest, creating two ∼90° bends. These bends account for most of the sinuosity of Soquel Canyon. Stratigraphic and Tectonic Framework of Monterey Bay The stratigraphy of Monterey Bay and the host rocks into which Monterey Canyon is cut are known from sediment coring and HOV (human-occupied vehicle) and ROV sampling of the strata exposed on the canyon walls, boreholes drilled within the bay, and regional mapping (Greene, 1977; Greene, 1990; Stakes et al., 1999; Orange et al., 1999). The offshore stratigraphic framework is summarized in a geologic map of Monterey County, California (Wagner et al., 2002), that includes the floor of Monterey Bay. The Wagner et al. (2002) map was constructed in part using seafloor textures seen in multibeam data. The major formations believed to be exposed on the flanks of the canyon or in subcrop include sedimentary rocks of various Tertiary ages and Mesozoic basement rocks of both metamorphic and igneous origins. Of relevance here is that the erosional resistance of the units increases with their age. For example, the upper canyon is hosted in the relatively soft Pliocene–Pleistocene mudstones (e.g., Purisima Formation), while in places in the lower canyon much more solid erosionally resistant granodiorite of the Salinian Formation crop out. The San Gregorio–Palo Colorado fault zone (SGPCFZ, Fig. 1), the westernmost active dextral fault of the Pacific–North American plate boundary, extends underneath Monterey Bay with a north-northwest–south-southeast orientation (Clark et al., 1984; Greene et al., 2002). Additional delineation of this active fault zone within the bay is provided by the pattern of low-magnitude earthquake epicenters (Greene, 1990). A zone of southwest-dipping reverse faults referred to as the Navy fault zone (NFZ, Fig. 1) crosses the inner bay with a northwest-southeast orientation. Greene (1977) mapped this using structural offsets seen in seismic reflection profiles. Canyon Floor Cores Previous studies (Paull et al., 2005, 2006, 2009, 2010) undertaken using an ROV-deployed Vibracoring system document the nature of the sediment facies that occur within the axis and flanks of upper Monterey Canyon (<1500 m water depth). Coarse-grained deposits form a narrow trail of sediment that is tightly restricted to the axial channel floor. Sand found on the floor of upper Monterey Canyon is supplied from the modern beach and nearshore environment (Paull et al., 2005, 2010). The lower sidewalls and terraces on the sides of the uppermost portion of Monterey Canyon are largely cloaked with a thick drape of recent sediment supplied from the Salinas and Pajaro Rivers (Eittreim et al., 2002a, 2002b; Paull et al., 2006). This drape is composed of laminated fine-grained sediments that have accumulated in the relatively calm environment sandwiched between the wave-washed continental shelf and the sediment gravity flow–scoured axial channel on the canyon floor (Paull et al., 2005). The extent and thickness of this drape decreases with distance from shore. Outcrops of the underlying country rock on the canyon walls become common ∼18 km from shore where the canyon axis is below 910 m water depth. The data we present here were collected to explore and document the morphology of the Monterey Canyon system. A particular goal was to image the canyon's axial channel where sediment transport processes are concentrated and to determine how far into the canyon system CSBs extend. An additional impetus was to provide detailed surveys of the deep-water sections of two recently established U.S. National Marine Protected Areas (Soquel Canyon and Portuguese Ledge) near the time that these were established (Fig. 1). High-resolution seafloor surveys of the axis of Monterey Canyon were conducted using an autonomous underwater vehicle (AUV). This AUV was developed at the Monterey Bay Aquarium Research Institute (MBARI) specifically for seafloor mapping (Kirkwood, 2007; Caress et al., 2008). The vehicle carries a Reson 7125 200 kHz multibeam sonar and an Edgetech 2–16 kHz chirp (compressed high-density radar pulse) subbottom profiler. The AUV simultaneously collects high-resolution multibeam bathymetry (vertical precision of 0.1 m and a horizontal beam footprint of 0.75 m diameter at 50 m survey altitude) and chirp seismic-reflection profiles (vertical resolution of 0.11 m). The AUV navigation and attitude derive from a Kearfott Seadevil inertial navigation system initialized by the global positioning system at the surface and aided by a Doppler velocity log (DVL) during missions. These surveys were conducted at 3 knots with the AUV programmed to fly 50 m off the seafloor on missions as long as 18 h. To cover the floor of the axial channel required flying 3 or more overlapping swaths that were nominally 150 m apart. The data presented here were collected during 16 AUV dives in Monterey, Soquel, and Carmel Canyons (Fig. 1). To enable continuous DVL bottom tracking, the AUV was launched from the R/V Zephyr on the continental shelf in <100 m water depth. For these surveys four different launch points were used. A series of surveys were conducted in Monterey Canyon on 22 and 24 September 2008 from the canyon head down to ∼950 m water depth. Additional surveys were conducted on 1 and 2 December 2008 from ∼1400 m water depth up canyon to overlap with the previous surveys. On 11 and 12 March 2009, 2 surveys were conducted to continue mapping down canyon to ∼2000 m water depth. On 2 December 2009 a survey was conducted to map the floor of Monterey Canyon at the intersection with Carmel Canyon. Two additional surveys were conducted on 9 December 2009 to include more of the lower sidewalls of upper Monterey Canyon, and on 25 June 2009 the southeastern sidewalls of the canyon south of Navy slump were surveyed. Six surveys were conducted in Soquel Canyon (28 and 29 March 2008; 22 and 23 July 2008; and 5 and 10 March 2009), covering the canyon floor and sidewalls from the canyon head on the continental shelf down to the confluence with Monterey Canyon. The AUV data were processed using MB-System, an open-source seafloor mapping software package (Caress and Chayes, 1996; Caress et al., 2008); 1 m grids of the data were generated. The long profile following the thalweg of these canyons was constructed by connecting the up-canyon apex of 1 m contours along their axial channels. ROV Sampling and Observations MBARI has operated one or more ROVs (Ventana, Tiburon, and Doc Ricketts) within Monterey Bay for more than two decades. These ROVs have made more than 4000 dives within the bay; however only a modest fraction of the total dive effort has been focused on benthic observations and an even smaller portion of the dives targeted the seafloor of the Monterey Canyon system. Some results of these investigations have been published (Paull et al., 2003, 2005, 2006, and 2009). Because the bottom water of Monterey Canyon is characteristically quite turbid, it is usually difficult to make visual observations and collect sediment or rock samples on or near the seafloor. During clear water periods, the nature of the canyon floor has been visualized and periodically rock samples have been collected from strata outcrops on the canyon walls using the mechanical arm of the ROV. ROV dive observations and samples associated with particular morphologic features seen in the multibeam data are used to provide ground truth. The new AUV-acquired high-resolution bathymetry focuses on the axial channels of Monterey and Soquel Canyons. The surveys cover the axial channel of Monterey Canyon from 100 m to 2100 m water depths, Soquel Canyon from between 104 m to its intersection with Monterey Canyon in 1210 m water depth, and Carmel Canyon below 1680 m water depth (Figs. 1 and 2). Terminology used to describe canyon morphology is illustrated in Figure 3. The areas below ∼350 m water depth in both canyons have never been mapped in this detail before. Images of the entire data set are in Supplemental Maps 1–5 in the Supplemental File1. Figures 4–15 illustrate the bathymetry of selected areas from Monterey Canyon; they have been arranged and numbered to extend down Monterey Canyon in order of increasing water depth of the canyon thalweg. The character of Soquel Canyon is illustrated in Figures 16 and 17. Although the surveys were not designed to cover the lowermost portions of the canyon sidewalls, small sections of the canyon flanks were inevitably imaged. ROV-collected video images of features characteristic of the axis of Monterey Canyon are shown in Figure 18. High-Resolution Bathymetry of Monterey Canyon From the canyon head out to an axial channel depth of 910 m (Figs. 4, 5, and 6), the texture of the canyon walls is generally smooth, suggesting that the underlying host strata are draped with recent sediment. Below 910 m depth (Figs. 7A, 7B) the texture of the bathymetry indicates that the canyon walls are rougher. In places, protrusions from the sidewalls extend into the path of the axial channel, and isolated canyon floor topographic highs occur (CFTH; Figs. 7, 9, 10, 11, and 12). In places these rougher-textured canyon wall surfaces, protrusions on the sidewalls, and canyon floor topographic highs have a distinct linear fabric that is suggestive of bedded strata outcrops (BS; Figs. 6, 7, and 9). In a few areas the AUV-acquired bathymetry covers some sections of the canyon walls above the canyon floor (Figs. 4, 8, 14, and 15). The walls of the canyon contain numerous slope-parallel ridges and troughs. Many of the troughs contain stairsteps of arcuate features (AF) that suggest they were formed by submarine mass-wasting events, consistent with previous interpretations of surface vessel multibeam surveys within Monterey Canyon (Greene et al., 2002; Smith et al., 2005) and elsewhere (e.g., McAdoo et al., 2000; Canals et al., 2004). Here AF is used to describe features on the canyon walls and CSB to describe features on the canyon floors. The occurrence of AFs and exposures of bedded strata, indicative of erosion, are especially common on the canyon sidewalls along outside bends of the Monterey Canyon axial channel (AF; Figs. 4 and 5). However, many of the scars on the canyon walls adjacent to the channel occur on the upslope side of the bends (Figs. 4 and 5), rather than on a path that is directly downslope of the previous straight canyon segment. The AUV-collected multibeam bathymetry show that distinctive bedforms occur within the axial channel of Monterey Canyon down to at least 2100 m water depth (Figs. 4–14; Supplemental Maps 1–4 [see footnote 1]). Repetitions of CSBs with a concave down-canyon shape are common within the incised portion of the axial channel of Monterey Canyon down to 1280 m water depth (CSB; Figs. 3B, 3C, and 4–10). Below 1280 m water depth some large reverse curvature bedforms (RCBs) (e.g., concave up-canyon crests) also occur (RCB; Figs. 10–12). In water depths <1280 m the CSBs are consistently asymmetric, with a relatively steep (∼15°) 1–2-m-high scarp on the down-canyon side and a longer flank on the up-canyon side that is approximately level or dipping gently (to 1°) up canyon (CSB; Figs. 4–9 and 19). In some places the CSB scarps are composed of two or more concave-downward segments (CSB; Figs. 6, 7, and 8). Individual well-formed CSBs are easily identified in map view (Figs. 4–9). We counted 371 well-formed CSB scarps that crossed the Monterey Canyon thalweg between 160 m and 1280 m water depth (Supplemental Maps 2 and 3 [see footnote 1]). These are spaced at intervals of 50 ± 28 m (1σ) with minimum and maximum separations of 12 m and 167 m. However, this count is subjective, as other less distinct features could also be counted as CSBs. The CSBs appear to occur in groups of 4–20 that are morphologically similar in size and shape (CSB, Fig. 19). These groupings are distinguished by an uppermost scarp that is distinct by being somewhat higher and thus forming small knickpoints (SKP; Figs. 5A, 9A, and 19) or distinctly narrower than the CSB scarps immediately upstream (CSB; Figs. 5A and 6A). The appearance of the CSBs in the multibeam images is characteristically sharper immediately down canyon from the distinctive scarps identified as small knickpoints and tend to become less distinct down canyon within an individual group of CSBs. The length of these groupings of CSBs varies from ∼200 m to >2 km and their down-canyon termination is commonly associated with another distinct small knickpoint scarp, which marks the beginning of the next group of CSBs further down canyon. When traced laterally, the crests of individual CSBs curve down canyon and merge with the sides of the axial canyon or the slightly taller scarps that bound the benches on the flanks of the incised part of the axial channel (Figs. 3B, 3C, 4, 5, 6, 8, 9, and 10). Multiple CSBs commonly merge with the same sidewall scarp. The cross-channel widths of the CSBs vary considerably over relatively short distances along the canyon. For example, in 690 m water depth (CSB, Fig. 6A) the width of a distinct CSB is only 30 m. From this location, the widths of the CSBs increase down canyon until they extend over 200 m across the channel 1 km further down canyon. In some places the changes in width of trains of CSBs are associated with constrictions in the channel (C, CSB; Figs. 9A and 10A), but in other areas the changes in CSBs do not appear to be related to bedrock controls within the axial channel axis (CSB; Figs. 5A, 6A, and 7A). The CSBs are usually in the incised and deepest part of the axial channel associated with the canyon thalweg. However, some groups of CSBs appear to be continuous with AFs on the canyon sidewall. For example, in ∼1920 m water depth, well-developed CSBs within the axial channel bifurcate upslope in at least four separate directions (CSB, AF, Fig. 13). Only one of these trains is connected with the main channel of Monterey Canyon. The features identified as AFs are morphologically similar to the CSBs in that they are concave-downward scarps. While there is a greater range in the size of the AFs, the primary distinction is their position with respect to the canyon floor versus its flanks. Another example of the CSB is illustrated in ∼1310 m where a train of CSBs can be traced up canyon into a headless reentrant on the canyon floor (CSB; Figs. 10 and 19). The deepest occurrence of CSB-like features is below the confluence with Carmel Canyon (CSB, Fig. 14). However, here their appearance in the multibeam data is less distinct than at shallower depths further up canyon. Although much of upper Monterey Canyon seafloor is covered with trains of CSBs, which have concave down-canyon scarps, there are two areas where somewhat similar bedforms occur with the opposite curvature (RCB; Figs. 10A, 11, and 12). One of the areas with the RCBs is in 1265–1284 m water depths (RCB, Fig. 10A) just upstream from a large constriction within the canyon axis referred to as the Navy slump (Greene et al., 2002). The other area with RCBs is between 1810 and 1875 m water depths where the walls of the upper canyon open out into an ∼1-km-wide basin (RCB; Figs. 11 and 12). Unlike the CSBs, the RCBs are not associated with local incision in the canyon floor fill (CSB, Figs. 3C, 3D). Instead, the crests of the RCBs fade out laterally within the canyon floor rather than terminating along a side scarp. The RCBs are also larger (to 10 m high and to 120 m long), less asymmetric, and lack the distinctive downslope scarps characteristic of CSBs (Fig. 19). ROV transects conducted during Tiburon dive T1136 and Doc Ricketts dives DR17, DR18, DR108, DR110, and DR112 show that the seafloor where these bedforms occur is composed of angular gravel and boulders of granodiorite that crop out through a veneer of sediment (Figs. 18F–18H). Many of the observed boulders are >1 m on an edge. Benches on the Margins of the Incised Channel Common features observed along the margins of the incised channel of Monterey Canyon down to ∼1100 m water depth are elevated benches (B; Figs. 4–9). The benches separate the canyon sidewalls from the slightly deeper incised channel on the canyon axial channel floor that contains CSBs (Fig. 3C). These benches have relatively smooth surfaces that dip down canyon with slopes similar to the seafloor of the incised channel (<2°). Linear scarps (LS; Figs. 4 and 6) 2–10 m higher than the incised axial channel floor define the boundary between the benches and the incised channel (Figs. 4, 6, and 8). Smaller scarps that form the crests of CSBs curve into and often merge down canyon with the scarp that defines a bench. The linear scarps that bound the benches can approach 1 km in length and are generally oriented parallel to the incised channel axis. In some cases benches form triangular-shaped wedges on the inside bends of meanders (B; Figs. 4, 5A, and 6A). Elsewhere benches are absent on the inside bends of meanders (Figs. 6A and 7A). Outcrops on the Canyon Floor and Canyon Constrictions The shallowest occurrence of pre-canyon strata outcrops within the axial channel of Monterey Canyon is in 910 m water depth, where a distinct linear ridge occurs within the incised channel. Here channel floor topographic highs up to 10 m across rise ∼4 m above the seafloor. They form a discontinuous ridge ∼100 m long (CFTH, Fig. 7A). Additional ridges 6 m high and 20 m long rise above the canyon floor ∼120 m further down canyon. The adjacent canyon walls show lineations and apparent stairsteps that are interpreted as outcrops of subhorizontal bedded strata (BS, Fig. 7A). These mid-channel topographic highs and outcrops of bedded strata form a constriction in the canyon floor. Several other distinct constrictions of the incised channel occur further down canyon (C; Figs. 9A, 10A, and Fig. 13). A constriction in Monterey Canyon in 1060 m water depth is created by 2 blocks or outcrops more than 60 m wide that form a partial dam across the incised channel (C, Fig. 9A). A 36-m-wide slot cuts through this dam and there is more than 10 m of relief immediately down canyon. Observations and sampling during ROV Ventana dive V3347 show that the down-canyon face is composed of massive carbonate-cemented sandstone. Similar appearing outcrops or large blocks that rise above the canyon floor are common below this feature and define other constrictions in the incised channel. Just 200 m further down canyon a headland protrudes 200 m from the northern wall into the canyon axis, reducing the channel width from >350 m to <150 m. Observations made during ROV Doc Ricketts dive DR40 show that the face of this feature is composed of lithified bedded rock (Fig. 18C). The most distinctive constriction in upper Monterey Canyon (Fig. 10) is associated with the feature called the Navy slump (Greene et al., 2002), a large promontory that juts out into the canyon from the east, forming an ∼1000-m-wide, 900-m-long, and ∼125-m-high obstruction in the axial channel between 1300 m and 1400 m water depths. The canyon thalweg follows a circuitous path around the northwestern edge of the Navy slump and passes through an ∼1-km-long straight constriction where the width of the channel decreases to 38 m. ROV dives in this narrow constriction show that the seafloor is composed of gravel, and the steep, nearly parallel sidewalls are composed of massive competent rock (ROV dives V2077, V3001, and V3302; Fig. 18E). ROV transects over Navy slump reveal that it is largely sediment bare and lacks loose rock. A few rock samples have been obtained from both sides of the constriction, and show that the Navy slump is composed of Salinian granodiorite on both sides (Wagner, et al., 2002). The bathymetry shows that the surface of the Navy slump is rough, and distinct linear troughs (DLT, Fig. 10) cross much of the feature. The largest of these troughs is >350 m long, 10–20 m across, and as much as 40 m deeper than the surrounding rock mass (DLT, Fig. 10B). These open troughs appear to have relatively flat floors that form a surface that connects downslope to the axial channel floor, suggesting that these troughs are partly filled with sediment. In 1850 m water depth one area with a diameter of ∼40 m is ∼3 m higher than the surrounding seafloor (CFTH; Figs. 11 and 12A). Observations and sampling on ROV dive DR132 show that this canyon floor topographic high is composed of massive granodiorite and the seafloor inside and outside the moat comprises gravel and angular boulders of granodiorite covered with a discontinuous veneer of fine sediment. Bottom Roughness and Canyon Floor Debris The 1 m bathymetric grids show that the seafloor within the incised channel of Monterey Canyon has considerable roughness (Figs. 5B, 6B, 7B, 9B, 10B, and 19). The data show an irregular texture, suggesting that tens of centimeters to meter-scale local relief is common within the incised channel (Fig. 19). Rough textures occur within areas where CSBs are identified and in areas where CSBs are not developed. In places, the distinctive textures in the bathymetric data are easily identified as debris on the canyon floor (e.g., Fig. 5). The detailed longitudinal gradient plots (Fig. 20) also illustrate how local bottom roughness obscures the identity of the CSBs. Two regional fault zones cross Monterey Canyon (Fig. 1). The feature called the Navy slump (NS, Fig. 10A) occurs where the western margin of the Navy fault zone extends across the canyon (Greene et al., 2002). The long straight narrow constriction that extends alongside the Navy slump is parallel with the northwest orientation of the Navy fault zone as mapped on the shelf adjacent to both sides of the canyon (Greene, 1977). A linear section of the incised channel between 1900 and 2000 m water depths is oriented north-northwest–south-southeast. Here there are two series of isolated, elongate canyon floor topographic highs that are ∼250 m apart (CFTH, Fig. 13). These linear arrays of topographic highs are nearly parallel with the general north-northwest trend of the lower portion of Carmel Canyon (Fig. 1) and have been used to map the San Gregorio–Palo Colorado fault zone using preexisting bathymetry (Greene et al., 2002). Higher-resolution multibeam bathymetry shows that there are north-northwestward–oriented gullies cutting the base of the northern wall of Monterey Canyon oriented parallel to the San Gregorio–Palo Colorado fault zone and Navy fault zone (G, Fig. 15). Chirp Subbottom Profiles from Monterey Canyon The AUV-collected chirp profiles from the flanks and benches on the side of Monterey Canyon resolve numerous nearly seafloor-parallel reflectors indicating that thinly bedded ∼15–30-m-thick sediments drape the canyon walls (0.02–0.04 s two-way traveltime) (Figs. 21A, 21B, and 21E). In places on the canyon walls, these thin-bedded sediments are offset by small faults (Fig. 21A) that appear to be rotational faults that sole out toward the canyon axis (Smith et al., 2005, 2007). Strike profiles show that the draping layers are frequently disrupted by gullies on the canyon flanks (G; Figs. 15 and 21E). The coincidence of the interruptions in the continuity of the drape and the existence of the gullies make it difficult to establish if the discontinuities seen in the chirp profiles are associated with recent displacements along the San Gregorio–Palo Colorado fault zone. The AUV-collected chirp profiles over both the typical CSBs and those with reverse curvature from the floor of Monterey Canyon show the seafloor as being one strong reflector, and lack indications of internal layering below (Fig. 21C). High-Resolution Bathymetry of Soquel Canyon Soquel Canyon is an ∼10-km-long tributary that extends northeast of Monterey Canyon (Fig. 1). The canyon head is located mid-shelf ∼10 km from the nearest shoreline. AUV-acquired multibeam bathymetric data reveal the shape of the axial channel from between 104 m water depth down to its intersection with Monterey Canyon in ∼980 m water depth. Surveys of Soquel Canyon were collected using various AUV survey patterns, with some focused on imaging the floor of the axial channel, and others covering portions of the canyon flanks. Upper Soquel Canyon comprises two straight segments (2.5 km and 4 km long) oriented north-northeast–south-southwest, offset by a shorter 0.6 km segment oriented west-northwest–east-southeast, forming two right-angle bends (Figs. 2 and 16; Supplemental Map 5 [see footnote 1]). The high-resolution bathymetry shows the floor of upper Soquel Canyon as being a relatively smooth flat-floored channel 200–350 m wide and with a thalweg slope of 3°–5° down to 650 m water depth (Fig. 16). Only a few scarps were imaged within the upper Soquel Canyon surveys, and they are primarily on the canyon sidewalls. One cluster occurs on the lower flanks of the canyon in ∼420 m water depth, upstream of the right-angle bend above the axial channel (AF, Fig. 16). These scarps are apparently slide scars associated with failures on the canyon walls. The boundary between upper and lower Soquel Canyon occurs where the axial channel water depth is 650 m (Supplemental Map 5 [see footnote 1]). Below 650 m water depth the channel topography becomes more rugged and the slope increases to ∼7° (Fig. 17). This is the first indication of possible exposures of country-rock outcrops on the canyon floor; the bathymetry suggests that these outcrops are the eroded edge of gently dipping bedded strata. The transition from smooth seafloor to an incised channel with outcrops of bedded strata occurs below 720 m water depth (Fig. 17; Supplemental Map 5 [see footnote 1]). The bottom texture of the lowermost flanks of the canyon sidewalls become distinctly rougher, and the outcrops appear to lack the layering observed slightly up canyon (Fig. 17). Two very tight constrictions occur within lower Soquel Canyon. At 760 m there is a constriction that narrows to as little as 5 m width, which is ∼30 m deeper than its adjacent sides (C, Fig. 17). Another similarly narrow constriction occurs at 790 m water depth (C, Fig. 17). Observations made on Tiburon dive T235 (conducted by H.G. Greene in ∼800 water depth) revealed that the walls of the incised canyon at these constrictions are composed of massive competent rock, which the ROV was unable to sample. The Wagner et al. (2002) geologic map indicates that a Tertiary volcanic unit occurs in this area. The western edge of lower Soquel Canyon contains two morphologic features that resemble submarine plunge pools (Lee et al., 2002b). They are nearly circular, closed depressions with a diameter of ∼300 m (PP, Fig. 17). They are aligned along a north-northeast–south-southwest trend parallel to the canyon axis spaced ∼500 m apart in a branch of Soquel Canyon. The deeply incised channel of Soquel Canyon bypasses the plunge pools. The multibeam bathymetry reveals that the characters of the southeast and northwest flanks of Soquel Canyon are different (Fig. 16). The southeast side is covered with comparatively smooth sediment drape with only an occasional exposure of what appears to be bedded strata. In contrast, most of the northwest side is a rugged topography with numerous deeply dissected gullies filled with recent sediments. The confluence of Soquel Canyon with Monterey Canyon occurs in a water depth of 960 m (Fig. 8), forming a 200-m-deep, ∼100-m-wide broad embayment on the north side of the canyon. The gradient in Monterey Canyon does not change, nor is there a break in the pattern of the CSBs within the incised channel at the intersection of Soquel Canyon. Seafloor within Monterey Canyon forms a smooth gentle slope that extends beyond the confluence without a noticeable change in the character of the axial channel. Chirp subbottom profiles show that the canyon floor fill in upper Soquel Canyon is associated with discontinuous horizontal reflectors, which continue through the depth resolved in these profiles (Fig. 21D). These reflectors suggest that the axial channel is filled with subhorizontal layered sediments that are laterally discontinuous. High-Resolution Bathymetry of Lower Carmel Canyon and Monterey Canyon Confluence Carmel Canyon joins the southern side of Monterey Canyon at a water depth of ∼1950 m (Fig. 14). Carmel Canyon heads at the shoreline in Carmel Bay in close proximity to the mouth of the Carmel River (Fig. 1). However, the AUV surveys covered only the lowermost 3 km of Carmel Canyon from below 1680 m water depth to the confluence with Monterey Canyon (Fig. 11; Supplemental Map 4 [see footnote 1]). The AUV multibeam images show two distinct trains of CSBs in Carmel Canyon between 1730–1850 m and 1900–1920 m water depths (CSB; Fig. 11). These trains of CSBs are similar in amplitude and wavelength to those that occur throughout most of the incised channel of upper Monterey Canyon. The coalescence between Carmel and Monterey Canyon occurs within the San Gregorio–Palo Colorado fault zone (Fig. 1) and the orientations of distinct linear scarps (LS, Fig. 11) along the canyon walls have been used to map this fault system (Greene, 1977). The orientation of the last segment of Carmel Canyon (Figs. 11 and 14; Supplemental Map 4 [see footnote 1]) and its main trend (Fig. 2) are parallel with Monterey Canyon at their confluence, but opposite in slope direction. The confluence area is one of the few sections where the incised channel of Monterey Canyon is smooth and without CSBs. Down canyon from the confluence the seafloor becomes rougher and CSBs reappear (Fig. 14). Soquel and Monterey Canyons Thalweg Comparison The high-resolution multibeam bathymetric data show a considerable contrast in the morphology of the axial channels within Monterey and Soquel Canyons. Soquel Canyon has thalweg gradients that range from 3° to 7° (Fig. 20). Steeper slopes occur within lower Soquel Canyon below 650 m where tight constrictions in the incised channel occur and outcrops of indurated host rock are exposed on the canyon walls. The thalweg in upper Monterey Canyon is distinctly less steep, averaging 1.6° between 160 m and 1216 m water depths (Fig. 20). Over this section of the Monterey Canyon our trace of the thalweg is essentially linear (R2 = 0.999). The slope within the narrow constriction that bypasses the Navy slump is 3.7° between 1290 m and 1432 m water depths. Below this constriction, the slope of the thalweg averages 2.3° between water depths of 1470 and 1756 m. Changes in Seafloor Texture along the Canyon Walls The textures observed in the high-resolution multibeam bathymetry from the canyon walls reveal the distribution of exposed outcrops. The change from the characteristically smooth seafloor texture (indicative of sediment drapes) near the heads of Monterey and Soquel Canyons to rougher textures (indicative of strata outcrops) further offshore is attributed to diminished sediment drapes with distance from the primary nearshore sediment sources, including the outflow from the Salinas and Pajaro Rivers (Paull et al., 2006). Asymmetries in the roughness of the canyon sidewalls are also noticeable in the segments where the meanders in their axes trend approximately north-south and parallel to the shoreline (Figs. 11 and 16). These asymmetries are attributed to variations in the sediment supply from nearshore sediment sources, which preferentially bury the eastern walls of these canyons and leave more sediment-bare rock outcrops exposed along their western flanks. Exposure of Host Strata The textures observed in the multibeam bathymetry from the lower walls of Monterey and Soquel Canyons also show areas of bedrock outcrops and reveal trends consistent with the exposure of increasingly competent host-rock lithologies with depth. There is no evidence of bedrock exposures occurring on the seafloor of the axial channel of Monterey Canyon shallower than 900 m water depths, and the canyon walls are largely draped with recent sediments (Supplemental Map 2 [see footnote 1]). In a few places older strata of the Purisima Formation or Santa Cruz Mudstone (Wagner et al., 2002; Powell et al., 2007) may be exposed or occur in subcrop, but they are poorly lithified and easily eroded formations. The canyon wall forming the interior bend of the meander at 900 m water depth (BS, Fig. 7) is mapped as being composed of lithified diatomites of the Monterey Formation (Wagner et al., 2002), moderately competent rocks that are erosion resistant (Garrison and Douglas, 1981). A few blocks of material protrude from the axial channel fill that could be either outcrops or debris from the canyon walls (CFTH, Fig. 7). The massive outcrops on the walls of lower Soquel Canyon (Fig. 17; Supplemental Map 5 [see footnote 1]) are composed of graywackes and peridotites, presumably part of the Franciscan Formation (Wagner, et al., 2002; Wentworth et al., 1984). Below 1060 m water depth (BS, Fig. 9A) occasional large blocks of strata of unknown age rise above the axial channel fill. Here the host rock is believed to be sedimentary in origin and the AUV multibeam data show what appears to be outcrops of gently tilted bedding surfaces (BS, Fig. 9A). These exposures of stratified rock could be either in place or huge blocks of material that have fallen onto the canyon floor. However, the broadly consistent orientation of apparent bedding between 1060 m and 1280 m suggests that these outcrops are part of a coherent stratigraphic sequence that extends intact into the subsurface under the canyon. Further down Monterey Canyon, the feature referred to as the Navy slump forms the most distinct and longest constriction in the axial channel (C, Fig. 10A). Multibeam data show that the surface of the Navy slump has numerous open, headless gullies that appear to be developed along jointing planes or faults in well-indurated rock (Fig. 10B). The name Navy slump implies that it is a large slump mass that has fallen off the canyon wall and partially dammed the canyon; however, an alternate interpretation is that this feature was formed by differential erosion of rocks juxtaposed by movement along the Navy fault zone (Fig. 2; Supplemental Map 4 [see footnote 1]). Upstream of the Navy slump canyon floor topographic highs are layered, suggesting a sedimentary origin for host rock in this portion of the canyon; the Navy slump is the first known occurrence of Salinian granodiorite in the canyon. Salinian granodiorites continue to crop out down canyon and around the major meander bend to where the San Gregorio–Palo Colorado fault zone crosses Monterey Canyon in ∼1900 m water depth (Figs. 2, 11, 13, and 14; Supplemental Map 4 [see footnote 1]). Insight into Canyon Carving The high-resolution multibeam images of Monterey and Soquel Canyons provide a snapshot of the morphology of the axial channels and lower walls of these canyons. This snapshot provides some insight into the ongoing erosional processes shaping the seafloor and their potential long-term impact on canyon morphology. Erosion within Monterey Canyon The documentation that multiple sediment transport events have occurred recently in Monterey Canyon shows that it is an active sediment transport conduit (Smith et al., 2007; Xu et al., 2002, 2004, 2008; Paull et al., 2003, 2005, 2009, 2010). The significance of the recently observed events for canyon incision is less clear. Outcrops of the host rocks into which Monterey Canyon is cut occur intermittently along the walls of the canyon and occasionally protrude through the sediment fill within the axial channel below 900 m water depths (Figs. 7 and 9–14). ROV observations show that these exposed outcrop surfaces are scoured (Fig. 18D), and the lack of colonization by encrusting organisms also indicates recent abrasion (Paull et al., 2009). While turbidity currents that scour and undercut the canyon walls will act to increase the width of the canyon, locally steepen the canyon walls, and even stimulate slumping on the canyon walls, this process will not directly contribute to increased canyon incision where the host rocks are covered with fill. In order to increase the canyon incision the host rocks underlying the axial channel need to be directly exposed to the erosive forces (Baztan et al., 2005). The majority of the seafloor of Monterey Canyon is currently covered with coarse-grained sediment fill (Paull et al., 2005). Unfortunately, the thickness of the canyon floor fill and the depth to the contact between the canyon fill and the preexisting country rock into which Monterey Canyon is carved are unknown. Neither surface ship seismic reflection profiles nor AUV chirp subbottom profiles have imaged the base of the canyon axis fill. If the fill is only a relatively thin veneer overlying the pre-canyon host rocks, periodic scours may reach through this cover and erode into the host rocks. In this case, canyon incision may be an ongoing semicontinuous process affecting many small segments of the canyon at different times, not dissimilar to the progressive erosion in terrestrial incised valleys (Blum and Tornqvist, 2000; Strong and Paola, 2008). The thickness of the unconsolidated sediments of the canyon fill in upper Monterey Canyon can be estimated by projecting the canyon walls downward into the subsurface. Projections of the sidewall slope could accommodate as much as ∼30 m of fill (Paull et al., 2005). If the present sediment fill is both immobile and thicker than the level that the common events scour, the presence of the fill will insulate the underlying host rocks from erosional downcutting. Thus, while Monterey Canyon is currently an active sediment transport conduit, the observed gravity flow events may not be effective for cutting the canyon into its host rocks. If there are times when the volume of canyon fill is reduced substantially, allowing scours within periodic gravity flow events to cut into the host rock, it is unclear under what conditions this occurs. Conversely, there may be movements within the sediment fill that erode the host rocks without requiring their exposure on the canyon floor (discussed in the following). Erosion within Soquel Canyon The high-resolution multibeam data from Soquel Canyon reveal an erosional history different from that of Monterey Canyon. The seafloor of upper Soquel Canyon is relatively smooth, and covered with relatively fine grained layered sediments out to 610 m water depth (Fig. 21D), suggesting that upper Soquel Canyon is not currently undergoing erosion. The absence of coarse-grained sediment is presumably because the mid-shelf position of Soquel Canyon head leaves it isolated from direct access to a supply of sand associated with the beach and nearshore environment. Below 610 m water depth, the longitudinal gradient becomes steeper (Fig. 20), sediment cover decreases, and outcrops become more abundant toward the confluence with Monterey Canyon. Deep incision of the channel into host rock occurs between 750 m and 850 m water depths. Arcuate features on the canyon walls cut into the pre-canyon host rocks suggest the importance of sediment failure on the development and enlargement of Soquel Canyon (AF, Fig. 17). The series of closed depressions similar to submarine plunge pools described by Lee et al. (2002b) (PP, Fig. 17) and scours described by Normark et al. (2009a) appear to be erosional features. Although the longitudinal gradient in lower Soquel Canyon (to 7°) far exceeds that of Monterey Canyon (∼1.6°; Fig. 20) at the intersection of the two canyons, Soquel Canyon does not appear to be an active conduit for coarse sediment transport. The lower portion of Soquel Canyon shows evidence of deep erosion into its host rock. Whether erosion within the lower portion of Soquel Canyon is ongoing is unclear. However, the long profile shape of Soquel Canyon (Fig. 20) is probably inherited. Monterey Canyon Long Profile The contrast between the long profiles of Monterey and Soquel Canyons is notable (Fig. 20). A 38.7-km-long segment between 160 and 1280 m water depths, where the long profile shape is distinctly linear, has an average slope of ∼1.6°. The long profile shape outlined in Figure 20 smooths out the smaller scale variations associated with the canyon floor bedforms (Fig. 19). The persistent 1.6° average slope of the canyon axis between 160 and 1280 m water depths is the lowest sustained average slope in either canyon. While this segment of Monterey Canyon appears to be pinned by the bedrock control (Mitchell, 2006) associated with the Navy slump at its downstream end (Fig. 10A), this slope is developed within a segment of the canyon that is mostly free of bedrock control (Figs. 4–8). The 1.6° sloping segment of the canyon is where the recurring trains of CSBs are best developed and where the incised portion of the axial channel is covered with coarse-grained event deposits (Paull et al., 2005, 2010). It is curious that this segment of the canyon has had documented sediment transport events at a subannual recurrence frequency. The persistence of the 1.6° slope throughout the most active segment of the canyon floor may reflect equilibrium with respect to modern conditions. Apparently the ongoing sediment transport events within this section of the canyon do not generate sustained average slopes that exceed 1.6°. We speculate that sections of the canyon floor filled with the relatively cohesionless sediments that significantly exceed slopes of 1.6° are more susceptible to periodic failure. The segment within the linear long profile in upper Monterey Canyon differs from the concave profiles characteristic of terrestrial river channels and many submarine turbidite channels (e.g., Pirmez et al., 2000; Kneller, 2003; Pirmez and Imran, 2003; Mitchell, 2005; Gerber et al., 2009). Models suggest that submarine canyons with linear long profiles may reflect a balance between erosion and deposition within the canyon floor (e.g., Gerber et al., 2009). Canyon Floor Bedforms Repetitive trains of large wave-like bedforms have been found in a number of marine settings (e.g., Piper and Savoye, 1993; Lee et al., 2002a; Wynn and Stow, 2002; Spinewine et al., 2009). Understanding the mechanisms responsible for their formation has been a long-standing goal of the geological community. When the CSBs were discovered within the axial channel of uppermost Monterey Canyon, data with adequate resolution to see these features were only available to 250 m (Smith et al., 2005). The existing AUV data show that CSBs occur throughout most of Monterey and Carmel Canyons down to 2100 m, the limit of the existing mapping AUV surveys. However, the less crisp appearance of the CSBs in the multibeam data below the confluence of Monterey and Carmel Canyons suggests that these CSBs are perhaps somewhat older features that have been modified by sediment draping. This observation is consistent with the recurrence interval of transport events within the axis of Monterey Canyon decreasing below 2 km water depths (Paull et al., 2009). The first hypothesis as to the origin of CSBs on the floor of Monterey Canyon proposed that they were sand waves and/or dunes. The CSBs were inferred to migrate along the canyon floor, driven by traction associated with the tidal currents (Smith et al., 2005, 2007; Xu et al., 2008). Large seafloor sand waves are known to form and migrate in areas where the bottom undergoes strong (e.g., >100 cm/s) currents (e.g., Wynn and Stow, 2002). However, in Paull et al. (2010), it was shown that boulder-size objects buried within these features periodically move, the CSBs are formed as en masse deposits, and they lack a predictable internal architecture characteristic of migrating bedforms (e.g., Wynn and Stow, 2002). While some relatively high current velocities have been measured in discrete events within the axis of Monterey Canyon, the maximum daily tidal current is usually considerably <80 cm/s (Xu et al., 2008). Such current velocities are marginal for moving coarse sand, and inadequate for moving gravel, let alone boulders (Hjulstrom, 1935). The inclusion of angular boulders on and within the axis throughout the canyon (Figs. 18F, 18G) is further confirmation that these bedforms are deposited in discrete high-energy gravity flow events. Moreover, the materials within the bed move more than one wavelength (i.e., as much as 900 m) down canyon during individual brief sediment transport events. Thus, the hypothesis that the CSBs progressively migrate due to the tractive forces associated with regular tidal currents was rejected (Paull et al., 2010). Cyclic Steps, Soquel Canyon Plunge Pools, and CSBs Recently the CSBs within the axis of upper Monterey Canyon have been used as examples of bedforms developed by cyclic steps in turbidity currents (Cartigny et al., 2011; Kostic, 2011). The concept that repetitive hydraulic jumps, referred to as cyclic steps, occur within flows where alternations between shallow, swift supercritical flow (Froude number > 1) and thick, tranquil subcritical flow (Froude number < 1) occur was initiated by Parker (1996). Originally, cyclic steps were invoked to explain repetitive bedforms within river channels. Theory, laboratory experiments, and numerical models indicate that cyclic steps in energetic flows can create repetitive bedforms in a variety of environments (Koyama and Ikeda, 1998; Parker and Izumi, 2000; Sun and Parker, 2005; Taki and Parker, 2005; Kostic and Parker, 2006). An understanding of the impact of cyclic steps within turbidity currents on the generation of large bedforms is still developing. In the marine realm trains of scour depressions, erosional scarps, and sediment waves have been attributed to both erosional and depositional processes generated by cyclic steps in turbidity currents (e.g., Lee et al., 2002a; Fildani et al., 2006; Lamb et al., 2008; Normark et al., 2009a; Heinio and Davis, 2009). Numerical models have simulated the formation of repetitive bedforms associated with cyclic steps in overlying flows under marine conditions (e.g., Fildani et al., 2006; Kostic and Parker, 2006; Cartigny et al., 2011; Kostic, 2011). Unfortunately, there are no criteria to definitively identify bedforms generated from cyclic steps in turbidity currents and to confidently discriminate them from bedforms developed by other mechanisms. Moreover, the terminology is confusing, as the term “cyclic steps,” one with a mechanistic connotation, has been applied to both the bedform morphologies and a turbidity flow mechanism proposed to be responsible for their formation. Here we have tried to separate the description of the observed morphologies (i.e., CSBs) from inferences about the processes that may have created them. While the cyclic step theory does not restrict the size of the bedforms that could be generated, most of the features that have been attributed to cyclic steps in marine turbidity currents have wavelengths of ∼500 m and typically occur in sets of 3–6. Many of the published examples are similar in size and morphology to the plunge pool–like features seen in lower Soquel Canyon (PP, Fig. 17). The long-term impact of repetitive cyclic steps occurring in the same location during multiple turbidity flows may generate these plunge pool–like features. Models of Cartigny et al. (2011) and Kostic (2011) illustrate how incremental erosion and deposition stimulated by cyclic steps in turbidity currents can result in the progressive migration of bedforms. The CSBs within the axis of upper Monterey Canyon have been used as examples of bedforms developed by cyclic steps in turbidity currents. Cartigny et al. (2011) compared predictions from numerical models to the data available at the time about CSBs observed in upper Monterey Canyon. The new empirical data presented in Paull et al. (2010) and outlined here extend the range of observations down to 2100 m depth, providing significantly different and more detailed constraints than those that were matched in the existing models. The possibility that CSBs in the incised channel of Monterey Canyon are generated by cyclic steps in turbidity flows cannot be discarded. However, models need to explain the following new observations. The CSBs are developed within thick beds of very poorly sorted debris flow–like, en masse facies lacking a predictable internal architecture. The occurrence of angular boulders on the canyon floor (Figs. 18A, 18B, 18E, and 18F) and observed movements (∼170 m) of large (∼1360 kg) instrument frames deployed on the canyon floor during discrete events (Paull et al., 2010) seems inconsistent with the formation of CSBs by balanced oscillations in the turbidity flow regime over short distances (∼50 m). Abrupt lateral facies changes occur on the margins of the CSBs to the adjacent benches, imposing serious constraints on the thickness of the high-energy component of these flows (Paull et al., 2010). If the cyclic flow theory were to apply here, regular alternations between high-energy turbulent flows capable of transporting boulders and conditions adequately tranquil to allow deposition of thick blankets of debris flow–like, en masse deposits would have to reoccur over just tens of meters. However, the boulder-sized monuments and instruments move multiple CSB wavelengths during what appear to be individual sediment transport events (Paull et al., 2003, 2010). The high-resolution multibeam data presented here also significantly extend the known depth range of CSBs in Monterey Canyon out to 2100 m water depth and show that there are hundreds of CSBs in the incised channel of Monterey Canyon that are associated with a consistent 1.6° slope (Fig. 20). The models of Kostic (2011) depend on the occurrence of a change in slope to set up conditions for generating cyclic steps. The modeling efforts should also consider why the average slope of the thalweg remains consistent at 1.6° over hundreds of CSB cycles. Failures within the Canyon Floor The possibility that sediment failures occur within the floor of Monterey Canyon was introduced to explain CSBs (Paull et al., 2010). Inherent in this concept is that while there may be density-driven flows on the canyon floor, movements also occur within the canyon fill. Such movements may either be occurring along defined slippage surfaces or be associated with liquefaction (e.g., breaching) of the canyon fill. Breaching within weakly cohesive sediments is common in river channels and during suction-dredging operations in unconsolidated water-saturated sands (Van den Berg et al., 2002). Breaching is associated with retrogressive slope failures and produces crescent-shaped scarps. Such scarps propagate upslope. Breaching has been inferred to occur within submarine canyons, notably Scripps Canyon, an arm of the La Jolla Canyon system (Mastbergen and Van den Berg, 2003). CSBs are known to occur in La Jolla Canyon (Paull et al., 2008). The thick, poorly sorted en masse facies observed within the canyon floor are consistent with deposition downslope of retrogressive failures associated with breaching (Paull et al., 2005, 2010). This concept also has the appeal of being capable of accounting for the episodic movements of very large objects without the need to invoke very high current velocities that are not measured in Monterey Canyon. The upslope propagation of these retrogressive failures is not constrained to follow the canyon thalweg. Thus, scarps associated with breaching in the canyon floor can climb up the canyon walls irrespective of the path of individual or repeated turbidity currents. However, failures are more likely to propagate up the channel, where the unlithified coarse sediments are most susceptible to breaching failure (Paull et al., 2005, 2010). Movement within the unconsolidated sediment filling the canyon axial channel may have an impact somewhat analogous to that of alpine glaciers. Erosion into the canyon host rocks will occur if the failures within the canyon floor periodically contact the underlying country rock (Fig. 3C). The subsurface depth affected by breaching failures with the canyon floor is unknown, and may vary between events. However, the contact between the canyon fill and the underlying country rock may be a favored surface. Movement along this interface would inevitably cause erosion of the underlying strata. Thus, canyon incision may be occurring without having to remove the canyon fill and expose the underlying strata. Two areas within the channel of Monterey Canyon contain large bedforms with crests showing reversed curvature (i.e., concave-up canyon crests). Both of these areas are upstream of features that may be restricting down-canyon sediment movement. This observation suggests that RCBs may form where sediments build up (RCB; Figs. 10A, 11, and 12). Some similarity between the RCBs and the surfaces of glaciers and rock glaciers is noted. Both are covered with large angular blocks of material and commonly have large furrows and ridges with a parabolic shape similar to the RCBs (e.g., Swift et al., 2006; Johnson et al., 2007; Harrison et al., 2007; Serrano et al., 2010; Evans, 2010). In the case of glaciers and rock glaciers, the surface material has ridden downslope accommodated by flow within the underlying valley fill, and the ridges develop by compression. If analogous processes occur within the Monterey Canyon floor, it may help explain how large blocks of material can be moved without requiring that turbidity flows with adequate velocity to transport boulders occur regularly within the canyon axis. AF and CSB Similarity The appearance of the CSBs that occur throughout most of the sediment-filled sections of Monterey and Carmel Canyons is similar to many of the AFs that occur on the canyon walls, in that they form crescent-shaped concave down-canyon scarps. The AFs occur at a number of scales. Some are large enough to be easily recognized in the previously collected surface ship bathymetry (Supplemental Map 1–4 [see footnote 1]), whereas smaller AFs are resolved only in the AUV surveys (AF; Figs. 4, 5, 13, 14, 15, 16, and 17). Given their occurrence on steep canyon walls, most workers would interpret the AFs as being slide scars produced by submarine mass failures. The morphology of AFs is difficult to distinguish from the CSBs on the floor of Monterey Canyon (CSB; Figs. 2, 4, 7, and 12) on the basis of bathymetry alone. The similarity suggests that the CSBs may also be slide scars within the incised channel of the canyon. The slightly more distinctive CSB scarps identified here as small knickpoints (Figs. 5A, 6A, 9A, and 19) may be headwall scarps of an individual train of canyon floor failures. In several places within Monterey Canyon, trains of CSBs extend from the seafloor up the canyon walls (CSB; Figs. 10, 13, and 14). This suggests that trains of CSBs may be continuous with AFs on the canyon walls. Where the CSBs extend from the canyon floor up the canyon walls into the presumably more cohesive fine-grained sediments, the slopes typically increase from an average of 1.6° on the canyon floor to 5°–25° (Greene et al., 2002; Paull et al., 2005) on the canyon walls. The locations of many of the AFs on the canyon walls are not directly associated with the outside bends of the channel, which is where gravity driven flow passing down through the canyon might have the greatest impact. Instead, many of these AFs are on the upstream side of the bends, where the impact of failures within the canyon floor propagating upslope would be greatest. Lithologic Control on CSB Occurrence The distinctly steeper slope of the canyon floor where competent bedrock is exposed (e.g., within the narrow constriction that bypasses the Navy slump or in lower Soquel Canyon) is easily attributed to bedrock control. However, over most of the floors of these canyons the slopes of the axial channel may reflect equilibrium conditions between the processes of erosion and deposition. The lithologic composition of channel fill may have significant control over the occurrence of the CSBs. Previously published ROV-collected Vibracore data have shown that where CSBs occur in the incised channels of upper Monterey Canyon and Carmel Canyon the primary lithology is unconsolidated and relatively cohesionless coarse-grained sediment. These sediments are interpreted to be gravity flow–event deposits (Paull et al., 2005, 2010). ROV observations show that debris flow deposits are exposed on the canyon floor within the CSB and RCB fields (Figs. 18A, 18B, 18E–18H). Debris flow deposits characteristically lack internal layering, which is shown by chirp subbottom profiles in Monterey Canyon (Figs. 21A–21C). In contrast, the axial channel in Soquel Canyon is covered with internally layered fine-grained sediment (Fig. 21D) and lacks evidence for internal disruptions associated with gravity flow events (Paull et al., 2005). Fine-grained material such as that found in Soquel Canyon is cohesive at shallow depths. The differences in the average slopes of the sediment filled portions of Monterey and Soquel Canyons may be attributed to contrasting cohesive strength of the sediments. The cohesionless sand and gravel within the incised channel of Monterey Canyon have an increased propensity for failure, resulting in the average slope of ∼1.6°, which is self-maintained. The more cohesive fine-grained sediments in Soquel Canyon stabilize the seafloor and allow substantially higher longitudinal gradients (3°–5°) to occur. Significance of Benches Bounding the Incised Channel of Monterey Canyon Soquel Canyon (Fig. 16) lacks the obvious benches that are common along the sides of the incised channel within Monterey Canyon (B; Figs. 2–8). The acoustic character of the chirp subbottom profiles shows nearly horizontal, thin, and discontinuous reflectors from benches within Monterey Canyon and the entire floor of Soquel Canyon (Fig. 21D). This acoustic characteristic suggests that channel fill deposits underlie the benches on Monterey Canyon and the seafloor of Soquel Canyon. While Vibracore data show that the sediment fill in Soquel Canyon is finer grained than the sediments that cover the benches in Monterey Canyon, these sediments appear to be abandoned channel fill deposits and/or thin turbidites. The benches in Monterey Canyon are areas that have not undergone recent sediment failure events and have not been profoundly affected by the high-energy deposits associated with the formation of CSBs within the incised sections of Monterey Canyon (Fig. 3). Although the benches in Monterey Canyon are in immediate proximity to CSBs, they are notably distinct from the en masse movement and deposition of thick poorly sorted sediments that form the CSBs. These benches may be remnants of older canyon fill or accumulations of thin fine-grained turbidite sequences deposited by high-energy turbidity flow events (Fig. 3). The benches show some similarity to models describing the development of inner levee deposits in the Congo (Babonneau et al., 2010). The MBARI mapping AUV has provided bathymetry of the axial channels of Soquel Canyon and Monterey Canyon in unprecedented detail down to 2100 m water depth. Textures interpreted from these multibeam data indicate that the drape of sediment on the walls of the canyon thins with increasing distance from the head of the canyon and nearshore sediment sources. The Monterey Canyon floor is covered with sediment fill out to 910 m water depth. Below 910 m water depth intermittent outcrops of resistant strata protrude through the channel fill, and in places form constrictions within the incised channel. The detailed bathymetric data show trains of CSBs within the incised channel fill in Monterey Canyon down to at least 2100 m water depth and in places on the lower sidewalls of the canyon. Similar CSBs occur on the seafloor of lower Carmel Canyon, but not in Soquel Canyon, which has a smooth seafloor. Both Monterey and Carmel Canyons are currently active conduits for coarse-grained sediment transport, whereas the seafloor of Soquel Canyon comprises fine-grained sediments and does not appear to be an active conduit for sediment transport. The CSBs occur on areas of low slope (∼1.6°) and where the canyon fill consists of cohesionless sand and gravel. Where CSBs are absent, the canyon floors are smooth and filled with horizontally layered sediments. We hypothesize that the nature of the fill (weakly cohesive sand and gravel versus cohesive fine sediments) within these canyons controls where and whether CSBs form. The walls of Monterey and Soquel Canyons have numerous arcuate features, which by morphological appearance are identified as slide scars. The distinction between the arcuate features on the canyon side and the CSBs on the canyon floor is unclear; they may form a continuum. While the existing paradigm about the processes that occur within submarine canyons emphasizes the importance of turbidity currents and other flows that pass through the canyon, the new multibeam data evidence can be interpreted to indicate that sediment failures are also occurring within the canyon floor fill. Sediment failure within the sediment fill in the incised channel of Monterey Canyon may be an important process in generating the morphology within this channel and for moving sediments, including boulders, down the canyon. Benches on the margins of the incised channel have been isolated from the sediment failures in the incised channel long enough to accumulate a significant thickness of sediment. The detailed bathymetric data set presented here is a critical step in the exploration of these submarine canyons and provides fundamental constraints on the physical processes that are important in their evolution. The existence of many of the morphologic features illustrated and discussed in this paper was unknown less than a decade ago, and this paper greatly expands their known extent. However, the multiple hypotheses about the dynamic processes responsible for generating the observed morphologies can be inferred from static images of the seafloor. Distinguishing between the various hypotheses to explain the origins of the observed features, even with the highest resolution bathymetry and subbottom profiler data, is difficult (e.g., Duarte et al., 2010). Facies data help constrain the possibilities, but only present a static view that needs to be interpreted to infer the actual processes of deposition. Modeling of these features is under way, but ultimately can only differentiate what could or could not happen given the assumptions. Unfortunately, few data on the physical conditions during these events are available to constrain models. Ultimately direct measurements of the physical processes that erode and deposit material within submarine canyons within the episodic sediment events need to be made in situ. The David and Lucile Packard Foundation provided support. Special thanks to the crew of the R/V Zephyr and the Monterey Bay Aquarium Research Institute Autonomous Underwater Vehicles (MBARI AUV) Operations Group. The paper benefited from the thoughtful review comments of Roberto Gwiazda, Roger Urgeles, and an anonymous reviewer. We especially acknowledge the enormous impact the late Bill Normark made on the field of marine geology. Bill was involved in the initiation of the AUV mapping program within Monterey and other submarine canyons.
<urn:uuid:1b574721-3237-4987-b0b2-325be1cc124a>
CC-MAIN-2022-33
https://pubs.geoscienceworld.org/gsa/geosphere/article/7/5/1077/132468/High-resolution-bathymetry-of-the-axial-channels
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00265.warc.gz
en
0.926903
16,396
2.6875
3
As more and more toy companies continue to flood the market with new and improved ways for kids to learn and interact, the adverse effect could be said when it comes to the plight of blind kids. For example, blind kids are unable to take advantage of all of those wonderful educational toys such as the ones that teach kids how to read, write, count, and spell. Those wonderful pictionary games are out of the reach of blind kids, and learning by seeing is just not in the cards for blind children. This is not really anyone's fault. It is just how the ball bounces and it is practically impossible for us to hold technology back. It could be compared to trying to pin a wave to the golden sand. Not possible. So, with all of this in mind, how can we make it a better world for our blind kids? What can we do in order to try and narrow the gap? A blind kid is no different when it comes to wanting to be a part of technology and play with technology. They like their sighted counterparts yearn to learn, understand, and play. They yearn to interact with the big TV screen just like any other kid and they yearn to be a part of the world of technology. Progress has been made but we need to see more innovation on the part of all stakeholders. If you would like to see what types of games and toys are available to blind kids, look at the games catagory of this blog. I'm Donna J. Jodhan your friendly accessibility advocate wishing you a terrific day. If you'd like to learn more about me, then you can visit some of my blog spots at: Donna Jodhan! Advocating accessibility for all: http://www.donnajodhan.blogspot.com Weekly Saturday postings on issues of accessibility: http://www.sterlingcreations.ca/blog/blog.html blogs on various issues and answers to consumers concerns: http://www.sterlingcreations.com/businessdesk.htm
<urn:uuid:e65bc761-af60-4e15-8840-50821869e59c>
CC-MAIN-2017-04
http://www.fredshead.info/2012/06/technology-barriers-for-blind-kids.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00062-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953269
419
2.546875
3
Van Wilder L, Pype P, Mertens F, Rammant E, Clays E, Devleesschauwer B, Boeckxstaens P, De Smedt D. Living with a chronic disease: insights from patients with a low socioeconomic status. BMC Fam Pract. 2021 Nov 18;22(1):233. doi: 10.1186/s12875-021-01578-7. Background: Little is known about how patients with low socioeconomic status (SES) experience their chronic disease, and how it impacts health-related quality of life (HRQoL). Compared to their more affluent counterparts, worse outcomes have been reported. A better understanding of the domains of HRQoL that are relevant to these specific populations is therefore needed. We explored the experiences of living with a chronic disease in low SES persons. Methods: A qualitative interview study was performed in Flanders, Belgium. Semi-structured interviews were conducted in chronically ill patients, selected through purposive sampling. Interviews were audio-recorded and transcribed verbatim. Analysis followed an inductive and iterative approach. Results: Fifteen patients were interviewed. Six major themes were identified: a heavy bag to carry, loss of autonomous life, inner and outer loneliness, emotional imbalance, unmet need for support, and coping strategies. Patients experienced their illness as an additional problem on top of all other problems (i.e. financial/social problems, traumatic life events). In general, the disease burden and non-disease burden were mutually reinforcing, resulting in greater dependency, greater risk of social isolation, greater psychological distress, and greater risk of impaired HRQoL. Conclusions: This study is the first to provide detailed insight into the experiences of living with a chronic disease in low SES persons. A conceptual model is proposed that can be used in daily clinical practice to raise awareness among clinicians and health care providers that the patient's needs go beyond the disease itself. Future research is needed to validate and test the model.
<urn:uuid:a57d865d-fcc6-4d73-adfd-54edccf0410e>
CC-MAIN-2022-33
https://endoflifecare.be/living-with-a-chronic-disease-insights-from-patients-with-a-low-socioeconomic-status
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00271.warc.gz
en
0.936025
425
1.882813
2
With the opening of the Olympic games in Athens on Friday the archaeology magazines offered in-depth articles on the origins of the world's largest sporting event in their July-August issues. The first competition was in 776BC at Olympia, 200 miles west of Athens. This date is based on a register of Olympic winners compiled by Hippias of Elis in the 5th century BC, explained David Gilman Romano in Odyssey. Although the exact origins have been lost, "there is evidence that the religious cult, and possibly even the athletic culture, may be even older. Pottery excavations at Olympia suggest that cult activity in the area of altis - the enclosed heart of the sanctuary - dates from the late 11th century BC. Bronze dedications from the 10th and 9th centuries BC have also been discovered at Olympia, including tripods and miniature charioteers - which may indicate that equestrian games were held at this early date." Olympia was the oldest and the most prestigious of the four great pan-Hellenic festivals. Held every four years, these six-day festivals were "organised in the sanctuaries of the gods", explained André Bernand in Minerva: "Zeus at Olympia and Nemea, Apollo at Delphi, and Poseidon at Isthmia." The Olympia games began with the second full moon following the summer solstice. "To set the date of this festival in relation to astrological factors gave it an increased religious significance," said Bernard. "The Greeks of the Hellenistic period understood how important it was to refer to the stars to legitimise the date of important festivals." The pervasion of religion at the games didn't stop with the celestial dates. The opening day was taken up with religious ceremonies and the Olympic oath, which "was particularly important and created a climate of solemnity, sobriety and calm". After four days of competing -including running, wrestling and the pentathlon - the victors were awarded olive wreaths ornamented with bands. They then formed a procession with the priests and gathered in front of the altars for a ceremony that finished with prayers and sacrifices. The games were "first and foremost intended as a tribute to the gods", said Bernand. "Participants, spectators and organisers made a kind of pilgrimage in order to reach these competitions and sometimes travelled long distances." In Archaeology, Jarrett A Lobell examined why the 2004 games in Athens were so important to the hosts and how they were using archaeology and history as a way to redefine Greece as a modern nation. "Using artefacts and monuments that make up a culture's collective past is a powerful way to strengthen and present national identity." The games have also been a boon to reviving that heritage. "Different kinds of projects have been the beneficiaries of the Olympic energy and money." One of the most ambitious projects in the city "is an effort to link the most significant sites by paved walkways, creating the largest archaeological park in Greece". Although the Greek authorities had been overly ambitious in planning to have every archaeological project - such as the dismantling and rebuilding of the Athena Nike temple - completed by the opening of the games, said Lobell, "the improved museums and the restoration on the Acropolis will last long after the final national anthem is played." The construction of Olympic venues has also uncovered more of Greece's ancient past. "At the equestrian centre in Markopoulo, east of Athens, all work stopped while archaeologists excavated several tombs, a temple to Aphrodite, and the remains of an ancient brothel," said Lobell. "An aqueduct dating from the Hadrianic period was found smack in the middle of the Olympic village - organisers decided to make it the visual centrepiece of the village rather than destroy or rebuild it."
<urn:uuid:004f5cf4-e379-4adf-8695-f235f9927e65>
CC-MAIN-2017-04
https://www.theguardian.com/sport/2004/aug/11/athensolympics2004.athletics
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00060-ip-10-171-10-70.ec2.internal.warc.gz
en
0.9701
795
3.046875
3
Stories are everywhere - in commercials, news, and business meetings because they make us care about the information. Designers also use storytelling skills to create positive user experiences, though it looks a little different when a story is a part of a product. Human brains are built to find and understand stories. Therefore, it’s no wonder that a story can improve UX. UX is all about connecting an experience to a person’s mental model. Let’s review several steps that can help you build a story into your user experience. Identify your genre Before beginning work on a product, it’s essential to identify the genre. But where an author calls it a genre, we might call it a “niche” or a “use case” in UX. This differs from an industry — it’s not enough to create something “for healthcare” or “for finances.” Your product “genre” is the space in which it exists and can make a difference for the target audience. Add context to the experience Context is everything that surrounds us. A UX designer also creates visual context by including headers at the top of screens or breadcrumbs to show someone on a website where they are in the grand scheme of things. Сontextmeans going beyond the moment someone uses your product. Make sure to ask these questions: who is my audience, where do they spend their time, and what were they thinking, feeling, and doing before seeing my product? Follow the hero’s journey A good book — and a good product — has a flow that eventually ends. The author or UX team needs to know what that flow is and how to complete the experience gracefully. Good writing is good editing The same is true with UX. For an author, finishing the story is only the first step. They then work with an editor to get more feedback and make numerous revisions. In UX, we rely on user research, and instead of “revisions,” we have iterations. Usability testing, A/B testing, user research, and prototype testing are all ways to get feedback from the target audience. In UX, we have a significant advantage - digital products can be adapted and improved even after launch. Websites get redesigns, and apps get bug fixes. So to cut a long story short - storytelling is a powerful tool for any UX designer. It will help you to create your product and understand the people who use it.
<urn:uuid:f637e8dc-b992-4e04-971d-aaf9b8dd5cac>
CC-MAIN-2022-33
https://www.codebridge.tech/articles/storytelling-as-the-powerful-tool-in-ux
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00475.warc.gz
en
0.944867
522
2.140625
2
Llangunnor History (Overview) When preparing this section it was very difficult to know where to begin or maybe more appropriately when to begin, that's the problem with history it is constantly being created. Most people will know about the Romans and the Normans but I wonder how many people will know that a castle (Rhyd y Gors) once stood within the boundaries of Llangunnor. No visible remains of this reputed wooden castle can be seen today as the expansion of the railway into Carmarthen with a station at Myrtle Hill (Carmarthen Junction) being opened on 17th September 1852, passing through the site destroying what evidence would have remained. Of course others have looked into the history of Llangunnor and have published these findings which are valuable resources to any historian in fact it is down to these publications that the inspiration to create this online repository came about. Llangunnor by Major Francis Jones In 1965 Major Francis Jones the County archivist for Carmarthenshire gave a lecture to Cymdeithas Sant Cynnwr (Society of St. Cynnwr) about the history of Llangunnor and the resources available to assist in the compilation of a full history of the parish of Llangunnor. The society felt that the end result of Major Francis Jones's research should be preserved and the end result is this book which was first published in 1965 and later republished in 1986. It contains a wealth of information about Llangunnor and since it was first published Llangunnor has seen a number of major changes which have altered the area considerably, with the construction of new housing estates from the mid 1960's and the destruction of Pensarn to make way for the bypass in the late 1970's we can already see that some of the places mentioned have faded from memory, however the book is a great starting point for further research into the parish. We shall be looking at the work of Cymdeithas Sant Cynnwr in more detail elsewhere on the site.A History of Llangunnor Church by Cyril Treharne A comprehensive history of Llangunnor Church has been written by local resident Cyril Treharne which was published in 1989. Mr Treharne had spent considerable amount of time looking through church and census records and the end result is the first book that gives a very detailed look at many different aspects of the history of Llangunnor church and those locals associated with it. The book looks at the memorials in the church and with a handy map gives information regarding the stained glass windows, and also looks at some of the interesting memorials which can be found on the gravestones in the churchyard. A Short History Of Llangunnor Church by Reverend James Jenkins An extremely rare 28 paged paperback book which was written and published in 1937 by the incumbent vicar of Llangunnor at the time Reverend James Jenkins. Reverend Jenkins at time the book was published had been at Llangunnor for 25 years and continued to serve the parish until 1959 becoming the longest serving vicar of Llangunnor. The book briefly looks at the various aspects of the history of the church and the graveyard. Only a very basic overview of the history of Llangunnor, we will be looking at various aspects of the history of Llangunnor in the coming months and this section will expand eventually. If you spot any mistakes or have any questions please feel free to get in touch, please contact us
<urn:uuid:6a048894-191f-46e2-8b6b-072297de5188>
CC-MAIN-2022-33
http://www.llangunnor.net/history
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00666.warc.gz
en
0.96537
726
2.59375
3
It consists of a handle with an olivary point at one end, and at the other a plate with transverse ridges. It consists of a long shaft with an olivary point at one end and a spatula at the other. The spathomele and other olivary probes were no doubt often used as small pestles. olivary ol·i·var·y (ŏl'ə-věr'ē) Of or relating to the olivary body. Relating to or shaped like an olive.
<urn:uuid:3b185735-caa2-466b-8eaa-637ff4c0cdf8>
CC-MAIN-2016-44
http://www.dictionary.com/browse/olivary
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00240-ip-10-171-6-4.ec2.internal.warc.gz
en
0.925491
120
2.5
2
Inside Wikileaks, Domscheit-berg 201.1 “Coded language is common in the military and jargon is an intrinsic part of most specialized environments….language like this is perfectly suited to preventing outsiders from getting any insight into what is really going on. There are entire professions that justify their existence only in terms of fluency in a self-referential system…jargon is a fraudulent form of significance, in which the person who is speaking automatically seems to know what he’s doing.” Jargon is a great way to create a discussion chorus. Is it possible to streamline content creation and aggregation. Trying out post-by email to explore this. Time to update my commonplace book. I don’t remember exactly why, but reading Stephen Johnson’s book Where Good Ideas Come From I had a brief recollection of a sort-of-related discussion of advertising and emotion based ads. I could not recall where I read this. I haven’t taken notes while reading for a while and I haven’t transcribed these into my commonplace book (blog) for longer. I could not recall. I’ve continued to keep a list of the books I’ve read. Searching for this discusion was a needle in a haystack. I thought I was on the right track with Secret Life of the Grown-up brain…maybe a discusison of the myth of midlife crisis. A search for early 20th century psychologist turned ad man gave me John B Watson which was a dead end. I couldn’t search Strauch’s book – it’s not available for search on Amazon or Google books. I was resolved to look things up in my book at home…I would have been frustrated. Fortunately I gave my book list one last shot and searched for Frauenfelder’s Made by Hand on Google Books (not avail for search on Amazon). There. Frauenfelder talks about cigarette sales killing ‘making’ and references Bernays, Sigmund Freud’s NNephew. Now how in the heck? Only Google could have given me that. I wouldn’t have taken that note while reading, either. It’s easier to dream than to actually do something. It’s easier to edit than create. Is it just me, or is there a desert background on Google’s home page this morning. I just want my blank white screen back. This sucks. I’m not even logged into iGoogle. When I log in I haven’t found the ‘no image’ option yet. Dang. Godel, Escher, Bach: An Eternal Golden Braid – Hofstadter is an incredibly dense read. It’s light hearted and funny, but at the same time really really tough to read. The book starts by talking of strange loops like: [This statement is false] And goes from there. So, both these statements are true: [I am reading the book] [I am not reading the book] This is no paradox depending on what you mean by ‘reading.’ Another entertaining loop from the book: asking the genie “I wish that you would not grant my wish” A related paradox from How to Survive a Robot Uprising by Wilson, that I’m listening to in the car: “Never show fear. Robots have no emotion. Sensing your fear could make the robot jealous and send it into an angry rage.” 16 notes from hell. After several unsuccessful Google searches for guitar tab for the intro in Final Six by Slayer, I used Audacity to slow down and loop the intro riff and figured it out myself. Here’s what I heard…posted for research only… The guitar is tuned at least a half step down. Asterisks by the notes where I think the bass is playing over the guitar. Eb----------------------------------- Bb----------------------------------- Gb----7---7-----7---7---7-----7---7-- Db------7---6*----5*--7---7-----7---- Ab--5*--------5-------------4-------- Eb-----------------------------------
<urn:uuid:81331c3d-1ea6-4858-9785-0c9bb9f444ec>
CC-MAIN-2016-44
https://futhermet.wordpress.com/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00282-ip-10-171-6-4.ec2.internal.warc.gz
en
0.924046
885
1.5625
2
Anterior Cruciate Ligament RECONSTRUCTION (ACL) Reconstruction in Vail, Colorado ACL injuries are one of the most common knee injuries, especially for athletes who dominate high-demand sports, including soccer, tennis, football, or snowboarding. If you believe you have an ACL injury, you may require ACL reconstruction surgery to regain full function of your knee before returning to physical activities. However, there are non-surgical treatments for elderly or non-active individuals that may alleviate their painful symptoms. The bones that meet and form your knee, including your kneecap (patella), thighbone (femur), and shinbone (tibia), are all connected by four primary ligaments. These ligaments are like strong ropes that hold everything together. The anterior cruciate ligament, or ACL, stretches diagonally in the middle of the knee, which allows rotational stability and prevents the tibia from sliding in front of the femur. When the ACL is injured, orthopaedic surgeons classify it as a “sprain” and grade it on a severity scale to determine the best treatment course. Most cases of ACL injuries result in complete or near complete tears, and partial tears are generally rare. If you have an ACL injury, you may experience one or several of the following symptoms: - “Popping” noise of the knee - Weakness or looseness of the knee - Knee giving out from under you Depending on the severity of your ACL injury and your age and lifestyle, treatment options will vary. If you are an athlete that is desperate to return to training, you will most likely require surgery to recover safely and efficiently in the shortest time possible. Completely torn ACLs generally are unable to heal without surgery. However, non-surgical treatments may be helpful for individuals with low activity levels or elderly patients. Non-surgical options may include bracing to stabilize the knee and physical therapy. The rehabilitation program will focus on restoring knee strength. It is necessary for the muscles around the knee, specifically the hamstring muscles, to be strengthened after an ACL injury. Then the reinforced muscles can take some support off the injured ACL’s duties of stabilizing the knee. In any case of non-surgical ACL recoveries, an ACL brace will be administered to decrease the chance of knee instability. Patients who opt for non-surgical treatments are at more risk for a recurrent injury, or other injuries including meniscus tears. ACL reconstruction is usually not performed right away unless it is a treatment for a combined ligament injury. Waiting for ACL reconstruction provides time for inflammation to subside, quadriceps muscles to function, and allows a restoration of motion before surgery. Delaying the surgery can significantly reduce the risk of arthrofibrosis, or scar forming in the joint, which may lead to loss of knee motion. ACL Reconstruction Surgery – - Rebuilding the ligament – Since the ACL is unable to be sutured, or stitched back together, the ligament needs to be surgically removed and replaced with another soft tissue to allow proper knee function. During ACL reconstruction, Dr. Hackett utilizes a tissue graft to act as the new ACL ligament. There are many areas where grafts can be taken from autogenous (from the patient), including the patellar tendon, hamstring tendons, or in some cases, quadriceps tendons. However, the patellar tendon is most popular among surgeons because it is large and strong and has bone fragments at each end, which are attached to the femur and tibia. This allows for bone-to-bone healing. For all graft sources there are pros and cons, and a consultation with Dr. Hackett is necessary to determine which graft choice would be optimal for your recovery. Since regrowth takes time, it may take six months or longer before patients can return to strenuous activities. - Procedure – ACL reconstruction surgery is generally performed with an arthroscope, or a tiny endoscopic camera through minimalistic incisions, which is a less invasive surgical method. This technique provides benefits such as less pain and a quicker recovery time. During the procedure, the torn ACL is removed, and the graft is attached through holes made in the thighbone and shinbone. After the graft is put in place, it is held by screws or other devices to allow proper growth and healing. Then the incisions of your surgery are closed. In any case of treatment, rehabilitation and physical therapy play a critical role in helping you return to your daily activities. Physical therapy programs help restore knee strength and motion. In the case of ACL reconstruction, physical therapy focuses on returning movement to the surrounding muscles and knee, which is followed by a strengthening treatment to maintain and protect the new ligament. Finally, in the last step of rehabilitation the methods are customized for a safe return to the athlete’s sport.
<urn:uuid:c67e1f49-b46c-4afd-ab6c-59090aa51478>
CC-MAIN-2017-04
http://doctorhackett.com/anterior-cruciate-ligament/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00050-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936022
1,021
2.1875
2
The mineral matter of coal contains a number of inorganic constituents. which play an important role in almost all coal utilisation systems. Some techniques have been applied to coal to separate its mineral matter from its organic part. In this study, an alternative method was applied to separate the mineral matter content of a Turkish lignite. For this purpose, Goynuk lignite was treated, in sequence, with acetic acid, ammonia, hydrochloric acid, hydrofluoric acid and nitric acid at 70 degreesC for 60 min in order to remove individual mineral species. After each stage, the lignite was treated with performic acid, the product of reaction between hydrogen peroxide and formic acid, at 50 degreesC. The organic coal matrix was decomposed as a result of performic acid oxidation, and consequently, the recovered mineral species were isolated. Ammonia, which has the potential of chemical comminution, was used to increase the effects of the subsequent reagents and enhance the extent of separation between the organic and inorganic phases. In each mineral matter removal stage, the lignite was treated with the reagents of the previous stage, and then, a new reagent was added to investigate whether the last stage has a different effect on the mineral species. FT-IR and X-ray diffractometry techniques were used to determine the constituents of the isolated mineral matter after each stage. (C) 2001 Elsevier Science Ltd. All rights reserved.
<urn:uuid:43d86627-1faf-4349-b5b4-728e42e13986>
CC-MAIN-2022-33
https://avesis.itu.edu.tr/yayin/5276d7ce-54e9-43a0-9863-d12c87db5eba/stepwise-demineralisation-and-chemical-isolation-of-the-mineral-matter-of-goynuk-lignite
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00669.warc.gz
en
0.966508
300
2.40625
2
Social City - follow up Dorea Educational Institute, not for profit organisation offering training solutions for people in need as well as working professionals throughout Europe and the largest training provider of ERASMUS+ courses in Cyprus organized one day workshop of duration 8 working hours as follow up activity for Training course Social City (10 days training implemented in Slovakia in frame of Erasmus+ programme). 12 Youth workers from Limassol aged between 21 - 35 years old, participated in this activity, in order to widen their knowledge about Non-Formal Education tools and methods related to promotion of Social Inclusion and Active Citizenship. The topic – aims and objectives of TC Social city were presented briefly. Leaders of the sessions Nazar Meliuh & Oleksandra Seredynska provided participants with 3 NFE workshops related to the Social inclusion, urban marginalization and marginalized youth. Participants started with brainstorming about the topics creating laboratory of ideas and then shared their experience and opinion on this matter. Later on participants had a possibility to elaborate their own social campaign that should attract the attention of public towards the presented issues. Outputs of the activity were 4 different social campaigns exposed in Dorea office. Facilitators together with participants decided to continue with this sessions also in the future. The plan for next workshop is to address 25 different youth workers and after that involve local youth.
<urn:uuid:5886975a-7713-45a3-8bd4-f2969844a927>
CC-MAIN-2022-33
https://youthfullyyours.sk/sk/blog-ci-vlog/social-city-follow-up/social-city-limassol/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00277.warc.gz
en
0.953505
277
1.742188
2
This booklet (2005), designed for young adults who are turning 18 years old, provides basic information on the new rights and responsibilities they have upon becoming an adult in the eyes of the law. It provides brief answers to some of the questions that young adults may have about their rights and responsibilities and additional resource information. Schools are eligible for free copies. Anyone from the public may purchase a copy $2 each. To place an order, please contact Carolyn Gravit at 303-824-5323 or email [email protected]. For a summary of the topics covered in each section and to download the information, please click on the section title below. Where You Live On The Job You're Under Arrest On the Road (Motor Vehicles) At the Store Resources and Reprint Permission
<urn:uuid:c6a68fe8-92ab-4bcb-9dc0-86c402801b8f>
CC-MAIN-2017-04
http://www.cobar.org/For-the-Public/So-Youre-18-Now-A-Survival-Guide-for-Young-Adults
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00169-ip-10-171-10-70.ec2.internal.warc.gz
en
0.867863
170
1.804688
2
Disusage presents the contradictions and foibles of usage manuals, style guides, and the quirky folks who love them. This week: elegance — variously a virtue and a vice. variation. It is the second-rate writers, those intent rather on expressing themselves prettily than on conveying their meaning clearly, and still more those whose notions of style are based on a few misleading rules of thumb, that are chiefly open to the allurements of elegant variation. Thackeray may be seduced into an occasional lapse (careering during the season from one great dinner of to another of eighteen guests—where, however, the variation in words may be defended as a setting off of the sameness of circumstance); but the real victims, first terrorized by a misunderstood taboo, next fascinated by a newly discovered ingenuity, and finally addicted to an incurable vice, are the minor novelists and the reporters. There are few literary faults so widely prevalent, and this book will not have been written in vain if the present article should heal any sufferer of his infirmity. —from Fowler’s Modern English Usage, 2nd edition, 1965 elegant. adj. [elegans, Latin] 1. Pleasing with minuter beauties. Trifles themselves are elegant in him. Pope. 2. Nice; not coarse; not gross. —from Samuel Johnson’s A Dictionary of the English Language, 1755 elegant. a. [L. elegans, -antis; akin to eligere to pick out, choose, select: cf. F. élégant.] 1. Very choice, and hence, pleasing to good taste; characterized by grace, propriety, and refinement, and the absence of every thing offensive; exciting admiration and approbation by symmetry, completeness, freedom from blemish, and the like; graceful; tasteful and highly attractive; as, elegant manners;elegant style of composition; an elegant speaker; an elegant structure. A more diligent cultivation of elegant literature. Prescott. 2. Exercising a nice choice; discriminating beauty or sensitive to beauty; as, elegant taste. —from Webster’s Revised Unabridged Dictionary, 1913 Fowler devised the name “elegant variation” for the ludicrous practice of never using the same word twice in the same sentence or passage. When Fowler named this vice of language in the 1920s, elegant was almost a pejorative word, commonly associated with precious overrefinement. Today, however, the word has positive connotations. E.g.: “This book is exceedingly well edited, and several essays are elegantly written.” Lest the reader think that the subject of this article is a virtue rather than a vice in writing, it has renamed unambiguously: inelegant variation. —from Garner’s Modern American Usage, 3rd edition, 2009 Have an aspect of usage you want examined? Email me. Image via Every reform movement has a lunatic fringe.
<urn:uuid:16dbd75d-f379-4dd4-96bc-eb3dde3c7c43>
CC-MAIN-2016-44
http://airshipdaily.com/blog/disusage-inelegance
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00116-ip-10-171-6-4.ec2.internal.warc.gz
en
0.899685
659
1.90625
2
- Chat & Instant Messaging - ファイルサイズ: 1850 KB - 価格: $45 - ダウンロード: 11 - 作者: SendSMSMessages.net Blackberry Mobile Phone SMS Messaging Tool helps the users to increase the company sales and earnings by marketing the products and services through text messaging. Following steps explain the full working of the bulk messaging software- Step 1: Import the contacts in the software from various sources like text file, excel file or add numbers manually. Step 2: With the help of excel file, user can directly import the contact numbers along with the messages or create the personalized dynamic messages on the basis of the file contents. Step 3:Software provides update selected messages option and apply this message to list items options to update the existing text messages 1)In first option, select list of contact numbers, set a new message in each contact number and then update it by clicking on apply to selected numbers option. 2) In second option, write a new message in message composer box and apply it to all list items, selected list items or blank list items. Step 4: Click on skip duplicate numbers option to automatically skip all duplicate number entries during message sending process. Step 5: Control the load of bulk SMS broadcasting by selecting the Delayed Delivery option in which user can pause multiple SMS for specific time. Step 6: Prevent some contacts from receiving text messages by excluding it with the help of exclusion list wizard option. Step 7: If user wants to forward the sent messages to other contact numbers without modifying it, then save the messages as a template by clicking on save sent messages to templates option Step 8: Click on send option to start the SMS sending process. * Forward Bulk text messages via blackberry mobile phones connected with PC. * Connect with the family, friends, customers etc. by transferring text messages. * Send bulk text SMS without any technical knowledge or skills. * Send the bulk text messages in the form of job alerts, business news, notifications, and much more.
<urn:uuid:91a7fd48-ea17-4c08-bfb4-9601cb635f9b>
CC-MAIN-2022-33
https://www.downloadnice.com/shareware/software/?Blackberry%20Phone%20SMS%20Messaging%20Software-36586.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00671.warc.gz
en
0.715784
488
1.625
2
Themes often help to create a whole story line. tend to use the same themes in their writing. the themes they use may change due to how the writers have . changed. Some writers use the same themes in all of their writing, . but others tend to use many different themes. In her writing, . Louisa May Alcott touched upon various different themes. The early writings of Louisa May Alcott were rarely . recognized. In the first phase of her writing, 1840's-1860's, she . wrote some short stories. Most of them featured a mysterious, . vengeful woman bent on manipulation and destruction (Schafer 1). . Common themes that Louisa often used included self-sacrifice, . duty, charity, self-reliance, and patients. She also touched the . surfaces of jealousies, fears and frivolities (Durbin 1). A lot of the . stories Louisa wrote early on she never really put her name too. . She also wrote children's stories and was mostly know for these. . "Flower Fables, the first volume that she put her name on, were . stories and poems that were moral fables, rather windy and . obvious but emotionally revealing" (Saxton 192). Most of . Louisa's early works touched upon these themes along with . domestic life in the nineteenth-century and maturing adolescent. . These themes are what Louisa's early writings were based . In the early writings the themes used tend to come from . some point of Louisa's. "Louisa's world works with clocklike . moral regularity" (Saxton 4). With Louisa's father being very . critical of her work, she tried her hardest to write to his approval. . She used her own life experiences for her writing. She took what . she knew and what she likes and used them to write, which showed . in the themes. Her stories defied nineteenth-century values of . womanhood again brought on by how she was treated by her father . (MacDonald 10). She would also indulge her passions in her .
<urn:uuid:09606f73-d4b9-4b53-936d-e578bf73523e>
CC-MAIN-2022-33
https://www.exampleessays.com/viewpaper/89994.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00465.warc.gz
en
0.983797
466
3.390625
3
The main symbol of the school's commitment to community action is the Whole School Community Day which takes place on the Wednesday of the final week of the Summer Term. On this day every boy and member of staff is involved in either community or charity based activities. In July 2012 the school hosted 1,300 pupils from 28 local Primary Schools in a mini-Olympiad, organised, run and delivered by staff and boys to promote the school’s contribution to the Olympic legacy programme, a contribution which the British Olympic Association (BOA) used as an example of good practice in this field. The visiting children enjoyed a vast range of sporting, artistic, musical and academic challenges, culminating in a vast parade of nations, the massed-choirs singing anthems written for the day by Tonbridge boys, and the awarding of over 500 medals. This was followed in the evening by a 5k charity fun run with boys and local residents taking part together, many in fancy dress, which raised a considerable sum for a small local charity. Watch the videos from recent Community Days:
<urn:uuid:088408f1-7a79-42bc-9fb7-4b3883a413f8>
CC-MAIN-2017-04
https://www.tonbridge-school.co.uk/community/whole-school-community-day/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00557-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947294
221
1.757813
2
Two weeks before the Memphis premiere of Charles S. Dutton's one-man show Goodnight Mr. Wilson, Cookie Ewing, the Rhodes College theater professor recently honored by the Memphis Arts Council with a lifetime achievement award, sat in her office and worried. Would the McCullough Ballroom be too large and impersonal for the celebrated actor's intimate tribute to August Wilson, the Pulitzer Prize-winning author of Fences, The Piano Lesson, Two Trains Running, and Ma Rainey's Black Bottom? Or would Rhodes' McCoy Theater, a 200-seat black box, be too small? Ewing wants to see Memphis turn out for "The August Wilson Celebration," a four-day festival conceived by the Hattiloo Theatre's executive producer Ekundayo Bandele and produced with the assistance of Rhodes College and the University of Memphis. But she worries. And so does Bandele. "I had a friend ask, 'Who is August Wilson?'" Bandele says, a hint of frustration in his voice. "And this was an educated person with a post-graduate degree." In spite of his obvious accomplishments, Wilson's brand penetration is hard to gauge. He was born and reared in Pittsburgh, and his major works were produced in Seattle before moving to New York. Although The Piano Lesson was adapted for television by PBS, none of Wilson's plays were ever adapted to the big screen. And with the exception of Fences and Ma Rainey's Black Bottom, his groundbreaking plays chronicling the urbanization of black culture in America have rarely been produced in the Memphis area. "But why not Memphis?" Ewing asks, considering the author's legacy. "Wilson's plays may be set in Pittsburgh, but they were all influenced by the blues. His characters have come up through Mississippi at some point. That's why we're putting together the trip to Clarksdale. That's why Joyce Cobb is going to talk about August Wilson and the blues. "Wilson also was influenced by the [Harlem] painter Romare Bearden," Ewing says. "And Rhodes has Professor David McCarthy who is an authority on Bearden's work." "We live in a world where most people, when they think of black theater, think of Tyler Perry," Bandele says. "Wilson was the counterbalance to that kind of theater. He is the equivalent of Richard Wright." Bandele and U of M African-American literature professor Ladrica Menson-Furr have collaborated on a project called "The August Wilson Songbook," an 11-song revue exploring Wilson's work through music and scholarship. "We've got one opening song and a song for every play in the cycle," Bandele says. "We're using songs like Ma Rainey's 'Prove It on Me' and W.C. Handy's 'Joe Turner Blues.' For Fences, we're going to do the song 'Did You See Jackie Robinson Hit That Ball.'" Bandele and Menson-Furr had hoped to include excerpts from Wilson's plays but were unable to secure the rights. "We wanted to perform a scene, then have some commentary but were told that even if we used an excerpt we'd have to pay the full royalty for every play we referenced," Bandele says. "I can't remember how much it was going to cost us, but it was a lot." A staged reading of Wilson's Gem of the Ocean was also canceled due to ongoing problems with the Wilson estate. In spite of minor frustrations and setbacks, "The August Wilson Celebration" kicks off Wednesday, September 19th, at 8 p.m. with a solo performance by Charles S. Dutton at Rhodes' McCoy Theater. On Thursday, September 20th, at 6 p.m., Sandra Shannon of Howard University delivers the keynote address at the U of M's Rose Theater, followed by selections from "The August Wilson Songbook." Friday, September 21st, begins with a 10 a.m. lecture on "Location, Regionalism, and the Delta's Influence on August Wilson's Characters" at the McCoy Theater. The day culminates with a staged reading of Joe Turner's Come and Gone at Art Village Gallery, 412 S. Main. There is also an 11 a.m. bus tour to Clarksdale ($40, reservations required). Saturday, September 22nd, begins at 10 a.m. at the McCoy Theater with a continental breakfast followed by discussions on Bearden, Wilson's female characters, and the topic "Music and August Wilson." The festival concludes Saturday evening with a performance of "The August Wilson Songbook" at the Hattiloo Theater at 8 p.m. and a finale party with Joyce Cobb at Marshall Arts Gallery at 10 p.m. For more information on "The August Wilson Celebration," call 843-3834.
<urn:uuid:800a5ed5-90f0-4b4f-9940-fbd19980c368>
CC-MAIN-2017-04
http://www.memphisflyer.com/memphis/august-in-september/Content?oid=1139335
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00175-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977436
998
1.632813
2
With the change from Trade Practices Act to the Competition and Consumer Act comes a new national regime for consumer protection. To assist the ACCC in monitoring and enforcing these new laws, the ACCC now has the ability to issue infringement notices for suspected breaches of the Act and it appears to be making good use of these powers. Notices have been issued to businesses in a variety of industries on a variety of issues including in respect of pricing, refunds, affiliations and The ACCC can issue an infringement notice if the ACCC has reasonable grounds to believe that a person or corporation has: engaged in unconscionable conduct engaged in unfair practices (though not for misleading or engaged in pyramid selling failed to comply with certain product safety and product information requirements, or failed to respond to (or properly respond to) a substantiation If the ACCC forms this belief then it can issue a notice that you pay up to $1,320 (individuals) and $6,600 (corporations). You then have 28 days in which to pay the infringement. If you pay the infringement, then the ACCC will not take the matter further. However, if you fail to pay the notice then the ACCC may commence proceedings. A recent example of where this has taken place is where the ACCC issued 8 infringement notices to 8 different restaurants for failing to advertise a single price for their products. The restaurants had used disclaimers at the bottom of their menus stating that a surcharge applied on Sundays or public holidays, a practice which in unlawful. Four of these restaurants paid the notices and no further action was taken. Their financial exposure was limited to the amount of the infringement notice, which could not have been more than $6,600. The other four restaurants did not pay the infringement notice and the ACCC commenced proceedings against the restaurants. Each of those 4 restaurants was found guilty and the court ordered that they each pay a penalty of $13,200 (double the maximum amount permissible under an infringement notice). Further, and perhaps more significantly, each was ordered to pay the ACCC's costs. Costs of legal proceedings can be very significant and will often far exceed the cost of an infringement notice. That said, paying the infringement notice may not always be the right decision for your business. It is important to bear in mind the public nature of the process and the potential damage to your business's reputation, particularly given the ACCC only needs to suspect a breach to issue a notice. Either way you should not sit on a notice if received and should act quickly to get advice and assistance in responding. The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances. To print this article, all you need is to be registered on Mondaq.com. Click to Login as an existing user or Register so you can print this article. This case has clarified the protection of reputation where misleading or deceptive conduct were claimed to have arisen. Some comments from our readers… “The articles are extremely timely and highly applicable” “I often find critical information not available elsewhere” “As in-house counsel, Mondaq’s service is of great value” Register for Access and our Free Biweekly Alert for This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
<urn:uuid:7db86271-21b6-4f74-af41-b17597d5f263>
CC-MAIN-2017-04
http://www.mondaq.com/australia/x/134486/Consumer+Trading+Unfair+Trading/Watch+out+if+you+dont+pay+that+fine+on+time
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00310-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930218
775
1.828125
2
Illinois State students finished another successful week of volunteering through Alternative Breaks. Alternative Spring Break (ASB) is a student organization supported by the Center for Community Engagement and Service Learning that provides Illinois State with opportunities to enact social change. Alternative Breaks sends out five buses of 45 people every year during spring break. Past participants have helped Hurricane Katrina victims by working with KaTREEna in New Orleans, built homes with Habitat for Humanity in Georgia, served individuals leaving the prison system in Texas, and more. Students also have one free day during their trip to enjoy the sites in their host city. This year, Illinois State sent students to Paradise, Texas; Paragould, Arkansas; Sacramento, California; St. Louis; and New Orleans. In addition to ASB, students seeking this experience can choose Alternative Winter Break (AWB), Alternative Summer Break (ASuB), and even Alternative Weekends. Senior nursing major Maggie McKeating was a trip leader on the trip to support Living Lands and Waters in St. Louis. “I wanted to become a trip leader because the Alternative Break program does great things for the communities we work with. You get to work with and meet amazing people, and each trip has positively impacted my life in some way while still being fun,” McKeating said. This trip was McKeating’s third and final trip as a student. McKeating said she applied to be a trip leader in order to help support the next generation of Alternative Break students. “I wanted to be able to give back to the program, help other participants get a positive experience, and gain leadership skills,” McKeating said. Applications for the waiting list for Alternative Summer Break are now being accepted. This summer, the group will travel to Ngong Hills, Kenya.
<urn:uuid:002dbad4-0f87-48eb-83b5-ec09021c75c7>
CC-MAIN-2022-33
https://news.illinoisstate.edu/2018/03/illinois-state-students-enact-social-change-during-the-18th-year-of-alternative-breaks/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00677.warc.gz
en
0.939727
383
1.679688
2
Electronic payment services are classified into online payment, telephone payment, mobile payment, terminal point-of-sale transaction, ATM transaction and other electronic payment according to the way of issuing electronic payment instructions. Online payment is a form of electronic payment. In a broad sense,online payment processors online payment is based on the Internet and uses some digital financial tools supported by banks, which occur in the financial exchange between buyers and sellers to realize the process of online monetary payment, cash flow, fund settlement and query statistics from buyers to financial institutions and merchants, thus providing financial support for e-commerce services and other services. Telephone payment is an offline form of e-commerce payment that can be realized in the form of teaching, which refers to the way consumers choose to use the telephone (landline, cell phone, SmarTone) or other business-like telephone terminal equipment, multi purpose steam mopand can invest directly from their personal development bank accounts to complete the payment through the network banking management system. Mobile payment is a new type of payment method that uses mobile devices to complete payment behavior through wireless means. The mobile terminal used for mobile payment can be a cell phone, PDA, mobile PC, etc. Online payment refers to the use of secure electronic payment means by all parties to electronic transactions, including consumers, manufacturers and financial institutions, to make monetary payments or fund circulation through the network. There are three main categories. One is electronic money, such as e-cash and e-wallet. Among them, electronic cash is a kind of money circulating in the form of data. It converts the cash value into a series of encrypted data sequences through which the monetary value of various transaction amounts in reality is represented. Users can accept electronic cash for purchases by setting up an account at a bank that conducts cash operations and depositing money into that account. Electronic cash transactions are similar to physical cash in that the transactions are anonymous. Related article reading:
<urn:uuid:d23a4c02-8fad-4e16-9915-7c1e4cb44b92>
CC-MAIN-2022-33
https://bresdel.com/blogs/224329/Types-of-Online-Payments
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz
en
0.94092
412
2.78125
3
About Mid Wilshire Mid Wilshire is located in the central part of Los Angeles, surrounded by Fairfax, Hancock Park, Windsor Square, Koreatown, Arlington Heights, Mid-City, Mid-City West, Carthay, and Beverly Grove. This neighborhood has a prominent parks and recreation department that oversees a number of public facilities. Mid Wilshire’s community operated facilities include a public library and several parks, one of which is dedicated to the men who served in World War 1. The Queen Anne Recreation Center includes a baseball field, indoor and outdoor basketball courts, an auditorium, a barbecue and picnic area, tennis courts, and a playground. Mid Wilshire is also home to several research centers, a couple of large shopping centers, and a selection of upscale restaurants. Living in Mid Wilshire One of Mid Wilshire’s most prominent commercial districts is the Miracle Mile. A particularly interesting section of the Miracle Mile, called Museum Row, is packed with top quality museums, including the Los Angeles County Museum of Art, the Craft and Folk Art Museum, the Petersen Automotive Museum, and many more. Another of Mid Wilshire’s commercial strips is the Park Mile, a section of Wilshire Boulevard that is filled with office buildings. This is a unique commercial area in that the architecture is highly regulated. Buildings can be no more than three stories tall and they must be made of brick rather than more modern building materials. This set of rules was implemented in an attempt to make the Park Mile blend seamlessly with the nearby residential areas such as Hancock Park. Real Estate in Mid Wilshire This densely populated neighborhood is the most racially diverse city in Los Angeles, with a roughly equivalent representation of whites, blacks, Asians, and Hispanics. This is evident in the wide range of ethnic neighborhoods contained within Mid Wilshire. Like its name suggests, Little Ethiopia is home to a population that is predominantly composed of people of Ethiopian descent. The Ethiopian businesses here include several top-notch restaurants that attract visitors from all over Mid Wilshire. Other historic neighborhoods include Oxford Square and Wilshire Vista. The latter was once a predominantly African American neighborhood, but a recent influx of young professionals has caused this neighborhood to rapidly diversify. While Mid Wilshire is one of the more densely packed Los Angeles neighborhoods, it is noticeably more affluent than the other, similarly compact neighborhoods in the area. The real estate in Mid Wilshire includes an assortment of upscale single-family homes, the majority of which range in price from $1.5 million to $3 million. If you are looking for something smaller, you might consider one of the 2 bedroom/2 bathroom townhomes or condos in Mid Wilshire. These properties sell for closer to $500,000, making them a better choice for families that are just starting out. To see for yourself some of the beautiful, historic properties for sale in Mid Wilshire, contact our team and set up a showing. You will not be disappointed by the home selection in and around Mid Wilshire.
<urn:uuid:b7c4b32b-678e-4b09-a47f-ae69b8b103bf>
CC-MAIN-2022-33
https://www.joshgoldsteinla.com/communities/mid-wilshire/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00278.warc.gz
en
0.958174
619
1.734375
2
- Title: Using XSLT to manipulate MARC metadata by Corey KeithMeta-information about MARC: an XML framework for validation+ explanation and help systems by Joaquim Ramos de Carvalho; Maria Inês Cordeiro; António Lopes; Miguel VieiraCreating metadata practices for MIT's OpenCourseWare Project by Rebecca L Lubas; Robert H.W. Wolfe; Maximilian FleischmanMedium or message? A new look at standards+ structures+ and schemata for managing electronic resources by Sharon E Farb; Angela RiggioRepurposing MARC metadata: using digital project experience to develop a metadata management design by Martin Kurth; David Ruddy; Nathan RuppFuture considerations: the functional library systems record by Karen CoyleA bibliographic metadata infrastructure for the twenty-first century by Roy Tennant Tuesday, July 20, 2004 Volume 22 Issue 2 of Library Hi Tech is the second part of the metadata special issues. at 9:48 AM
<urn:uuid:aec15845-52da-438d-9a77-c8e47d999c68>
CC-MAIN-2017-04
http://catalogablog.blogspot.com/2004/07/marc-metadata.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00264-ip-10-171-10-70.ec2.internal.warc.gz
en
0.808589
207
1.835938
2
Learn languages abroad – it's the perfect way. With a language holiday, you combine taking language lessons with discovering new places. In this way, you learn your new language intensively, quickly, and with plenty of variety. - Choice between a half-day or a whole day of language lessons in your destination country - Choose from 4 attractive locations - Choose between small groups, individual lessons or Total Immersion - Many Berlitz Levels - Starting dates by arrangement - Wide choice of languages
<urn:uuid:625c5e15-5352-4aa0-be49-f6db0d619d7e>
CC-MAIN-2017-04
http://www.berlitz.lu/en/book_online/product_overview/language_holidays/berlitz_study_abroad/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00486-ip-10-171-10-70.ec2.internal.warc.gz
en
0.865454
104
1.671875
2
Why is a Pakistani bill to protect women unpopular? - 17 March 2016 - From the section Asia More than 30 Pakistani religious groups are threatening to launch protests if a bill to protect women in Punjab province is not withdrawn. Why do they not support moves to reduce the abuse of women? Why is the bill needed? The United Nation's Gender Inequality Index puts Pakistan 147th in a list of 188 countries because of its poor record on women's health, education, political empowerment and economic status. This is mainly because Pakistan is a heavily patriarchal society with a strong feudal value system, in which women are treated as domestic property. Increased urbanisation and the concomitant fading of the joint family system have exposed women to further abuses. A recent report for 2014 by a non-profit women's rights organisation, the Aurat (Woman) Foundation, said that every day of the year, six women were murdered, six were kidnapped, four were raped and three committed suicide. Dowry-related violence and acid attacks are in addition to that. Over the decades, successive laws have sought to improve the position of women, but implementation has been lacking because it is mostly in the hands of male government functionaries and the police who consider most violence against women as a "family problem", or even provoked by women themselves. The present law introduces women as complaint takers and enforcers. What does the bill do? The Punjab Protection of Women Against Violence Act 2015 seeks to set up a women's force at district level throughout the province, which would respond to women's complaints of physical, financial or psychological abuse. Offences include domestic violence, sexual violence, psychological and emotional abuse, economic abuse, stalking and cybercrime. The law provides for the setting up of District Women's Protection Committees, which will include officials of the district administration, the police, social welfare department and law. The law also envisages the setting up of a universal, toll-free dial-in telephone number for women to call if they want to report an abuse. It empowers the women protection officers to enter any premises to recover women held captive. It also provides for the establishment of shelters, and empowers the courts to restrain offending males from approaching those shelters, or places where victimised females work. The law emphasises reconciliation between the parties, and as such it does not criminalise the offence at the outset. However, in the event of a breach of court orders with respect to the female's right to protection, residence or financial wellbeing, the offending male can be punished with one to two years in jail, and a fine of between 200,000 to 500,000 rupees (£1,350-3,400; $1,900-4,800). The law has been hailed as comprehensive in liberal circles, where it is seen as providing a wider definition of violence against women and a one-stop mechanism for redress. Has the new law been used yet? The law calls for creation of a vast institutional infrastructure, the recruitment and training of manpower, and the drawing up of detailed rules to regulate the legal and operational aspects of system to protect women. The Act provides for "phased" implementation of the law, and officials say it will be some time before the first district protection teams get on the ground. Who introduced it? The law was drawn up in 2015 by the PML-N, the party of Prime Minister Nawaz Sharif which also governs Punjab province. The draft was approved by the provincial cabinet, and subsequently passed unanimously by the Punjab parliament in February. The bill came as a surprise to many because the PML-N has long been seen as a right-of-centre party, often pandering to the religious lobby. But many say it took the lead because it was under pressure to address the issue. Much of the violence against women takes place in Punjab, Pakistan's most populous province. Why are religious hardliners unhappy? On Tuesday more than 30 religious groups, including all the mainstream Islamic political parties, got together in Islamabad to condemn the law and to warn the Punjab government to withdraw it by 27 March. If not, they have threatened to launch protests. One leader said these could be worse than those in 1977 - a reference to a religious movement which culminated in a military coup against Pakistan's first popularly elected government. Religious groups have often equated women's rights campaigns with promotion of obscenity. They say the new Punjab law will increase the divorce rate and destroy the country's traditional family system. But the Aurat Foundation's Naeem Mirza believes that religious groups are more incensed over the way the new law seeks to empower women. "A woman can ring up a toll-free number for help, women protection officers can enter any premises to rescue her, and the husband is constrained by the law from throwing her out of his house. If he remains violent, he can be turned out of his house, and forced to wear a GPS tracker to ensure he doesn't get anywhere near the victim until a settlement is reached," he says. "If implemented, these measures will fundamentally change the traditional power equation between men and women, something which the religious lobby will find hard to tolerate." What happens now? While the bill has been signed into law by the Punjab governor, the provincial government in Lahore is yet to formally notify it, fuelling speculation that it may agree to dilute the bill by sending it back to parliament. If the government backtracks, many fingers will be pointed at the powerful military establishment which is widely believed to have been behind past demonstrations by religious groups - from the movement of 1977 to the so-called "million marches" of the 1990s that toppled one political government after another. But many believe the government cannot afford to pay the political price of a retreat. The bill has been unanimously passed by the parliament, which represents the will of the people. A retreat will undermine democracy. It will also frustrate women at large who have drawn some hope from this law. Additionally, such a move could give a fillip to social radicalism which both the civilian government and the military have been struggling to bring under control, at least on the domestic front.
<urn:uuid:6e50a666-ad57-4999-9767-590cfa0bd366>
CC-MAIN-2017-04
http://www.bbc.com/news/world-asia-35811180
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00034-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971967
1,282
2.671875
3
April 17, 2014 - 3:58 PM PEACHLAND - The Regional District of Central Okanagan has issued a precautionary Water Quality Advisory for residents served by the small Star Place Water System in the Central Okanagan West Electoral Area. The advisory affects eight properties connected to the community water system on Star Place off Trepanier Road near the Okanagan Connector (Hwy 97 C). Increased turbidity in the water system source has resulted in water quality that might impact children, the elderly or those with weakened immune systems. Roadside sign notices are in place to advise residents of the precautionary Water Quality Advisory. Communications Officer Bruce Smith says, “Interior Health has been contacted and while the health risk is modest and no bacteria have been found in any of the water from the system tested, Regional District staff recommends that as a precaution that Falcon Ridge water customers follow Interior Health guidelines, especially for those with weakened immune systems, the elderly, children and those wishing additional precautions. All water intended for drinking, washing fruit and vegetables, making beverages, ice or brushing teeth should be boiled for at least one minute or customers should use a safe alternative to water from the tap such as bottled or distilled water.” This precautionary water quality advisory affecting the Star Place Water System will continue until further notice. For information visit the Regional District website water system webpage (regionaldistrict.com/water) or contact RDCO Environmental Services at [email protected] or 250-469-6241. To subscribe online for Regional District water quality advisories or alerts by email visit regionaldistrict.com/water. News from © InfoTel News Ltd, 2014
<urn:uuid:b278979d-8f24-4d69-8d94-8422e806c719>
CC-MAIN-2017-04
http://infotel.ca/newsitem/water-quality-advisory-for-star-place-water-customers/it9448
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00019-ip-10-171-10-70.ec2.internal.warc.gz
en
0.927408
347
2.140625
2
Artists and scientists analyze the world around them in surprisingly similar ways, by observing, collecting, documenting, analyzing, and comparing. In this captivating guided journal, readers are encouraged to explore their world as both artists and scientists. The mission Smith proposes? To document and observe the world around you. As if you've never seen it before. Take notes. Collect things you find on your travels. Document findings. Notice patterns. Copy. Trace. Focus on one thing at a time. Record what you are drawn to.
<urn:uuid:666733a5-b963-4a5e-a167-5fc1d761022f>
CC-MAIN-2022-33
https://www.skoob.com.br/how-to-be-an-explorer-of-the-world-236048ed263883.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00276.warc.gz
en
0.948099
106
1.984375
2
Is the US Winning? Boonsboro, Md.: When will it be okay to state that we are winning in Iraq and all the naysayers ("the war is lost") were wrong? Even the New York Times is admitting things are going well. Thomas E. Ricks: Well, things are going better. I just got back from Baghdad last week, and it was clear that violence has decreased. But it hasn't gone away. It is only back down to the 2005 level -- which to my mind is kind of like moving from the eighth circle of hell to the fifth. I interviewed dozens of officers and none were willing to say we are winning. What they were saying is that at least now, we are not losing. But to a man, they were enormously frustrated by what they see as the foot-dragging of the Baghdad government. Why is violence down? Bethesda, Md.: Tom, I note you were in Iraq last week and I am really interested in your perspectives on the security in Baghdad and its sustainability. My understanding is that the neighborhoods are safer but am wondering if that's because they have been walled off and ethnically cleansed. Thomas E. Ricks: Yes, one reason that the city is quieter is because of the presence of American troops. But yes, another reason is that some Sunni neighborhoods are walled off, and other Sunni areas have been ethnically cleansed. In addition, the Shiite death squads, in addition to killing a lot of innocents, also killed some of the car bomb guys, I am told. Where is Iraq going, in political terms? Currently, nowhere. That is the worrisome stalemate I wrote about in last week's article. The U.S. is placing great hope in bottom up movement, and many officials think that provincial elections will break the political logjam. Kingston, Ontario: Mr. Ricks: Here's a two-part question. Do you think that the success in reducing violence in Iraq is because of a decisive breakthrough against the insurgency, or are the insurgents just biding their time? And do you have the sense that the Americans have any control at all over the political process in Iraq, or are the Iraqi factions just pursuing their own strategies? Thanks. Thomas E. Ricks: Well, that's the big question. Are the warring sides standing down until Uncle Sam gets out of the way? The Sunnis have largely stopped fighting while they seek to cut a deal to get a place at the table in post-Saddam Iraq. And the Shiites have stopped fighting the Americans for at least six months, they say -- and why not? With the Sunnis standing down, Uncle Sam would be focusing all his firepower on the Shiites. But what if the Sunnis get sick of waiting? And what happens when U.S. forces start declining in number next year? The administration's "plan"! Fort Bragg, N.C.: Two questions, and maybe I'm not looking for an answer. What is the administration's current goal/expectation when all in Iraq is said and done? And if we expect to have 50,000 or so military troops (and the unknown number of U.S.-paid contractors supporting the troops), many to maintain the "peace" in Iraq (vs. "fighting terrorism/terrorists"), have we accepted that those troops aren't available for anything else, and that one-year rotations will be damned expensive to maintain? And thanks for your excellent reporting and taking time to answer chat questions.Now Thomas Ricks is no antiwar lefty but you will notice that he is saying many of the same things we have been saying here. One of the complaints we have had about the media is that it continues to give voice to those who have been wrong, think Bill Kristol, while ignoring those who have been right from the beginning. Thomas E. Ricks: A shout-out from Fort Bragg! I think the Bush Administration's plan is to pass off Iraq to the next administration. They know it isn't going to end on their watch. I think what they would like is to pass along a situation that wouldn't force a Democratic president to pull the plug immediately. As you say, that means aiming to have a force of perhaps 50,000 troops in Iraq by the middle of 2009. But I've heard generals talk about big troop cuts in Iraq for more than four years now. (The first story I did on this was, I think, in Oct. 2003.) So I will believe it when I see it. Princeton, N.J.: Obviously not everyone in the media should resign, but it is annoying to having The Post (and others) regularly publish articles by those who were wrong, wrong, wrong, but those who were right about Iraq (e.g. Feingold) still get short shrift. Thomas E. Ricks: Yes, I agree with you. There are a few people out there who should have the decency to follow the advice of the king of Spain [who recently told Hugo Chavez to "shut up"].
<urn:uuid:52eae72d-c386-4566-8b4e-bf96da8d5f4b>
CC-MAIN-2016-44
http://ronbeas2.blogspot.com/2007/11/from-eighth-circle-of-hell-to-fifth.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00003-ip-10-171-6-4.ec2.internal.warc.gz
en
0.981386
1,057
1.578125
2
Ideas in and of themselves hold no force, no resolve, but the enablers of ideas do. In religion they call the individuals who hold stead fast to the tenets and beliefs of a church as someone being devout. If that person then decides to apply too much force behind that same idea, he or she is judged a fanatic. Some who hold strongly to a belief or idea can view others who do not hold such tenets with a degree of contempt and brand them as being misguided or being an heretic or infidel. On the other hand, ideas are the empowering concepts that built a nation, drove our ancestors across deadly oceans to survive harsh conditions. Freedom has always been a powerful idea which no amount of counter-force can entirely vanquish. It may be buried in despair or forgotten by fear, but like any idea, it will resurface. Whether our forefathers traveled to America for the freedom of worship or the freedom from governments and tyrants, freedom rang strong and true for our ancestors. As my family carried the torch, generation after generation across America, religion and the practice of a doctrine began to wane until noone in my immediate family really associated with a church or congregation. In contrast, my fifth-great-grandfather Adam Smith Sr. was a German Baptist and most likely would not have been caught dead with out a black hat and jacket. A few generations later, my grandfather called the religion his father participated in as either dippers or dunkers. The urge to attend church fizzled. The height of my direct line to immerse into religion was my fourth-great-grandfather, Adam Smith Jr. who started a German Baptist church in Licking County, Ohio. He and his son Isaac became deacons of the church, which they built originally of logs in the early 1800's. Rifts in congregations, rifts in a family over ideas, over transgressions written in scripture, can be sudden and divide like a fork in a river or as gradual as the erosion of a river bank. Dissent can be over philosophical points, the conduct of ceremonies, or disagreements on interpretation of a particular passage. Or like my second-great-uncle's son, which family lore said, "He did something against the church," and thus that entire branch of the family moved from Indiana to Michigan, in disgrace. What ever the rift, whether the church left the family or the family left the church, the consequences are like ripples in a pond, the effects sweep out and changes destiny in its wake. The Lutheran Church in America In my research I ran into the Lutheran church as it appeared in the late 1700s-early 1800s in the northern section of the Shenandoah Valley. Dr. Martin Luther posted his challenge to the established church in 1517 and by 1580 the statements of belief became known as the Lutheran confessions. The "Father" of American Lutheranism was Pastor Henry Melchior Muhlenberg, who arrived from Germany to Pennsylvania in 1742 and started the first church in Trappe, Pennsylvania. There was a family with the same name of Adam Smith that lived in the same Shenandoah Valley. I was able to separate the two families apart by discovering which religion belonged to which family. This is another reason why churches and the geographical areas they set up in are important to genealogical research. Early school books seem to group all separations from the Western Roman Catholic church as the Protestant Reformation. I can remember the root word "protest" as commonly bantered about. However, as written below under the German Baptists section, the 16th century had its fair share of many different groups finding fault with the Catholic Churches handling of affairs. Some of the objections were not just concerning religious practices, but also at the corruption and the selling off of offices in the church. Protestants generally trace their separation from the Catholic Church during this same era. The history of this period is at best a record of chaos and turmoil. Obviously, there was dissatisfaction concerning the Roman Catholic's handling of the Christian religion. To be sure, the four major Inquisitions which covered a period from 1184 to 1860, did not help, as many brutal actions to handle heresy would also target groups which separated from the church. For example, the Huguenot wars in 1562 might explain why my fifth-great-grandfather Adam Smith (a German) ended up with a wife named Hannah Jackman (a French woman). It would explain how French and Germans merged in the Rhine River area as a result of populations fleeing from death by the sword due to their religious views, and thus began the friction of an area later known as Alsace Lorraine. This area would be an area of contest and start another series of wars later in history. By an outsider, the story of the German Baptist takes some study to understand. Baptism is defined in the dictionary as an initiation or symbol of admission into Christianity or a Christian church. It is an event or ordeal designed to purify or cleanse the subject. Anabaptists was a 16th century sect which started a movement known as the Reformation. The group. originating in Switzerland, denied the validity of infant baptism as it was previously held in the Roman Catholic Church. The Anabaptist practiced adult baptisms and advocated other religious and social reforms. Such groups as the Amish and the Mennonites were also descendants of the Anabaptists. Historians contend that the Old German Baptist Brethren descended from a period of time in 1708 when Alexander Mack founded a fellowship with seven other believers in Schwarzenau, Germany. These individuals were to start what was later known as the pietist movement, which advocated a revival of devotional ideas and practices. Several Brethren groups, Brethren referring to a brotherhood in a religious order, trace themselves back to Mack's first group. These resulting splinter groups are distinguished as German Baptists and not to be confused with English Baptist. German Baptists were given various other names such as, "Dunker, Dunkards, Tunkers, and Taufer which all relate to their practice of baptism by immersion. I have also come across the names of dunkers, dippers, and tankers in my own family research. Like most seeking freedom for religious worship and from persecution, many Brethren groups immigrated to America: the largest influx was between 1719 and 1729. In 1719 the first congregation was founded near German Town, Pennsylvania. The groups of worshipers tended to congregate in a rather small geographic area, connected to one another by faith and by the German language. They were first known as the NeuTaufer (new Baptists) and later adopted "German Baptist," "German Baptist Brethren," and by 1871 was the "Old German Baptist Brethren." The later group represented a group which did not tolerate certain modern innovations of the 19th century. As with most early immigrants, the language of the homeland slowly relinquished to English. ,In 1881 to 1883 German Baptist continued to fracture off into different churches over issues of Sunday school, type of dress, automobiles and telephones, and other disciplines. The German Baptist Brethren change their name to the Church of the Brethren in 1908. The advance of modern technology continued to be a catalyst for the continuing splitting and re-identifying certain church groups until you get today a plethora of names and denominations across the United States. In addition, there are many other names which popped up like the Southern and Calvary Baptist, which reflect more geographical reasons. Calvary being the name of the hill where Jesus Christ was crucified. This is why I had always been confused as to who was who. Many outsiders still use "German Baptists" and "Quakers" as an all inclusive term for the groups which adhere to a specific dress code for every day while others have relaxed such restrictions to when they are attending church. And then there are many Baptist churches, which could be descendants as well from English Baptist roots, which seem to have dropped out all of the dress codes and restrictions in using modern devices. Is it any wonder a genealogist becomes confused when trying to track down the church in which their ancestors participated? The Amish & Mennonites My father was born in the 1920s in an area called, Pucker Huddle near Elkhart, Indiana. Today a majority, if not all of the farms, are owned and operated by the closed society of the Amish. As mentioned above, Amish and Mennonites were also part of the Anabaptists as described above in the German Baptist section. It is said they also challenged the reforms of Martin Luther and other Protestant Reformations, and like the Baptist, rejected infant baptisms. They were once known as Mennonites in Switzerland but in the late 1600s, led by Jakob Ammann, left over a disagreement, primarily over the shunning of ex-communicated members. The distinction between the Amish and the Mennonites is largely one of dress and manor of worship. The first sizable group of Amish arrived in America around 1730 and settled near Lancaster County, Pennsylvania as a result of William Penn's ‘Holy Experiment'. Since then the Amish have spread to twenty four states and Canada. Today Amish settlements are divided into five orders, the "Old Order Amish" is the largest group and the "Swartzentruber Amish" are considered the most conservative. Quaker is a word that means "to tremble in the way of the lord." It is also an informal label referring to members of the ‘Religious Society of Friends' which was a movement which began in England in the 17th century. The movement continued to expand into many parts of the world, especially the Americas and Africa. William Penn's effort was to establish a safe place for the Quakers to live and practice their faith. As with other religious groups, they suffered separations in the 1800's forming different branches. For me, the term Quaker has always been a term used quite loosely by others. Too many have seen fit to assign anyone in the traditional dress as Quakers. The previous outline of other denominations begins to bring into focus what has been too over-lapping of a subject. It was said that William Penn began to lose control of his settlements, as different groups had strong ideas on how they wanted to live as apposed to Mr. Penn's vision. After seeing all the various origins that these groups came from, it is easy to see why. Catholic Churches in America With more than 68 million members worldwide, the Catholic Church was spread widely by missionaries. In America, the first to arrive after Christopher Columbus were the Spanish missionaries, establishing missions in what is today, Florida, Georgia, Texas, New Mexico, and California. French missionaries also contributed in the states of Louisiana, Alabama, Arkansas, and Michigan. In contrast, in 1789 there were only a small fraction of Catholics in the original thirteen colonies. Immigration in the 19th century from various nationalities expanded the numbers. This was obviously due to the influence of the Church of England which had also separated from the Catholic church. The Episcopal Church has a very colorful history, especially for America. Its roots travel back to the Church of England, which began with a founding church in Jamestown, Virginia in 1607. The Church of England continued to grow with churches in Virginia, New York, Maryland, and the Carolinas. However, it was disestablished by the Revolutionary War. In the 1780s it was reestablished as the Episcopal Church, as an independent church and was the church of choice for many high-status Americans and English immigrants. It boasts of having a quarter of the presidents of the United States as being Episcopalians. Islam in America Though I have never run across this group in my research, I thought it only fair to briefly cover Islam's growth in America. Historically, Estevanico of Azamor, a Moorish Muslim, landed in Florida in 1527. The first group of Muslims landed and settled in coastal towns of South Carolina and Eastern Tennessee in around 1587. It has been estimated that 10 to 20 percent of the slaves to America were Muslims. A small scale migration to the United States by Muslims started in about 1840. Most of the immigrants had the purpose of making money and returning to their homeland, but ended up staying. The largest groups ended up in Michigan, M' In my research I also followed a branch of a church from the Shenandoah Valley region in Virginia to central Ohio. It was interesting to note that I found a portion of a group split away from the Virginia church, and a number of these families had surnames which were connected with my family line. This, too, is an important reason for genealogists to include in his or her studies, the family's religious beliefs. When faced with the disappearance of a family from an area, maybe they followed their favorite pastor or elders. Religion, the pastors, and the congregation as a whole, can have a huge impact on a family's history. Histories of marriages, baptisms, and other ceremonies can some times be found in better condition in the hands of the church than with governments. Church functions and socials are often where many young couples meet each other and later marry. Churches are where people turned to for help, as the early colonial government could not provide much for families needing relief. The roster of a church at a particular time can be quite revealing. This is why I made a stab at trying to sort out some of the prominent religions which came to America. I do not for a minute believe I scratched the surface of all denominations, but then, I'll leave it up to the researcher of his or her particular family's belief to find out more.
<urn:uuid:ac9810ae-801d-48b6-97a0-8059f86b4110>
CC-MAIN-2017-04
http://www.genealogytoday.com/articles/reader.mv?ID=3838
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00209-ip-10-171-10-70.ec2.internal.warc.gz
en
0.981161
2,850
2.109375
2
Separable Differential Equations More Lessons for A Level Maths Videos, activities, solutions, and worksheets that are suitable for A Level Maths. How to solve Separable Differential Equation and apply to growth and decay model? Solving a Separable Differential Equation, Example #1 Solving a Separable Differential Equation, Example #2 Solving a Separable Differential Equation, Example #3 Separable Differential Equations & Growth and Decay Model Rotate to landscape screen format on a mobile phone or small tablet to use the Mathway widget, a free math problem solver that answers your questions with step-by-step explanations. You can use the free Mathway calculator and problem solver below to practice Algebra or other math topics. Try the given examples, or type in your own problem and check your answer with the step-by-step explanations.
<urn:uuid:ac27a9cd-cbc8-43ca-8fab-45c62bd73a47>
CC-MAIN-2017-04
http://www.onlinemathlearning.com/differential-equations-c4.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00557-ip-10-171-10-70.ec2.internal.warc.gz
en
0.832254
198
3.03125
3
In this wide-ranging narrative, which is part historical, part investigative and largely autobiographical, Ian Parker examines the perennial preoccupation of man with elephants…and his pursuit of their ivory. ‘…although a lot more could be said about this remarkable work, I want simply to recommend reading Parker’s book to all those interested by the elephant issue and wildlife in general. It is very instructive, exciting, sometimes possibly irritating and not lacking of humour. However, I certainly regret that following advice he received Ian has decided to cut about 100,000 words from his original text. I am sure that they would also have been of great interest. Perhaps they will appear in his next work.’ (Jacques Berney) ‘I enjoyed this book enormously. The subject matter, the parsimonious style of writing, the acerbic humour, the genuine concern for people (missing in most persons who have had much to do with wildlife), all contribute to make it one of the most valuable treatises on elephants and Africa to have been produced in the second half of the twentieth century.’ (Rowan Martin, Engineer, Biologist, ex-Head of Zimbabwe Dept of National Parks & Wildlife Management Research Division, International Consultant in Conservation.) ‘A unique book in every way and one destined to be a classic ‘must’ for the library shelves of conservationists worldwide.Good science and practical, economically sound, science-based management are essential for efficient land-use and modern conservation. Quite apart from reaching the general public, this book should be adopted as a basic text for all universities that offer courses in conservation and in environmental management.’ Dr M. D. Gwynne, formerly Senior Research Fellow in Tropical Ecology, Balliol College; Director United Nations Environment Monitoring System; Assistant Executive Director, United Nations Environment Programme. ‘I thoroughly enjoyed it and found it absolutely fascinating, not only for the history of ivory but also for all the political machinations, some of which I had heard about, but without the detail. The manuscript is, in my opinion, a most valuable contribution to conservation history, particularly in Kenya.’ (Dr George Schaller, Director for Science, Wildlife Conservation International, New York Zoological Society and Author)
<urn:uuid:f6c02fb1-45d4-4322-a912-0eb0ef9a873e>
CC-MAIN-2022-33
http://www.stridentpublishing.co.uk/product/what-i-tell-you-three-times-is-true-conservation-ivory-history-and-politics/?add-to-cart=6012
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00076.warc.gz
en
0.951362
474
2.28125
2
On this day in 2008, at the New Delhi Auto Expo in India, Tata Motors debuts the Nano, billing it as the world’s cheapest car: The anticipated price tag is around $2,500. Tata, India’s largest automaker, called the four-door, bubble-shaped mini-vehicle (it was just 5 feet wide and 10 feet long) the “People’s Car” and declared that it would be a vehicle for families who previously hadn’t been able to afford a car. (At the time, it wasn’t uncommon to see an entire family precariously packed onto a single motorbike.) The Nano was originally scheduled to go on sale in October 2008; however, production delays arose because of a land dispute in West Bengal, where the car’s production plant was being built. The company opted to move its production facilities to another part of India and the Nano officially went on sale across the country in April 2009. The basic model carried a starting price of approximately $2,000 (not including taxes) and came without a radio, air conditioning, airbags, power steering or power windows. It had a body made of plastic and sheet metal and a 32-horsepower, 624cc two-cylinder rear-mounted engine, and it could reach speeds of 65 miles per hour. In another nod to cost-cutting, the car had just one windshield wiper. Tata received more than 203,000 pre-orders for the Nano–a strong number, especially considering that at the time there were only about nine cars for every 1,000 people in India. However, because Tata was only able to produce an initial run of 100,000 Nanos, the cars’ first owners were chosen by lottery. The Nano was initially sold only in India, although Tata said it eventually intended to launch the car in other parts of the world. Tata Motors is part of the Tata Group, one of India’s largest and oldest business conglomerates. And Tata does not just make inexpensive cars: In March 2008, the company purchased the venerable British brands Jaguar and Land Rover from the Ford Motor Company for $2.3 billion.
<urn:uuid:d22df6e9-5953-4314-9772-e89d660708fa>
CC-MAIN-2022-33
https://pophistory.org/2009/11/13/worlds-cheapest-car-debuts-in-india/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00073.warc.gz
en
0.97347
455
2.859375
3
- Coming off injury, Savchenko and Massot determined to compete at Europeans - Russian Champion Kolyada readies for Europeans - Miyahara claims third consecutive national title - Uno wins national title; hopes to improve consistency - Medvedeva defends national title with record-breaking score - Stolbova and Klimov: “We got the job done” As the Skate Spins: 2002 Olympic Winter Games - Published: March 2, 2002 The 2002 Olympic Games, the world’s biggest made-for-TV event, is finished. But just how much of it was real and how much was scripted in advance? Millions of dollars were spent to try to ensure that the ‘right’ people won. TV-linked magazines and sportswriters who have made millions from skating books have glorified their favorites and demonized their competitors. TV commentators, some closely involved with commercial ice shows, declared skaters the winners before the marks were up, then screamed ‘foul’ when their choices were not the same as the judges. For the most part, the original spirit of the Olympics was gone. There were few true amateurs among the medal contenders, although some of the lower level participants were still there for the Olympic experience. Some countries elected not to send their qualified athletes because they didn’t think they could place high enough, conveniently forgetting the original reasons for the Olympics. Politics, greed, and shady dealings hung a black cloud over the Olympics as a whole and figure skating in particular. No matter who won, many felt all the results were tainted. The 2002 Olympics in Salt Lake City started with scandal and they ended with scandal. On the positive side, the USA almost tripled its previous medal count overall. On the negative side, lots of other countries thought those medals came unfairly. There were plenty of “feel good” stories, but even some of them appear to have been scripted. Even President Bush’s interaction with Sasha Cohen in the opening ceremonies may have been orchestrated. Cohen is the spokesperson who will be featured in an advertising for the National Cattlemen’s Beef Association, a huge Bush financial contributor, which was announced just days before the opening ceremonies, about the same time Bush attended their annual meeting. Even the positive accomplishments were overshadowed by the figure skating scandals that began almost on opening day and sparked viewer interest in the Games. By the end of the competition, Canada had protested the results in pairs, Lithuania in the dance, and Russia in the ladies. Is there a trend here? In 1994, controversy surrounded the ladies and to a lesser extent, the dance competition and only the USA, the Soviets and Great Britain were involved. In 1998, both the ladies and dance competitions sparked controversy and France and Canada were added to the mix. In 2002, the pairs event joined the fray, and Italy and Lithuania joined in. So can we assume that in 2006, there will be a controversy in every event and all of the major countries will be suing somebody else? What happened to sportsmanship and fair play? The actual skating in the pairs event was one of the best ever at the Olympics. The seven top teams skated very well, and in a weaker year, any of the non-medalists could have been on the podium. Had the Chinese pair actually held the landing of the throw quad salchow, the results could well have been different. But that and a lack of quality spins doomed Xue Shen and Hongbo Zhao to third. Meanwhile, Russia’s Elena Berezhnaya and Anton Sikharulidze skated a technically demanding program in the free skate, including a variety of transitional moves between the “big tricks”, but they were a bit tentative and Sikharulidze bobbled a double Axel landing. Canada’s Jamie Sale and David Pelletier skated their 2000-2001 Love Story program after they had performed their new Orchid program poorly at Canadians. They skated flawlessly but with less speed, fewer transitional moves, and greater distance between the partners than did the Russians. The program was spectacularly presented, with numerous gestures that do not show up on television. Even the original book’s author was moved by their interpretation. But the judges came down 5-4 in favor of the Russians, and the TV commentators went ballistic. Focusing on the one missed jump, they failed to inform the audience of the technically superior parts of the Russians program that could have merited a higher score, thus starting the opening controversy. Then things really got weird. Christine Brennan, the millionaire author who’s savaged the judges ever since Oksana Baiul beat Nancy Kerrigan, found another “judging scandal” and the TV ratings went through the roof. The Canadians howled, the ISU and the IOC panicked, and suddenly there were gold medals for everyone, complete with a second medal ceremony to bring in even more TV viewers. Everyone in the skating industry with contacts in television appeared on TV to weigh in with their opinions and get a little face time to publicize their particular ventures. In the meantime, no one bothered to delve into the issue much further. The French judge at the center of the controversy has claimed that everyone but Osama bin Laden influenced her to cast her vote the “wrong” way, so how much of her story could anyone believe? Pretty soon she’ll be saying that little green men abducted her in their spaceship where she was brainwashed to vote for the Russians because the Canadian costumes were too dull. Too many questions remain in this affair. What about the other judges? Is buying one vote enough to ensure a win? Who had a motive to trade a fix in the pairs for a fix in the dance? Or to start a big scandal? When you follow the money, where does the trail lead? That set the stage for the rest of the competition. The men were easy. Almost everybody can count jumps and the men with the most won in a walkover: quadmeisters Alexei Yagudin, Evgeny Plushenko and Timothy Goebel, the same three that everyone had expected to medal since the Goodwill Games last September. Had Plushenko not been injured before the Olympics, it would have been closer, but everybody knew the Russians were a lock so why worry about it? Sentimental favorites Todd Eldredge and Elvis Stojko got some airtime, but the media knew they weren’t serious contenders after the short so nobody freaked out when the Russians won. Time for the dance, the event everyone “knew” was fixed after popular Canadians Shae Lynn Bourne and Victor Kraatz finished fourth in Nagano after winning the Grand Prix Final in Canada. With the pairs controversy still swirling and the French dance team of Marina Anissina and Gwendal Peizerat implicated in the scandal, observers felt that the judges would be pressured to give Bourne and Kraatz the benefit of the doubt if the results were close. After all: (1) Anissina was Russian, (2) the French were the ones who had knocked the Canadians off the podium in 1998, (3) the Canadians had again beaten the French at the GPF (even if it was on hockey ice), and (4) the Russians and French had already been caught cheating so it was payback time. But it was déjà vu all over again for Bourne and Kraatz, when they both fell near the end of their program. It’s hard to claim you got cheated when you’re flat on the ice, and they finished fourth again. Last year’s world champions, Italy’s Barbara Fusar Poli and Maurizio Margaglio, also expressed their distaste for the judging after the first three dances but then he fell in the free dance, leaving them no leg to stand on. But they got the bronze. The Russians, Irina Lobacheva and Ilia Averbukh, took a relatively uncontroversial silver even though she literally had only one leg to stand on after a severe knee injury earlier in the season. They skated a tribute to the 9/11 disaster so how could anyone be mad at them? That left it to the Lithuanians, Margarita Drobiazko and Povilas Vanagas, who skated a clean, but uninspiring program, to file their protest. The Lithuanians hurt their own cause by skating to the same type of heavy music that everyone used last year and the ISU had expressly asked skaters to avoid in the Olympics. Plus Drobiazko is originally from Russia, so that appeal was regarded as sour grapes and went nowhere. That left the ladies, television’s most over-hyped Olympic event and the one that the networks fork over the megamillions to televise. This was planned to be the highlight of the Games – the coronation of Michelle Kwan as the queen of skating after her sorrowful defeat to that upstart Tara Lipinski in Nagano four long years ago. But it was not to be. Kwan appeared to be so sure of victory that she didn’t even have a coach, apparently reasoning that all she had to do was the same level of program she’d been doing since 1996 and the medal was in the bag. Her marks from the USA judges at Nationals sure made it seem that way. And with intense American pressure on the international judges from the pairs and dance event, it wasn’t likely that the Russians were going to get many breaks in the judging. That was true in the short program when Irina Slutskaya landed the most difficult combination, had better spins and the better footwork sequence, and still finished second to Kwan. But then something unexpected happened. Sarah Hughes, having been dissed as a gawky flutzer by the pundits, decided that she was fed up and laid down the gauntlet. She ripped through the best program of her life, establishing Olympic records for the most triple-triple combinations, and essentially told Kwan that to get that gold medal around her neck, she was going to have to fight her for it. Kwan wilted under the pressure, completing no triple-triples, missing another triple and finishing third in the free skate to settle for the bronze medal. Slutskaya had the opportunity to go for the win, but knew that with the aura of judging scandals permeating the arena and the Americans hungering for a sweep, the judges would savage her for a bad mistake and put her completely out of the medals. So she skated conservatively, well enough to beat Kwan for the silver, but not enough to overtake Hughes for the gold. Then the Russians decided that this was their time to protest. Too little, too late. After the Olympics ended, the “games” continued. The “journalists” continue to dish the dirt so that the books they publish later will sell better. The French judge continues to change her story. The TV networks celebrate millions of dollars in advertising revenue that came in after the pairs controversy. And every other unsavory character has come out of the woodwork. People have even criticized Hughes’ coach Robin Wagner because she screamed with joy after Hughes won the gold medal. That’s the same coach who was told she wasn’t good enough to coach Hughes and that one of the USFSA’s favored coaches should train Hughes instead. She’s the same coach who reworked Hughes program in a couple of weeks to put in the highest technical difficulty ever and succeeded. Hughes had just come from way behind to beat the two-best skaters in the world, and the USFSA’s heir apparent, Sasha Cohen, before hundreds of millions of people, when no one had given her a chance. You would have had to have a heart of stone not to have screamed for joy. It was the closest thing to the 1980 Miracle on Ice that this Olympics ever saw. And now the cash registers are ringing. The winners are signing up for millions in endorsement deals. The tours are getting ready to pack the house because everyone wants to see the golden ones for themselves. How long will it last? Will people get sick of watching skating every week on TV? Will the judging system truly be reformed? Will this be the last time there’s skating in the Olympics? Will the Russians stay out of the next Olympics? Will there be scandals in every skating event next time? Who knows? Stay tuned for the next chapter of “As the Skate Spins.”
<urn:uuid:5515f23d-e20a-4d37-8f6a-6a83f3a6a479>
CC-MAIN-2017-04
http://www.goldenskate.com/2002/03/as-the-skate-spins-2002-olympic-winter-games/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00281-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977054
2,611
1.601563
2
Faced with a deadly and expensive diabetes epidemic, Gulf states are looking at innovative business marketing techniques to promote healthy behaviour and keep a cap on spiralling health costs. By Jane Williams Strong oil prices have bankrolled an affluent lifestyle in the Middle East’s Gulf region, with deadly consequences. Rich foods, decreased physical activity and high smoking rates have exacerbated a genetic predisposition to diabetes, fuelling an epidemic responsible for 10 percent of all adult deaths and sucking up a major chunk of the region’s healthcare budget. Five of the six Gulf countries are now listed among the top 10 worst afflicted places in the world, according to International Diabetes Federation data, with the United Arab Emirates at number two, behind the small island state of Nauru. Healthy eating, exercise and stress management can dramatically reduce obesity and the chance of developing diabetes, but convincing the region’s patients and those at-risk to make the lifestyle change is proving difficult. “The solution can only be found in creating awareness and behavioural change from an early age, ” Dr Mazin Jawad Al Khabouri, senior consultant at Oman’s ENT Al Nadha Hospital and adviser to Oman’s Health Ministry, told INSEAD Knowledge outside an INSEAD Innovators for Community Wellness programme in Abu Dhabi. “That’s not easy. Because everyone’s obese here, it’s not considered a major problem but there is no doubt that non-communicative diseases like diabetes are the biggest issue facing the Gulf. Up to 20-24 percent of the Gulf’s national population has diabetes, and because it’s related to many chronic heart, kidney and eye diseases, if we can control diabetes we can control these other diseases as well.” A New Approach Since late last century, governments in the region have been monitoring and developing strategies to reduce the problem, providing accessible screening opportunities, and training more health professionals. But results have been limited and diabetic numbers continue to climb. A recent focus group for diabetes self-management in Oman found patients still hold many misconceptions; turning to herbal medicines, or overindulging in dates and mangoes, even eating honey in the belief that being “natural” it won’t affect blood sugar levels. “Oman like other Gulf countries is in a transitional period, people have faith in the medical system but we have to convince people it’s not medication but the patients themselves who can make the difference,” Dr Fatma Ajmi, director general of health services in the Omani governorate of Muscat told INSEAD Knowledge on the sidelines of the Wellness programme. To this end, Gulf countries are pouring resources into primary care services bolstering the relationship between care-giver and patient. This is where the marketing techniques come in. “We’re still learning how to communicate with people, how to empower them to manage their disease,” Ajmi says. Easier to Take a Pill The solution is in finding innovative techniques to engage specific groups within the population, says Markus Christen, INSEAD Associate Professor of Marketing. “From a purely medical point of view we have good knowledge of what’s going wrong. The people have a comfortable life and don’t want to give it up. They prefer to get a magical pill from the pharmacy which allows them to continue to engage in this behaviour. It’s easier than going to the gym. “We need to break these habits and create new ones. Marketing is a powerful way to do this. The most successful brands are thriving because they’ve got us into certain habits; now we want them to use the same methods to help break habits. It’s not a matter of being forceful and saying this is what people need to do, because they will resist that.” While previous campaigns have been aimed at blanket coverage, targeted approaches give better results, Christen says. And different targets need different approaches. Smoking, for example, because of its addictive nature, has a medical as well as a social component to address, while many eating habits are attached to the region’s culture. “Within the family or community structure there are often traditional influences that are detrimental to what you are trying to accomplish,” notes Christen. “They are often very entrenched and extremely difficult to change. “This is where we need new ideas and innovation. Perhaps it’s a matter of encouraging employers to give employees free time to look after themselves, maybe go to the gym.” Deep Pockets Have Limits Nation-wide gym membership may be an expensive proposition but the alternative is even more so. As patient numbers rise, technology advances and treatments for chronic disease get more expensive, healthcare costs in the region are skyrocketing to an expected US$60 billion by 2025 from US$12 billion today, according to McKinsey & Company estimates. Stephen Chick, INSEAD Professor of Technology and Operations Management and director of the school’s Middle East Health Leadership Programme, says the challenge of rising health costs is forcing health care systems around the world to make this shift away from acute care to a combination of acute and primary care — put simply, away from disease and into wellness. “Innovation management and systems thinking are sometimes not the focus of medical schools or nursing schools, but I think poor processes, poor engagements or poor marketing can be deadly if it’s not done well,” Chick told INSEAD Knowledge. “As people age, different disease categories become more prevalent. This chronic disease challenge is absolutely essential to resolve to ensure we have a sustainable healthcare system. The question is: can we think differently and come up with a system rapidly that will adapt?” Al Khabouri says the answer must be yes. “The costs to governments are very, very high and because of the exponential factor there will come a time when nobody can afford it,” says Al Khabouri. “We need new and innovative ways of thinking, we can’t buy our way out of this.” This article was republished courtesy of INSEAD Knowledge. Copyright © INSEAD 2012 The views expressed in this article are the author’s own and do not necessarily reflect Fair Observer’s editorial policy. For more than 10 years, Fair Observer has been free, fair and independent. No billionaire owns us, no advertisers control us. We are a reader-supported nonprofit. Unlike many other publications, we keep our content free for readers regardless of where they live or whether they can afford to pay. We have no paywalls and no ads. In the post-truth era of fake news, echo chambers and filter bubbles, we publish a plurality of perspectives from around the world. Anyone can publish with us, but everyone goes through a rigorous editorial process. So, you get fact-checked, well-reasoned content instead of noise. We publish 2,500+ voices from 90+ countries. We also conduct education and training programs on subjects ranging from digital media and journalism to writing and critical thinking. This doesn’t come cheap. Servers, editors, trainers and web developers cost money. Please consider supporting us on a regular basis as a recurring donor or a sustaining member.
<urn:uuid:ae3c841a-6707-4311-893f-d5f7c9fd8fd9>
CC-MAIN-2022-33
https://www.fairobserver.com/politics/combating-diabetes-some-things-money-cant-buy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00478.warc.gz
en
0.937348
1,529
2.09375
2
Newspapers and trade magazines are good resources for finding information on companies. A local newspaper would be interested in local companies while trade magazines would be interested in covering companies in that industry. While there are several databases that include digitized newspapers, not all newspapers are digitized and trade magazine are less likely to be digitized before the 1990's. It may be that microfiche or print sources are required. Any full-text database with several years of coverage can be used for historical research depending on how far back the coverage goes. Some databases are only indexing are others include full-text (either text or as a digital image). The type of information that can be found in articles and advertisements includes: Unlike newspapers where digitization projects are making papers more available, trade magazines are less widely available in a digitized format particularly before the advent of the Internet. Most databases are subscription/fee-based resources. Finding relevant articles in trade literature that is not full-text/digitized may depend on using indexing sources similar to Readers Guide to Periodical Literature. The index will provide citation information that is then used to retrieve the article in print volumes. Additionally, some magazines did their own indexing (usually on an annual basis) so utilize that if it is available. A few indexing sources are listed below. Advertisements are also important and can yield useful information but finding them is more challenging. Searching the databases with digitized content will retrieve advertisements. However, text-based databases often don't include advertisements. To find advertisements in print editions of the trade magazines, use the publication's advertiser index (usually noted in the table of contents) for each issue if it is available. None of these databases (either digitized images or full-text) include all newspapers or magazines, and all of them have other limitations that can include: limited time period covered limited title coverage, database search limits, or general limits on functionality. Any full-text database can be used for historical research depending on how far back their coverage goes and what time frame someone is looking at, but the ones below have coverage that is specifically historical in nature. Below are a few tips for searching databases. Many of these tips and notes are particularly important when searching those databases with digitized content because these databases don’t function quite the same way as purely text based databases do. The subscription resources marked with a padlock are available to researchers on-site at the Library of Congress. If you are unable to visit the Library, you may be able to access these resources through your local public or academic library. Many of the trade literature sources are not necessarily going to be digitized and searchable. Historically, indexing services have been the traditional way to access many of the articles found in trade literature if the journal did not index itself. Included below are many of the standard and relevant indexing titles. While many of the below indexes are available in electronic format, the print versions may be more widely accessible. The following materials link to fuller bibliographic information in the Library of Congress Online Catalog. Links to digital content are provided when available.
<urn:uuid:a73e4a17-7164-4852-ad1f-648a0c1cac08>
CC-MAIN-2022-33
https://guides.loc.gov/historical-company-research/news
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00266.warc.gz
en
0.937309
637
2.6875
3
problem 1) What is Normalization? Describe the condition under which the relation requires to be normalized to 3 NF fro3 2 NF with the help of an ex? problem 2) Compare primary, secondary and clustering indexes. Which of these indexes are dense and which are not? problem 3) What is difference between B tree and B+ tree? Why B+ tree is the better tree structure than B tree for implementation of an indexed sequential file. problem 4) Consider following employee database schema: Employee ( ESSN ,ENAME , DOB , DEPT-NO , SALARY) Dependent (ESSN, DEPENDENT_NAME, RELATION, DOB) Department (DEPT_NO, DEPT_NAME, MANAGER) Perform the following queries using SQL (a) Determine details of dependent for employee having name ABC. (b) Determine name of manager of the department in which employee whose ESSN code is 1234 (c) Determine name of all employees whose age is less than 18 years. (d) Determine DOB of the son of employee having employee code ESSN 5078 problem 5) describe benefits of data replication in DDBBMS? What typical units of data are replicated in a process of data replication?
<urn:uuid:36edd0f2-a5de-429a-8cb5-f0760e57ebc9>
CC-MAIN-2017-04
http://www.mywordsolution.com/question/compare-primary-secondary-and-clustering/92342
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00327-ip-10-171-10-70.ec2.internal.warc.gz
en
0.91014
276
3.09375
3
Girl Scouts - At the Speed of a Girl, Raleigh NC |2011 Temporary Exhibit:|| North Carolina Museum of History 5 E Edenton St, Raleigh, NC 27601 Mon-Sat 9am-5pm; Sun 12pm-5pm The exhibit was designed, built and installed by Design Dimension, Inc. The exhibit pieces have since been uninstalled and relocated to the Girl Scout offices in Raleigh. 100 Years of Girl Scouts Juliette Gordon Low organized the first Girl Scout meeting on March 12, 1912, in Savannah, Ga. Two years later, North Carolina’s first troop met in Eden. By the 1920s, troops were springing up across the Tar Heel State. Today, nearly 70,000 North Carolina girls participate in Girl Scouts, the premier leadership organization for girls, with 3.2 million girl and adult members worldwide. “At the Speed of A Girl” celebrates the 100th anniversary of Girl Scouting and tells the story of Girl Scouts and the contributions they continue to make in North Carolina. The exhibit installation is filled with a rich mixture of vibrant images, compelling artifacts, and personal stories told by prominent former Girl Scouts. Of special note is a 1942 thank-you letter from First Lady Eleanor Roosevelt to Girl Scouts whom she met while visiting Raleigh. Mrs. Roosevelt came to the capital city when serving as one of the first honorary presidents of Girl Scouts. A photograph of the First Lady with Girl Scouts appears in the exhibit. Other items include antique camping equipment, Girl Scout craft projects, and scrapbooks filled with drawings and entries written by former scouts. The design of the exhibit features rough-hewn wood posts juxtaposed against bold colors and vibrant images. A series of simple display cases are positioned around the gallery, with a large teepee shaped case in the center. Wallpaper mural and smaller image reproductions breath life into the great selection of historic photos. Girl Scouts Blog “At the Speed of a Girl” Opens at the North Carolina Museum of History WFMY News Girl Scouts Celebrate 100 Years in 2012 Carolina Parent Raleigh Exhibit Commemorates 100 Years of Girl Scouting
<urn:uuid:98e5e305-3463-4253-8067-d3a99c8b613f>
CC-MAIN-2016-44
http://www.designdimension.com/projects/girl-scouts-at-the-speed-of-a-girl
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719453.9/warc/CC-MAIN-20161020183839-00231-ip-10-171-6-4.ec2.internal.warc.gz
en
0.924911
441
2.328125
2
Hyperspectral remote sensing of river macrophyte vegetation: towards an assessment of wildfowl and fish habitat quality Conference: RSPSoc Annual Conference: New Dimensions in Earth Observation Dates: 8-11 September 2009 Place of Publication: LeicesterAbstract: Submerged macrophytes are key components of freshwater ecosystems but can prove difficult to monitor using digital imaging. In chalk streams, water crowfoot Ranunculus pseudofluitans ssp. pseudofluitans, a perennial, submerged macrophyte, is a keystone species forming a fundamental structural component which influences flow patterns and silt deposition, maintains river depth during summer low flow, and supports high densities of invertebrates. This serves to enhance system productivity to the benefit of fish populations. In addition, water crowfoot provides grazing habitat for mute swans Cygnus olor. To maintain aquatic biodiversity and ecosystem stability, there must therefore be a balance between the distribution and abundance of water crowfoot, mute swan population size and grazing, and the conservation of salmonid populations. This paper explores the relationships between hyper-spectral reflectance characteristics and the surface cover and depth of water crowfoot in a chalk stream. Soft classification techniques are explored as a method for assessing vegetation amount with increasing submergence in the water column.
<urn:uuid:4da14a47-99d1-42a1-9526-d05ded14ac14>
CC-MAIN-2022-33
https://staffprofiles.bournemouth.ac.uk/display/conference/12230
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00465.warc.gz
en
0.866542
278
2.6875
3
Posted on: 5 October 2021 The cost of a new cooling system for your home doesn't end when you purchase an AC unit. You'll need technicians to install the air conditioner in your house. Here are some factors that affect air conditioner installation costs. A load calculation is the first thing an air conditioner technician will do before installing an AC. The calculation tells the technician the amount of heat your house gains during the day. This will help them determine the appropriate AC size for cooling your home. The load calculation is part of a home energy audit, and it will be part of the cost of installing your AC. The assessment will identify air leaks and any issues that could increase the cost of running your air conditioner. Condition of the Ductwork The ductwork acts like the veins of your air conditioner. The air moving through the ducts allows the AC to cool and heat your home effectively. Problems with the ducts are mainly associated with the age of the ductwork. Ducts also malfunction because of leaks. There is reduced airflow when there are duct leaks, which makes your AC work harder to attain the desired room temperature. Oversized ductwork is also another problem that will result in increased run times for the AC. The AC technician will evaluate your ductwork to identify any problems and offer their recommendations. If your ductwork needs to be changed or upgraded, it will add to the air conditioner installation cost. Zones and Controls Zones and controls also affect AC installation costs. Interior structures that need a multiple-zone air conditioner will have spaces that require different types of air conditioning. This is mainly the case in large homes, which require high cooling power in rooms that retain higher heat than other rooms. For example, the kitchen in a large home will have different conditioning requirements than the living room in the same house. Innovations in the air conditioning industry like wireless thermostats give homeowners more control over their AC systems. This technology allows you to control your air conditioning system remotely. However, the cost of AC installation is greater for homes with high zone and cooling requirements. The location of the AC will also affect the cost of installation. If you're replacing an old AC with a new one, you can avoid additional costs by installing the new one at the same location. Changing the location of an AC will mean adding new ductwork and modifying the existing framework. If the AC will be located in upper stories, the extra work will inflate the installation cost. Contact a local HVAC technician to learn more about AC installation.Share
<urn:uuid:e3f6e080-4ac4-49d9-af1e-dd63ce25d072>
CC-MAIN-2022-33
https://raptorhead.com/2021/10/05/factors-that-affect-air-conditioner-installation-cost/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00072.warc.gz
en
0.939411
534
2.296875
2
inside track, the A position of special advantage, as in His relationship with Walter put him on the inside track with the company. This metaphoric expression, which alludes to the inner, shorter track of a race course, has been used figuratively since the mid-1800s. Words nearby inside track, the How to use inside track, the in a sentence France 24 is providing live, round-the-clock coverage of both scenes as they progress. They took cover inside a print works to the north east of Paris, where they held a member of staff as a hostage. Sands was involved in a scandalous-for-the-time romance with the carpenter and there were rumors she was pregnant with his child.New York’s Most Tragic Ghost Loves Minimalist Swedish Fashion|Nina Strochlic|January 8, 2015|DAILY BEAST Eating disorders, on the other hand, are driven largely by biological processes that occur on the inside.How Skinny Is Too Skinny? Israel Bans ‘Underweight’ Models|Carrie Arnold|January 8, 2015|DAILY BEAST Three on-the-record stories from a family: a mother and her daughters who came from Phoenix.I Tried to Warn You About Sleazy Billionaire Jeffrey Epstein in 2003|Vicky Ward|January 7, 2015|DAILY BEAST Suddenly, however, he became aware of a small black spot far ahead in the very middle of the unencumbered track.The Joyous Adventures of Aristide Pujol|William J. Locke Sleek finds it far harder work than fortune-making; but he pursues his Will-o'-the-Wisp with untiring energy.The Pit Town Coronet, Volume I (of 3)|Charles James Wills The grass had a delightful fragrance, like new-mown hay, and was neatly wound around the tunnel, like the inside of a bird's-nest.Davy and The Goblin|Charles E. Carryl No trail was so obtuse, no thicket so dense that members of that regiment would not track them to their lair.The Courier of the Ozarks|Byron A. Dunn He reached down inside my shirt, with a none too gentle hand, and relieved me of the belt that held the money.Raw Gold|Bertrand W. Sinclair
<urn:uuid:23e23b60-28de-4604-8bf5-196f5aec7c68>
CC-MAIN-2022-33
https://www.dictionary.com/browse/the-inside-track
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00476.warc.gz
en
0.958014
497
2.28125
2
Samson Rakas Seize the Night / k Seize the Night / k I came upon a building site like those where we had our first smokes we, born in '78 the bat flew from my shoulder I went in like a maidservant who's about to comb for the first time a word's long hair the word is “paince” a gypsy kid a boy a girl not sure at the centre of the enormously high-ceilinged room sat atop a pile of white plastic chairs I could see the gypsy kid high up with its mouth wide open in order to be fed by swallows my mouth dried up what should I do? awe means your shadow kneeling first and pulling you down forcefully the next moment I was silently trying out my words from the oesophagus up to my gums and with dried larynx then enunciated them correctly: “why did I come to paradise? I never prayed”, “they come to paradise those who have shaken hands with a gypsy” was heard from high above – translated by Panayotis Ioannidis White plastic chairs — armchairs almost — usually bought from Rom sellers driving around in their open trucks, are a frequent sight in summer balconies and gardens in Greece. Seize the Night (2014), Samson Rakas's final version of his Psyttaleia project, is in 24 continuous sections of varying length, bearing as their titles each of the Greek alphabet's 24 letters. It was self-published, each copy being unique, as it consists of the poem in photocopied pages cut and pasted on pages of a second-hand book, the whole being stapled together and including colour photocopies of four beautiful illustrations by @apiastosleizer [“unstoppable laser” in Greek], portraying in tondo four characters appearing in this long poem. A fifth, the gypsy kid of section “k” presented here, adorns the cover — or perhaps I should say (since I have not seen the other copies), my cover: that of “monotype no. 509”. While obviously toying with the number of rhapsodies in the two homeric epics, Seize the Night is a dizzying hybrid poem: part 'road-movie' in Athens (real and imagined) and its environs; part lyrical reflection with rhetorical and dramatic outbursts; bats, gypsies, names of real places and people, poetic and historical allusions, traverse it and contribute to an epiphany (situated more or less in the fragment given here) eventually leading to the poem's apocalyptic end. Its overall effect is mesmerising and impressive. In Rakas' next book-length poem, Amperludahamin (2015, Ypokeimeno, Athens) the journey has been internalised, resulting in an even more masterful but equally idiosyncratic monologue. In 2017, there followed a much longer and ambitious book, Noone (Ypokeimeno, Athens). Samson Rakas was born in 1981 in Piraeus, but grew up on the nearby island of Salamis. (Incidentally, Psyttaleia, mentioned in the first paragraph of these notes, is a small uninhabited island between Piraeus and Salamis: of historical significance, but also of current environmental importance, since it hosts Attica's sewage treatment plant.) Rakas also performs his poetry: on stage or (famously, over a long period) in his car with passengers who have asked for this poetic ride around Athens. He is the co-founder of Ypokeimeno Publications; the animating spirit of the highly original online journal and cultural events platform “1-2”; and the founder of “Academia Romantica”, building further on “1-2”'s mission of elaborating on unexamined historical documents, little-known or neglected poets, etc.Pictured: A drawing by Kyklothymia, from the book 'Οι άλλοι, είσαι εσύ' (The others are you), published by Kyklothymia and To Sfalma. More here.
<urn:uuid:8c0324f1-9dae-4f8e-8216-d9c81b5d8848>
CC-MAIN-2022-33
http://und-athens.com/journal/und-poetry-samson-rakas
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00670.warc.gz
en
0.949992
927
1.523438
2
Traits & Talks: Lessons About Personality & Deliberation from the Negotiations Between Nelson Madela & FW de Klerk By Julia Jennstal $79.50 Paper original This thesis asks the question of whether political behavior primarily is an effect of situation or personality. It claims that personality is a vital component in understanding individual political conduct. The relevance of personality in politics is demonstrated within the field of deliberation. By analyzing personality differences through the well established 'Big Five' model, and assessing constellations effects of various personalities the thesis contributes to a more profound understanding of how fair, equal and legitimate decision-making can take place between individuals. The relationship between deliberation and personality is further developed in an in-depth study of the leadership conduct during the South African peace negotiations 1989-94. Focusing on the chief negotiators, Nelson Mandela and FW de Klerk, and their negotiation conduct, it is shown that vital personality attributes strengthened deliberation during the negotiation process. Through this close scrutiny of how personality might influence the process and outcome of negotiations, the thesis also contributes to the broader field of negotiation research. Return to Coronet Books main page
<urn:uuid:8b97aa7b-e605-4648-8f00-2538b9691a89>
CC-MAIN-2022-33
http://coronetbooks.com/books/trai3753.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00471.warc.gz
en
0.906598
260
1.984375
2
Jesuit High School's 53rd Annual Food Drive Aims to Help Hundreds of Local Families During the Holidays Food collected by students will reach more than 15 feet in Student Center BEAVERTON, Ore. – On Wednesday, Dec. 15, at 2:15 p.m., the Jesuit High School Student Center will become a food sorting and distribution center, with canned food that reaches the ceiling, just more than 15 feet. The JHS student body will bring all of the food that has been collected over a two-week period and begin compiling food boxes for 315 families in the Portland area. All leftover food will be shared with local food pantries. The JHS Food Drive is in its 53rd year and has seen a huge increase in participation over the years. In its first year, 1969, roughly 40 families benefited from the project and just a little more than $350 was raised. "As Jesuit High School has grown, so has its Food Drive. The drive not only helps families experiencing food insecurity during the Christmas season but also provides non-perishable foods for local food banks that serve families in need year round," said Andrea Casey, Food Drive Coordinator. Students, faculty, and staff will volunteer through the night of Dec. 15 sorting and preparing the food for delivery on Thursday, Dec. 16, beginning at 12:00 p.m. "Throughout these last two weeks before Christmas break, our students are collecting non-perishable food items and making donations to go towards purchasing perishable foods. We are also raising awareness about hunger in Oregon. We hope students will realize this is not a once-a-year issue. It is year-round," said Casey. The families are pre-selected through St. Vincent de Paul and Lifeworks Oregon. Students will deliver all of the food that has been collected at Jesuit High School over the prior two weeks. In addition, alumni of Jesuit High School will host their own non-traditional Food Drive on December 18. 3,000 gift cards will be distributed to families in our community and alumni will deliver to 300 of these families. "The Alumni Food Drive brings our community together to continue our mission of being men and women for others," said Kathy Baarts, Alumni Director. "The need for food continues to increase and we have continued to grow in the number of families we serve. As an additional service component this year, we will also be packing hygiene kits to be distributed at the Blanchet House." If you are interested in donating products and/or packing hygiene kits, please contact the JHS Alumni Office at 503-291-5414 or [email protected]. About Jesuit High School: Founded in 1956 by the Society of Jesus, Jesuit High School is Oregon's only secondary school in the Ignatian tradition of excellence in education. Our 1,273 students represent a diverse mix of young men and women from the Portland metro area and southwest Washington. Jesuit High School's mission is to educate "men and women for others." Our graduates are leaders who are religious, loving, intellectually competent, committed to doing justice, and open to growth. Jesuit is the recipient of two U.S. Department of Education Blue Ribbon School of Excellence Awards, a U.S. Department of Education Green Ribbon Award for its sustainability efforts, and 16 OSAA Cup Awards for outstanding achievement in academics, school activities, athletics, and sportsmanship. More information can be found online at www.jesuitportland.org.
<urn:uuid:3b9a0a04-9e43-498a-b6bf-2d303fd85672>
CC-MAIN-2022-33
https://www.jesuitportland.org/our-community/news/news-details/~post/jesuit-high-schools-53rd-annual-food-drive-aims-to-help-hundreds-of-local-families-during-the-holidays-20211213
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00472.warc.gz
en
0.960903
723
1.648438
2
'Do you see that mountain?' asked the king, pointing to a huge mass that towered into the sky about three leagues from Schiraz; 'go and bring me the leaf of a palm that grows at the foot.'rn rn The words were hardly out of the king's mouth when the Indian turned a screw placed in the horse's neck, close to the saddle, and the animal bounded like lightning up into the air, and was soon beyond sight even of the sharpest eyes.rn -from "The Enchanted Horse"rn rn A startlingly prolific collector of fairy tales from around the world, Andrew Lang, in this 1898 work, brought together in one volume the "fairy tales of the East," the delightful and resoundingly entertaining adventures of The Arabian Nights. rn rn Translated from a French version that omits all the "very dull and stupid" additions of early European retellings, this wonderful book regales us with the stories of Sindbad and his seven voyages, the "Vizir who was Punished," Aladdin and his magic lamp, and many, many more. rn rn Complete with beautiful pen-and-ink illustrations, this is a collection to treasure, whether you're studying comparative mythology or just seeking a rollicking good read.rn rn Scottish journalist and author ANDREW LANG (1844-1912), a friend of Robert Louis Stevenson, produced a stunning variety and number of volumes, including books of poetry, novels, children's books, histories, and biographies, as well as criticism, essays, scholarly works of anthropology, and translations of classical literature.
<urn:uuid:539eac1f-990d-4ec2-9df9-f3a4b4770de4>
CC-MAIN-2017-04
https://www.moluna.de/buch/4227813-the+arabian+nights+entertainments/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00401-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957598
336
2.21875
2
Thame Remembers, an historic community project to place crosses on the graves of 190 men from the town who have died in conflicts in the past 120 years, formally launches tomorrow. Crosses will be laid at the 32 graves and memorials in St Mary’s Churchyard, Thame. The evening will include a church service at 6pm followed by an open-air ceremony involving local dignitaries. A team of volunteer researchers has spent four months tracking down details of the Thame men who died in the First and Second World Wars, the Boer War and Korea, painstakingly identifying where they were killed or laid to rest. Some are buried in St Mary’s Churchyard in Thame, many more in France and Belgium. But the remainder ended their days in far-flung locations, including Greece, Italy, Egypt, Iraq, India, New Zealand and Tanzania. Some died at sea. The project aims not only to formally record the histories of these men but also to involve the community in a unique act of commemoration. Project co-ordinator Mike Dyer said: “We are appealing to anyone with an appropriate connection to the men or the town to help us lay a Thame Remembers cross on the grave of each serviceman and to formally record the moment. “Whether they are a relative who would like to join a planned trip to the battlefields of France or Belgium, or a resident who happens to be going abroad on business or holiday, the project would love to hear from anyone inspired to take part.” Volunteers will be given a special Thame Remembers two-bar cross for each ceremony. This is a recognised representation of the Holy Cross which the people of the town chose as its emblem in the early years of the Second World War. A project website – thameremembers.org – provides full details of how to get involved and will record the cross-laying campaign as it develops. The team has also produced a special promotional video, shot in Thame, which re-creates a soldier’s departure from home and experience of war. The video can also be seen on the website. Tomorrow’s event, marking the 100th anniversary of the eve of the declaration of war, will start with a commemorative church service at 6pm and then participants and public will assemble on the outfield of the cricket pitch which overlooks the churchyard. A lone piper from the RAF Halton Pipe Band will play in the churchyard whilst local dignitaries and representatives of youth groups take position, announced by members of Thame Players Theatre. The cross-laying ceremony will then take place at about 7.30pm, conducted by a series of bugle calls, in the tradition of the Ox & Bucks Light Infantry. Two of the ceremonies will involve relatives of those being remembered. Throughout the evening there will be displays explaining the project and others relating to the war in general. Refreshments will be available. Following the event the church will remain open for anyone wishing to reflect in their own private vigil. Thame Remembers was the brainchild of David Bretherton, a local councillor and former RAF engineer who was instrumental in creating Thame Museum. He said: “We wanted to mark the 1914 anniversary with something which would involve the community directly in honouring these men and leave a lasting legacy of research and commemoration. I am confident the people of Thame will rise to the challenge.” Do you want alerts delivered straight to your phone via our WhatsApp service? Text NEWS or SPORT or NEWS AND SPORT, depending on which services you want, and your full name to 07767 417704. Save our number into your phone's contacts as Oxford Mail WhatsApp and ensure you have WhatsApp installed. Our top stories
<urn:uuid:04261d84-33c6-44e4-ac91-6270bdb24e48>
CC-MAIN-2017-04
http://www.thisisoxfordshire.co.uk/news/11383033.Thame_gets_ready_to_remember_war_dead/?ref=rss
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00311-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957297
791
1.859375
2
Commonsense Rebellion with Bruce Levine, dissident psychologist and author of Commonsense Rebellion: Taking Back Your Life from Drugs, Shrinks, Corporations, and a World Gone Crazy, discusses the social forces that drive people to depression, anxiety, and mental breakdown, and how community and caring are the way to a healthier self and world. Subscribe or Follow Us! Subscribe to Madness Radio updates by email - Somatic Trauma Therapy | Phillippe Citrine & Jacks McNamara | Madness Radio - Schizophrenia Factory Christmas Story | Will Hall | Madness Radio - Survivors As Therapists | Jacks McNamara | Madness Radio - Bicycles and Madness! | Nedra Deadwyler | Madness Radio - Nothing About Us Without Us | Jay Mahler | Madness Radio - Medication Withdrawal | Adele Framer | Madness Radio - Oddball Magazine w/ Will Hall | Jason Wright | Madness Radio - A Little Crazy – Show Me All Your Scars | Susie Meserve | Madness Radio Have You Heard? - Paul Levy, counselor, teacher, and coordinator of the Padmasambhava Buddhist Center in Portland, Oregon, speaking on his spiritual emergence from psychosis to mystical awakening. Also … Recent Blog Posts - Thinking Upstream: Winning Real Mental Health Reform By Joining the Anti-Corruption Movement - Cannabis for Treating Mental Health Conditions? A Clear Yes, Maybe. - Letter to the Mother of a “Schizophrenic:” We Must Do Better Than Forced Treatment and Laura’s Law - Thai Translation of Coming Off Meds Guide! - Is it Depression? Or Melancholy? Or… - The Substance of Substance Use: Talking About Marijuana, Alcohol, and Other Drugs - Do You Think It’s Real? Responding to Alternate Realities - Dylan Tighe – “RECORD: Questioning A Scientific View of Mental Health” Play Features Madness Radio - Sabrina V Lin: on Oddball Magazine w/ Will Hall | Jason Wright | Madness Radio: I don't think I have schizophrenia. I was labeled by the hospital to keep t - Sabrina V Lin: on Oddball Magazine w/ Will Hall | Jason Wright | Madness Radio: The reason why science cannot be trusted is because does not emotionally co - Sabrina V Lin: on Oddball Magazine w/ Will Hall | Jason Wright | Madness Radio: I think there is something wrong with the people who research and create ne - Sabrina V Lin: on Nothing About Us Without Us | Jay Mahler | Madness Radio: My experience in the hospital is tat the staff members enjoy inflicting pai - yana jacobs: on Nothing About Us Without Us | Jay Mahler | Madness Radio: Listened to this amazing 2 hour interview. What a gift that you were abl Activism Addiction Alternatives Art Big Pharma Books Children Coming Off Meds Community Depression Diagnostic Labels Documentary Dreams Drugs Ecology Electroshock Families Genetics Healing Trauma Hearing Voices History Holistic Health Human Rights Indigenous People International Mad Science Meditation Music Neuroscience Personal Stories Philosophy Poetry Police & Prisons Process Work Professionals Psychiatric Abuse Race Real Paranoia Relationships Sexuality Social Justice & War Spirituality Suicide System Reforms Video
<urn:uuid:452f21d1-bedd-4748-a2f5-d417c73e53fe>
CC-MAIN-2022-33
https://www.madnessradio.net/madness-radio-2006-10-04-bruce-levine-commonsense-rebellion/?replytocom=1328
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00078.warc.gz
en
0.789891
684
1.59375
2
Stories of Significance: The Process and Practises of Sense-Making in the Sherlock Fan Community Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis Building on professor of psychology Kenneth Pargament’s claim that people actively seek to establish a sense of significance and strive to minimize its loss, this study argues that fans of fictional works continually create a (subjectively seemingly) coherent interpretation of the source text that both builds upon and supports meaningful themes and phenomena found in the text. This, in turn, generates a subjective (though often communally negotiated) sense of significance. However, such meaningful/meaning-creating interpretations – and thus the sense of significance generated by them – are constantly running the risk of being disturbed by new information or perspectives that contradict them. This risk is particularly high when the source text is still evolving, as in the case of a current book series or TV-show, which necessitates an on-going process of interpretation and coping. In this thesis I examine how a sense of significance is formed and maintained by fans of an evolving text by studying the various interpretative strategies employed by fans of the BBC TV series Sherlock. Combining in-depth interviews with data from a three-month participant observation of fan interactions primarily but not exclusively on the social network platform site Tumblr, this study aims both to deepen the understanding of some of the psychological mechanisms behind the creation, negotiation and transformation of meaning, and to examine its expressions in a specific case. Place, publisher, year, edition, pages 2015. , 120 p. Masteruppsatser i kulturantropologi, ISSN 1653-2244 ; 54 coping theory, production of meaning, virtual anthropology, sherlock, tumblr, fan studies, fan psychology IdentifiersURN: urn:nbn:se:uu:diva-255315OAI: oai:DiVA.org:uu-255315DiVA: diva2:821716 Subject / course Masters in Humanities, Cultural Anthropology Bodén, Daniel, Doktorand i etnologi Sverker, Finnström, Docent, universitetslektor
<urn:uuid:e0055b9a-d45c-4ff8-93a4-8447030352ed>
CC-MAIN-2016-44
http://www.diva-portal.org/smash/record.jsf?pid=diva2:821716
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00240-ip-10-171-6-4.ec2.internal.warc.gz
en
0.857047
467
1.898438
2
Part Two: What we know, and don’t know Although the adjective ‘unprecedented’ has been largely overused this past year, there really is no better word to describe 2020. It was an unprecedented global pandemic that kicked off the year; an unprecedented one-quarter plunge in U.S. GDP; unprecedented fiscal and monetary policy response; unprecedented work from home surge; unprecedented peaceful and not-so-peaceful protests around the country; and finally, and most importantly, unprecedented speed to a medical solution to COVID-19. As we flip to 2021, and as the vaccines are now getting rolled out to millions each week, we are also beginning to feel, perhaps, an unprecedented level of optimism. The road ahead will be bumpy, in particularly the first few months of the new year, but there is light at the end of the tunnel. In a series of three snapshots focused respectively on the economy; key office trends—what we know and don’t know; and a 2021 outlook, we explore some of the factors that will shape this calendar year. Part Two: U.S. office sector: what we know, and don’t know It is an understatement to say the office sector outlook remains unclear. In fact, there are still many unknowns that will influence the shape of the office recovery for years to come, such as the path of the virus itself; the rollout of vaccines; school openings; employee and employer confidence; and the work-from-home (WFH) dynamic. So, rather than speculate, we are sharing a few key trends that we do know lay the foundation for a possible path forward. - The office leasing fundamentals were severely damaged last year. We observed 104 million square feet (msf) of negative absorption in 2020, which is already more severe than what we observed during the Great Recession. Sublease space soared—about 50% of the negative absorption observed last year came from newly added sublet space. Office vacancy rose from 12.9% pre-pandemic to 15.5% by year-end. When we line up the office-using job losses that occurred last year (1.15 million) with the amount of negative absorption, it suggests that vacancy will continue to rise—at least for the next couple of quarters—as businesses continue to right-size office footprints and WFH trends filter through. - Most companies will not go 100% remote. According to multiple studies and surveys, conducted both by the CRE industry and outside of the industry, most companies are not moving to a 100% remote model. There may be some companies that return to 100% in-office and some that experiment with 100% virtual, but these will be the outliers post-COVID-19. Although there is no consensus on the optimal balance of remote vs. in the office, and it will undoubtedly vary greatly based on many factors such as the business itself, the industry, the job function, personnel and other factors, most surveys show that employees and employers expect to spend 2-3 days in the office post-COVID-19. - Most businesses are not fleeing CBDs. According to our data, in a typical year, CBDs account for 30-40% of all leases, and in 2020, CBDs again account for 30-40% of all leases (32.6% to be precise). Of course, 2020 is a difficult year to analyze, since it is a much smaller sample size, but based on the data we have, there has been no evidence that businesses are fleeing CBDs en masse. Multifamily rental data does show more strength in the suburbs in 2020, which makes sense since much of the benefits of living in a city have been temporarily eroded by the pandemic, quarantining and government lockdowns. This could reverse back towards CBDs and city centers more quickly than office occupancy can pivot given the relatively short length of multifamily leases. Bottom line: it is premature to conclude that a permanent shift to the suburbs is occurring beyond the norm (we did expect some millennials to go there at some point) as it seems quite intuitive that there would be some migration out of densely populated cities when you are in the middle of a global pandemic. - Most businesses not fleeing big cities. Likewise, there is no evidence thus far that the majority of businesses are leaving large cities for small cities. In a typical year, about one-third of all office leasing in the U.S. occurs in gateway cities (Boston, Chicago, Washington, DC, Los Angeles, New York, San Francisco), and in 2020, it was about the same, 32%. Likewise, there is no evidence that investors are also fleeing gateways either. Office sales activity was down sharply virtually everywhere in 2020, but it was down equally in major markets vs. non-major markets. If anything, the gateway cities gained market share last year accounting for 38% of total U.S. sales in 2020 vs. 36% in 2019. That said, there has been some movement and relocations to the sunbelt region and to lower cost markets, but that was a trend that started well before COVID-19. The key question is, will migration patterns fundamentally shift as a result of COVID-19 or from a larger adoption of a decentralized, agile workforce? Again, too soon to say. We will be monitoring migration data closely this year. We will continue to closely monitor, evaluate and report back on these key trends all throughout this year and beyond. Up next: U.S. Office Sector Outlook in 2021
<urn:uuid:cfe2e8a5-2b0f-43e1-bc19-c18abdfd7c01>
CC-MAIN-2022-33
https://www.cushmanwakefield.com/tr-tr/insights/the-chief-economist/us-office-sector-what-we-know-and-do-not-know
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00070.warc.gz
en
0.960398
1,146
1.523438
2
"Can I see that?" his friend, Josh, put down the elephant he was holding to examine the cow-eating alligator. How realistic the Schleich animal action figures are! My imagination traveled to all sorts of places with one glance at the animals the boys were examining: African Safaris, Wisconsin dairy farms, Everglades National Park, and a Kentucky horse farm. What hours of fun the boys had examining and playing with these animal action figures. "And God said, 'Let the water teem with living creatures, and let birds fly above the earth across the expanse of the sky.' So, God created the great creatures of the sea and every living and moving thing with which the water teems, according to their kinds, and every winged creature according to its kind. And God saw that it was good. God blessed them and said, 'Be fruitful and increase in number and fill the water in the seas, and let the birds increase on the earth.' And there was evening and there was morning--the fifth day. "And God said, 'Let the land produce living creatures according to their kinds: livestock, creatures that move along the ground, and wild animals, each according to its kind.' and it was so. God made the wild animals according to their kinds, the livestock according to their kinds, and all the creatures that move along the ground accordin to their kinds. And God saw that it was good." (Genesis 1:20-25 NIV) God, the benevolent Creator of all things, made sea and land animals incredibly lovely and amazing to look at. What joy there is in seeing all of God's creation in its natural habitat. For those of us who cannot travel around the world and enjoy all the living creatures the Lord has created, Schleich gives us a great idea of what all these creatures look like. There is an artistic beauty in these little action figures that makes one appreciate the Creator behind the animals' existence. The World of the American Frontier looks very realistic too with Native Americans, pioneers, a canoe, and a tepee. What fun these collection of 19 hand-painted models would add to a unit study on pioneers. Your children might even act out a drama with the figurines and videotape it for the rest of the family. The World of Knights and Castles is adorable with a huge variety of knights, a jester, a dragon, a princess, a king, a queen, and an ox cart. There is also a battering ram, catapult, castle wall, well, stable, and siege tent. There are enough different knights for an entire battle to take place on your kitchen floor to rescue the princess or slay the dragon. The children can play with this set to act out what they have learned about knights, castles, crusades, wars, and historical events. An oceanography unit study could use a set of Sea Animals and there are Wild Animals from every continent in the world for geography studies. The possibilities are endless for educational play using these figurines. Are toys a good investment for your home school, especially in these hard economic times? Every family must answer that question for itself. If there is room in the budget for more than books, textbooks, and workbooks, consider these lifelike figurines as a tool in your child's hand to explore the wonderful world God has made. Merey (Meredith Ludwig Curtis)
<urn:uuid:499b91df-3c70-47f8-8ab7-889aa4a03990>
CC-MAIN-2022-33
http://www.meredithcurtis.com/blog/review-of-schleich-action-figures
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00076.warc.gz
en
0.956582
706
2.265625
2
Ms. Yanghee Lee (Republic of Korea) is a professor at Sungkyunwan University. She is highly recognized nationally, regionally, and internationally for her expertise in human rights and served as member (2003-2013) and chairperson of the Committee on the Rights of the Child (2007-2011). She has also served as chairperson of the Meeting of Chairpersons of Treaty Bodies (2010-2011). Nationally, Ms. Lee currently serves on the Advisory Committee of the National Human Rights Commission of Korea. She is the founding President of International Child Rights Center, and currently serves as Vice-chair of the National Unification Advisory Council. In 2009, she received the Order of Civil Merit, the highest recognition given to a civilian for her work in human rights. Regionally, she actively takes part in Asia Pacific debates and actively participates in ASEAN Human Rights Discussions in areas of children and armed conflict and human rights within the context of migration. Internationally, Ms. Lee is recognized for her work as member and chairperson of the Committee on the Rights of the Child. She has taken an active role in the Strengthening of Treaty Body System Process, including the Dublin Process. Of importance, her efforts in reopening the discussions on the need for a communications procedure for children which ultimately led to the adoption of a 3rd Optional Protocol are recognized. Ms. Lee has earned a B.S. Degree from Georgetown University, M.ED. and Ph.D. from University of Missouri-Columbia. She has published numerous articles and books on human rights and children’s rights. La presentación de información y contacto La información relevante para el titular del mandato es muy bienvenido y puede ser enviado a: [email protected].
<urn:uuid:e904a7ab-0704-45c4-9ae5-de8e954eb827>
CC-MAIN-2017-04
http://www.ohchr.org/SP/HRBodies/SP/CountriesMandates/MM/Pages/SRMyanmar.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00118-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932327
386
1.789063
2
In the 19th century’s world of aristocratic dilettantes there are a few greats that stand out, but until more recently one of those visionaries was commonly overlooked. Ada Lovelace may very well have conceived of computer science and she is often credited as the first person to write a computer program. Nearly 200 years later, Ada is receiving credit, and fame, for her work. Indeed, Ada has become a figurehead for women in STEM (science, technology, engineering, and mathematics). This book is a long-awaited biography for Ada, whose ideas could have changed the world had the world allowed her the opportunity. Why is this on our bookshelf? In a world just coming to grips with the power of steam engines is a theoretical device called the Analytical Engine. This device uses punch cards to input variables and a sequence of operations on those variables. Charles Babbage, the inventor of the Analytical Engine, envisions the device would assist the science of Mathematics. It would, for example, be able to perform mathematical operations on infinite numbers without losing precision. Ada Lovelace thinks this device can do a lot more than simple mathematical calculations. She makes a distinction between mathematics and the science of operations. Essinger makes the case that this distinction is the basis of modern computer science. Generally though, controversy (there is a lot less these days) on Ada’s place in history centers on an Algorithm she wrote for the Analytical Engine that would generate Bernoulli numbers. Many claim this to be the first computer program though untestable because the Analytical Engine was never built. Essinger leaves that decision up to the reader, but outlines a clear case that Ada was a brilliant mind in the field of computer science—a discipline that would not exist for another 100 years. Rating (3 stars) Queen Victoria’s England happened nearly 200 years ago. Ada’s world is dramatically different and although Ada herself was visionary, I had difficulty relating to Essinger’s depiction of Ada’s surroundings, her lifestyle, and her compatriots. My desire for a more engaging narrative is offset by the readily apparent research Essinger has done. It would seem that every critic of Ada’s genius has been addressed and every grammatical or factual misstep found in her communications has been explained. Essinger describes her life with obvious respect, perhaps admiration, but also with a careful sense of journalistic objectivity and precision. Ada’s Algorithm would be ideal for a STEM-infused High School History course. It provides insight into not only Ada, but also into Charles Babbage’s scientific accomplishments and the industry of the time. Ada Lovelace was part of England’s Aristocratic society and therefore had interactions with much of Western Europe’s well-to-do. Read this book: If you don’t believe Ada Lovelace wrote the first computer program. Or if you’re into steampunk, roleplaying seriously intelligent Victorian English aristocracy, or computer science. Don't Read this book: If you’ve already read A Female Genius: How Ada Lovelace Started the Computer Age which is the UK version of this book also written by Essinger. Once you're done, do this: Read Ada’s most notable work, including her Algorithm: http://www.fourmilab.ch/babbage/sketch.html
<urn:uuid:41dac30d-3988-4c79-a680-a4e55e23a323>
CC-MAIN-2022-33
http://geekylibrary.com/library/adas-algorithm/?mc_cid=3e2f9231d9&mc_eid=779f840aca
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00466.warc.gz
en
0.962076
719
3.484375
3
In Greek mythology, the almond tree represented youthfulness and fragility. The firm ivory nut, which grows protected in a beautiful soft green velvet shell, is very much appreciated for its cosmetic properties. It moisturises, nourishes, smoothes and firms the skin, and these properties in combination make the new firming almond body care range effective and delightful to use. In spring, the almond tree covers itself with delicate white flowers, but it will be necessary to wait for the month of October so that they become fruits. Different assets are derived from the beans: With the shell of the Almond crushed particles are obtained the Almond Delicious paste for exfoliating the skin. The nut of the Almond brings other active ingredients of the products of this line: • Oil Almond which transforms into Almond butter (which nourishes and gives flexibility to the skin). • Almond powder with Almond proteins, this ingredient will be removed Almond milk, which gives the products of this line smoothing and softening properties. Discover the almond collection
<urn:uuid:5fed8990-2ccf-4518-8a18-0890c7b4a75b>
CC-MAIN-2017-04
http://fi.loccitane.com/almond%2C52%2C1%2C6854%2C89189.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00188-ip-10-171-10-70.ec2.internal.warc.gz
en
0.921972
216
1.59375
2
Cuvier’s beaked whale Ziphius cavirostris, Cuvier These are shy and peaceful whales. Cuvier’s beaked whales spend most of their time under water. They are relatively small although they can reach 6 metres. Long and slim, the color of their body can be from dark grey to dark brown. Their head ends with a beak. Males may feature 2 visible teeth in the lower jaw. Although not yet scientifically confirmed, they are believed to have a lifespan of up to 60 years. They are exceptional divers : up to 1.5 hour and 2500 meters deep ! They do so in order to feed on cephalopods and fish. We can usually see them in groups of 3 to 7 individuals. No known marin predators, other than threat from direct capture by fishing gear, collision with boats and ingestion of plastic. They do not seem to appreciate boats and this makes their study difficult.
<urn:uuid:56261c8c-480d-4386-a8e1-b0254b0c388b>
CC-MAIN-2022-33
https://ontales.com/species/cuviers-beaked-whales/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00673.warc.gz
en
0.948548
204
3.28125
3
Python Algorithms, Second Edition explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques. The book deals with some of the most important and challenging areas of programming and computer science in a highly readable manner. It covers both algorithmic theory and programming practice, demonstrating how theory is reflected in real Python programs. Well-known algorithms and data structures that are built into the Python language are explained, and the user is shown how to implement and evaluate others. Python Algorithms: Mastering Basic Algorithms in the Python Language, 2nd Edition ISBN: 148420056X | 2014 | PDF | 320 pages | 3,61 MB
<urn:uuid:f7b7aa48-e539-4836-97e9-e957cc6d8378>
CC-MAIN-2017-04
http://www.lanqibing.com/archives/1212.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00032-ip-10-171-10-70.ec2.internal.warc.gz
en
0.881082
169
3.328125
3
The Seven Princesses of Atlantica (commonly referred to as the Daughters of Triton) are the daughters of King Triton and Queen Athena, debuting in the 1989 Disney animated feature film, The Little Mermaid. Attina is a princess of Atlantica, and the fourth daughter of King Triton and Queen Athena. However, the prequel portrays her as the eldest. In her 2008 portrayal, her age causes her to feel a certain sense of responsibility for her sisters. She is described by her sisters in that film as being bossy, but ironically, she herself is often bossed around when her siblings outvote her. In the books, she is a bookworm and has a pet catfish named Fin Fin. - Her favorite hobby is researching the history of the sea. - Her pet peeve is mer-people that litter in the coral reef. - Her biggest fear is letting her father down. - Her favorite food is kelp wrap. - Her favorite color is orange. - Her favorite genre of music is classical. - Her favorite instrument is the harp. - In the book series, she's a bookworm and a writer, and owns a catfish named Fin Fin. Alana is the second oldest princess of Atlantica, and the sixth daughter of King Triton and Queen Athena. Her hair decoration is similar to a crown, and like Attina's and Triton's, has five points, although in a different style, representing that she is currently next in line to the throne after Attina. She appears to be the one who is most interested in beauty and health. She speaks of her looks often, but she is, by no means, selfish or vain. - Alana is 20 years old in the prequel. - Her sisters say she's glamorous. - Her hobbies are picking wildflowers and making beauty cremes. - Her pet peeve is having a bad hair day. - Her biggest fear is having scaly skin. - Her favorite color is purple. - Her favorite food is low-salt coral blossom stew. - Her favorite music genre is jazz. - Her favorite musical instrument is the tambourine. - In the books, she is shy, likes to spend time tending her sea garden, and has a pet sea turtle. - In the TV series she has a friend named Pearl who is a partygirl. - She has the most lines in the broadway musical version of The Little Mermaid. Adella is the fifth daughter of King Triton and Queen Athena. In the prequel film, she is boy-crazy, and wishes to dance with, and later kiss a boy. For some reason, she has also gone through a transformation in her life; in her early years, she was shapely and thin. After her father reinstated music, she gained a little weight, as seen in the TV series. However, in the sequel film, she appears to have lost the weight she gained. - Adella is 19 years old. - Her sisters say she's boy-crazy. - Her hobbies are talking about boys and dancing with Sluggie. - Her pet peeve is when Andrina makes fun of her. - Her biggest fear is that she will never be kissed. - Her favorite color is light green. - Her favorite food is sea cucumber sandwiches. - Her favorite genre of music are romantic ballads. - Her favorite musical instrument is the violin. - In the books, she tends to be shallow and vain and she has many dates with merboys. Aquata is the third daughter of King Triton and Queen Athena. She is the most obsessive-compulsive of her sisters; when Arista borrowed her things, including her hairbrush, her "lucky" seashells, her pillow, and her stuffed seahorse, Mr. Fuzzifinkle, she displayed frustration and some hostility, and an impulse to get her things back immediately. She isn't a good dancer, even saying herself that she looks "like a spastic piece of kelp." Her sisters encourage her to dance anyway, and she grows more confident (but not any better at dancing), even starting a conga line at the end of Ariel's Beginning. - Aquata is 18 years old. - Her sisters say she's tough. - Her hobbies are water sports. - Her pet peeve is when Arista borrows her stuff. - Her biggest fear is is dancing in public. - Her favorite color is baby blue. - Her favorite food is sea daisy stir-fry. - Her favorite genre of music is rock n' roll. - Her favorite musical instrument are the drums. - Her name means "watery" in Latin. Arista is the fourth daughter of King Triton and Queen Athena. She wears her hair in a pony tail similar to Aquata's, although their bangs are different. She tends to take a lot of Aquata's things in Ariel's Beginning. In her television appearances, she tended to be jealous of Ariel's adventurous ways and joined her youngest sister on adventures. Based on the prequel film Ariel's Beginning, she is the most energetic one, though she adopts a more by-the-rules personality, by the time of the TV series, as shown in the episodes, "Against the Tide," and "Beached". Although, in the latter, a small bit of her energetic side surfaces again to help Ariel stop thieves from robbing the Royal Treasury. - Arista is 17 years old. - Her sisters say she's fun loving. - Her hobbies are playing in the band. - She doesn't know what a pet peeve is. - Her biggest fear is forgetting a rehearsal. - Her favorite color is red. - Her favorite food is sea sponge swirl (almost like cotton candy). - Her favorite genre of music is calypso. - Her favorite musical instrument is the horn (although a clarinet is pictured). - She plays the sea equivalents to both a saxophone and clarinet in Ariel's Beginning (and both could be called horns). Andrina is the sixth daughter of King Triton and Queen Athena. She appears to be the joker of her sisters, as seen by her many jokes in the prequel film. - Andrina is 16 years old in the prequel - Her sisters say she's witty. - Her hobbies are gossiping, exploring, and swimming with dolphins. - Her pet peeve is mer-people who can't take a joke. - Her biggest fear is having a boring life. - Her favorite color is violet. - Her favorite food is everything! - Her favorite genre of music is pop. - Her favorite musical instrument is guitar. Ariel is the seventh daughter of King Triton and Queen Athena. She is adventurous and curious, especially about human things. She also enjoys music and singing, but can sometimes forget about responsibilites she has. She can also be easily distracted. She is the only princess of Atlantica to not have any specific hair accesory. She is the youngest one and the first to become a mother in her later years after being married to her prince. - Ariel is 15 (until the first movie, when she turns 16). - She is most likely 15, because the original story set the little mermaid to be 15 before she went to the surface. - Her sisters say she's unpredictable. - Her hobbies are collecting gadgets and gizmos. - Her pet peeve is rules that don't make sense. - Her biggest fear is being told that something is impossible. - Her favorite color is turquoise. - Her favorite food is the surface food, called strawberries. - Her favorite genre of music is every kind! - Her favorite musical instrument is the piano. - Each of Triton's daughters has a different hair and eye color in the third movie, but in the first movie, they all have blue eyes. - Point of reference, Adella admits in Ariel's Beginning, to being two years older than Ariel therefore making her the fifth daughter. - Ariel resembles her mother but acts like her father. - Arista is shown in the animated series to have Ariel's attitude just like her father. - Arista's bangs often change sides between scenes. - Another feature between them is that six have different updo hairstyles, while Ariel is the only one with her hair down. - Ariel is also the only one whose seashell bra doesn't match her tail color. - Like in the original story, they are all one year apart from each other. - Although Ariel's Beginning lists their birth order as Attina, Alana, Adella, Aquata, Arista, Andrina and Ariel, the original film's song, "Daughters of Triton", strongly implies that their birth order was Aquata, Andrina, Arista, Attina, Adella, Alana and Ariel. - Their tails are the different colors of the rainbow. - Arista - red; Attina - orange; Adella - yellow; Ariel - green; Aquata - blue; Andrina - purple; Alana - pink. - In the prequel film, their eye colors differ. - Attina - green; Alana - violet; Adella - teal; Aquata - brown; Arista - ice blue; Andrina - hazel; Ariel - blue. - There is a color error on some of them in some clipart and Ariel's pages of the Disney Princess find-it book.
<urn:uuid:149d5b9c-e285-4080-abd9-7b7dfa3287ef>
CC-MAIN-2016-44
http://disney.wikia.com/wiki/Alana
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00003-ip-10-171-6-4.ec2.internal.warc.gz
en
0.957871
2,038
1.90625
2
It’s never too late to learn to cycle… 08 June 2022 By RJ Heron Local Councils in Sussex & Surrey are offering cycling training and maintenance courses, the sessions are priced ranging from £15 for a beginner to £40 for more advanced courses, some group sessions are even available free of charge. Everyone welcome, no matter your ability! The sessions are tailored and available to people of all cycling abilities, whether you are entirely new to cycling or a regular cyclist looking to develop new skills. The team can also help with route planning for those looking to cycle a regular route. The fully trained instructors follow the nationally recognised Bikeability syllabus, starting with the basics of cycling and an assessment in a safe off-road environment. Beyond this level there are intermediate and experienced courses allowing for people to fully master the pedals. Find the link for your area below: West Sussex County Council – Due to increased demand WSCC are currently not taking any new registrations for training, but keep an eye out! Surrey County Council – Private training sessions have currently been suspended but will hopefully resume soon. How to get started We are lucky that within Brighton & Hove we have BTN BikeShare points close to many of our sites, making it easier to access a bike short term. It is a great way to test whether cycling is for you. It currently costs just 3p per min or £77 for an annual subscription. You could also consider getting a bike through your Trust’s cycle to work scheme. We’ve included some links to more information below: If you would like any more information or your Trust is not listed, ask your line manager what cycling related employment support is available. A positive change for our health and the planet Cycling is a great way of getting around with the added benefit of the low carbon impact, helping us reduce emissions to tackle the causes of climate change. This also helps improve local air quality for the whole community, including our patients. A win-win for the environment and us all! Incorporating cycling into our lives also improves our physical and mental health by encouraging us to exercise more. Another great benefit is that you’d also be saving money by opting to travel by bicycle, reducing fuel bills and car wear and tear. If you need some encouragement to get cycling, why not make either our ‘one less car journey’ or ‘active commute’ pledge to get you going? You can make your pledge here.
<urn:uuid:16842f80-aa0d-42d5-9f84-9c485344011b>
CC-MAIN-2022-33
https://www.carewithoutcarbon.org/its-never-too-late-to-learn-to-cycle/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00268.warc.gz
en
0.952185
518
1.976563
2
Welcome to Xuru's Website. This site is devoted to maths, physics and computing. Maths: My main interests in maths are related to fractional calculus, number theory and experimental mathematics. Physics: My interests in physics are focused on fundamental physics. Computing: My interests in computing are mainly related to my interests in maths and physics. I am also very interested in artificial intelligence, automated discovery, computability and complexity. For now the website has five main sections. In the section of fractional calculus you can see my introductory notes on this subject. In the sections of regression tools and statistical tools, you can make use of some useful and easy to use regression and statistical tools online. In the section of MESearch you can download the amazing Mathematical Expression Searcher or constant recognition program I have developed. Finally, in the section of screensavers you can see some funny screensavers. I hope you will enjoy these pages. Last updated: March 18, 2016 Euskal Herria - Basque Country
<urn:uuid:5fd3de38-89d9-481a-9b2c-9f1d463c530c>
CC-MAIN-2017-04
http://xuru.org/Index.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00482-ip-10-171-10-70.ec2.internal.warc.gz
en
0.911494
211
1.734375
2
Brad Evans: Throughout your work you have dealt with the dangers of ignorance and what you have called the violence of “organized forgetting.” Can you explain what you mean by this and why we need to be attentive to intellectual forms of violence? Henry Giroux: Unfortunately, we live at a moment in which ignorance appears to be one of the defining features of American political and cultural life. Ignorance has become a form of weaponized refusal to acknowledge the violence of the past, and revels in a culture of media spectacles in which public concerns are translated into private obsessions, consumerism and fatuous entertainment. As James Baldwin rightly warned, “Ignorance, allied with power, is the most ferocious enemy justice can have.” The warning signs from history are all too clear. Failure to learn from the past has disastrous political consequences. Such ignorance is not simply about the absence of information. It has its own political and pedagogical categories whose formative cultures threaten both critical agency and democracy itself. What I have called the violence of organized forgetting signals how contemporary politics are those in which emotion triumphs over reason, and spectacle over truth, thereby erasing history by producing an endless flow of fragmented and disingenuous knowledge. At a time in which figures like Donald Trump are able to gain a platform by promoting values of “greatness” that serve to cleanse the memory of social and political progress achieved in the name of equality and basic human decency, history and thought itself are under attack. Once ignorance is weaponized, violence seems to be a tragic inevitability. The mass shooting in Orlando is yet another example of an emerging global political and cultural climate of violence fed by hate and mass hysteria. Such violence legitimates not only a kind of inflammatory rhetoric and ideological fundamentalism that views violence as the only solution to addressing social issues, it also provokes further irrational acts of violence against others. Spurrned on by a complete disrespect for those who affirm different ways of living, this massacre points to a growing climate of hate and bigotry that is unapologetic in its political nihilism. It would be easy to dismiss such an act as another senseless example of radical Islamic terrorism. That is too easy. Another set of questions needs to be asked. What are the deeper political, educational, and social conditions that allow a climate of hate, racism, and bigotry to become the dominant discourse of a society or worldview? What role do politicians with their racist and aggressive discourses play in the emerging landscapes violence? How can we use education, among other resources, to prevent politics from being transformed into a pathology? And how might we counter these tragic and terrifying conditions without retreating into security or military mindsets? B.E.: You insist that education is crucial to any viable critique of oppression and violence. Why? H.G.: I begin with the assumption that education is fundamental to democracy. No democratic society can survive without a formative culture, which includes but is not limited to schools capable of producing citizens who are critical, self-reflective, knowledgeable and willing to make moral judgments and act in a socially inclusive and responsible way. This is contrary to forms of education that reduce learning to an instrumental logic that too often and too easily can be perverted to violent ends. So we need to remember that education can be both a basis for critical thought and a site for repression, which destroys thinking and leads to violence. Michel Foucault wrote that knowledge and truth not only “belong to the register of order and peace,” but can also be found on the “side of violence, disorder, and war.” What matters is the type of education a person is encouraged to pursue. It’s not just schools that are a site of this struggle. “Education” in this regard not only includes public and higher education, but also a range of cultural apparatuses and media that produce, distribute and legitimate specific forms of knowledge, ideas, values and social relations. Just think of the ways in which politics and violence now inform each other and dominate media culture. First-person shooter video games top the video-game market while Hollywood films ratchet up representations of extreme violence and reinforce a culture of fear, aggression and militarization. Similar spectacles now drive powerful media conglomerates like 21st Century Fox, which includes both news and entertainment subsidiaries. As public values wither along with the public spheres that produce them, repressive modes of education gain popularity and it becomes easier to incarcerate people than to educate them, to model schools after prisons, to reduce the obligations of citizenship to mere consumption and to remove any notion of social responsibility from society’s moral registers and ethical commitments. B.E.: Considering Hannah Arendt’s warning that the forces of domination and exploitation require “thoughtlessness” on behalf of the oppressors, how is the capacity to think freely and in an informed way key to providing a counter to violent practices? H.G.: Young people can learn to challenge violence, like those in the antiwar movement of the early ’70s or today in the Black Lives Matter movement. Education does more than create critically minded, socially responsible citizens. It enables young people and others to challenge authority by connecting individual troubles to wider systemic concerns. This notion of education is especially important given that racialized violence, violence against women and the ongoing assaults on public goods cannot be solved on an individual basis. Violence maims not only the body but also the mind and spirit. As Pierre Bourdieu has argued, it lies “on the side of belief and persuasion.” If we are to counter violence by offering young people ways to think differently about their world and the choices before them, they must be empowered to recognize themselves in any analysis of violence, and in doing so to acknowledge that it speaks to their lives meaningfully. There is no genuine democracy without an informed public. While there are no guarantees that a critical education will prompt individuals to contest various forms of oppression and violence, it is clear that in the absence of a formative democratic culture, critical thinking will increasingly be trumped by anti-intellectualism, and walls and war will become the only means to resolve global challenges. Creating such a culture of education, however, will not be easy in a society that links the purpose of education with being competitive in a global economy. B.E.: Mindful of this, there is now a common policy in place throughout the education system to create “safe spaces” so students feel comfortable in their environments. This is often done in the name of protecting those who may have their voices denied. But given your claim about the need to confront injustice, does this represent an ethically responsible approach to difficult subject matters? H.G.: There is a growing culture of conformity and quietism on university campuses, made evident in the current call for safe spaces and trigger warnings. This is not just conservative reactionism, but is often carried out by liberals who believe they are acting with the best intentions. Violence comes in many forms and can be particularly disturbing when confronted in an educational setting if handled dismissively or in ways that blame victims. Yet troubling knowledge cannot be condemned on the basis of making students uncomfortable, especially if the desire for safety serves merely to limit access to difficult knowledge and the resources needed to analyze it. Critical education should be viewed as the art of the possible rather than a space organized around timidity, caution and fear. Creating safe spaces runs counter to the notion that learning should be unsettling, that students should challenge common sense assumptions and be willing to confront disturbing realities despite discomfort. The political scientist Wendy Brown rightly argues that the “domain of free public speech is not one of emotional safety or reassurance,” and is “ not what the public sphere and political speech promise.” A university education should, Brown writes, “ call you to think, question, doubt” and “ incite you to question everything you assume, think you know or care about.” This is particularly acute when dealing with pedagogies of violence and oppression. While there is a need to be ethically sensitive to the subject matter, our civic responsibility requires, at times, confronting truly intolerable conditions. The desire for emotionally safe spaces can be invoked to protect one’s sense of privilege — especially in the privileged sites of university education. This is further compounded by the frequent attempts by students to deny some speakers a platform because their views are controversial. While the intentions may be understandable, this is a dangerous road to go down. Confronting the intolerable should be challenging and upsetting. Who could read the testimonies of Primo Levi and not feel intellectually and emotionally exhausted? Or Martin Luther King Jr.’s words, not to mention those of Malcolm X? It is the conditions that produce violence that should upset us ethically and prompt us to act responsibly, rather than to capitulate to a privatized emotional response that substitutes a therapeutic language for a political and worldly one. There is more at work here than the infantilizing notion that students should be protected rather than challenged in the classroom; there is also the danger of creating a chilling effect on the part of faculty who want to address controversial topics such as war, poverty, spectacles of violence, racism, sexism and inequality. If American society wants to invest in its young people, it has an obligation to provide them with an education in which they are challenged, can learn to take risks, think outside the boundaries of established ideologies, and expand the far reaches of their creativity and critical judgment. This demands a pedagogy that is complicated, taxing and disruptive. B.E.: You place the university at the center of a democratic and civil society. But considering that the university is not a politically neutral setting separate from power relations, you are concerned with what you term “gated intellectuals” who become seduced by the pursuit of power. Please explain this concept. H.G.: Public universities across the globe are under attack not because they are failing, but because they are they are considered discretionary — unlike K-12 education for which funding is largely compulsory. The withdrawal of financial support has initiated a number of unsavory responses: Universities have felt compelled to turn towards corporate management models. They have effectively hobbled academic freedom by employing more precarious part-time instead of full-time faculty, and they increasingly treat students as consumers to be seduced by various campus gimmicks while burying the majority in debt. My critique of what I have called “gated intellectuals” responds to these troubling trends by pointing to an increasingly isolated and privileged full-time faculty who believe that higher education still occupies the rarefied, otherworldly space of disinterested intellectualism of Cardinal Newman’s 19th century, and who defend their own indifference to social issues through appeals to professionalism or by condemning as politicized those academics who grapple with larger social issues. Some academics have gone so far as to suggest that criticizing the university is tantamount to destroying it. There is a type of intellectual violence at work here that ignores and often disparages the civic function of education while forgetting Hannah Arendt’s incisive admonition that “education is the point at which we decide whether we love the world enough to assume responsibility for it.” Supported by powerful conservative foundations and awash in grants from the defense and intelligence agencies, such gated intellectuals appear to have forgotten that in a democracy it is crucial to defend the university as a crucial democratic public sphere. This is not to suggest that they are silent. On the contrary, they provide the intellectual armory for war, the analytical supports for gun ownership, and lend legitimacy to a host of other policies that lead to everyday forms of structural violence and poverty. Not only have they succumbed to official power, they collude with it. B.E.: I feel your recent work provides a somber updating of Arendt’s notion of “dark times,” hallmarked by political and intellectual catastrophe. How might we harness the power of education to reimagine the future in more inclusive and less violent terms? H.G.: The current siege on higher education, whether through defunding education, eliminating tenure, tying research to military needs, or imposing business models of efficiency and accountability, poses a dire threat not only to faculty and students who carry the mantle of university self-governance, but also to democracy itself. The solutions are complex and cannot be addressed in isolation from a range of other issues in the larger society such as the defunding of public goods, the growing gap between the rich and the poor, poverty and the reach of the prison-industrial complex into the lives of those marginalized by class and race. We have to fight back against a campaign, as Gene R. Nichol puts it, “to end higher education’s democratizing influence on the nation.” To fight this, faculty, young people and others outside of higher education must collectively engage with larger social movements for the defense of public goods. We must address that as the welfare state is defunded and dismantled, the state turns away from enacting social provisions and becomes more concerned about security than social responsibility. Fear replaces compassion, and a survival-of-the-fittest ethic replaces any sense of shared concern for others. Lost in the discourse of individual responsibility and self-help are issues like power, class and racism. Intellectuals need to create the public spaces in which identities, desires and values can be encouraged to act in ways conducive to the formation of citizens willing to fight for individual and social rights, along with those ideals that give genuine meaning to a representative democracy. Any discussion of the fate of higher education must address how it is shaped by the current state of inequality in American society, and how it perpetuates it. Not only is such inequality evident in soaring tuition costs, inevitably resulting in the growing exclusion of working- and middle-class students from higher education, but also in the transformation of over two-thirds of faculty positions into a labor force of overworked and powerless adjunct faculty members. Faculty need to take back the university and reclaim modes of governance in which they have the power to teach and act with dignity, while denouncing and dismantling the increasing corporatization of the university and the seizing of power by administrators and their staff, who now outnumber faculty on most campuses. In return, academics need to fight for the right of students to be given an education not dominated by corporate values. Higher education is a right, and not an entitlement. It should be free, as it is in many other countries, and as Robin Kelley points out, this should be true particularly for minority students. This is all the more crucial as young people have been left out of the discourse of democracy. Rather than invest in prisons and weapons of death, Americans need a society that invests in public and higher education. There is more at stake here than making visible the vast inequities in educational and economic opportunities. Seeing education as a political form of intervention, offering a path toward racial and economic justice, is crucial in reimagining a new politics of hope. Universities should be subversive in a healthy society. They should push against the grain, and give voice to the voiceless the powerless and the whispers of truth that haunt the apostles of unchecked power and wealth. Pedagogy should be disruptive and unsettling, while pushing hard against established orthodoxies. Such demands are far from radical, and leave more to be done, but they point to a new beginning in the struggle over the role of higher education in the United States.
<urn:uuid:463866d7-560c-4f45-8bd7-91765875035f>
CC-MAIN-2022-33
https://umaincertaantropologia.org/tag/estados-unidos/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00668.warc.gz
en
0.956069
3,204
2.203125
2
Cancel culture does more good than harm The goal of "cancel culture" is to hold people accountable so that they can learn from their mistakes and grow as a person. Granted, sometimes it has gone off the rails (ex death threats) but if no one ever pointed out something was wrong, nobody would ever learn. Also, it can be argued that celebrities and social media stars should be held to a higher standard in regards to their behavior because they have a fanbase that looks up to them and learns from them. Holding people accountable for their actions is a good thing, but it should not be taken to the extreme that every little online post from decades ago should determine a person's professional future, especially if they have appropriately apologized where needed and have changed their opinions or actions The censorship and mob behavior caused by 'wokeness' and canceling is comparable to the Chinese Cultural Revolution. Cancel culture is just taking 2 steps back without even taking 1 step forward. We're better off engaging people politely and explaining where we disagree. Cancel culture doesn't allow for that. It is lynch mob mentality for political differences.
<urn:uuid:7ef74eea-e37f-4f98-bf92-18f715d78567>
CC-MAIN-2022-33
https://lockhorns.io/cancel-culture-does-more-good-than-harm/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00473.warc.gz
en
0.974284
247
1.8125
2
A PBIS School In the past, school-wide discipline has focused mainly on reacting to specific student misbehavior by implementing punishment-based strategies including reprimands, loss of privileges, office referrals, suspensions, and expulsions. Research has shown that the implementation of punishment, especially when it is used inconsistently and in the absence of other positive strategies, is ineffective. Introducing, modeling, and reinforcing positive social behavior is an important step of a student's educational experience. Teaching behavioral expectations and rewarding students for following them is a much more positive approach than waiting for misbehavior to occur before responding. The purpose of school-wide PBIS is to establish a climate in which appropriate behavior is the norm.
<urn:uuid:b443f5b8-24c8-48db-b9ad-cac8c454e321>
CC-MAIN-2017-04
http://pvschools.net/site/default.aspx?PageType=3&DomainID=31&ModuleInstanceID=9326&ViewID=6446EE88-D30C-497E-9316-3F8874B3E108&RenderLoc=0&FlexDataID=10184&PageID=55
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00031-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956493
142
3.625
4
It’s a bald eagle’s mecca, a bird’s paradise…2,579 lush, green acres...stretching along the Potomac, dotted with dense forest. It’s prime habitat for eagles and other wildlife. However, the public won’t be able to enjoy it for much longer. Caledon Natural Area in King George County is caught in Virginia’s budget crunch. It’s one of five state parks that Governor Bob McDonnell wants to close to the public because of declining attendance and revenue. “We looked at attendance figures and these were among the lowest,” Department of Conservation and Recreation spokesman Gary Waugh told the Free Lance-Star. “We were trying to spread closures out geographically so no one part of the state would be hit harder than others." The closures would include Mason Neck State Park in Fairfax County, False Cape State Park in Virginia Beach, Twin Lakes State Park in Prince Edward County and Staunton River Battlefield Park in Halifax and Charlotte counties. The good news is that the closures would be temporary. The bad news is that the closures would take effect July 1st or sooner, and there’s no word about when the parks would be reopened. According to Waugh, closing the parks would save about $500,000 a year. However, no full-time workers would be let go. About half of those workers would fill vacancies at other parks; and a skeleton crew would stay on to take care of the closed parks until the budget situation improves. Virginia has 35 state parks. This may be the first time the state has proposed closing one since the first parks were built back in the1930s.
<urn:uuid:b7714c23-aaec-4f0f-8dd5-fec178b1d71d>
CC-MAIN-2017-04
http://www.nbcwashington.com/news/local/VA-BUDGET-AXE-FALLS-ON-EAGLE-PARADISE-84731362.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00329-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972
354
2.21875
2
The Soviets arrested and imprisoned about 500,000 Poles during 1939-1941, including former officials, officers, and natural "enemies of the people," like the clergy. This was about one in ten of all adult males,1 and murdered. But those the Soviets only arrested and inprisoned were lucky. They also murdered about 65,000 Poles in this terror.2 In one notorious massacre, in incredibly cold calculation, the NKVD-the Soviet secret police--systematically executed possibly 14,471 former polish officers, including political leaders, government officials, and intellectuals.3 Some 4,254 of these were uncovered in mass graves in Katyn Forest by the Nazis in 1941, who then invited an international group of neutral representatives and doctors to study the corpses and confirm Soviet guilt.4 For more about Katyn, see: VHO.org & The sworn deposition provides evidence of Soviet responsibility for the 1940 massacre of some 22,000 Polish officers in the Katyn forest and other places in what was then the Soviet Union. The Soviet Red Army had taken the Polish officers prisoner after invading eastern Poland in September 1939. Another report that Van Vliet made a few days later in Washington is considered missing. This has fueled speculation that the U.S. government helped cover up Soviet responsibility for the massacre out of fear that saying the truth would anger Stalin, whom the Allies were counting on to help them defeat Germany and Japan in World War II. Then there were the Soviet deportations. During 1939 to 1941 the Soviets deported 1,200,000 Poles deported to the Soviet Union for forced labor or resettlement, of which perhaps 146,000 died. This number does not include those shot for failing or straying out of line during deportation, or disobeying an To all this Polish misery, pain, and death, we must add what the Germans did in the Poland they ruled. They shot former politicians, and government, cultural, professional, and intellectual leaders, or sent them to die in concentration camps. Just in the city of Bydgoszcz, for example, Germans murdered about 10,000 non-Jewish civilians in four months of occupation. And from 1939 to 1941, they deported en mass about 1,6000,000 Poles, including 400,000 Jews. About 700,000 Poles were sent to Germany for forced labor,6 many to die there. And the most infamous German death camps had been located in Poland. Overall, during German occupation of pre-war Polish territory, 1939-1945, the Germans murdered 3,900,000 to 6,400,000 Poles, probably about 5,400,000, including near 3,000,000 Jews.7 According to the German Federal Ministry for Expellees, Refugees, and War Victims, 9,575,000 Germans lived in these eastern territories in 1939 10 (about 15 percent of Germany's population). 11 Perhaps no more than a couple of hundred thousand Poles lived there as well.12 The actual number of Germans remaining in these former German territories put under Polish authority was one of the critical questions regarding both Poland's new borders and the expulsions. The Polish representative to the Potsdam conference claimed there were only 1,500,000, the United States estimated 2,000,000. Stalin simply said that there were none -- all those surviving the war had run away13 Churchill, however, saw the true dimension of the issue. He predicted that 8,000,000 to 9,000,000 would have to be expelled,14 which is close to thesubsequent 10,000,000 estimate of the West German government. No wonder then that the estimates among Germans themselves for the human cost of the expulsion from the German eastern territories varies from 800,000 to 3,200,000 dead.29 Even lower figures are available. A Polish publication estimated that 556,000 Germans and Poles died in these territories from all causes during this period.30 The West German Federal Ministry for Expellees, Refugees, and War Victims calculated the loss from 1945 to 1950 as 1,225,000 for Germany's eastern territories.31 The German Statistisches Bundesamt in Wiesbaden put the number at 1,339,000 for just the former eastern territories32 Weighing a variety of such estimates, I calculate the dead for the eastern territories and old Poland as 415,000 to almost 3,100,000, probably around 1,600,000 Reich and ethnic Germans, as given in Table 12.1. In my view, this toll is the direct and indirect responsibility of the new Polish government (although aided, abetted, and promoted by the Soviets), as I will establish in the next section. By genocide, the murder of hostages, reprisal raids, forced labor, "euthanasia," starvation, exposure, medical experiments, and terror bombing, and in the concentration and death camps, the Nazis murdered from 15,003,000 to 31,595,000 people, most likely 20,946,000 men, women, handicapped, aged, sick, prisoners of war, forced laborers, camp inmates, critics, homosexuals, Jews, Slavs, Serbs, Germans, Czechs, Italians, Poles, French, Ukrainians, and many others. Among them 1,000,000 were children under eighteen years of age 1. And none of these monstrous figures even include civilian and military combat or war-deaths. The [following] article is the first part of Prof. Piotrowski's lecture on the subject of deportations, amnesty etc. It appeared in the "Miedzy Nami" in one of Canadian newspapers which I can't recall at the moment. The date is May 2000 and it comes Regards, Richard P. The amnesty for the Polish people in Russia came about as a consequence of an agreement between Stalin, Churchill, Anthony Eden and the Polish government in exile in London. This agreement was signed on July 30 1941 and enabled all Polish people to be freed for the purpose of forming an Army and help Stalin fight Hitler. Such was the lot of the deportees until the invasion of the Soviet Union by Germany on June 22, 1941. A protocol of the Polish-Soviet (Sikorski-Maisky) agreement of July 30, 1941, provided for the release of all Poles in Soviet exile as well as for the formation of a Polish army on Soviet soil. The document, signed in the presence of Winston Churchill and Anthony Eden, used the unfortunate term "amnesty" (the word should have been "manumission" or "emancipation") to characterize the release of the exiles; they were Stalin's bargaining chip in the contest for the status quo ante borders of Poland. According to a January 15, 1943, note from Beria to Stalin, 389,041 Polish citizens were freed as a result of that "amnesty." These included 200,828 ethnic Poles, 90,662 Jews, 31,392 Ukrainians, 27,418 Belorussians, 3,421 Russians, and 2,291 persons of other nationalities. There was no need to inform Stalin of the fact that the Soviet authorities often impeded the release of the deportees from their various places of confinement and absolved themselves from assisting them in any way whatsoever upon their release. This utter lack of concern brought about a crisis of unimaginable proportions. Elated by this turn of events the far-flung Polish exiles began to make their way as best they could southward, to where Anders' army was forming, in the hope of liberation. These journeys, often several weeks long, brought new suffering and tens of thousands died from hunger, cold, heat, disease and exhaustion on that trip to freedom. For many, the help provided by the United States and Great Britain was too little and too late. During the two great evacuations (the first, between March 24 and the beginning of April 1942; the second, between August 10 and September 1, 1942), from Krasnovodsk across the Caspian Sea to Pahlavi (Iran), and the smaller overland evacuations from Ashkhabad to Mashhad (in March and September 1942), about 115,000 people (including some 37,000 civilians, of whom about 18,300 were children) left the Soviet Union. The soldiers of Anders' army went on to fight in many battles, including the one at Monte Cassino; the civilians, because they could not be repatriated, were forced to remain in foreign lands for the remainder of the war. The first stop of the refugees evacuated with Anders' army was Iran, where they found temporary quarters in large transit camps initially located in Pahlavi and Mashhad, and later in Tehran and Ahvaz. While Gen. Anders' troops were subsequently transferred to Palestine and from there to Iraq, the civilians remained in Iran. To accommodate the refugees, a sprawling stationary camp was established in Isfahan. Because it housed several camps for the thousands of orphaned Polish children, it came to be known as the "City of Polish Children." The relief assistance afforded by Polish, British, American, and Iranian authorities soon improved their living conditions and brought the devastating contagious diseases under control, diseases acquired in the Soviet Union which continued to rob the refugees of their lives even after liberation (over 2,000 refugees died in Iran alone). In time, various Polish institutions, including 24 schools serving some 3,000 students, were established in Iran and several. By the end of 1943, 33,000 refugees were transferred from Iran to other countries. By the end of 1945, another 4,300 were evacuated to Lebanon; by 1946, that number rose to 6,000. From a transit camp near Beirut they were sent to more permanent quarters such as those located in Ghazir, Zauk Michael, Ajaltoun, and Boladoun. Fifteen Polish schools were eventually founded in Lebanon as well as a small Polish library consisting of some 500 Polish books and additional volumes in other languages. In Palestine, the camps for the over 5,000 refugees transferred there were located in Nazareth, Rehovot, Ain-Karem,and Barbara. Several scout groups, schools, training centers, a Women's Auxiliary Service, and an Officers' Legion were established. A Polish press, located in Palestine and Iran, printed the much-needed educational materials used in refugee schools throughout the Middle East. Some exiles also found asylum in India in transit camps set up in Quetta, Mount Abu, Panchgani, Bandra, and in and near Karachi (such as the Country Club Camp, Haji Pilgrims Camp, and the Malir Camp). But more stable settlements also emerged such as those in Balachadi, near the city of Jamnagar, and in Valivade, near Kolhapur. Balachadi became a refuge for some 1,000 Polish children. Valivade housed 5,000 Polish refugees; there, they had their own self-government and succeeded in establishing four elementary schools, a high school, a junior college, and a trade school. In all, 16 Polish schools were attended by some 2,300 Polish children in India. Moreover, several Polish periodicals were published, Polish amateur theaters were founded, and Polish business enterprises flourished. Africa provided another safe harbor for the Poles. In mid-1944, East Africa hosted over 13,000 Polish citizens. They settled in transit and permanent camps in the British colonies of Uganda, Kenya, and Tanganyika. In Uganda, the camps were located in Masindi and Koya on Lake Victoria. In Kenya, they were located in Rongai, Manira, Makindu, Nairobi, and Nyali near Mombasa. In Tanganyika, the largest settlement was Tengeru (4,000 refugees) and smaller camps were located in Kigoma, Kidugala, Ifunda, Kondoa, and Morogoro. South Africa, South Rhodesia, and North Rhodesia also became the home of Poles. The largest of these settlements were: in the Union of South Africa Oudtshoorn; in North Rhodesia Abercorn, Bwana M'Kubwa, Fort Jameson, Livingstone, and Lusaka; in South Rhodesia Digglefold, Marandellas, Rusape, and Gatooma. In Africa, Polish schools, churches, hospitals, civic centers, and manufacturing and service cooperatives were founded and Polish culture prospered. African radio stations ran programs in the Polish language and there waseven a Polish press. In South Africa alone there were 18 Polish schools with about 1,800 students in attendance. A large Polish settlement was also founded in Mexico. Although provisions were made to resettle several thousand Poles in that country, only two transports arrived in the summer and fall of 1943 with a total of 1,432 refugees. Their home became a deserted hacienda in Santa Rosa, near Leen. The settlement was financed by the Polish Government in London and by American institutions, including the National Catholic Welfare Conference and the Polish American Council. Finally, 733 Polish children with their 105 caretakers arrived in New Zealand on November 1, 1944. They were housed in the Polish Children's Camp located in Pahiatua. As elsewhere, kindergartens and grammar schools provided for the educational needs of the youngsters. Unlike elsewhere, upon graduation the teens were placed either in schools operated by religious orders or in technical colleges. Two hostels were also established: one in Island Bay for girls, the other in Lyall Bay for boys. Wherever they went the Polish refugees encountered effusive good will not only on the part of the respective governments that invited them but also on the part of the native populations. Welcoming signs with Polish flags, white eagles, and words of encouragement often greeted their arrival, high government officials paid them visits, and commemorative monuments were erected in their honor. Unlike the Soviet Union, these were, after all, ancient civilized cultures. Why didn't America open its doors, and open them wide, to the Polish refugees? That the Western Allies knew all about the deportations is clear from their relief efforts in their behalf in the Soviet Union and the Middle East. Moreover, even while in Iran, although debriefed, the refugees were not encouraged to speak about their experiences in the Soviet Union with outsiders. In America, the date of the arrival of the first transport aboard the USS Hermitage (on June 25, 1943 consisting of 706 refugees, including 166 children) was a State secret. After disembarking at the San Pedro naval dock near Los Angeles, the women and children under 14 years of age were placed in the Griffith Park Internment Camp in Burbank and the men in the Alien Camp in Tuna Canyon. When the Polish community found out about the arrival of the transport they rallied around the exiles and demanded "Why can't they stay here?" Father Waclaw Zajaczkowski even recruited families willing to take in a hundred orphans. But that was not in the plans, and two days later all of the refugees were shipped off to The second group (726 refugees including 408 children, mostly orphans) to arrive on the USS Hermitage that fall were also quarantined, this time in a U.S. army camp near Los Angeles called Santa Anita. After a short stay, they too were dispatched across the border to Colonia Santa Rosa. The delicate balance between the Soviet Union and the Western Allies had to be maintained, it seems, at any cost. Among the victims on this altar of silence were the 14,500 prisoners of war interned in Kozelsk, Starobelsk, and Ostashkov and executed in cold blood in Katyn, Kharkov, and Kalinin in April and May 1940. The Allies never officially contradicted the Soviet line that the Germans, who dug up the graves in the Katyn forest, were responsible for the murders. No doubt "Uncle Joe"(Joe Stalin) homo sovieticus barbarosus incarnate must have been grateful to the Western Allies for their conspiracy of silence, for preserving the "good name" of his evil empire. He was even more grateful at Yalta, when the Western Allies granted him the right to enslave all of Eastern and half of Central Europe. All the camps and settlements established in Iran, Lebanon, Palestine, India, Africa, Mexico, and New Zealand were meant to be temporary quarters for the Polish refugees until the end of the war and the expected liberation of their country. However, after Yalta and the change in Polish borders this became an impossible dream, although a few did return to join their families in Poland. What became of the rest? Many of those who wound up in New Zealand and the Union of South Africa remained where they were brought. The Polish refugees housed in the various camps in Iran, Lebanon, Palestine, India, and Africa moved to Great Britain and its dominions, Canada and Australia, from where some of them later emigrated to the United States; some also settled in Argentina. And a few years ago, in 1996 in Chicago, the Poles of Santa Rosa celebrated the 50th anniversary of their arrival in the United States. Thus ended the saga of the deportees from Eastern Poland who managed to get out of the Soviet Union under the provisions of that tenuous "amnesty" of 1941. But what happened to the rest of the hundreds of thousands of deportees who did not leave with Anders' army? For tens of thousands the Soviet Union became their final resting place before the war's end. Another quarter of a million were repatriated to the "recovered territories" of Western Poland during the massive population exchanges following World War II. As for what happened to those who never got out, God only knows. Some, no doubt, are still there. Despite the fact that in 1918 all Jewish organizations were against the rebirth of Poland, in1926 Poland gave full citizenship to some 700,000 Jewish refugees from USSR ,while at the same time Jewish refugees who escaped to France remained stateless until WWII. In 1938 some 20,000 to 30,000 Jews evicted from Germany were resettled in Poland by Polish authorities.... On Aug. 22, 1939 Hitler delivered a secret speech in which he stated that the complete destruction of Poland and especially its population was his primary target. Hitler talked about the conquest and colonization of Poland. He ordered his military commanders to use the utmost ferocity in merciless killing Polish men, women, and children. Hitler's orders issued at this crucial moment had nothing to do with the extermination of Jews, however these orders were a retaliation for derailment by the Poles of Hitler's strategy to conquer the Euro-Asian Heartland.. The Jewish population of 8,700,000 was trapped under the control of the Berlin government; at least sixty percent (or about 5,100,000) were exterminated by the Germans during World War II. The second world war was not fought to save the Jews. However, during first years of war the rate of German and Soviet murder of the Poles was much higher than that of the Jews. Eighty percent of the food consumed by the Jews was smuggled into the ghettos by Poles. Jewish Ghetto Police were to arrest non-Jews who made purchases in stores exclusively designated for the Jews or brought merchandise or food with them. Arrested Polish gentiles were to be turned over to the Germans for execution. A number of such executions actually took place in Konin and other localities. Polish underground courts prosecuted traitors and criminals during the war. Crime was rampant inside and outside ghettos. It included extortions, robberies and murders Thousands of Jews were employed by the Soviets in deportation and execution of Polish citizens. Among the deportees 52 percent were Poles, 30 percent were Jews, and 18 percent were Ukrainians and Byelorussians. Society volunteers offer a limited research service to members for a reasonable donation. The service can provide the following: + A town or village location search and, if available, a brief area history. Copies of obituaries and death notices found in the Dziennik Chicagoski, 1890-1971. Information onsurname meaning, frequency, and distribution in Poland. Copies of Haller's Army + Copies of insurance death claims from the Polish Roman Catholic Union of Korespondencja z rodzina (1939-1940). Korespondencja w sprawie pomocy dla uchodzęców. Wymiana listów z instytucjami w Stanach Zjednoczonych (1941-1942). T.2. Korespondencja z w?adzami amerykanęskimi w sprawie zezwolenia na pobyt i uzyskania obywatelstwa. Listy braci: Karola, Antoniego, Jana, ciotki Zofii Lanckoronęskiej (1942-1949). Zaproszenia ze strony Komitetu Narodowego Amerykanów Polskiego Pochodzenia, Ko?a Oficerów Rezerwy w Nowym Jorku. T.3. Korespondencja w sprawie pomocy charytatywnej, zaproszenia itd. Korespondencja do cz?onków rodziny (1945-1946). T.4. Korespondencja - sprawy urze dowe i osobiste (1946-1947). T.5. Korespondencja, m.in. z Wac?awem Potockim w Montresor, Adamem i Iza Zamoyskimi, Zofia, Janowa,Tarnowska, oraz w sprawach pomocy charytatywnej (1948-1949). T.6. Korespondencja - sprawy prywatne i rodzinne (1949-1950, 1957). Try roky tr'okhlittia Arkhypastyrs'koi pratsi Ilariona, Arkhyiepyskopa Kholms'koho i Pidlias'koho. 8s. 22sm. Language--U. Kholm, 1943. Ukrainian Catholics and Orthodox in Poland and Czechoslovakia. The Millenium of Christianity in Rus'-Ukraine. Sorokowski, Andrew. Ukrainian Studies Fund. Harvard University. 68p. 23cm. Language--E. Cambridge, MA, 1988.
<urn:uuid:ee6cc2c0-0d13-4387-8810-b88b0f19ab68>
CC-MAIN-2022-33
http://dpcamps.org/poland.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00075.warc.gz
en
0.964812
4,796
3.3125
3
Women In The World Of Design The most celebrated woman in the Design Industry. For Women’s History Month we wanted to celebrate and give recognize some of this era’s revolutionary women that have made waves in the industry with their creative vision and exceptional capabilities. They are truly inspirational. In no particular order: 1. Zaha Hadid – a groundbreaking architect who made her mark with her trademark neo-futuristic designs. The elegant curvy and powerfully elongated designs are the legacies she left behind. Her architectural identity was evident in all her designs that played with the balance between solid and void, transparent and opaque, interior and exterior. In her long list of outstanding achievements is her being the first woman to be awarded the prestigious Pritzker Architecture Prize. 2. Kelly Hoppen – is one of the most respected and admired interior designers globally with 40 years of expertise under her belt. She is known to break all confines, designing her projects outside the box. She is a creative genius that is geared towards making trends and is a pioneer for modern luxury designs housed in various destinations. 3. Kelly Wearstler – has an affinity for colors and energetic compositions. She is a master in combining bold textures with unique colors almost harmoniously. Her clientele is as influential as her designs and are drawn to her for her ability to create rare aesthetics distinctive to her personality. 4. Neri Oxman – is the queen of the blend. Her designs are personalized to combine art, biology, computing, or any other concept that you can think of. Her approach to design births one-of-a-kind pieces that are the embodiment of environmental design and digital morphogenesis. 5. Amanda Levete – is the founder of her architecture firm that has landed many awards for her sophisticated and instinctive design approach. The Financial Times has identified her as the architect building the future. Levete is often described as an architectural magician by admirers of her work. 6. India Mahdavi – is loved for her color statement designs that are said to reflect her fun and vibrant personality. Her designs have a hint of humor that is contemporary and very tasteful. Her design recipe comprises simple yet stylish ingredients cooking up aesthetics that are innovative and chic. 7. Victoria Hagan – provides a wide array of renovation and interior design services for luxury homes. Her designs are refined playing with natural colors and warm tones masterfully. Hagan believes herself to be a Timeless American and her designs highlight the agelessness. 8. Elizabeth Diller – not only has an interdisciplinary design studio with her partner but also has projects related to performing and visual arts. They have a revolutionary vision for design and are the design home of many exceptional projects such as The Lincoln Center. Time Magazine has listed Diller in the top 100 Most Influential People in the world in 2009. 9. Annabelle Selldorf – is one of the most sought-after designers since she started her practice in 1988. Her experience has helped her gain experience in a variety of projects ranging from residential to exhibition spaces globally. Selldorf is known for her design consistency between romantic and ambitious influences. 10. Jeanne Gang – believes in the philosophy of connecting people. Her studio represents her ideologies of uniting people socially, experientially, and intellectually. One of her striking projects for Social Justice Leadership in Michigan. As you can see, there are numerous inspiring women, who play a dominating role within the design industry. We salute them for their hard work and find inspiration in their work, which inspires others.
<urn:uuid:c1323df0-dcb4-4cb8-9c88-b164d779e561>
CC-MAIN-2022-33
https://htsinteriors.com/women-in-the-world-of-design/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00475.warc.gz
en
0.967405
733
1.851563
2
Bike Maintenance 101 Our hands-on Bike Maintenance 101 class will give you the basic tools (figuratively and literally—the $65 registration fee includes a multi-tool, patch kit, and tire levers) to fix flats, adjust brakes and derailleurs, clean and lube a chain, and perform minor adjustments that can have a significant impact on your ride quality.These skills will save you time, money, and give you a much better understanding—and appreciation—of your bike. Proceeds support Recycle-a-Bicycle’s mission to provide youth job training and environmental education. Class Duration: 4 hours Class Location: Recycle-A-Bicycle (DUMBO, Brooklyn) Class Size: Up to 8 adults and mature teens over the age of 14 Instructors: 1 trained bike mechanic Equipment: Students are encouraged, but not required, to bring their own bicycle. Registration Policy: Advance registration is required of all participants; walk-in students are not allowed. Cost: $65, which covers a multi-tool, patch kit, and tire levers. The registration fee can be considered a tax-deductible charitable donation to Recycle-A-Bicycle, a 501(c)(3) nonprofit. Is This the Right Class for You? If you’re ready to take more ownership of your bike and develop a deeper understanding of exactly what makes it go (and stop), then this class is for you. Don’t have a clue what a derailleur is? Perfect—this class is designed with beginners in mind. Next Step: volunteer With your newfound knowledge of a bicycle’s mechanics, you’d make a fine Bike New York volunteer! Whether at an event, ride, or educational class, Bike New York is always in need of skilled support.
<urn:uuid:5aae792e-8115-4a4b-bf29-6ec4f8b22575>
CC-MAIN-2016-44
http://www.bike.nyc/education/classes/bike-maintenance-101/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.28/warc/CC-MAIN-20161020183838-00270-ip-10-171-6-4.ec2.internal.warc.gz
en
0.899507
384
2.171875
2
By Jason Ditz Over the weekend, Israel carried out attacks against a poultry farm on the Syrian coast, wounding two civilians. Russia issued a statement Monday, warning such attacks are “categorically unacceptable.” Russia has positions on the Syrian coast, and has warned Israel away from the area before. The latest attack came from the coast, and conspicuously Russia didn’t comment when it happened. The Russians say it violates Syrian sovereignty, and is against international norms. Those are plainly true things, but have never stopped Israel before. Israel has shown time and again they’re willing to keep attacking over objections. If Russia decides to flat out stop them militarily, they clearly could, but so far that’s not been the case. Instead Russia has tried to deter further attacks with air defenses. That’s allowed Syria to intercept more Israeli missiles, but not stop them outright. This warning sounds serious, but so did the last few without any action to stop the attacks. Jonas E. Alexis has degrees in mathematics and philosophy. He studied education at the graduate level. His main interests include U.S. foreign policy, the history of the Israel/Palestine conflict, and the history of ideas. He is the author of the new book, Kevin MacDonald’s Metaphysical Failure: A Philosophical, Historical, and Moral Critique of Evolutionary Psychology, Sociobiology, and Identity Politics. He teaches mathematics in South Korea.
<urn:uuid:44c8fac2-0cd1-42ef-ab25-3ea1abdf84a6>
CC-MAIN-2022-33
https://www.veteranstoday.com/2022/07/05/russia-demands-israel-stop-sovereignty-violating-airstrikes-on-syria/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00671.warc.gz
en
0.942511
305
1.515625
2
Davos is upon us, a chance to look at the superclass, Will the eurozone continue after the Greek disaster, the worlds oldest bank in a fresh scandal, battles in Syria, North Korea isnt done yet, French farther into Mali, Living up to the name of The International Forecaster and properly respecting the standard that the late, great Bob Chapman set for this publication requires an ability to cast a cold, hard gaze at world events and see them for what they are, rather than what we want them to be. Of course, that doesn't mean that we're all left helplessly watching these events unfold like passive objects; we all have a part to play in protecting ourselves and our loved ones from economic and societal collapse, building up our communities to resist that collapse, shaping the world around us by making the right choices day in and day out, and raising the next generation to be strong, independent, and compassionate members of the human family. I preface this week's report with this because there are significant events taking place all across the globe right now, many of them quite worrying, and it is important to keep this information in perspective. To be forearmed, we must be forewarned. And to be forewarned, we have to be willing to take a look at what is really happening, bleak as it may be. First we turn our attention to the Eurozone, where the world's self-proclaimed “elite” have just wrapped up the World Economic Forum in Davos, Switzerland, the first major event of the powers-that-shouldn't-be calendar year. This means that the Trilateral Commission's annual meeting is right around the corner, and after that: Bilderberg. Davos is more of a public spectacle than the significantly more secretive (and selective) meetings of the Trilateral/Bilderberg ilk, however. There is much pomp and ceremony as some of the world's most recognizable movers-and-shakers are trotted out to make speeches and participate in forums that are then dutifully dissected by the big financial institutions and regurgitated by the talking heads of the business networks. Although the spectacle of the event is mostly for show, and the real action takes place in off-the-record closed-door meetings between the members of the erstwhile “Superclass,” the event is still a good opportunity to see where the globalists and their bankster sponsors are planning to lead the global economy over the course of the coming year. This year, the theme song for the event may as well have been the 1988 Bobby McFerrin hit “Don't Worry, Be Happy.” The overriding message: the recovery is well under way, the economic “headwinds” are subsiding and, absent the usual twists, turns, and bumps in the road, the world economy (including the Eurozone) is back on track! Don't worry, be happy! Depending what data you look at, it's hard to argue with such a message. After all, the dominant question at last year's Davos was whether the Eurozone could continue after the Grexit; this year, Greece's withdrawal from the Euro isn't even on the political radar. Last year there was still uncertainty about the ECB's and the Federal Reserve's next moves, but this year Draghi's bazooka and the Bernanke's QE3 and 4 have assured the markets further trillions in funny money to cushion whatever fall might be coming in the short term. Years past saw hand-wringing about China's faltering growth and the consequences of a global downturn, but this year markets are booming, with the S&P 500 reaching highs it hasn't seen since 2007, the FTSE 100 marking its strongest January performance in nearly 25 years with a 6.4 percent gain on the month, and the Nikkei hitting 11,138.50 for the first time in 33 months on the back of its best January performance since 1998 (even after a round of last minute profit taking). “If this is the new normal,” say the giants of finance, “bring it on!” As always, however, there is an altogether different story to be told by investigating the data more deeply. Even the banksters' new darling, Mark Carney, alluded to this in his appearance at the annual global economic forum, joking that when he arrived in Switzerland on Thursday the consensus was that the global economic “tail risk” had been “reduced,” whereas by Friday night it had been “eliminated.” Such is the way of groupthink, even when it is not directed by an agenda. The darker aspects of the global structural economic decline are hiding under the glossy surface of market optimism. No matter what the FTSE 100 believes about the performance of the LSE blue chips, the UK's actual economy shrank by 0.3% last quarter. The US surprised nearly everyone Wednesday by announcing a 0.1% GDP contraction in Q4 2012 (which the usual market boosters have done their best to spin into a positive). And now, just in time for the Italian elections later this month a fresh scandal is rocking the Eurozone. This one involves Monti dei Paschi, better known as the world's oldest bank. The problem? They hid major losses from their 9 billion Euro takeover of Antonveneta in 2007 by in a series of complex derivative trades and those trades are coming back to haunt them. And it just so happens that Mario Draghi, current ECB head, was leading the Bank of Italy at the time they failed in their oversight of the bank in 2007. And just last June, bankster favorite Mario Monti granted the bank state bailout money after it failed the Eurozone stress test. The yield on the Italian 10-year bond rose 0.09% on news that a court in Rome is summoning officials from the Bank of Italy to answer for their part in the scandal. All of this news would be worrying at the best of times, but coming as it does during a sustained structural decline after an era of “jobless recovery” during a period of geopolitical instability, the news is extremely concerning. It's as if the economic engine of the world is sputtering and the “Check Engine” light is on, but the world elite are too busy admiring the flashy rims of the global markets to notice. Oh, and did I mention the possible outbreak of war with Iran? Last Wednesday Syria confirmed it had been attacked by military jets for the first time since 2007. The Syrians say the attacks targeted a military research center near Damascus, Israel claims they struck a convoy of trucks bearing anti-aircraft missiles destined for Hezbollah in Lebanon. Whatever the case, the timing of the strike may have been as much a part of the message as the strike itself. Just two days before the attack, Tehran sent an explicit message to Tel Aviv, according to press reports: any attack on Syrian territory will be treated as an attack against Iran itself. Given the timing of that announcement, either Iran had caught wind of Israel's impending strike and sought to head it off, or Israel simply called Iran on their bluff. Perhaps both. We could lament the situation and point out the obvious hypocrisies, namely that if Syria had sent fighters into Turkey to strike at admitted Al Qaeda staging areas there where foreign jihadis are being equipped to carry out terror attacks in Syria it would be decried as an act of war, but when Israel does essentially the same thing it is immediately lauded by the White House and given tacit US backing. As I say, we could lament this hypocrisy, but let's not forget what I wrote at the beginning of today's report: we are here to be realistic about what is happening, not idealistic about what we wish would happen. Right now the world is bracing to see whether this will lead to the start of the full-scale theater war that many have been warning about for so long. The options include a retaliatory strike from Syria, which is exceedingly unlikely given the situation on the ground for Assad (it would be equivalent to signing his own death warrant); a retaliatory strike by Iran, which, its own warning notwithstanding, is also unlikely given Tehran's extremely delicate situation right now vis a vis its nuclear program; or some type of strike via Hezbollah in Lebanon, which remains a possibility. Sadly, the best we can hope for in terms of preventing a larger-scale war is that the Syrians/Iranians/Hezbollah will not play into the trap by responding against Israel and “justifying” a larger NATO intervention in the region. If all that wasn't enough, Kim Jong-un and the North Koreans aren't done rattling cages and pleading for world attention yet. Last week the UN Security Council, with the surprise backing of China, passed a resolution condemning North Korea's satellite launch last month, which is widely believed to have been a test of ballistic technology for the isolated communist nation's missile program, a worrying development for a nation that has nuclear weapons and is actively seeking the technology to miniaturize and deliver them via ICBMs. The dictatorship responded as expected: by threatening the US and South Korea with nuclear war (again). But there may be more than just bluster to the threat. At the very least, it looks like North Korea is shaping up for another nuclear test, and it might be coming sooner than expected. Now the Joonang Daily is reporting that despot Kim Jong-un has met with the nation's top security and defence officials and authorized preparations for a new nuclear test. Many analysts were predicting the test to occur on February 16, the birthday of former leader Kim Jong-il, or the inauguration of the new government which takes place on the 25th, but now it appears the test may come any day. The latest reports indicate that the military has been told to be ready for war, and the nation is under martial law lockdown. Similar preparations took place in March 1993, when the North first announced its withdrawal from the Nuclear Non-Proliferation Treaty. Test preparations have been corroborated by satellite images showing that the mouth of the shaft has been sealed at the testing site, and South Korean officials and Beijing-based sources are concurring that a test is imminent. Although this new test is likely little more than a response to the UN resolution and a chance for new leader Kim Jong-un to assert himself on the world stage, it certainly won't help ease tensions in East Asia, where nerves are already frayed from recent Taiwan/China/Japan tensions over disputed islands in the East China Sea. Once again, the world sits, seemingly hostage to the whims of a nuclear-armed madman. Perhaps the most helpless hostages in all of this are the North Koreans themselves. Fresh reports are leaking out of cannibalism from the country's beleaguered rural provinces. Add to all of this the ongoing French incursion in Mali, the continuing concerns over Algeria, the latest suicide attack on the U.S. embassy in Ankara, and a new report from a US think tank trying to whip up war frenzy by declaring Iran and Hezbollah the most significant world terror threats, and you start to get a sense of the knife edge that the world economy is balanced on right now. Any and every one of these areas has the potential to blow up into something much bigger (perhaps quite literally) and the effects on a precariously perched economy where markets are completely detached from reality are potentially disastrous. Luckily for readers of this publication, you will already know about the ways to brace yourself and your family for the economic storm that is coming, from precious metals to storable food and water filters to bug out bags and emergency electricity generation to alternative currencies and local exchanges. “Don't Worry, Be Happy!” may not be the most apt phrase to describe these times, but for those who are relying less on the phoney baloney markets for their future security and more on their own preparedness strategies, there's certainly less to be worried about and more to be happy about.
<urn:uuid:0e23503e-4597-4bdf-93c2-69c74849e8be>
CC-MAIN-2016-44
http://www.theinternationalforecaster.com/International_Forecaster_Weekly/A_Time_of_Uncertainty_is_a_Call_for_Strategies
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722951.82/warc/CC-MAIN-20161020183842-00210-ip-10-171-6-4.ec2.internal.warc.gz
en
0.963156
2,490
1.570313
2
Many people suffer from feeling tired all of the time. This feeling is usually referred to as fatigue. The feeling of being tired all the time is not the same as feeling sleepy. Feeling sleepy just means that somebody feels like they need to go to sleep. Being tired all the time is more like having a lack of energy and motivation. Feeling tired all the time can also make someone feel apathetic, bored or stressed. Even though there is a difference between being sleepy and being fatigued, a lack of sleep can be one of the reasons for fatigue. A sleeping disorder like sleep apnea could be the reason why you're feeling tired all the time. During sleep apnea, a person will stop breathing for a few seconds to a few minutes. They will suddenly start breathing again after a loud snort or choke. This pause in breathing occurs somewhere between 5 and 30 times an hour. When this pause in breathing occurs the person will go from deep sleep to light sleep and won't get the required amount of deep sleep. Another sleeping disorder that can lead to being tired all the time is restless legs syndrome. Restless legs syndrome is a neurological disorder where a patient constantly feels the need to move their legs. This especially becomes a problem at night when the victim needs to lay motionless for seven hours to sleep but their need to move their legs won't allow them to sleep that long. The thyroid controls a wide variety of process in the body. The thyroid controls the heart rate, the temperature in the body, energy and cholesterol levels and the growth of hair and skin. Some thyroid disorders will cause the person to have an over active thyroid and others will cause an under active thyroid. Either way, the thyroid not working properly will lead to fatigue since so many of the bodily processes are being disturbed. Fatigue is a major symptom of diabetes type I and type II. Someone who is fatigued should definitely be checked for diabetes because it is one of the fastest growing conditions in the United States. There are now 23.6 million American that suffer from diabetes. In addition to fatigue, diabetes can make someone overweight, which increases the possibility of sleep apnea. Some of the symptoms of depression are fatigue, drowsiness, apathy and boredom. The symptoms of depression and chronic fatigue are almost identical. For anyone that is tired all the time, they may want to consider the possibility that they are depressed. Depression is not just a feeling of sadness or loneliness; it's a condition that affects the body and someone may have it without realizing it. Anemia is a condition that is caused by too little iron in your blood stream. An anemia sufferer has a decrease in the amount of healthy red blood cells in the body. The red blood cells in the body are responsible for carrying oxygen and carbon dioxide through the body. When less oxygen is delivered to the body you will feel very tired.
<urn:uuid:351d0708-9ab3-4f35-82dc-e4590cf40ea8>
CC-MAIN-2016-44
http://www.ehow.com/about_5375599_reasons-feeling-tired-time.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00241-ip-10-171-6-4.ec2.internal.warc.gz
en
0.963719
586
3.1875
3
Japan Aerospace Exploration Agency (JAXA) Concerning the deployment experiment of the Large Deployable Reflector Small-sized Partial Model 2 (LDREX-2) launched by the Ariane 5 launch vehicle at 5:56 a.m. on Oct. 14, 2006 (Japan Standard Time, JST,) the Japan Aerospace Exploration Agency (JAXA) confirmed the antenna deployment by images acquired at the Malindi Station in the Republic of Kenya. The images are attached below. It is expected to take a week to 10 days to find the final result of the deployment experiment as we have to analyze telemetry data acquired during the experiment. We will release the result as soon as the analysis is completed. JAXA Public Affairs Department Tel: +81-3-6266-6413 to 7, Fax: +81-3-6266-6910
<urn:uuid:1dad4361-7598-4387-9b20-1df52cf1ac84>
CC-MAIN-2017-04
http://global.jaxa.jp/press/2006/10/20061016_ldrex-2_e.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00006-ip-10-171-10-70.ec2.internal.warc.gz
en
0.89927
182
1.929688
2
|Número de publicación||US3600372 A| |Tipo de publicación||Concesión| |Fecha de publicación||17 Ago 1971| |Fecha de presentación||4 Jun 1968| |Fecha de prioridad||4 Jun 1968| |Número de publicación||US 3600372 A, US 3600372A, US-A-3600372, US3600372 A, US3600372A| |Inventores||John H Udelhofen, Roger W Watson| |Cesionario original||Standard Oil Co| |Exportar cita||BiBTeX, EndNote, RefMan| |Citada por (94), Clasificaciones (16)| |Enlaces externos: USPTO, Cesión de USPTO, Espacenet| United States Patent US. Cl. 260-132 8 Claims ABSTRACT OF THE DISCLOSURE An ashless dispersant for lubricants which is made by reacting carbon disulfide or carbon disulfide and an alkali metal hydroxide with a Mannich condensation product. BACKGROUND OF THE INVENTION It has been known for many years that, with use, hydrocarbon lubricating oils deteriorate and form sludge, varnish, and corrosive substances that attack the surfaces which these oils are supposed to protect. Dispersants are blended with the oils to suspend the sludge and varnish formers, and inhibitors are added to the oils to prevent oxidation and counteract the corrosive substances. The dispersants and inhibitors should be compatible, and, preferably, they should enhance each others performance. Illustrative of prior art dispersonts is US. Pat. No. 3,256,185. This patent portrays a need for improved dispersants, and disclose dispersants formed by the reaction between an alklylene polyamine, carbon disulfide, and a hydrocarbon substituted dicarboxylic acid. Although these dispersants work, their performance is not altogether satisfactory. SUMMARY OF THE INVENTION We have discovered novel dispersants which are formed by reacting carbon disulfide or carbon disulfide and an alkali metal hydroxide with a Mannich condensation product. The types of Mannich products particularly suited for the purpose of this invention are: Type I.-Mannich products formed by the condensation of an alkyl substituted phenol, an alkylene polyamine, and formaldehyde; an Type II.--Mannich products formed by the condensation of an alkyl substituted phenol, an alkylene polyamine, and a hydrocarbon substituted aliphatic dicarboxylic acid or anhydride of such an acid. Both types react with carbon disulfide or carbon disulfide and an alkali metal hydroxide to produce excellent dispersants. Surprisingly, these dispersants co-act with inhibitors to increase the anti-corrosion activity of the inhibitors. The amounts of reactants may vary, but in general, about 0.25 to 3.0 moles of carbon disulfide are contracted with about 1 equivalent weight of the Mannich product (one equivalent weight of the Mannich product being the molecular Weight of the Mannich product divided by the number of reactive nitrogen atoms present per molecule). When carbon disulfide and the alkali metal hyroxide are used, the ratio by weight of carbon disulfide to the hydroxide ranges from about 2:1 to 1:2, preferably 1:1. We prefer to use a saturated aqueous solution of the hydroxide, but a 25% by Weight alkali metal hydroxide solution also works Well. In general, the hydroxide is first blended with the Mannich product and then the carbon disulfide is added to the blend. Examples of suitable alkali metal hyroxides are potassium hydroxide, sodium hydroxide, and lithium hydroxide. The potassium hydroxide, however, is preferred. In preparing Type I Mannich products, about 2 moles of a substituted phenol are reacted with about 3 moles of formaldehyde and about 2 moles of an alkylene polyamine. In preparing Type II Mannich products, about 1 mole of a substituted phenol is reacted with about 2 moles of formaldehyde and about 2 moles of an alkylene polyamine to produce an intermediate, and about 1 mole of this intermediate is then reacted with about 2 moles of a dicarboxylic aliphatic acid or acid anhydride. Examples of suitable alkyl substituted phenols are polybutyl and polypropyl para-substituted phenols Whose substituent groups are, respectively, derived from polybutenes and polypropenes. The preferred alkyl substituent contains from about 2 to 20,000 carbon atoms. In preparing Type I Mannich products, we prefer to use phenolic compounds wherein the alkyl substituent is a polybutyl radical. In preparing Type II Mannich products, we prefer to use phenolic compounds wherein the alkyl substituent is a nonyl radical. Suitable alkylene polyamines generally come within the following formula: in which n is an integer from about 1 to 12. The preferred alkylene polyamine is tetraethylene pentamine. Other alkylene polyamines include, for example, propylene amines, butylene amines, trimethylene amines, tetramethylene amines, and also cyclic homologues of such polyamines, for example, piperazines. Specific examples are: ethylene diamine, diethylene triamine, triethylene tetramine, propylene diamine, tripropylene tetramine, trimethylene diamine, pentaethylene tetramine, di(trimethy1- ene) triamine, N-Z-aminoethyl-piperazine, and octamethylene diamine. Examples of suitable acids and acid anhydrides are hydrocarbon substituted succinic, malonic, glutaric, and adipic acids and anhydrides thereof. The hydrocarbon substituent should impart oil solubility to the acid or anhydride. Generally, hydrocarbon substituents having about 10 or more carbon atoms work well. Hydrocarbon substituents of the acids or anhydrides may be prepared using olefin polymers having a molecular Weight between about 5'00 to 100,000, and they may also contain other groups, as for example, chloro, bromo, nitro, alkoxy, or phenoxy radicals. For a more detailed description of the Type I and Type II Mannich products, refer to, respectively, US. application, Ser. No. 502,368, filed Oct. 22, 1965, and US. application, Ser. No. 591,084, filed Nov. 1, 1966. It is a common practice to add to lubricating oils a divalent metal salt of a 0,0-dihydrocarbyl ester of dithiophosphoric acid. This salt is an oxidation and corrosion inhibitor. When these inhibitors and the dispersants of this invention are added to oils, less inhibitor can be used than hitherto considered advisable. We believe this unforeseen result may be attributed to a synergistic coaction between the novel dispersants and the inhibitors. The principal aims of this invention are: ( 1) to provide an improved ashless dispersant Which increases the anti-corrosion activity of inhibitors; (2) to provide an improved ashless dispersant prepared by reacting carbon disulfide or carbon disulfide and an alkali metal hydroxide with a Mannich product; and 3) to provide improved lubricants containing the above novel dispersants, said dispersants being compatible with inhibitors and other additives. 3 DESCRIPTION OF THE PREFERRED EMBODIMENTS Other objectives and advantages will become apparent upon considering the following examples which demonstrate this invention in greater detail. EXAMPLE I A Type I Mannich product was first prepared by reacting about 2 moles of a polybutyl substituted phenol having a molecular weight of about 2,000 with about 3 moles of formaldehyde and about 2 moles of tetraethylene pentamine. The reaction was conducted in an SAE 5 oil and the Mannich product constituted 50% by weight of the resulting oil blend. Over a period of minutes, 24 milliliters of carbon disulfide (0.4 mole) was added dropwise with stirring to 500 grams (0.4 eq.) of this blend. During the addition of the carbon disulfide to the blend, the temperature rose to about 40 C. For two hours following the addition of the carbon disulfide, the mixture was stirred and gradually heated to about 150 C., during which time hydrogen sulfide evolved. The product was then cooled to about room temperature. EXAMPLE II A Type Mannich product was first prepared by reacting about 1 mole of nonylphenol with about 2 moles of tetraethylene pentamine and about 2 moles of formaldehyde to form an intermediate, and then reacting about 1 mole of this intermediate with about 2 moles of polybutenyl succinic anhydride. The reaction was conducted in an SAE 5 oil and the Mannich product constituted 50% by weight of the resulting oil blend. Over a period of about 20 minutes, 18 milliliters of carbon disulfide (0.3 mole) were added dropwise with stirring to 400 grams (0.6 eq.) of this blend. During the addition of the carbon disulfide to the blend, the temperature rose to about 40 C. For two hours following the addition of the carbon disulfide, the mixture was stirred and gradually heated to about 150 C., during which time hydrogen sulfide evolved. The product was then allowed to cool to about room temperature. A bomb sulfur analysis of the product showed the presence of sulfur in the amount of 1.88% by weight. EXAMPLE III First, a Type II Mannich product was prepared as described in Example II. Then, 140 grams of a 50% by weight potassium hydroxide aqueous solution were added to 1,000 grams of this Mannich product. Next, over a period of about 30 minutes, 76 milliliters of carbon disulfide were added dropwise with stirring to the mixture of potassium hydroxide and the Mannich product. During the addition and mixing of the above reactions, the temperature rose to about 40 C. Because the mixture became so thick as the carbon disulfide was added, about 500 milliliters of benzene were also introduced into the mixture to reduce viscosity. The mixture was stirred overnight and allowed to cool to room temperature. Presented below are examples of lubricating oil formulations using different dispersants. Some use the novel dispersants of this invention; others use unreacted Mannich products or prior art additives. Only a minor amount of the novel dispersant was added to the oil, usually from about 0.5 to 20 weight percent based on the total weight of the formulation, preferably from 2 to 6%. Each for- Inulation also contained an equal amount of a zinc dialkyl dithiophosphate inhibitor. Enough of this inhibitor was added so that the Zinc content of each formulation was about 0.06% by weight. Metal di-aryl or alkyl-aryl dithiophosphate salts may also be used. The corrosiveness of these different oil formulations was then measured using the Stirring Sand Corrosion Test (SSCT). The results of this test are compiled in Table I. Lubricating material A (prior art): Parts by volume SAE 30 mineral oil 98.0 Reaction product of CS polybutenyl succinic anhydride, and tetraethylene pentamine 2.00 Lubricating material B: SAE 30 mineral oil 98.0 Additive of Example I 2.00 Lubricating material C: SAE 30 mineral oil 98.0 Additive of Example II 2.0 Lubricating material D (prior art and KOH): SAE 30 mineral oil 95.0 Reaction product of CS KOH, polybutenyl succinic anhydride, and tetraethylene pentamine 5.0 Lubricating material E: SAE 30 mineral oil 95.0 Additive of Example III 5.0 Control material A: SAE 30 mineral oil 98.0 Reaction product of polybutenyl succinic anhydride and tetraethylene pentamine 2.00 Control material B: SAE 30 mineral oil 98.0 Mannich product of Example I 2.00 Control material C: SAE 30 mineral oil 98.0 Mannich product of Example II 2.0 Control material D: SAE 30 mineral oil 95.0 Reaction product of polybutenyl succinic anhydride and tetraethylene pentamine Control material E: SAE 30 mineral oil 95.0 Mannich product of Example III 5 .0 STIRRING SAND CORROSION TEST The above-mentioned test measures the ability of the oil additives to inhibit corrosion of copper and/or lead containing material. In this test, a copper-lead test specimen is lightly abraded with steel wool, washed with naphtha, dried, and then weighed to the nearest milligram. This clean copper-lead test specimen is then suspended in a steel beaker, Washed with a hot trisodium phosphate solution, rinsed with water and acetone, and then dried. Next, 250 grams of the oil formulation to be tested together with 50 grams of a 30-35 mesh sand and 0.625 gram of lead oxide is charged into the beaker. The lead oxide simulates lead blow-by from fuels. The beaker is then placed in a bath or on a heating block and heated to a temperature of 149 C. (12 C.) while the contents of the beaker are stirred using a stirrer rotating at 750 r.p.m. The contents of this beaker are maintained at this temperature with stirring for 48 hours, after which the copper-lead test specimen is removed, rinsed with naphtha, dried, and weighed. TABLE I Bearing Bearing wt. loss wt. loss Percent increase lubricating control in anti-corromat. Control material sion activity, Lubricating material (SSOT) material (SSCI) (d) (b) e/dX10 A (2% prior art additive) 349 A 465 116 24. 9 B (2% Ex. 1 additive) 98 B 181 83 45. 9 O (2% Ex. 2 additive) 275 C 569 294 51. 7 D (5% prior art additive and K011) 334 D 490 156 32. 5 E (5% Ex. 3 additive) E 569 459 80. 9 Referring to Table I, the low bearing weight loss for formulations B, C, and E in contrast to the high bearing weight loss for formulations A and D demonstrates the superiority of the dispersants of this invention. Table I also shows that the reaction between a Mannich product and carbon disulfide produces a despersant that cooperates with the inhibitor to increase the anti-corrosion activity of the inhibitor. While the reaction between carbon disulfide, the polybutenyl succinic anhydride, and the polyamine does produce a dispersant that also co-acts with the inhibitor to increase the anti-corrosion activity of the inhibitor, this increase is slight in comparison with the increase exhibited by the dispersants of this invention. Formulations D and D were prepared in order to contrast the effect of the hydroxide treatment of the prior art reaction product and the same hydroxide treatment of the Mannich products of this invention. Formulation D exhibits only a small increase in the anti-corrosion activity whereas formulation E exhibits a large increase in the anti-corrosion activity. The above examples have :been presented merely to illustrate the preferred embodiments of this invention. It will be apparent to those skilled in the art that these examples can be changed in many details, too numerous to conveniently list here, which do not depart from the basic principles of this invention. What is claimed as novel and desired to be secured by Letters Patent of the United States is: 1. The reaction product of (A) the condensation product of an alkyl substituted phenol, an alkylene polyamine having the formula H N(alkylene-NH),,H in which n is an integer from about 1 to about 12, and formaldehyde, said alkyl phenol, polyamine and formaldehyde being reacted in proportions of about 2 moles of phenol to about 2 moles of polyamine to about 3 moles of formaldehyde; and (B) carbon disulfide or carbon disulfide and an alkali metal hydroxide, said carbon disulfide being reacted with the condensation product (A) in the proportion of about 0.25 to about 3.0 moles of carbon disulfide to about 1 equivalent weight of product (A). 2. The reaction product of claim 1 is prepared using tetraethylene pentamine. 3. The reaction product of claim 1 wherein the ratio of weight of carbon disulfide to alkali metal hydroxide ranges between about 2:1 and 1:2. 4. The reaction product of claim 3 wherein the alkali metal hydroxide is dissolved in Water. 5. The reaction product of (A) the condensation product of an alkyl substituted phenol, an alkylene polyamine having the formula H N(-alkyleneNH) H in which n is an integer from about 1 to about 12, formaldehyde, and a hydrocarbon substituted aliphatic dicarboxylic acid or anhydride of said acid wherein the hydrocarbon constituent has at least about 10 carbon atoms and imparts oil-solubility to the acid or anhydride, said substituted phenol, polyamine and formaldehyde being first reacted in proportions of about 1 mole of phenol to about 2 moles of polyamine to about 2 moles of formaldehyde to form an intermediate, and then said intermediate and the substituted hydrocarbon substituted acid or acid anhydride being reacted in proportions of about 1 mole of intermediate to about 2 moles of acid or acid anhydride to form said condensation product; and (B) carbon disulfide or carbon. disulfide and an alkali metal hydroxide, said carbon disulfide being reacted with the condensation product (A) in proportions of about 0.25 to about 3.0 moles of carbon disulfide to about 1 equivalent weight of product (A). 6. The reaction product of claim 5 is prepared using tetraethylene pentamine. 7. The reaction product of claim 5 wherein the ratio of weight of carbon disulfide to hydroxide ranges between about 2:1 and about 1:2. 8. The reaction product of claim 5 wherein the hydrocarbon substituted aliphatic dicarboxylic acid is polybutenyl succinic anhydride. References Cited UNITED STATES PATENTS 3,256,185 6/1966 Le Suer 260-132X CHARLES B. PARKER, Primary Examiner D. R. PHILLIPS, Assistant Examiner US. (:1. x11. 2sz 42.7, 47.5 |Patente citante||Fecha de presentación||Fecha de publicación||Solicitante||Título| |US4025451 *||6 Jun 1975||24 May 1977||Ethyl Corporation||Sulfurized mannich bases as lubricating oil dispersant| |US4357149 *||25 Sep 1980||2 Nov 1982||Standard Oil Company (Indiana)||Hydrocarbon-soluble oxidized, sulfurized polyamine-molbdenum compositions and gasoline containing same| |US4521319 *||2 Ago 1983||4 Jun 1985||Chevron Research Company||Dispersant lubricating oil additives| |US4752416 *||11 Dic 1986||21 Jun 1988||The Lubrizol Corporation||Phosphite ester compositions, and lubricants and functional fluids containing same| |US5124055 *||16 Mar 1990||23 Jun 1992||Ethyl Petroleum Additives, Inc.||Lubricating oil composition| |US5334329 *||7 Oct 1988||2 Ago 1994||The Lubrizol Corporation||Lubricant and functional fluid compositions exhibiting improved demulsibility| |US5498809 *||22 May 1995||12 Mar 1996||Exxon Chemical Patents Inc.||Polymers derived from ethylene and 1-butene for use in the preparation of lubricant dispersant additives| |US5554310 *||9 Jun 1994||10 Sep 1996||Exxon Chemical Patents Inc.||Trisubstituted unsaturated polymers| |US5629434 *||25 Sep 1995||13 May 1997||Exxon Chemical Patents Inc||Functionalization of polymers based on Koch chemistry and derivatives thereof| |US5643859 *||17 Jun 1994||1 Jul 1997||Exxon Chemical Patents Inc.||Derivatives of polyamines with one primary amine and secondary of tertiary amines| |US5646332 *||17 Jun 1994||8 Jul 1997||Exxon Chemical Patents Inc.||Batch Koch carbonylation process| |US5650536 *||17 Jun 1994||22 Jul 1997||Exxon Chemical Patents Inc.||Continuous process for production of functionalized olefins| |US5663130 *||11 Mar 1996||2 Sep 1997||Exxon Chemical Patents Inc||Polymers derived from ethylene and 1-butene for use in the preparation of lubricant dispersant additives| |US5696064 *||23 Ago 1995||9 Dic 1997||Exxon Chemical Patents Inc.||Functionalization of polymers based on Koch chemistry and derivatives thereof| |US5698722 *||6 Jun 1995||16 Dic 1997||Exxon Chemical Patents Inc.||Functionalization of polymers based on Koch chemistry and derivatives thereof| |US5703256 *||16 Dic 1996||30 Dic 1997||Exxon Chemical Patents Inc.||Functionalization of polymers based on Koch chemistry and derivatives thereof| |US5717039 *||6 Jun 1995||10 Feb 1998||Exxon Chemical Patents Inc.||Functionalization of polymers based on Koch chemistry and derivatives thereof| |US5767046 *||15 May 1997||16 Jun 1998||Exxon Chemical Company||Functionalized additives useful in two-cycle engines| |US5811379 *||17 Jun 1996||22 Sep 1998||Exxon Chemical Patents Inc.||Polymers derived from olefins useful as lubricant and fuel oil additives, processes for preparation of such polymers and additives and use thereof (PT-1267)| |US5814111 *||6 Ago 1996||29 Sep 1998||Shell Oil Company||Gasoline compositions| |US6030930 *||14 May 1997||29 Feb 2000||Exxon Chemical Patents Inc||Polymers derived from ethylene and 1-butene for use in the preparation of lubricant disperant additives| |US6066603 *||21 Jul 1997||23 May 2000||Exxon Chemical Patents Inc.||Polar monomer containing copolymers derived from olefins useful as lubricant and useful as lubricant and fuel oil additivies process for preparation of such copolymers and additives and use thereof| |US6172015||21 Jul 1999||9 Ene 2001||Exxon Chemical Patents, Inc||Polar monomer containing copolymers derived from olefins useful as lubricant and fuel oil additives, processes for preparation of such copolymers and additives and use thereof| |US6468946||6 Jul 1999||22 Oct 2002||The Lubrizol Corporation||Mixed phosphorus compounds and lubricants containing the same| |US6468948||21 Jul 1999||22 Oct 2002||Infineum Usa L.P.||Polymers derived from olefins useful as lubricant and fuel oil additives, processes for preparation of such polymers and additives and use thereof (PT-1267)| |US6627584||28 Ene 2002||30 Sep 2003||Ethyl Corporation||Automatic transmission fluid additive comprising reaction product of hydrocarbyl acrylates and dihydrocarbyldithiophosphoric acids| |US7214649||31 Dic 2003||8 May 2007||Afton Chemical Corporation||Hydrocarbyl dispersants including pendant polar functional groups| |US7645728||17 Feb 2004||12 Ene 2010||Afton Chemical Corporation||Lubricant and fuel additives derived from treated amines| |US7695534||19 May 2005||13 Abr 2010||Ecr Technologies, Inc.||Chemical synthesis methods using electro-catalysis| |US7833953||28 Ago 2006||16 Nov 2010||Afton Chemical Corporation||Lubricant composition| |US7879775||14 Jul 2006||1 Feb 2011||Afton Chemical Corporation||Lubricant compositions| |US7888299||13 Ene 2004||15 Feb 2011||Afton Chemical Japan Corp.||Extended drain, thermally stable, gear oil formulations| |US7902133||14 Jul 2006||8 Mar 2011||Afton Chemical Corporation||Lubricant composition| |US7947636||27 Feb 2004||24 May 2011||Afton Chemical Corporation||Power transmission fluids| |US8546311||10 Mar 2009||1 Oct 2013||Volkswagen Aktiengesellsschaft||Method for lubricating a clutch-only automatic transmission component requiring lubrication| |US8557752||22 Mar 2006||15 Oct 2013||Afton Chemical Corporation||Lubricating compositions| |US8703669||17 Feb 2009||22 Abr 2014||Afton Chemical Corporation||Ultra-low sulfur clutch-only transmission fluids| |US9267093||21 May 2010||23 Feb 2016||Afton Chemical Corporation||Methods for providing steel-on-steel friction and/or steel-on-paper friction with lubricant compositions for power transmitting fluids| |US9481841||8 Dic 2005||1 Nov 2016||The Lubrizol Corporation||Process of preparation of an additive and its use| |US20040147410 *||13 Ene 2004||29 Jul 2004||Milner Jeffrey L||Extended drain, thermally stable, gear oil formulations| |US20050065043 *||23 Sep 2003||24 Mar 2005||Henly Timothy J.||Power transmission fluids having extended durability| |US20050070446 *||25 Sep 2003||31 Mar 2005||Ethyl Petroleum Additives, Inc.||Boron free automotive gear oil| |US20050101494 *||10 Nov 2003||12 May 2005||Iyer Ramnath N.||Lubricant compositions for power transmitting fluids| |US20050101496 *||6 Nov 2003||12 May 2005||Loper John T.||Hydrocarbyl dispersants and compositions containing the dispersants| |US20050143265 *||31 Dic 2003||30 Jun 2005||Loper John T.||Hydrocarbyl dispersants including pendant polar functional groups| |US20050181959 *||17 Feb 2004||18 Ago 2005||Esche Carl K.Jr.||Lubricant and fuel additives derived from treated amines| |US20050262760 *||19 May 2005||1 Dic 2005||Lawson J A||Chemical synthesis methods using electro-catalysis| |US20060217273 *||22 Mar 2006||28 Sep 2006||Nubar Ozbalik||Lubricating compositions| |US20060264339 *||19 May 2005||23 Nov 2006||Devlin Mark T||Power transmission fluids with enhanced lifetime characteristics| |US20070054813 *||25 Oct 2006||8 Mar 2007||Chip Hewette||Boron free automotive gear oil| |US20070111906 *||12 Nov 2005||17 May 2007||Milner Jeffrey L||Relatively low viscosity transmission fluids| |US20080015124 *||14 Jul 2006||17 Ene 2008||Devlin Mark T||Lubricant composition| |US20080274921 *||14 Jun 2007||6 Nov 2008||Ian Macpherson||Environmentally-Friendly Lubricant Compositions| |US20090031614 *||1 Ago 2007||5 Feb 2009||Ian Macpherson||Environmentally-Friendly Fuel Compositions| |US20090071067 *||17 Sep 2007||19 Mar 2009||Ian Macpherson||Environmentally-Friendly Additives And Additive Compositions For Solid Fuels| |US20090093384 *||3 Oct 2007||9 Abr 2009||The Lubrizol Corporation||Lubricants That Decrease Micropitting for Industrial Gears| |US20090156445 *||13 Dic 2007||18 Jun 2009||Lam William Y||Lubricant composition suitable for engines fueled by alternate fuels| |US20090233822 *||17 Feb 2009||17 Sep 2009||Afton Chemical Corporation||Ultra-low sulfur clutch-only transmission fluids| |US20090233823 *||10 Mar 2009||17 Sep 2009||Volkswagen Aktiengesellschaft||Method for lubricating a clutch-only automatic transmission component requiring lubrication| |US20100152078 *||12 Feb 2010||17 Jun 2010||Ian Macpherson||Environmentally-friendly lubricant compositions| |US20100279901 *||21 May 2010||4 Nov 2010||Iyer Ramnath N||Methods for providing steel-on-steel friction and/or steel-on-paper friction with lubricant compositions for power transmitting fluids| |DE102009001301A1||3 Mar 2009||24 Sep 2009||Audi Ag||Verfahren zum Schmieren einer Komponente nur für die Kupplung eines automatischen Getriebes, welche Schmierung erfordert| |DE102009012567A1||11 Mar 2009||1 Oct 2009||Afton Chemical Corp.||Clutch-only transmission fluid useful for lubrication comprises oil formulated with additive components having metal detergent, phosphorus-based wear preventative, phosphorylated and boronated dispersant, sulfurized extreme pressure agent| |EP0399764A1||21 May 1990||28 Nov 1990||Ethyl Petroleum Additives Limited||Lubricant compositions| |EP0471124A1 *||15 Ago 1990||19 Feb 1992||Mobil Oil Corporation||Polyether substituted mannich bases as fuel and lubricant ashless dispersants| |EP0537865A2 *||27 Feb 1989||21 Abr 1993||Exxon Chemical Patents Inc.||Polyanhydride modified dispersants| |EP0537865A3 *||27 Feb 1989||23 Jun 1993||Exxon Chemical Patents Inc.||Polyanhydride modified dispersants| |EP0558835A1||30 Ene 1992||8 Sep 1993||Albemarle Corporation||Biodegradable lubricants and functional fluids| |EP0713908A1||21 Nov 1995||29 May 1996||Ethyl Corporation||Power transmission fluids| |EP1568759A2||24 Feb 2005||31 Ago 2005||Afton Chemical Corporation||Power transmission fluids| |EP2017329A1||17 Abr 2008||21 Ene 2009||Afton Chemical Corporation||Environmentally-Friendly Lubricant Compositions| |EP2025737A1||30 Jul 2008||18 Feb 2009||Afton Chemical Corporation||Environmentally-friendly fuel compositions| |EP2072611A1||11 Nov 2008||24 Jun 2009||Afton Chemical Corporation||Lubricant composition suitable for engines fueled by alternate fuels| |EP2230292A1||8 Nov 2004||22 Sep 2010||Afton Chemical Corporation||Methods of lubricating transmissions| |EP2302023A2||2 Oct 2003||30 Mar 2011||R.T. Vanderbilt Company, Inc.||Synergistic organoborate compositions and lubricating compositions containing same| |EP2366762A1||2 Oct 2003||21 Sep 2011||R.T. Vanderbilt Company Inc.||Synergistic organoborate compositions and lubricating compositions containing same| |EP2371933A1||1 Feb 2007||5 Oct 2011||The Lubrizol Corporation||Tartaric acid derivatives as fuel economy improvers and antiwear agents in crankcase oils and preparation thereof| |EP2420553A1||17 Abr 2008||22 Feb 2012||Afton Chemical Corporation||Environmentally-Friendly Lubricant Compositions| |EP2436753A1||2 Oct 2003||4 Abr 2012||R.T. Vanderbilt Company Inc.||Synergistic organoborate compositions and lubricating compositions containing same| |EP2460870A1||2 Oct 2003||6 Jun 2012||R.T. Vanderbilt Company, Inc.||Synergistic organoborate compositions and lubricating compositions containing same| |EP3070153A1||30 Ago 2011||21 Sep 2016||The Lubrizol Corporation||Hydroxychroman derivatives as antioxidants| |WO1986004601A1||29 Ene 1986||14 Ago 1986||The Lubrizol Corporation||Sulfur-containing compositions, and additive concentrates and lubricating oils containing same| |WO2006094011A2||28 Feb 2006||8 Sep 2006||R.T. Vanderbilt Company, Inc.||Molybdenum dialkyldithiocarbamate compositions and lubricating compositions containing the same| |WO2010096325A1||11 Feb 2010||26 Ago 2010||The Lubrizol Corporation||Amine derivatives as friction modifiers in lubricants| |WO2011143051A1||6 May 2011||17 Nov 2011||The Lubrizol Corporation||Tartaric acid derivatives in hths fluids| |WO2012033668A1||30 Ago 2011||15 Mar 2012||The Lubrizol Corporation||Hydroxychroman derivatives as engine oil antioxidants| |WO2012141855A1||21 Mar 2012||18 Oct 2012||R.T. Vanderbilt Company, Inc.||Molybdenum dialkyldithiocarbamate compositions and lubricating compositions containing the same| |WO2012154708A1||8 May 2012||15 Nov 2012||The Lubrizol Corporation||Aromatic imides and esters as lubricant additives| |WO2013012987A1||19 Jul 2012||24 Ene 2013||The Lubrizol Corporation||Overbased friction modifiers and methods of use thereof| |WO2013013026A1||19 Jul 2012||24 Ene 2013||The Lubrizol Corporation||Carboxylic pyrrolidinones and methods of use thereof| |WO2013070376A2||11 Oct 2012||16 May 2013||Vanderbilt Chemicals, Llc||Lubricant composition| |WO2014088814A1||21 Nov 2013||12 Jun 2014||The Lubrizol Corporation||Pyran dispersants| |WO2015200592A1||25 Jun 2015||30 Dic 2015||The Lubrizol Corporation||Mixtures of friction modifiers to provide good friction performance to transmission fluids| |WO2016144639A1||2 Mar 2016||15 Sep 2016||The Lubrizol Corporation||Lubricating compositions comprising an anti-wear/friction modifying agent| |Clasificación de EE.UU.||528/158, 528/211, 528/186, 508/542, 528/183, 528/180, 528/147, 508/543| |Clasificación cooperativa||C10M2217/06, C10M2215/04, C10M159/16, C10M2215/062, C10M2217/046, C10M2215/26|
<urn:uuid:da073e98-5140-4926-a6b0-b49bc162a942>
CC-MAIN-2017-04
http://www.google.es/patents/US3600372?dq=flatulence
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00487-ip-10-171-10-70.ec2.internal.warc.gz
en
0.814123
7,819
1.523438
2
The Susan Smith case In the blink of an eye, North America was informed of Susan Smith's tragic loss of her two young boys. No one would have guessed that such a violent crime could have occurred in a small town . Throughout the ordeal , police began to see the flaws in Susan Smith's story. This lead to suspicions, causing the police to make Susan Smith their prime suspect. Days later, Susan Smith confessed to the hideous crime she committed, leaving the nation in disgust. The actions of Susan Smith, which were based on her background and the events in question have left a profound social and legal impact… - Greenspan - The Case for the Defense - Opening Statements for case againt incompetent school. - The Susan Smith case E-pasta adrese, uz kuru nosūtīt darba saiti: Saite uz darbu:
<urn:uuid:02327a5b-22c7-4bb5-bc60-f6d4228a9f71>
CC-MAIN-2017-04
https://www.atlants.lv/eseja/the-susan-smith-case/891876/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00118-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930837
183
2.078125
2
Tightening experts in the production environment are sought-after specialists, particularly for safety-critical tightening. This kind of tightening process is often found in the construction of vehicles and aircraft. Only a handful of tightening specialists have the expertise for such critical processes as well as detailed knowledge of the kind of complications that can occur; in other words, what causes tightening problems and how they can be solved. The tightening expert is therefore a rare “commodity” in the world of manufacturing and needs to be deployed properly. Take for example a car manufacturing plant. The more than 2,000 tightening systems in use there see over 250 million safety- or function-critical tightenings per year. The Association of German Engineers (VDI) even provides standards for particular restrictions or requirements when it comes to automotive tightening. Did you know? In a car manufacturing plant, for example, there are more than 2,000 tightening systems in use and over 250 million safety- or function-critical screw fittings per year. Safety-critical tightening processes in particular have to be closely monitored and analyzed. Anomalies need to be detected and responded to, alerts for production staff need to be triggered. And for a manufacturing company, it would be best for all this to happen close to real time. That’s because the production process has to be transparent throughout if the tightening expert is to take preventive action, continuously improve the production process, and make the most of his or her expertise. There are other quality controls that can be used in tightening processes. The earlier these controls take place in the process for manufacturing an engine or a transmission, for example, the better they can reduce failure and reworking costs and increase output. In detail: What measures take tightening experts in their day-to-day work? How can Industry 4.0 take the expertise of these tightening specialists and make it available at a company’s production locations around the world? How can it keep from tying them up with routine manual tasks or having to collate information from various unconnected systems? 1. Quick overview of tightening processes Tightening experts need a fast and easy-to-navigate overview – for example, in a tree structure – of plants, areas, lines, stations, tightening applications, and even right down to individual channels. This helps them realize straightaway what tightening systems are active in a given factory or how many production lines are in one plant. Access to the tightening systems’ master data also gives the power tool fleet manager a detailed overview of system status and utilization. Familiar routines from the private or office environment, such as creating favorites, make it easier for tightening experts to quickly access specific tightening processes, tightening rundowns, or units. 2. Optimizing processes by carefully analyzing tightening processes Visual elements such as graphs and statistical functions help tightening experts to analyze tightening processes quickly and detect process changes early on – including refinements such as a night view, with a darker layout that is easier on the eyes during night shifts. At a glance, traffic-signal colors indicate whether a tightening process is being carried out properly. Similarly, an alarm function can alert the experts when defined threshold values have been exceeded or not been reached, informing the experts of why the tightening process is not being carried out properly. Reacting quickly to errors thanks to real-time data acquisition To detect trends early, the tightening process data from the tool controler has to be transmitted in real time to a database. Tightening experts can then view the data in a user interface supported by all common web browsers. They have immediate access to the tightening process and can intervene directly if necessary. 3. Documentation and quality assurance Documenting the tightening processes plays a special role in quality management, particularly in regard to safety-critical tightening applications and products. A database can support tightening experts by providing the product ID for every completed tightening events and the ID for the individual tool that performed that activity. In the case of production errors, this information is of particular relevance as it becomes necessary to verify which tightening system was used on which component and when, and which status (OK/NOK) the tightening event received. You might ask how I know all this, not being a tightening expert myself. I’ve been developing a software solution for the manufacturing industry with my colleagues, and in the course of my work, I’ve met several tightening experts from leading German automotive suppliers. Together with Bosch Rexroth we took their main requirements and combined them into a software-based solution we call Process Quality Manager. Did I miss anything? What else can Industry 4.0 do to better support professionals in manufacturing?
<urn:uuid:741ed5e8-f047-4002-b6b4-973831532bf9>
CC-MAIN-2022-33
https://blog.bosch-si.com/industry40/what-tightening-experts-expect-from-industry-4-0/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00478.warc.gz
en
0.93968
953
2.796875
3
During the early 15th century the Medici family helped foster a cultural revolution that took Italy out of the dark ages. Cut to the present. The English-language “Medici: Masters of Florence” TV series, which Frank Spotnitz is showrunning on a $28 million budget co-financed by Netflix, is considered a harbinger of change within the Italian TV industry. The first eight-episode season, in which Dustin Hoffman played Giovanni de’ Medici, the Florentine family’s patriarch, scored an average primetime share of more than 25% in 2016 on Italian pubcaster RAI and traveled widely. The second installment, “Medici: Masters of Florence. The Magnificent,” will instead feature Daniel Sharman (“Teen Wolf”) as Lorenzo de’ Medici and Sean Bean (“Game of Thrones”) as Jacopo de’ Pazzi, head of a rival banking family who plotted to kill the Florentine ruler known as The Magnificent. Co-produced by Rome’s Lux Vide with Rai Fiction, Altice Group and Spotnitz’s Big Light Prods., the show — which will go out as a Netflix original in North America and India — is about to wrap 82 days of shooting directed by Jon Cassar (“24”) and Italy’s Jan Michelini. They say this season will be more fast-paced and youth-skewing. The international distributor in still open territories is Germany’s Beta Film. Cameras started rolling in late August at Lux Vide’s Rome studios, where interiors of the Medici and Pazzi palazzi were meticulously reconstructed, as were more than 2,500 square feet of frescoes by early Renaissance masters. After six weeks, production moved to more than 30 locations in Tuscany, Lombardy and the Lazio region, where castles, museums, churches and piazzas provided Renaissance elements that doubled for spots where the real historical events took place. Production designer Francesco Frigeri says he’s particularly proud of work shot in the Tuscan town of Volterra, which doubled for Florence, especially in its central square, which was augmented with some sets to make it look like Florence’s famed Piazza della Signoria six centuries ago. Frigeri, who worked with Mel Gibson on “The Passion of the Christ,” points out that “Italy used to be known as the best place in the world to re-create any kind of ambience.” But he laments that the decline in Italian cinema that started during the 1980s “was killing my profession.” He calls “Medici” “an effort on Italy’s part to rise to the challenge of the international market … which can save us.” Cassar is impressed by Italy’s nine-hour shooting day. “I hope North America wakes up one day and gets all the unions to say, ‘Let’s do a nine-hour day and have a life!” Costume designer Alessandro Lai seized the “Medici” opportunity to work with Tuscan clothing manufacturers and fashion houses, and not just showbiz costume companies. Hats and jewels were made in Florence, shoes and boots in Lucca. Soft leather came from designer bag maker Bottega Veneta, while Fendi furnished “the same type of mink fur trims as those of the times,” Lai says. Lux Vide CEO Luca Bernabei hopes “Medici” will be the trailblazer for a new TV genre hailing from Italy that he calls “Mediterranean drama.” He notes, “The Mediterranean is the cradle of Western civilization,” while Italy “throughout history has often been positioned at the crossroads of economic and sociopolitical changes.” Mining this rich material with bigger budgets, the right skill sets and a global outlook can become “the starting point for something completely new in high-end TV.”
<urn:uuid:125247f5-f948-4aef-8295-7008e3ff5e23>
CC-MAIN-2022-33
https://variety.com/2018/artisans/production/netflix-medici-tv-series-1202651265/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00665.warc.gz
en
0.955795
869
1.664063
2
The Dingle at Night — The Two Sides of the Question — Roman Females — Filling The Kettle — The Dream — The Tall Figure I descended to the bottom of the dingle. It was nearly involved in obscurity. To dissipate the feeling of melancholy which came over my mind, I resolved to kindle a fire; and having heaped dry sticks upon my hearth, and added a billet or two, I struck a light, and soon produced a blaze. Sitting down, I fixed my eyes upon the blaze, and soon fell into a deep meditation. I thought of the events of the day, the scene at church, and what I had heard at church, the danger of losing one’s soul, the doubts of Jasper Petulengro as to whether one had a soul. I thought over the various arguments which I had either heard, or which had come spontaneously to my mind, for or against the probability of a state of future existence. They appeared to me to be tolerably evenly balanced. I then thought that it was at all events taking the safest part to conclude that there was a soul. It would be a terrible thing, after having passed one’s life in the disbelief of the existence of a soul, to wake up after death a soul, and to find one’s self a lost soul. Yes, methought I would come to the conclusion that one has a soul. Choosing the safe side, however, appeared to me playing rather a dastardly part. I had never been an admirer of people who chose the safe side in everything; indeed I had always entertained a thorough contempt for them. Surely it would be showing more manhood to adopt the dangerous side, that of disbelief. I almost resolved to do so — but yet in a question of so much importance, I ought not to be guided by vanity. The question was not which was the safe, but the true side — yet how was I to know which was the true side? Then I thought of the Bible — which I had been reading in the morning — that spoke of the soul and a future state; but was the Bible true? I had heard learned and moral men say that it was true, but I had also heard learned and moral men say that it was not: how was I to decide? Still that balance of probabilities! If I could but see the way of truth, I would follow it, if necessary, upon hands and knees — on that I was determined; but I could not see it. Feeling my brain begin to turn round, I resolved to think of something else; and forthwith began to think of what had passed between Ursula and myself in our discourse beneath the hedge. I mused deeply on what she had told me as to the virtue of the females of her race. How singular that virtue must be which was kept pure and immaculate by the possessor, whilst indulging in habits of falsehood and dishonesty! I had always thought the gypsy females extraordinary beings. I had often wondered at them, their dress, their manner of speaking, and, not least, at their names; but, until the present day, I had been unacquainted with the most extraordinary point connected with them. How came they possessed of this extraordinary virtue? Was it because they were thievish? I remembered that an ancient thief-taker, who had retired from his useful calling, and who frequently visited the office of my master at law, the respectable S—— 126 who had the management of his property — I remembered to have heard this worthy, with whom I occasionally held discourse, philosophic and profound, when he and I chanced to be alone together in the office, say that all first-rate thieves were sober, and of well-regulated morals, their bodily passions being kept in abeyance by their love of gain; but this axiom could scarcely hold good with respect to these women — however thievish they might be, they did care for something besides gain: they cared for their husbands. If they did thieve, they merely thieved for their husbands; and though, perhaps, some of them were vain, they merely prized their beauty because it gave them favour in the eyes of their husbands. Whatever the husbands were — and Jasper had almost insinuated that the males occasionally allowed themselves some latitude — they appeared to be as faithful to their husbands as the ancient Roman matrons were to theirs. Roman matrons! and, after all, might not these be in reality Roman matrons? They called themselves Romans; might not they be the descendants of the old Roman matrons? Might not they be of the same blood as Lucretia? And were not many of their strange names — Lucretia amongst the rest — handed down to them from old Rome? It is true their language was not that of old Rome; it was not, however, altogether different from it. After all, the ancient Romans might be a tribe of these people, who settled down and founded a village with the tilts of carts, which by degrees, and the influx of other people, became the grand city of the world. I liked the idea of the grand city of the world owing its origin to a people who had been in the habit of carrying their houses in their carts. Why, after all, should not the Romans of history be a branch of these Romans? There were several points of similarity between them; if Roman matrons were chaste, both men and women were thieves. Old Rome was the thief of the world; yet still there were difficulties to be removed before I could persuade myself that the old Romans and my Romans were identical; and in trying to remove these difficulties, I felt my brain once more beginning to turn, and in haste took up another subject of meditation, and that was the patteran, and what Ursula had told me about it. I had always entertained a strange interest for that sign by which in their wanderings the Romanese gave to those of their people who came behind intimation as to the direction which they took; but it now inspired me with greater interest than ever — now that I had learnt that the proper meaning of it was the leaves of trees. I had, as I have said in my dialogue with Ursula, been very eager to learn the word for leaf in the Romanian language, but had never learnt it till this day; so patteran signified leaf, the leaf of a tree; and no one at present knew that but myself and Ursula, who had learnt it from Mrs. Herne, the last, it was said, of the old stock; and then I thought what strange people the gypsies must have been in the old time. They were sufficiently strange at present, but they must have been far stranger of old; they must have been a more peculiar people — their language must have been more perfect — and they must have had a greater stock of strange secrets. I almost wish that I had lived some two or three hundred years ago, that I might have observed these people when they were yet stranger than at present. I wondered whether I could have introduced myself to their company at that period, whether I should have been so fortunate as to meet such a strange, half-malicious, half good-humoured being as Jasper, who would have instructed me in the language, then more deserving of note than at present. What might I not have done with that language, had I known it in its purity? Why, I might have written books in it; yet those who spoke it would hardly have admitted me to their society at that period, when they kept more to themselves. Yet I thought that I might possibly have gained their confidence, and have wandered about with them, and learnt their language, and all their strange ways, and then — and then — and a sigh rose from the depth of my breast; for I began to think, ‘Supposing I had accomplished all this, what would have been the profit of it? and in what would all this wild gypsy dream have terminated?’ Then rose another sigh, yet more profound, for I began to think, ‘What was likely to be the profit of my present way of life; the living in dingles, making pony and donkey shoes, conversing with gypsy-women under hedges, and extracting from them their odd secrets?’ What was likely to be the profit of such a kind of life, even should it continue for a length of time? — a supposition not very probable, for I was earning nothing to support me, and the funds with which I had entered upon this life were gradually disappearing. I was living, it is true, not unpleasantly, enjoying the healthy air of heaven; but, upon the whole, was I not sadly misspending my time? Surely I was; and, as I looked back, it appeared to me that I had always been doing so. What had been the profit of the tongues which I had learnt? had they ever assisted me in the day of hunger? No, no! it appeared to me that I had always misspent my time, save in one instance, when by a desperate effort I had collected all the powers of my imagination, and written the Life of Joseph Sell; 127 but even when I wrote the life of Sell, was I not in a false position? Provided I had not misspent my time, would it have been necessary to make that effort, which, after all, had only enabled me to leave London, and wander about the country for a time? But could I, taking all circumstances into consideration, have done better than I had? With my peculiar temperament and ideas, could I have pursued with advantage the profession to which my respectable parents had endeavoured to bring me up? It appeared to me that I could not, and that the hand of necessity had guided me from my earliest years, until the present night in which I found myself seated in the dingle, staring on the brands of the fire. But ceasing to think of the past which, as irrecoverably gone, it was useless to regret, even were there cause to regret it, what should I do in future? Should I write another book like the Life of Joseph Sell; take it to London, and offer it to a publisher? But when I reflected on the grisly sufferings which I had undergone whilst engaged in writing the Life of Sell, I shrank from the idea of a similar attempt; moreover, I doubted whether I possessed the power to write a similar work — whether the materials for the life of another Sell lurked within the recesses of my brain? Had I not better become in reality what I had hitherto been merely playing at — a tinker or a gypsy? But I soon saw that I was not fitted to become either in reality. It was much more agreeable to play the gypsy or the tinker, than to become either in reality. I had seen enough of gypsying and tinkering to be convinced of that. All of a sudden the idea of tilling the soil came into my head; tilling the soil was a healthful and noble pursuit! but my idea of tilling the soil had no connection with Britain; for I could only expect to till the soil in Britain as a serf. I thought of tilling it in America, in which it was said there was plenty of wild, unclaimed land, of which any one, who chose to clear it of its trees, might take possession. I figured myself in America, in an immense forest, clearing the land destined, by my exertions, to become a fruitful and smiling plain. Methought I heard the crash of the huge trees as they fell beneath my axe; and then I bethought me that a man was intended to marry — I ought to marry; and if I married, where was I likely to be more happy as a husband and a father than in America, engaged in tilling the ground? I fancied myself in America, engaged in tilling the ground, assisted by an enormous progeny. Well, why not marry, and go and till the ground in America? I was young, and youth was the time to marry in, and to labour in. I had the use of all my faculties; my eyes, it is true, were rather dull from early study, and from writing the Life of Joseph Sell; but I could see tolerably well with them, and they were not bleared. I felt my arms, and thighs, and teeth — they were strong and sound enough; so now was the time to labour, to marry, eat strong flesh, and beget strong children — the power of doing all this would pass away with youth, which was terribly transitory. I bethought me that a time would come when my eyes would be bleared, and, perhaps, sightless; my arms and thighs strengthless and sapless; when my teeth would shake in my jaws, even supposing they did not drop out. No going a wooing then — no labouring — no eating strong flesh, and begetting lusty children then; and I bethought me how, when all this should be, I should bewail the days of my youth as misspent, provided I had not in them founded for myself a home, and begotten strong children to take care of me in the days when I could not take care of myself; and thinking of these things, I became sadder and sadder, and stared vacantly upon the fire till my eyes closed in a doze. I continued dozing over the fire, until rousing myself I perceived that the brands were nearly consumed, and I thought of retiring for the night. I arose, and was about to enter my tent, when a thought struck me. ‘Suppose,’ thought I, ‘that Isopel Berners should return in the midst of the night, how dark and dreary would the dingle appear without a fire! truly, I will keep up the fire, and I will do more; I have no board to spread for her, but I will fill the kettle, and heat it, so that, if she comes, I may be able to welcome her with a cup of tea, for I know she loves tea.’ Thereupon, I piled more wood upon the fire, and soon succeeded in producing a better blaze than before; then, taking the kettle, I set out for the spring. On arriving at the mouth of the dingle, which fronted the east, I perceived that Charles’s wain was nearly opposite to it, high above in the heavens, by which I knew that the night was tolerably well advanced. The gypsy encampment lay before me; all was hushed and still within it, and its inmates appeared to be locked in slumber; as I advanced, however, the dogs, which were fastened outside the tents, growled and barked; but presently recognising me, they were again silent, some of them wagging their tails. As I drew near a particular tent, I heard a female voice say —‘Some one is coming!’ and, as I was about to pass it, the cloth which formed the door was suddenly lifted up, and a black head, and part of a huge naked body protruded. It was the head and upper part of the giant Tawno, who, according to the fashion of gypsy men, lay next the door, wrapped in his blanket; the blanket, had, however, fallen off, and the starlight shone clear on his athletic tawny body, and was reflected from his large staring eyes. ‘It is only I, Tawno,’ said I, ‘going to fill the kettle, as it is possible that Miss Berners may arrive this night.’ ‘Kos-ko,’ 128 drawled out Tawno, and replaced the curtain. ‘Good, do you call it?’ said the sharp voice of his wife; ‘there is no good in the matter; if that young chap were not living with the rawnee in the illegal and uncertificated line, he would not be getting up in the middle of the night to fill her kettles.’ Passing on, I proceeded to the spring, where I filled the kettle, and then returned to the dingle. Placing the kettle upon the fire, I watched it till it began to boil; then removing it from the top of the brands, I placed it close beside the fire, and leaving it simmering, I retired to my tent, where, having taken off my shoes, and a few of my garments, I lay down on my palliasse, and was not long in falling asleep. I believe I slept soundly for some time, thinking and dreaming of nothing; suddenly, however, my sleep became disturbed, and the subject of the patterans began to occupy my brain. I imagined that I saw Ursula tracing her husband, Launcelot Lovell, by means of his patterans; I imagined that she had considerable difficulty in doing so; that she was occasionally interrupted by parish beadles and constables, who asked her whither she was travelling, to whom she gave various answers. Presently methought that, as she was passing by a farmyard, two fierce and savage dogs flew at her; I was in great trouble, I remember, and wished to assist her, but could not, for though I seemed to see her, I was still at a distance; and now it appeared that she had escaped from the dogs, and was proceeding with her cart along a gravelly path which traversed a wild moor; I could hear the wheels grating amidst sand and gravel. The next moment I was awake, and found myself silting up in my tent; there was a glimmer of light through the canvas caused by the fire. A feeling of dread came over me, which was perhaps natural on starting suddenly from one’s sleep in that wild lone place; I half imagined that someone was nigh the tent; the idea made me rather uncomfortable, and, to dissipate it, I lifted up the canvas of the door and peeped out, and, lo! I had an indistinct view of a tall figure standing by the tent. ‘Who is that?’ said I, whilst I felt my blood rush to my heart. ‘It is I,’ said the voice of Isopel Berners; ‘you little expected me, I dare say; well, sleep on, I do not wish to disturb you.’ ‘But I was expecting you,’ said I, recovering myself, ‘as you may see by the fire and the kettle. I will be with you in a moment.’ Putting on in haste the articles of dress which I had flung off, I came out of the tent, and addressing myself to Isopel, who was standing beside her cart, I said: ‘Just as I was about to retire to rest I thought it possible that you might come to-night, and got everything in readiness for you. Now, sit down by the fire whilst I lead the donkey and cart to the place where you stay; I will unharness the animal, and presently come and join you.’ ‘I need not trouble you,’ said Isopel; ‘I will go myself and see after my things.’ ‘We will go together,’ said I, ‘and then return and have some tea.’ Isopel made no objection, and in about half an hour we had arranged everything at her quarters. I then hastened and prepared tea. Presently Isopel rejoined me, bringing her stool; she had divested herself of her bonnet, and her hair fell over her shoulders; she sat down, and I poured out the beverage, handing her a cup. ‘Have you made a long journey to-night?’ said I. ‘A very long one,’ replied Belle, ‘I have come nearly twenty miles since six o’clock.’ ‘I believe I heard you coming in my sleep,’ said I; ‘did the dogs above bark at you?’ ‘Yes,’ said Isopel, ‘very violently; did you think of me in your sleep?’ ‘No,’ said I, ‘I was thinking of Ursula and something she had told me.’ ‘When and where was that?’ said Isopel. ‘Yesterday evening,’ said I, ‘beneath the dingle hedge.’ ‘Then you were talking with her beneath the hedge?’ ‘I was,’ said I, ‘but only upon gypsy matters. Do you know, Belle, that she has just been married to Sylvester, so you need not think that she and I—.’ ‘She and you are quite at liberty to sit where you please,’ said Isopel. ‘However, young man,’ she continued, dropping her tone, which she had slightly raised, ‘I believe what you said, that you were merely talking about gypsy matters, and also what you were going to say, if it was, as I suppose, that she and you had no particular acquaintance.’ Isopel was now silent for some time. ‘What are you thinking of?’ said I. ‘I was thinking,’ said Belle, ‘how exceedingly kind it was of you to get everything in readiness for me, though you did not know that I should come.’ ‘I had a presentiment that you would come,’ said I; ‘but you forget that I have prepared the kettle for you before, though it was true I was then certain that you would come.’ ‘I had not forgotten your doing so, young man,’ said Belle; ‘but I was beginning to think that you were utterly selfish, caring for nothing but the gratification of your own strange whims.’ ‘I am very fond of having my own way,’ said I, ‘but utterly selfish I am not, as I dare say I shall frequently prove to you. You will often find the kettle boiling when you come home.’ ‘Not heated by you,’ said Isopel with a sigh. ‘By whom else?’ said I; ‘surely you are not thinking of driving me away?’ ‘You have as much right here as myself,’ said Isopel, ‘as I have told you before; but I must be going myself.’ ‘Well,’ said I, ‘we can go together; to tell you the truth, I am rather tired of this place.’ ‘Our paths must be separate,’ said Belle. ‘Separate,’ said I, ‘what do you mean? I shan’t let you go alone, I shall go with you; and you know the road is as free to me as to you; besides, you can’t think of parting company with me, considering how much you would lose by doing so; remember that you scarcely know anything of the Armenian language; now, to learn Armenian from me would take you twenty years.’ Belle faintly smiled. ‘Come,’ said I, ‘take another cup of tea.’ Belle took another cup of tea, and yet another; we had some indifferent conversation, after which I arose and gave her donkey a considerable feed of corn. Belle thanked me, shook me by the hand, and then went to her own tabernacle, and I returned to mine. Last updated Sunday, March 27, 2016 at 11:51
<urn:uuid:b36fc09c-2f05-4c9a-85f4-00a939580f00>
CC-MAIN-2016-44
https://ebooks.adelaide.edu.au/b/borrow/george/romany/chapter12.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00374-ip-10-171-6-4.ec2.internal.warc.gz
en
0.991153
4,965
1.890625
2