text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
Magnification lenses used in dentistry have improved significantly in the past decade. During the mid-1980s, veteran dentists were still wearing the single-lens, flip-down loupes, featuring tiny opera like glasses protruding at an angle from a fixed metal bar. The loupes were held securely to the operator’s forehead by a narrow band. When chairside, the dentist could flip the metal bar down, lean in toward the patient until the magnified image was properly focused, and begin treatment. Improvements in magnification lenses have made them an asset to many dental professionals, including those without natural visual impairment. In the academic setting, many dental and dental hygiene students purchase loupes as they begin their preclinical exercises.1 Does the use of optical magnification improve clinical skill? The natural assumption is the bigger the object, the better we see, thus, the better we work. Dental studies using magnification technologies available in the mid-1990s provide conflicting evidence. A study conducted by Donaldson et al evaluated 52 third-year dental students’ performance on amalgam preparations in a pediatric setting.1 Students were randomly assigned to wear or not wear loupes. Students using loupes were allowed to choose from 1.75 magnification clip-on loupes or 2.0 magnification frame-mounted loupes. Tooth preparations performed at baseline were compared to tooth preparations done after 8 weeks of clinical practice. Outcomes at both intervals were based on student self-evaluations. The authors reported no significant differences in clinical outcomes between groups at baseline or final evaluation. A study of simulated patient care produced contrasting results. According to Leknius et al, student performance was enhanced by using loupes.2 In this study, 155 students in a preclinical prosthodontics lab practiced restorative preparations by trimming prepared dies. A cross-over study design was implemented, allowing both groups the use of visual magnification. All final products were evaluated by the same technician for errors. Results indicated that student performance was significantly enhanced with the use of loupes. Musculoskeletal injury induced by improper ergonomics and compromised postures is also of concern to dental professionals. Does the use of optical magnification improve posture, thereby reducing the risk of musculoskeletal injury? A study by Branson et al shows promising results.3 This randomized crossover design study evaluated the posture of 22 senior dental hygiene students during a periodontal probing exercise. Student performance was videotaped with an overhead camera then evaluated using Branson’s Posture Assessment Instrument (PAI). PAI ratings of acceptable, compromised, or harmful are based on 10 components of posture. Dental hygiene faculty who previously calibrated on the PAI system served as evaluators. Though posture was deemed acceptable with or without loupes, the authors reported significantly less deviation from the ideal neutral posture when students wore magnification lenses. In addition, the study surveyed student opinion concluding that most participants found the loupes comfortable and perceived an improvement in the quality of their work and posture. Understanding the importance of magnification power, image quality, weight, depth of field, and declination angle enables the clinician to make a wellinformed, educated purchase. Magnification power and image quality are optical performance factors. For optimal clinical performance, loupes must provide the amount of magnification needed for each task and the resultant image should be crisp and clear. Magnification size defines the visual increase of the object of focus and is influenced by the working distance of the operator to the patient. To maintain a clear image, longer working distances require higher magnification. Most companies offer a range of 2.0 x to 5.5 x with 2.5 x to 3.0 x being the most popular for dentistry.4 As magnification power increases, the viewing area or field width decreases, resulting in reduction of peripheral vision and greater disorientation when the operator shifts vision from the work site to the surrounding area. Image quality or resolution depends on the convergence of the telescopes on the loupes and the quality of lens design. If the telescopes are properly aligned, image quality is improved, resulting in a clear, precise focal point. Misalignment can result in poor image quality and double vision. Convergence capability can be preset or adjustable depending on the type of loupes used. Through-the-lens loupes have a fixed convergence, whereas front lens-mounted loupes provide an adjustable setting. Weight, depth of field, and declination angle are ergonomic factors to consider when purchasing loupes. Weight depends on the materials used in the frame, lenses, and scopes. Loupes should rest comfortably on the operator’s head and nose. Lightweight frames, often made of titanium, that are carefully balanced and provide snug nose pads tend to be most comfortable. Though light weight is important, achieving it by the use of inferior materials, screws, or mounting fixtures is counterproductive. Also important is depth of field or the working distance from the clinician’s eyes to the work site. The operator’s physical size and accommodation ability of the eyes should be taken into consideration. The operator should be allowed some movement during procedures. Loupes with an appropriate depth of field allow the operator to adjust for physical comfort while maintaining focus on a specific object. Hence, a longer depth of field allows the operator a broader range of movement. To determine proper working distance, custom fitting can be provided by product sales representatives. Finally, and perhaps the most critical consideration in the purchase of loupes, is the declination angle. The declination angle is formed by the line of sight in neutral eye position and the actual line of sight made by the declined eye as the operator focuses on the work area. There is a direct relationship between the working angle of the head and neck muscle fatigue.5 The proper declination angle allows the operator’s head and neck to stay in a neutral position. A neutral position ranges between 20° to 25°.6 As head tilt increases, neck fatigue is more rapid. A declination angle that is too small forces the clinician to tip the head toward the chest. A declination angle that is too large requires that the clinician adjust by severely declining the eyes or flexing the neck backward. Before deciding on a final purchase, clinicians should also discuss with the product manufacturer illumination features, optical filters, lens covers and infection control recommendations (Table 1). Table 2 provides a list of loupes manufacturers serving the dental field. - Donaldson ME, Knight GW, Guenzel PJ. The effects of magnification on student performance in pediatric operative dentistry. J Dent Educ. 1998;62:905-910. - Leknius C, Guenther JE, Quiring D. The effect of magnification on the quality of die trimming. J Dent Educ. 1996;60:219. - Branson BG, Bray KK, Gadbury-Amyot C, et al. Effect of magnification lenses on student operator posture. J Dent Educ. 2004;68:384-389. - Chang BJ. Guidelines for selecting ergonomically correct surgical telescope systems. The Academy of Dental Therapeutics and Stomatology. Nov 2003; CE5. - Chaffin DB. Localized muscle fatigue—definition and measurement. J Occup Med. 1973;15:346-354. - Nield-Gehrig JS. Goucher J. Fundamentals of Periodontal Instrumentation. 5th ed. Philadelphia: Lippincott Williams & Wilkins; 2004:11-15. From Dimensions of Dental Hygiene. November 2006;4(11): 28, 30-31.
<urn:uuid:464c79c6-df0d-40e9-a354-30235b42e5df>
CC-MAIN-2022-33
https://dimensionsofdentalhygiene.com/article/magnification-for-the-dental-hygienist/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00672.warc.gz
en
0.913155
1,614
3.03125
3
Chapter 1: Introduction. Chapter 2: The Survey and Its Imperfections. 2.1 The survey objective. 2.2 Sources of error in a survey. Chapter 3: General Principles to Assist Estimation. 3.2 The importance of auxiliary information. 3.3 Desirable features of an auxiliary vector. Chapter 4: The Use of Auxiliary Information under Ideal Conditions. 4.2 The Horvitz–Thompson estimator. 4.3 The generalized regression estimator. 4.4 Variance and variance estimation. 4.5 Examples of the generalized regression estimator. Chapter 5: Introduction to Estimation in the Presence of Nonresponse. 5.1 General background. 5.2 Errors caused by sampling and nonresponse. Appendix: Variance and mean squared error under nonresponse. Chapter 6: Weighting of Data in the Presence of Nonresponse. 6.1 Traditional approaches to weighting. 6.2 Auxiliary vectors and auxiliary information. 6.3 The calibration approach: some terminology. 6.4 Point estimation under the calibration approach. 6.5 Calibration estimators for domains. 6.6 Comments on the calibration approach. 6.7 Alternative sets of calibrated weights. 6.8 Properties of the calibrated weights. Chapter 7: Examples of Calibration Estimators. 7.1 Examples of familiar estimators for data with nonresponse. 7.2 The simplest auxiliary vector. 7.3 One-way classification. 7.4 A single quantitative auxiliary variable. 7.5 One-way classification combined with a quantitative variable. 7.6 Two-way classification. 7.7 A Monte Carlo simulation study. Chapter 8 The Combined Use of Sample Information and Population Information. 8.1 Options for the combined use of information. 8.2 An example of calibration with information at both levels. 8.3 A Monte Carlo simulation study of alternative calibration procedures. 8.4 Two-step procedures in practice. Chapter 9 Analysing the Bias due to Nonresponse. 9.1 Simple estimators and their nonresponse bias. 9.2 Finding an efficient grouping. 9.3 Further illustrations of the nonresponse bias. 9.4 A general expression for the bias of the calibration estimator. 9.5 Conditions for near-unbiasedness. 9.6 A review of concepts, terms and ideas. Appendix: Proof of Proposition 9.1. Chapter 10: Selecting the Most Relevant Auxiliary Information. 10.2 Guidelines for the construction of an auxiliary vector. 10.3 The prospects for near-zero bias with traditional estimators. 10.4 Further avenues towards a zero bias. 10.5 A further tool for reducing the bias. 10.6 The search for a powerful auxiliary vector. 10.7 Empirical illustrations of the indicators. 10.8 Literature review. Chapter 11: Variance and Variance Estimation. 11.1 Variance estimation for the calibration estimator. 11.2 An estimator for ideal conditions. 11.3 A useful relationship. 11.4 Variance estimation for the two-step A and two-step B procedures. 11.5 A simulation study of the variance estimation technique. 11.6 Computational aspects of point and variance estimation. Appendix: Properties of two-phase GREG estimator. Chapter 12: Imputation. 12.1 What is imputation? 12.3 Multiple study variables. 12.4 The full imputation approach. 12.5 The combined approach. 12.6 The full weighting approach. 12.7 Imputation by statistical rules. 12.8 Imputation by expert judgement or historical data. Chapter 13: Variance Estimation in the Presence of Imputation. 13.1 Issues in variance estimation under the full imputation approach. 13.2 An identity of combined and fully weighted approaches. 13.3 More on the risk of underestimating the variance. 13.4 A broader view of variance estimation for the combined approach. 13.5 Other issues arising with regard to item nonresponse. 13.6 Further comments on imputation. Appendix: Proof of Proposition 13.1. Chapter 14: Estimation Under Nonresponse and Frame Imperfections. 14.2 Estimation of the persister total. 14.3 Direct estimation of the target population total. 14.4 A case study.
<urn:uuid:e3a77e86-b461-4e00-9977-c9f4fa74fcad>
CC-MAIN-2017-04
http://www.maa.org/press/maa-reviews/estimations-in-surveys-with-nonresponse
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00486-ip-10-171-10-70.ec2.internal.warc.gz
en
0.713386
963
3.640625
4
At RAN, it isn’t our place to tell you what fabrics to buy. Really. All fabrics have impacts, and we aren’t experts in every fabric out there. What we believe is that clothing companies should trace their supply chains, eliminate controversial fiber and suppliers, create policies to ensure they never purchase controversial fiber again, and -- ideally -- join us in the fight to make their industry more sustainable. In the meantime, we encourage customers to buy used, to recycle and up-cycle, to host clothing swaps, and to do without when and where they can. Join us in continuing to call on the Fashion 15 to adopt comprehensive policies to eliminate forest destruction and human rights abuses from their supply chains. And if you still want some more specific advice… well, we have some thoughts: While we were researching this campaign, we looked into a number of different fabrics, and we definitely found that there are also a few fabrics that are gentler on the earth. Here’s what we found: Hemp has a very low impact. It doesn’t require the use of any chemicals (pesticides or fertilizers) on their crops. It requires less water than organic cotton. Hemp is also much stronger than cotton, and creates a high quality material when recycled. Hemp can grow in a wide range of climates, making it widely available all over the world. Ramie, also known as grass linen, is a very fast-growing crop. It yields up to six harvests per year, giving it a reputation for sustainability. Growing, spinning and weaving are expensive and intricate processes. Due to the involved nature and higher cost of taking ramie from plant to garment, it has yet to become a popular fabric. Jute also treads lightly on the earth. It requires low energy input, and actually acts as a small C02 sink. Farming uses no chemicals on these crops. Jute is also being used to make other pulp and paper products, not just clothing. Due to demand for these products, jute’s importance could increase over the coming years. Linen has a very low impact and requires very little to grow. Farmers use little or no pesticides at all on the flax plant, which becomes linen fiber. It also requires low quantities of water to grow. Linen also emits much lower levels of CO2, as compared with the cotton plant. Organic cotton doesn’t use chemicals or GMOs, but there are questions about water usage and other impacts, including the chemicals used in manufacture and milling processes. Bamboo has a low grow-impact on the soil, but requires high energy and chemical inputs. Most bamboo production involves toxic bleaching of the final product. Recycled polyester/PET uses less energy to make clothes from recycled plastics, but there are problems with the toxic recycling process and the original manufacture of polyester/PET. Soy can be organic and in those cases will use no pesticides. However, there are possible GMO impacts, and more information is needed before we can safely recommend it as an alternative. These fabrics demonstrate what is possible in the world of forest-friendly fabric. These textiles have a small footprint, require low inputs and don’t rely on deforestation to produce. Ultimately, though, companies must trace their supply chains and develop full forest policies in order to truly eliminate any controversy from their fabric. You can call on the Fashion 15 today to do just that. For further information, see:
<urn:uuid:09cd2578-3806-4c50-a973-9631e5d4b010>
CC-MAIN-2017-04
http://www.ran.org/alternatives
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00458-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947708
720
2.875
3
|College Bowl, "The Varsity Sport of the Mind", has a long and illustrious history on television, on radio and on campuses. It is the world famous game of questions and answers played by two teams of competing students. College Bowl has provided the arena for the fastest minds in school to demonstrate their great skills under the fire of varsity competition. At the same time, it has entertained millions. From October 10, 1953 through December, 1955, College Bowl was on the NBC radio network under the sponsorship of Good Housekeeping Magazine. The moderator was in a New York studio, the students on their own campuses and the entire event connected via three-way phone and radio hookup. On January 5, 1959, the College Bowl program became a network television show. The program's sponsor was the General Electric Company and the program became known as the GE College Bowl. It was first hosted by Allen Ludden, then by Robert Earle. It ran 26-39 weeks each year on Saturdays and Sundays until June of 1970. For archival data on the GE College Bowl, click below: In its 17 seasons on the air and since then, College Bowl has received widespread acclaim from Presidents, Congress, state and local officials schools, churches, the press and the public. College Bowl has been awarded many major educational, newspaper and television awards. It's been awarded an Emmy and the coveted Peabody Award for outstanding achievement in entertainment and education. College Bowl was cited by Congress and entered into the Congressional Record as "entertainment at its best." It has received citations from the national PTA and many other organizations. College Bowl's unique game format has been licensed by many major corporations for training programs and by communities nationwide for local high school competitions. Long before College Bowl left network television, the game had become an important activity on campuses across the country. In 1977, College Bowl in conjunction with the Association of College Unions International (ACUI), organized official competition at the campus, regional and national championship levels. Every spring there was an official National Championship Tournament featuring the top 16 teams in the country. The last National Championship Tournament was held in 2008 at Macalester College in St. Paul, Minn. In England, the program is known under the title University Challenge, airing there from 1961-1988 and again since 1995 (now on the BBC). The very first College Bowl National Championship Tournament and World's Championship were held in June of 1978. Stanford University emerged victorious from a field of 15 regional champions. A team of British All-Stars won the World's Championship title. The College Bowl regional and national championships have a rich tradition. Click to view the full archive listings: In all, over 500 schools have competed in the program. College Bowl has raised millions of dollars in institutional grants. During the 1978 and 1979 championships, four television programs were taped each year for syndicated broadcast in the United States. Starting on October 10, 1979, College Bowl began a three year run on the CBS radio network. The program featured both regular season competition and post-season national championship play. The final three games of the 1984 National Championship Tournament were broadcast on an NBC College Bowl 30th Anniversary Special. The 1987 College Bowl National Championship Tournament, a single elimination tournament, was taped for broadcast on the In years where there is no television sponsor, the College Bowl National Championship Tournament was run as a non-broadcast event at one of the participating schools.
<urn:uuid:2e42f842-2a6a-411c-8516-4c248829e912>
CC-MAIN-2016-44
http://www.collegebowl.com/arch/history.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00425-ip-10-171-6-4.ec2.internal.warc.gz
en
0.959054
759
2.15625
2
Even though there are a lot of educational facilities present in today’s society, some students nowadays face a lot of educational barriers. Basically, educational barriers are those which prevent learners from fully engaging in learning. And because of such barriers many children, especially the underprivileged ones, face lots of problems and sometimes even leading to remain uneducated. Educational barriers are crucial issues than they seem to b, directly or indirectly it impacts the society we live in. The first and foremost barrier for the education of underprivileged children is “Lack of funding for education.” The main reason behind this is that the family income of such children is not adequate to be spend a share on their education. And in our country, there’s a huge population of such families who cannot afford to educate their child. Even though some government authorities offer free education, the expenses of transport, uniforms and books are also quite too much for them. And here stands another barrier for them, that is, “Lack of learning materials.” This leaves no educational opportunities for them. Such barriers gave rise to another barrier which is, “Lack of incentive.” When such families can’t afford the resources, they even lose the hopes to educate their child even if they want to. They are, thus, unable to provide the proper incentive to their children and fail to motivate them, since they themselves have lost hopes. Since such families and children constitute half of the population, we cannot afford this deprivation to continue. There are other problems and barriers awaiting to stood as a block in the way of enlightenment. We need to contribute from our side also to help such children and then bring them forward and expose them to quality education, because these children are the future of our country and they might lead a better life if they will educate and get a decent employment. This can bring a significant change. As citizens, we can play our part in removing such educational barriers from the society. We should donate our old books and accessories to children who need them. It will at least help them to develop curiosity towards learning. Moreover, one can sponsor the education of few children if one is in a capacity to do so, this will give them a helping hand. Another responsibility that falls on our part is to make awareness regarding the NGO’s who are working in this direction, one such non-profit organizations is, Pehchaan the Street School, devoted itself for promoting free education. By joining team Pehchaan, the children get quality education from people willing to educate them, without charging a single penny. This is a wonderful initiative in building a better society where no one will remain uneducated.
<urn:uuid:7e0dbae0-7635-4ef8-8596-fd04b73aa792>
CC-MAIN-2022-33
https://pehchaanstreetschool.org/updates/eradicating-barriers-for-underprivileged-children/?noamp=mobile
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz
en
0.969986
556
3.296875
3
What Parents Need to Know Parents need to know that this thriller portraying human corruption and aberrant sex features full female and nearly full male nudity, violent death, profanity, and alcohol/drug abuse. A seductive female character (a wife and mother) is abused and raped; though we learn little of her back story, all indications are that she has learned to accept and enjoy this mistreatment. While the young-man hero and his allies react with horror and shock, some critics have complained that this film exploits the twisted elements of darkness and evil. - Families can talk about the meaning of the movie. What are the close-ups of insects supposed to symbolize about this spiffy-clean looking community? Since the good guys look almost as bland and Boy-Scoutish as the villains are demonic, some critics have found the overall movie distasteful and exploitative -- like something the terrible Frank Booth would find "entertainment." Do you agree? Do you think David Lynch has a little too much fun with the violence and weirdness? How do the director's G-rated The Straight Story and sinister TV series Twin Peaks compare? What traits do they share with this movie?
<urn:uuid:02028e1b-13d8-4371-b205-73cc0b21efc7>
CC-MAIN-2017-04
http://www.movies.com/movie-reviews/bluevelvet-review/m13566?viewmore=infoParents
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00093-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96081
243
1.6875
2
Generally, if left in their shells, hard-boiled eggs can last a week in the refrigerator. They should not be kept at room temperature for more than two hours. “How long can you keep eggs” is the question people always ask. ... chart shows how long hard-boiled eggs and raw eggs last when stored in the refrigerator. Hard boiled eggs must be refrigerated. You can extend the answer to how long do hard boiled eggs last by storing them in your fridge (refrigerator) immediately ... Jan 21, 2015 ... (That's assuming they've been stored in the fridge shortly after being boiled.) And if that hard boiled egg was peeled before being refrigerated, ... Apr 7, 2015 ... Easter is over and you're staring at a pile of dyed hard-boiled eggs, wondering if you should keep them or throw them out. Or maybe you boiled ... Generally, hard-boiled eggs can last a week in the refrigerator. Even with its natural (but easily cracked) calcium-carbonate container, a hard-cooked egg is a Mar 27, 2016 ... The answer to this question may surprise you: while uncooked eggs typically last four to five weeks when ... How Long Do Raw and Hard-Boiled Eggs Keep? .... How to Not Eat Complete Sh*t When You Are Ridiculously Busy. Do not be fooled into thinking that boiled eggs "last" longer than raw eggs do, because they do ... A boiled egg will not keep as long a a raw egg will. ... Hard boiled eggs, peeled or unpeeled last about a week in the refrigerator. I would Oct 5, 2012 ... How long can you leave hard boiled eggs out unrefrigerated until they spoil? I boiled mine 2 days ago, let them cool when they were done. Aug 10, 2012 ... Refrigerate leftover hard-cooked eggs in the shell within two hours of ... or plastic bag so they don't absorb refrigerator smells and flavors.
<urn:uuid:b528ef34-a6bc-4402-bd16-7d25f2e87c1a>
CC-MAIN-2017-04
http://www.ask.com/web?q=How+Long+Can+You+Keep+Hard+Boiled+Eggs%3F&oo=2603&o=0&l=dir&qsrc=3139&gc=1&qo=popularsearches
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00049-ip-10-171-10-70.ec2.internal.warc.gz
en
0.911051
422
2.03125
2
One of the most important topics on the mind of piping and process engineers is how to prevent corrosion under insulation (CUI) within their mechanical systems. Many of our clients have expressed an urgent need to understand this process and what steps they can take to proactively address this potential hazard in their plants. A basic understanding of the science behind corrosion helps equip one to make more informed decisions about how various insulation products interact with metals to either induce or inhibit corrosion. What is corrosion? It is a chemical process that gradually breaks down materials as electrons are exchanged and new molecules formed. The process requires liquid water and air or an electrolyte solution. With ferrous (iron-based) metals, corrosion is known as rust, which is the weakening of iron due to oxidation of its atoms. Here is a short video that illustrates how corrosion occurs at a molecular level:Video on Corrosion Basics There are two main types of corrosion: Galvanic corrosion happens when two different types of metals are exposed to an electrolyte solution (a liquid that is able to conduct electricity, like salt water). This exposure catalyzes a process where the metals exchange electrons through the electrolyte solution. As a result, one metal erodes while the other grows. Galvanic corrosion frequently happens in marine environments because salt water is a highly effective electrolyte solution. Bear in mind, not all metals are equally susceptible to galvanic corrosion. There are a handful of metals called noble metals, such as gold, silver, and platinum, that are resistant to corrosion. Chart 1: Nobility of Metals Atlas Tech Note No. 7: Galvanic Steel. Page 3. (2010, August). Retrieved January 12, 2016, from http://www.atlassteels.com.au/documents/TN7-Galvanic_Corrosion_rev_Aug_2... Other metals such as zinc or aluminum rank very low on the nobility scale and as such are highly susceptible to corrosion (see Chart 1). One method to prevent galvanic corrosion is called hot-dipped galvanizing, and it uses liquid zinc to coat carbon steel (mild steel). This creates galvanized steel, and over time, the zinc will erode, protecting the steel until the zinc coating has eroded enough to fail. This may lead some to ask, why don’t we just use galvanized steel or other zinc-rich coatings to provide protection against CUI in mid to high-temperature industrial process piping and vessels? Well, there is a specific reason, which is explained a document written by the National Association of Corrosion Engineers called NACE SP0198-10 Section 4.3.5: “Inorganic zinc-rich coating shall not be used by itself under thermal insulation in the 50 to 175°C (120°F to 350°F) service temperature range. Zinc provides inadequate corrosion resistance in closed, sometimes wet, environments. At elevated temperatures greater than 60°C, the zinc may undergo a galvanic reversal whereby the zinc becomes cathodic to the carbon steel.” Essentially, this means that at elevated temperatures, the zinc and the steel may reverse roles, where the steel begins to corrode while the zinc remains intact. The second form of corrosion is known as non-galvanic corrosion, and it is an oxidation process. Oxidation simply refers to the loss of electrons. When certain metals are exposed to air and water, they begin to lose electrons, and this subsequently causes erosion. While non-galvanic corrosion requires air and water to take place, it does not require two different types of metal. This is the primary mechanism that causes CUI. The primary method for preventing non-galvanic corrosion is to introduce a passivation layer to the system. A passivation layer is a thin coating that makes the underlying metal less susceptible to corrosion by physically blocking contact with air and water. This is the same concept as painting your car or applying a highly cross-linked epoxy phenolic or thermal spray aluminum (TSA) coating on industrial process piping and vessels. When it comes to insulating industrial process pipes and vessels, understanding which corrosion mechanism is at play is essential to choosing the correct corrosion-prevention method. As non-galvanic corrosion is the primary culprit of CUI, choosing an insulation that can directly combat it is crucial. Many choose to use hydrophobic insulations and coatings to prevent water from entering the system, thus halting non-galvanic corrosion; however these defense mechanisms can burn off at high temperatures or fail over time. As a result, relying solely on the hydrophobic insulation as the primary means of CUI prevention can be risky. Fortunately, there are certain types of industrial insulations that contain a unique chemical composition that actually inhibits corrosion under insulation by forming a passivation layer when water penetrates the system. All pre-formed calcium silicate and expanded perlite insulations manufactured in the United States feature a proprietary corrosion inhibiting package that forms a passivation layer on the pipe systems. We are too conservative to suggest eliminating anti-CUI coatings altogether, but this chemistry package is a proven belt-and-suspenders approach that provides back up protection should the coating fail due to application errors, burn-out or aging. The chemistry package is called XOX™, and it has been integral to all Johns Manville Thermo-12 Gold® and Sproule® WR-1200 since 2002. XOX-treated insulations demonstrate the lowest 3rd party tested ASTM C1617 mass loss corrosion rates of any industrial insulations on the market. Here’s exactly how it works to inhibit corrosion: Understanding how corrosion happens is the first step in developing a defense that can slow or halt the chemical process that causes it. In the end, XOX is a solution that uses the chemistry that causes corrosion to actively protect the system – changing an attack on the system into a defense mechanism. XOX capitalizes on corrosion chemistry to create lasting corrosion protection that is unaffected by temperature or time. If you would like more information about corrosion under insulation and the best methods to combat it, then we encourage you to attend our live webinar on January 20, 2016.
<urn:uuid:faa605ac-d814-4512-a995-6e65f2dd2806>
CC-MAIN-2017-04
http://news.jm.com/blog/science-behind-corrosion
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00382-ip-10-171-10-70.ec2.internal.warc.gz
en
0.922721
1,285
3.5625
4
Books & Bibles Fashion & Jewelry Gifts & Giving Home Decor & Accents Kitchen & Gourmet Beauty & Health Christian Bookstore .Net is a leading online Christian book store. Shop Christian Books, Bibles, Jewelry, Church Supplies, Homeschool Curriculum & More! An easy-to-understand guide to Christian history and theology explores the life and teachings of Jesus in the four gospels, describes sacred books and doctrines, and offers insight into the differences between its major denominations. Original. Get to know the beliefs and practices inspired by Jesus Christ Discover what it means to be a Christian and follow the gospel Curious about Christianity? This friendly guide helps you understand the basic teachings of the Christian faith, exploring the common ground that all Christians share, the differences among the major branches, the key events in Christian history, the key theological issues, and the many ways Christians live out their faith in today's world. The Dummies Way * Explanations in plain English * "Get in, get out" information * Icons and other navigational aids * Tear-out cheat sheet * Top ten lists * A dash of humor and fun Discover how to: * Express the core essentials of Christianity * Appreciate the life and teachings of Jesus * Understand why the Bible is central to the faith * Respect the unique roles of the Trinity * Explore controversial issues among the branches Buy Christianity For Dummies by Richard Wagner & Kurt Warner from our Christian Books store - isbn: 9780764544828 & 0764544829 The team at Christian Bookstore .Net welcome you to our Christian Book store! We offer the best selections of Christian Books, Bibles, Christian Music, Inspirational Jewelry and Clothing, Homeschool curriculum, and Church Supplies. We encourage you to purchase your copy of Christianity For Dummies by Richard Wagner & Kurt Warner today - and if you are for any reason not happy, you have 30 days to return it. Please contact us at 1-877-205-6402 if you have any questions. Customer Support: 1-888-395-0572
<urn:uuid:39a2e684-1aa9-4354-b55b-e7be2380ddc0>
CC-MAIN-2017-04
http://www.christianbookstore.net/christianity-for-dummies-by-wagner-warner/catalog-3436/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00164-ip-10-171-10-70.ec2.internal.warc.gz
en
0.83137
457
1.664063
2
Katie, a German Shepard, went missing for about 30 hours when she escaped from her back yard. She was found stuck in a drain pipe by Bojangles, a Golden Retriever belonging to her owner’s own daughter. The largest-living arthropod in the world is the coconut crab. This crab can be found on islands across the Indian Ocean and parts of the Pacific Ocean. Their diet consists of fleshy fruits, nuts and seeds.
<urn:uuid:2fdc89db-8d1b-48c9-ad7e-eb428219bab8>
CC-MAIN-2016-44
http://izismile.com/animals/page/21/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00354-ip-10-171-6-4.ec2.internal.warc.gz
en
0.954778
95
2.015625
2
Pandit Rajmani Tigunait arranged and led these chants drawing from the oral tradition of a long line of Himalayan sages. Many songs in this collection are Indian classics; a few are unique, rarely-heard arrangements. In the rhythm of these chants, you'll feel the pulsation of the concentrated energy of millions of saints and seekers who gathered in Allahabad, India, for the Maha Kumbha Mela. Once every 144 years, due to the alignment of celestial bodies and the intense spiritual practices of saints and sages, benevolent forces are perfectly polarized at the convergence of India's sacred rivers. This event is the Maha Kumbha Mela, which last took place in January 2001 in its traditional setting on the bank of the Ganges in Allahabad, the City of God. The Himalayan Institute's magnificent 40-acre campus on the banks of the Ganges is just two miles from the main site of the Maha Kumbha Mela. Many auspicious practices and teachings took place on this campus during the Mela in January 2001, including a 21-day rudra yaga, sessions on the Shvetashvatara Upanishad, and meetings with yogis and saints from many ancient traditions. Musical performances and traditional Indian dances punctuated this once-in-a-lifetime event. Pandit Rajmani Tigunait, PhD, arranged and led these chants expressly for the Maha Kumbha Mela, where they were performed at the Himalayan Institute's private campus. Their rhythm will reside there for ages, transmitting the pulsation of the concentrated energy of millions of saints and seekers who gathered for the event.
<urn:uuid:c3ab19fb-6789-409c-baca-633d60cade59>
CC-MAIN-2017-04
http://shop.himalayaninstitute.org/products/pulsation-of-the-maha-kumbha-mela-cd
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00082-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941595
343
2.296875
2
Much has been made of the clash between the liberal culture of the 'dope-smoking, prostitution-tolerating, gay-loving' Dutch and the medieval mindset of its fast-growing Muslim minority (future majority?) in order to explain the rise of the PVV (Party For Freedom) in the Netherlands. In short, the idea routinely peddled is that party's rise is explained by the threat Islam poses to the Dutch love of dope, gays, and whores. This cunning narrative manages to put a leftist spin on the white racial mobilization represented by the rise of the PVV to such an extent that many of those involved in the movement may actually believe that they are doing nothing more than extending the liberalism and freedoms of the 1960s by opposing the medievalization of their country through third world colonization. Less commented on, however, is the fact that the rise of the PVV bears an inverse relationship to the fortunes of the one significant group of Dutch emigrants to retain their identity in the modern world, namely the Boers. Although the Afrikaner population in South Africa also includes other elements - notably French Huguenots and Germans from German South West Africa (Namibia) - the group is essentially the overseas branch of the Dutch race. As this group has seen its power, wealth, and social position eroded and diminished, so in the 'Mother Country' a party representing the interests of the Dutch race has grown. Evidence that feelings for their Dutch brethren in the Southern hemisphere may also be contributing to the rise of the PVV came in a recent speech from one of the party's European MPs, Lucas Hartong, who used a debate in the European Parliament on the forthcoming Climate Change Conference in Durban, South Africa (28 Nov - 9 Dec) to launch a scathing attack on anti-White racism in the host country: "The socio-political climate in South Africa can only be described as horrific under the ANC-regime. Everything needs to be improved there; a battle is needed against the enormous unemployment and growing hopelessness amongst youths; against the terrifying criminality which is out of control; and the ANC should rather concentrate on hunting down and prosecuting the black-racist radicals who are murdering the Boer farmers on their own land in the so-called 'farm-murders.' "(Under the ANC) it's a battle for the Afrikaner's language, Afrikaans, to survive. There's a battle against the ANC regime’s racial-discrimination and its suppression of its own people: once again in South Africa, there is official racist discrimination based on skin-colour." One of the rules of successful White nationalist movements in our modern age seems to be that they work best when they keep the racial consciousness that drives them in soft focus, sending out the equivalent of a giant dog whistle signal that allows their target group to identify with them without feeling 'racist' in any way. This is no doubt one of the reasons why the leftist spin put on the PVV's rise is largely accepted in Holland. In America, the implicit Whiteness of the Tea Party finds a similar solace in the figure of Herman Cain. But the idea that only White consciousness should exist on a subconscious level while non-White groups are allowed to define and assert their group interests in the clear light of day is an obvious aberration that is also clearly racist. Any movement that fails to be honest, conscious, and precise about why it exists is also susceptible to being subverted, led astray, and seeing its power dissipated. If the White race is to survive in a recognizable form in its traditional homelands against the high tide of globalization, it is essential that White group interests and the organizations that express them move from the implicit level to the explicit while also avoiding the marginalization that this has usually involved. Mr. Hartong's speech shows that the PVV is not just about protecting Dutch hedonism from the Ayatollahs, something that we can all safely pretend has nothing whatsoever to do with race (D'oh!), but is also increasingly concerned about the ongoing ethnic disaster affecting their racial kin in South Africa, which is about nothing except race. The example of explicit Black racism faced by Boers in South Africa may help Holland's implicit nationalists to wake up and get a little more explicit.
<urn:uuid:5666e306-aaed-43d0-aa58-9b096cb9b6ee>
CC-MAIN-2017-04
http://www.radixjournal.com/altright-archive/altright-archive/main/blogs/euro-centric/not-gays-dope-or-whores
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00506-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957
884
1.6875
2
Not so long ago, being aggressively "pro–free speech" was as closely associated with American political liberalism as being pro-choice, pro–affirmative action, or pro–gun control. With little notice, this political dynamic has been shaken to the core. The Right's First Amendment examines how conservatives came to adopt and co-opt constitutional free speech rights. In the 1960s, free speech on college campuses was seen as a guarantee for social agitators, hippies, and peaceniks. Today, for many conservatives, it represents instead a crucial shield that protects traditionalists from a perceived scourge of political correctness and liberal oversensitivity. Over a similar period, free market conservatives have risen up to embrace a once unknown, but now cherished, liberty: freedom of commercial expression. What do these changes mean for the future of First Amendment interpretation? Wayne Batchis offers a fresh entry point into these issues by grounding his study in both political and legal scholarship. Surveying six decades of writings from the preeminent conservative publication National Review alongside the evolving constitutional law and ideological predispositions of Supreme Court justices deciding these issues, Batchis asks the conservative political movement to answer to its judicial logic, revealing how this keystone of our civic American beliefs now carries a much more complex and nuanced political identity. About the author Wayne Batchis is Associate Professor of Political Science at the University of Delaware. "The Right's First Amendment is an important and very readable guide to the transition from conservative moralism to conservative libertarianism. Batchis expertly documents the powerful impact of this thirty-year transition on constitutional law, politics, and the development of free speech." —Mark Graber, University of Maryland School of Law "In the realm of 21st century constitutional law, few developments have been as momentous as the increasingly ardent embrace of the First Amendment by conservative jurists and intellectuals. The Right's First Amendment describes, with gusto and fairness, this startling shift in conservative views, one with major impact on the liberty of all Americans." —Floyd Abrams, author of Friend of the Court: On the Front Lines with the First Amendment "Wayne Batchis is a lawyer-political scientist who impressively deploys both disciplines' approaches to improve our understanding of conservative politics and constitutional principles. The Right's First Amendment provides a compelling and important explanation of the political effort to define conservatism and, in turn, the conservative effort to define expressive freedom." —Douglas E. Edlin, Dickinson College "Readers interested in judicial politics – and the development of modern conservatism's thinking and action concerning the freedom of speech and civil liberties more generally – will find this book useful, and thought-provoking along many dimensions." —Ken I. Kersch, Law and Politics Book Review
<urn:uuid:f7ba648c-1b99-4945-a0f3-9100af0d9d9d>
CC-MAIN-2022-33
https://blog.sup.org/books/title/?id=24144&bottom_ref=recommended
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00666.warc.gz
en
0.929793
575
2.421875
2
1926, apparently coined by South African Gen. J.C. Smuts (1870-1950) in his book "Holism and Evolution" which treats of evolution as a process of unification of separate parts; from Greek holos "whole" (from PIE root *sol- "whole, well-kept") + -ism. This character of "wholeness" meets us everywhere and points to something fundamental in the universe. Holism (from [holos] = whole) is the term here coined for this fundamental factor operative towards the creation of wholes in the universe. [Smuts, "Holism and Evolution," p.86] updated on October 21, 2017
<urn:uuid:c17a967f-ca8a-4e63-8e2c-a7d447694ddd>
CC-MAIN-2022-33
https://www.etymonline.com/word/holism
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00676.warc.gz
en
0.957496
150
2.640625
3
A few years ago Egypt's Supreme Council for Media Regulation decreed that gay people must not appear in print or audio or visual media "except in recognition and acknowledgment of their misconduct". In other words, if they are to be seen or heard at all, gay people should always be presented in a negative light. One antidote to that comes in the form of a new book unashamedly titled 'This Arab is Queer' – though it probably won't be on sale in Egypt any time soon. It's a collection of personal stories and reflections by 18 Arabs who identify as somewhere on the LGBTQ+ spectrum. Besides challenging popular stereotypes, these accounts build into a more positive picture than might be expected: they show that some queer Arabs, at least, manage to integrate their sexuality or gender identity into everyday life. Even so, much of that takes place against a background of social and religious disapproval. Ahmed Umar recalls his first same-sex kiss during a school lunch break in Saudi Arabia, and the mental turmoil that followed: "I had never felt so good. I had never felt so bad," he writes. "I waited for Allah’s revenge. Would the earth split and swallow me, like the people of Lot in Sodom and Gomorrah? Or would I be punished with eternal unhappiness? Maybe I was already infected with AIDS." Several writers describe how they came out to their family or – worse – were found out. The reactions range from rejection to acceptance but there are also occasional surprises. Anbara Salam had been dropping hints about her sexuality and keying herself up for the expected conversation with her parents but it never materialised. Her parents clearly didn't want to talk about it and simply ignored the hints. For many Arabs, that would have come as a relief, because when acceptance is impossible, silence is better than rejection. "These withheld conversations serve us," Salam writes, "by providing shields that, in many places, literally save lives from legal and social censure. They invite convenient amnesia, avert judicious eyes, swallow tuts at the back of the throat." But, as she notes, silence also creates a barrier. "The cost of that barrier is to accept that those closest to you do not really know you, and that feels especially alienating when the love-language of your culture is intrusion. It means leaving unshared all the messy, low-level melodrama of relationships, friendship fallouts, disappointments, celebrations, milestones, anniversaries." Meanwhile, Madian al-Jazerah experienced another kind of denial that was almost comical. He hadn't been planning to come out but, in his late thirties, his sexuality put his life in danger and he needed to explain to his family why he was leaving Jordan. His mother had only one question. "Are you this?" she asked, cupping her hand, "Or are you this?" – poking a finger with the other hand. "If you are the poker, it’s OK, you are not a homosexual ... you can get married and have children." 'An act of moral terrorism' The Egyptian ban on positive coverage of gay people resulted from what one horrified religious leader described as "an act of moral terrorism". It happened in 2017 during a music festival in Cairo when Mashrou' Leila, a popular but controversial Lebanese band, performed for a crowd of 35,000. One of their songs is about same-sex love and their lead singer, Hamed Sinno (another of the book's contributors), is openly gay. Several members of the audience showed their appreciation by waving rainbow flags. In the ensuing uproar over this flag-waving the Egyptian authorities launched a crackdown. The Syndicate of Musical Professions – a government-linked body tasked with suppressing "abnormal" kinds of music in Egypt – added Mashrou' Leila to its banned list and the Egyptian authorities rounded up dozens of people suspected of being gay. One of those detained – a young lesbian named Sarah Hegazi – later took her own life. The rainbow flags affair resurfaces in a chapter by "Amina", the book's only contributor writing under a pseudonym, who describes her night of joy at the now-notorious Mashrou' Leila concert: Hamed sings "about us and for us", the crowd goes wild at the sight of the flags and two young men who don't know any different kiss. It feels almost like Pride, she writes – "not across oceans and borders among strangers ... but here, in Cairo". By next day, though, the mood has changed. As the flag-wavers are reviled on national TV, Amina's mother asks if they are talking about the concert she went to last night ... "I clutch my mug, the roll of my eyes a well-rehearsed lifebuoy that I hope will buy me enough time before I have to respond." She writes: "Our community knows few things as well as we know 24-hour-long panic attacks, when the air shifts and the state starts hunting and the men delete the apps and we brace ourselves. We are learning, slowly, how to hold each other through them." Amina's story ends with reflections on her brother's wedding party: "I recognise the look he gives his bride, because I have looked at a woman the same way ... I have known that love, joyous and overflowing." But she also knows her own relationships are of a kind that cannot be celebrated so openly. "My mother will never be happy for me like she is tonight for my brother. She will not invite her friends to see as she beams at her life coming full circle, or run to the DJ requesting songs I can twirl her to on the dance floor. My mother, to whom I have lied about so many of my sadnesses, will not find it in her to dance with me on that day, and I will not ask her to." Life as an outsider Sexuality and gender identity are not necessarily the only factors that make LGBTQ+ Arabs "different" or outsiders – and there are reminders of that from several of the book's contributors. "From a young age, I was off the social beat," Ahmed Umar recalls: "I was known for being the only Sudanese boy in the whole school. Not only that, but a Sudanese who was not very dark skinned ... I was often asked questions like: ‘How can you be Sudanese when you’re not charcoal-black?’ On many occasions I had my headwear taken off by the other boys so that they could mess up my exposed afro. I was also called a girl, by both students and teachers. While deep within me I never took it as an insult, I still had to act as if I did, to avoid raising suspicions." Amna Ali, from a Somali family living in the Emirates, faced bullying and racism as the only black student in a school of 700 girls: "I was a minority within a minority within a minority. A black, queer Arab and apostate child of very religious immigrant parents." She writes: "I developed an inferiority complex and internalised everything I was told about being queer and black: my gross, ugly hair, my home-cooked food smelling bad, and the weird other language (Somali) I spoke at home. And, at home, I wasn’t taught pride and to stand up for myself; I was always told to keep my head down and stay out of trouble. "These days, I wish I could tell my 16-year-old self that things get better, just as it got better for me. I came out and cut the homophobic members of my family off, I left Dubai and moved to Toronto. I put me and my needs first and I am now proudly and outspokenly (almost obnoxiously so) out of the closet. I no longer fear my family’s reaction when they find out. I no longer live in a country with homophobic laws." Trophy hunters and white saviours There's another way that race can enter the equation, though it's not often discussed and mainly affects Arabs in the diaspora. Saeed Kayyani recalls feeling disconcerted by some of the attention from admirers while living in the US: "Apparently, my ethnicity in itself was attracting men. This was a feature of being a gay Arab that I hadn’t anticipated." One cisgender white Republican man urged Kayyani not to worry about it: "Dude, openly gay Arabs like you are so rare. You’re like forbidden fruit ... Take it as a compliment." In the book, Kayyani treats it as mildly amusing but also troubling: "It was almost as if I wasn’t being regarded as an individual ... Would it have made any difference if I had been substituted with some other Arab guy?" In a chapter titled "Dating white people", Tania Safi tells of a similar experience with a lover in Australia who endlessly complimented her on her "dark-haired, tan-skinned" appearance and told her "I love that you are Lebanese, speak to me in Arabic". "Naïve as I was," Safi writes, "something didn’t feel right. I wasn’t aware of the concept of racialised fetishisation, but I knew how it felt." Alongside these trophy hunters there are also what Kayyani, an Emirati, describes as "white saviours". One of them sent him this message on Facebook: "Sweetheart, I understand that being gay is hard in general anywhere in the world, but I just wanted to let you know that I’m here for you. As someone with a degree in International Relations, I know that gayness is especially hard over there and will make others want to kill you in Arabia. You can always talk to me, all right? It would help since I also have a certificate in psychological counselling." "After a cold shower to process what exactly I had just read, I had a few immediate reactions. First, why was she assuming I was in danger? Yes, my country’s LGBTQIA+ situation was a massive don’t-ask-don’t-tell cosplay scenario, but I was in no danger. Every queer community across the globe has unique struggles and challenges specific to its location – but with modernisation, education and social media, physical danger is simply not a contemporary and immediate concern for us in the Gulf." Saying it in English Elias Jahshan, the book's Palestinian-Lebanese-Australian editor, says he was looking for contributors who could write interestingly and in English, though he adds: "I am deeply conscious of the fact it won't be accessible to everyone in the Arab world simply because English (or French) is a language of the educated." English also tends to be the favoured language for discourse about Arab LGBT+ issues – at least, the more thoughtful sort. Since 2016, at least ten novels or memoirs by or about queer Arabs have been published in English: Saleem Haddad: Guapa (2016) Danny Ramadan: The Clothesline Swing (2017) Leila Marshy: The Philistine (2018) Amrou Al-Kadhi: Life as a Unicorn (2019) Zeyn Joukhadar: The Thirty Names of Night (2020) Zeina Arafat: You Exist Too Much (2021) Randa Jarrar: Love Is an Ex-Country (2021) Madian Al Jazerah: Are You This? Or Are You This? (2021) Omar Sakr: Son of Sin (2022) Fatima Daas: The Last One (2022) For those Arabs who view homosexuality as a foreign phenomenon and others who claim LGBT+ activism is a form of cultural imperialism, this might be seen as confirmation of their views but the reality is that it's largely a result of conditions in the Middle East: restricting the discourse drives it abroad. Writing about sexual orientation or gender identity in Arabic and publishing in the Middle East is far more problematic than writing in English and publishing in the west. A struggle to be heard Large-scale crackdowns, as seen in Egypt over the rainbow flags, attract media attention but they only happen occasionally. In the meantime, though, there's the constant drip-drip of smaller-scale attempts to prevent LGBT+ voices in the region from being heard. In one of the book's chapters Khalid Abdel-Hadi describes the harassment he faced in Jordan publishing My Kali, an online LGBT+ magazine in both English and Arabic. Surprisingly, though, My Kali has survived for 15 years. Even in Lebanon, where activism dates back to the early 2000s, a concert scheduled for the recent LGBT+ week had to be cancelled because of threats and, following complaints from religious elements, the interior ministry denounced similar LGBT+ events as a violation of "our society’s customs and traditions". Last month, under pressure from authorities in the UAE, Amazon began blocking LGBT-related items on the Emirati version of its website (amazon.ae). If you search for "gay" or "LGBT", for example, the website reports "no results" and advises: "Try checking your spelling". The filtering system is crude and erratic, though. Of the ten novels and memoirs mentioned above, five are listed, two are completely absent and two are listed as "currently unavailable" with no details beyond their cover and title. Rather oddly, Fatima Daas's book is on sale through Amazon's Emirati website in French, Italian, Spanish, Catalan and German translations, but not in English. Weirder still, although you won't find 'This Arab is Queer' on the Emirati site, if you search for it Amazon helpfully suggests three LGBT-related alternatives – Saleem Haddad's 'Guapa' (“only 1 left in stock, more on the way”), Randa Jarrar's 'Love is an Ex-Country' ("10% discount with Citibank") and a novel by the gay Lebanese-American writer Rabih Alameddine. The purpose of such absurdity, Amazon says, is to comply with local Emirati laws against homosexuality. Obstacles of this kind are a persistent feature of the ongoing struggle, making it easy to overlook progress in the opposite direction. That's where 'This Arab is Queer' comes in: its overall tenor is cautiously hopeful and perhaps the most remarkable thing is that it exists at all. Ten to fifteen years ago the chances of finding 18 Arab contributors who identify as LGBT+, all but one of them willing to write under their real name, would have been slim or non-existent. This in itself suggests some kind of shift is taking place, if so far mainly on the margins.
<urn:uuid:dac50478-8d95-493f-9c28-731c1b152b9d>
CC-MAIN-2022-33
https://www.al-bab.com/blog/2022/07/book-review-arab-queer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00468.warc.gz
en
0.971101
3,103
2.203125
2
To Blanchard, it´s the latter: Once the acute phases of the financial and euro crises were over, it was clear that it would take time for advanced economies to recover. The history of past financial crises gave a clear warning that recovery would typically be long and painful. Today, the scars are largely healed but growth is still slow. Before the crisis, any economist would have predicted that an economy with interest rates close to zero and no other major brakes on demand would see high growth rates and quickly overheat. Yet this is not what we have seen. The reason, I believe, must be found in mediocre medium term prospects, which in turn affect current demand and growth. Low potential growth is bad news for the medium term. But it may explain what is happening today. A main finding of a paper that Eugenio Cerutti, Lawrence Summers and I wrote in 2015 was that, over the past 40 years, recessions in advanced countries have been associated surprisingly often with lower growth following the recession. Let´s examine this last point – fundamental for his “fact of life” argument – for the case of the US. The chart shows clearly that since the mid-80s and up to 2006, real growth was much more stable. The two recessions over the period were much shallower than average. In other words, “boom & busts” were much more contained, with growth keeping close to the long term average value. This is not exactly an original view. The same mistake was made following the 1990/91 recession, the first during the Great Moderation. In the summer 1992 issue of Challenge Magazine, Robert Brusca, at the time chief-economist at The Nikko Securities Co., wrote a long piece entitled Recession or Recovery? This is a good example of the often committed mistake of gauging the present (and forecasting future developments) using old barometers. He writes: “… by all historical standards there should be a strong recovery (following the 1990/91 recession). But the economy is now so uncertain, we could be in for a triple-dip recession rather than a recovery…” and there follows several pages of comparative statistics on the behavior of all kinds of economic variables following a recession, with the conclusion being that since the economy had not yet shown the strong rebound that historically follows a recession, his view was that the recession had not yet ended, “appearing to be the longest since the Great Depression” (at about the time the article was published, the official date for the end of the recession was put at March 1991). In the Fall 1992 issue of The Federal Reserve Bank of Minneapolis Quarterly Review, David Runkle (a senior economist in the research department) wrote: “… the current recovery is the weakest in the post war period in all measures of economic activity. This means that the current recovery is most appropriately viewed as a continuation of a long period of below average growth”. Now, the recovery from the 2007/09 recession has been very slow, indeed. But let´s not make the mistake of saying this is “a fact of life”! I favor the “policy incompetence” argument. The charts illustrate. While the Fed was correcting for the monetary policy mistake of letting nominal spending (NGDP) growth fall causing the 2001 recession, the economy was impacted by the first leg of the oil price shock (yellow band). In the case of a negative supply shock you expect a reduction in real growth (and some increase in inflation). The best that the Fed can do is to keep NGDP growth stable. This is what Greenspan did. As soon as Bernanke takes over, nominal spending growth begins to falter. Real growth falls some more. When the second leg of the oil shock hits (green band), the Fed´s “inflation concern” additionally constrains NGDP growth and so increases the fall in real growth. When NGDP tanks after mid-08, both real growth and oil prices tumble. This was surprising because 10 years earlier, in 1997, Bernanke had stated the “blueprint” for monetary policy in the event of an oil shock, concluding: Substantively, our results suggest that an important part of the effect of oil price shocks on the economy results not from the change in oil prices, per se, but from the resulting tightening of monetary policy. This finding may help to explain the apparently large effects of oil price changes found by Hamilton and many others. Either he forgot about it, or weak leadership made him sound “unconvincing” to the majority of the Board! Oil prices rebound when nominal spending picks up in mid-09, following the introduction of QE1 ending the recession. But, as the pink band shows, the recovery was “aborted” before nominal spending had picked up sufficient speed to bring the economy nearer the previous levels. This is illustrated in the pair of charts below, which clearly illustrates how the “slow growth fact of life” came into being! This echoes Runkle´s conclusion from 1992: “This means that the current recovery is most appropriately viewed as a continuation of a long period of below average growth” It did not have to end this way!
<urn:uuid:9f6ced84-7547-4f54-aa83-48cf24b692d1>
CC-MAIN-2017-04
https://thefaintofheart.wordpress.com/2016/04/17/whats-the-story-slow-growth-reflects-policy-incompetence-or-is-it-a-fact-of-life-in-the-post-crisis-world/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00535-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967191
1,100
2.171875
2
Edvard Munch is the most important Scandinavian artist and a pioneer of Expressionism. With him, the existential fear, the loneliness of man, and the unpredictability of his feelings are drawn into art. With a novel and experimental painting technique, Munch demonstrated man's soul-suffering. Written in short paragraphs which are then translated into five other languages, the book covers different art show where Munch featured his latest works. which To me, it seems that it was in the 1890's where he finally began to create his Expressionist paintings. I love the way his works display the angst of his subjects. Below are a five of my favourites from the book. My absolute favorite, The Scream, is on the book's cover, shown above, done in 1893. It's interesting to note that when I saw the exhibit, it showed how he also did this in various lithographs. This he did with many of his works. Here is a self portrait he did in 1895. an oil on canvas, he calls it, "Self Portrait with Cigarette". Next up is "Madonna". It's a lithograph which he created in 1895. I love the sperm around the picture and the weird little guy in the corner. I bought a small plaque of this work when I saw the show. The book shows the different versions of this work which he created. Fear, also known as "Angst", an oil on canvas was done in 1884. This bay or lake must be a local spot for him as it is the same background he used in The Scream, nine years later. He also used it in a few of his other paintings. Where much of his work is about death, fear, despair, "The Kiss", a dry point etching, is an excellent depiction of passion between a man and a woman. I read that he never married as he felt as if it would interfere with his work. Finally, "Kneeling Female Nude". It's an oil on canvas done in 1919. If not crying, she is definitely feeling despair, fear or loss. I love the emotion shows.
<urn:uuid:e5c6e6e8-f6c0-44ac-86f4-1b81790d3822>
CC-MAIN-2022-33
http://www.theworldofgord.com/2022/07/edvard-munch-by-hajo-duchting.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00066.warc.gz
en
0.985681
435
2.140625
2
The city of Springfield, Missouri, which recently-passed legislation regarding pit-bull-type dogs, has announced that its new ordinance goes into full effect Oct. 16. The Springfield City Council approved the new law on April 17, and on the 24th, the Springfield-Greene County Health Department began a public information campaign on the new requirements for American Pit Bull Terriers and other similar breeds that live within city limits. The law applies to “any dog that is an American Pit Bull Terrier, American Staffordshire Terrier, Staffordshire Bull Terrier or any dog that closely resembles any of these breeds. Health Department Animal Control staff is experienced at identifying pit bulls and pit bulls mixes, but when there is a doubt, staff will err on the side of the dog owner. According to the ordinance, which further strengthens current laws, city residents may keep pit-bull-type dogs within city limits only if they follow these regulations: - The dogs must be registered annually with a $50 fee; - They must be vaccinated for rabies; - Spaying or neutering is required, and; - Microchipping for identification purposes is mandatory. Also, all pit-bull-type dogs must be kept in secure, fenced enclosures while on the owners property. A sign measuring at least 8 inches by 10 inches that reads Pit Bull Dog must be clearly displayed at all entrances to the property. Starting June 5, and by appointment only, pit-bull-type dog owners can begin registering their dogs with the citys health department. The appointments will take place at the Springfield Animal Shelter. Dogs may be microchipped by health department staff, unless the owner provides proof the procedure has already been conducted by a veterinarian. For more information, call the county health departments information line at (417) 864-1166, or visit http://health.springfieldmogov.org Posted: April 27, 2006, 5 a.m. EST
<urn:uuid:18e6301d-ac92-40b4-a595-150e30bdd00d>
CC-MAIN-2016-44
http://petcha.com/pets/pit-bull-registration-to-begin-in-june/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00076-ip-10-171-6-4.ec2.internal.warc.gz
en
0.933009
408
1.945313
2
There might not have been many front-facing changes in the latest Chrome release, but Google made a boatload of under-the-hood improvements. As always, many of the changes were aimed at boosting the browser’s security — like putting the kibosh on extension installs from outside the Chrome Web Store. Previously, a .CRX file could be served up from any server and installed into Chrome. Try it now, and you should see the yellow warning bar above — which directs you to Chrome’s official marketplace. It’s a change most users won’t notice since both Chrome and the Web Store have had time to mature. The vast majority of Chrome users know about the Store because it’s advertised on the browser’s new tab page, and they’re probably not aware that other sites could serve up extensions, too. Power users would rather stick to Web Store installs anyway, since they play well with Chrome’s extension sync functionality (offsite extensions aren’t synced). It’s still possible to install extensions from elsewhere, but it now has to be done manually from chrome://extensions (network admins can also set up a whitelist). There are a couple of reasons for the change. The first, and most obvious, is that Google wants to better protect the hundreds of millions of Chrome users out there from malware. The other is that they want to drive additional extensions and extension seekers to the Web Store. And speaking of the Web Store, the time has finally come for Google to begin monitoring the extensions developers are submitting. They’ll be closely inspected for malicious behaviors and only displayed in the Store once given the all clear. That’s a very good thing, as malicious extensions have found their way into the Web Store as recently as this March — when a highly-publicized Facebook account hijacker was discovered. More at TNW
<urn:uuid:aad7ce14-3789-4e37-8742-ddb4a687b930>
CC-MAIN-2017-04
http://www.geek.com/news/google-cracks-down-on-malicious-chrome-extensions-1503227/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00013-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943717
395
1.585938
2
Electric Everything: France Proposes the World’s First Dedicated ‘Eco Race Track’ Debut Estimated Within Four Years A view of the new eco race track designed and built in Couvron by MotorSport Vision (MSV). Media sourced from MCN. France has got their fingers at the forefront of our clean, green future with the proposition of the world’s first dedicated ‘Eco Race Track’ – and the 2.2-mile layout will be a 300-hectare part of the the Former Military Airbase called the Laon-Couvron aerodrome. “Having contemplated rising costs and the shift by major manufacturers from petrol and diesel cars – now due to be phased out in 2035 – to hybrid technology and battery electric vehicles (BEVs), MSV has identified an opportunity for Couvron to establish itself at the forefront of motorsport and the automotive industry’s push towards a greener future,” MotorSport Vision (MSV) says in a statement on MCN. “MSV has a great opportunity at Couvron to pioneer the ability for people to enjoy zero carbon motorsport by using battery electric vehicles charged from green electricity from a vast on-site solar park,” adds MSV’s Chief Executive, Jonathan Palmer. “We are fully committed to embracing a future low carbon world where we can.” Obviously, green energy is still a growing topic in the powersports industry – not all countries have a green team to match a green track. As such, the report states that gas-powered units will be welcome to use the circuit – powered by Couvron’s solar farm – with zero-emission machines such as hybrids and battery EVs (BEVs) taking priority. With six race events already scheduled and planned per annum (and the track also supporting ‘host manufacturer testing and development, promotional events and other corporate functions’), we’re expecting the building of the thing to stay ‘on track’ (pun intended) and conclude within three years, allowing the actual debut to happen around four years from now. For other topics related to this, be sure to also subscribe to our newsletter; drop a comment letting us know what you think, and as ever – stay safe on the twisties.
<urn:uuid:cbe4ceb8-12c8-48d1-82a4-075e8a39495b>
CC-MAIN-2022-33
https://www.webbikeworld.com/electric-everything-france-proposes-the-worlds-first-dedicated-eco-race-track/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00065.warc.gz
en
0.927469
490
1.929688
2
Mystery in synchrony Cicadas' odd life cycle poses evolutionary conundrums By Susan Milius, 21:59 PM June 28, 2013 After 17 years underground, throngs of ruby-eyed cicadas clawed up through the soil this year to partake in a once-in-a-lifetime, synchronized mating frenzy. Except it wasn’t one big insect orgy: It was three. The insects that unearthed themselves to breed in 2013 belong to three distinct species. You need only flip them over to see some differences, written in the varieties of their orange markings. You can hear the differences too, says Chris Simon of the University of Connecticut in Storrs. ... Source URL: https://www.sciencenews.org/article/mystery-synchrony?mode=magazine&context=4556
<urn:uuid:a65a5866-158b-4be4-8b5a-e0cc57034245>
CC-MAIN-2017-04
https://www.sciencenews.org/print/187264?mode=magazine&context=4556
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00178-ip-10-171-10-70.ec2.internal.warc.gz
en
0.905854
180
2.09375
2
Photographers learn the trade with Redbridge Homes A UNIQUE chance to learn the art of photography was snapped up by willing students whose work will be the subject of an exhibition this month. Twelve budding photographers enrolled on a course run by Redbridge Homes in conjunction with Redbridge Institute of Adult Education. Redbridge Homes has been running educational courses for years in a bid to educate residents and give them extra skills. Andrew Radley, 51, of Dale Court in Grove Hill, South Woodford, heard about the courses when he received a letter from Redbridge Institute. “I have always been interested in photography, and have been taking pictures of things like stars since I was a teenager, but never had professional coaching. “On the course we learnt about exposure, how to use Photoshop and about composition - the coaching I got from the tutors really spurred me on,” he added. “I was inspired to take a photo of the old water pump next to Johnstone Pond in Woodford Green. “It was the striking blue tone of the pond and the way the tree drooped over the pump that captured my imagination - that was one of my pictures that will be on exhibition.” It was also Kim Bennett’s first experience of professional photography classes. - 1 Product sold at Tesco recalled due to risk of disease-causing bacteria - 2 Bleed kit in memory of doorman Ricky Hayden installed outside nightclub - 3 Met Office: Thunderstorm warning issued for London - 4 Pair charged with creating fake Covid vaccination records - 5 Convicted killer 'attacked sister-in-law after repeated threats', court hears - 6 Item thrown from A13 bridge smashes windscreen and injures driver - 7 Newbury Park grass fire sees homes evacuated - 8 Ilford fast food restaurant permitted to open later - 9 Cost of living crisis: What to do if you can't pay your bills - 10 Five tower blocks included in housing plans for Sainsbury's in Ilford The social worker of Althorne Gardens, South Woodford, said since the course she had been able to look at the borough creatively. “There is a well at the corner of Hollybush Hill in South Woodford, I took a picture of it and it didn’t strike me as anything special, but when I showed it to the tutors they were impressed at the scene setting behind the picture with snow.” Students were allowed to pick ten photos from the hundreds they had taken during the 12-week course, which did not prove an easy task for Mr Radley. “I had taken about 300, and each felt special to me. A spokesman for Redbridge Institute of Adult Education said: “We want to give residents another string to their bow which is why we stage these lessons. “They are completely free as they are subsidised by ouselves and Redbridge Homes.” The exhibition will be at the Orchard Community Hall in Broadmead Road, Woodford Green from Monday for a week. It will then move to Kenneth More Theatre, Oakfield Road, Ilford, from March 15 to March 25. Those who do not manage to visit the exhibition during this time can do so in April when the exhibition will be on show again at Central Library, Clements Road, Ilford from April 11 to April 14, then finally at Redbridge Institute of Adult Education in Gaysham Avenue, Gants Hill later in the year from May 14 to May 20.
<urn:uuid:40e584de-a453-43e5-80e1-61b6985b1ba6>
CC-MAIN-2022-33
https://www.ilfordrecorder.co.uk/news/photographers-learn-the-trade-with-redbridge-homes-2906954
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00675.warc.gz
en
0.976396
741
1.679688
2
There are two primary elements of choosing and using a lens: what focal length to use and where to focus/what aperture to use. Let’s take a look at how these elements affect an image. How Does Focal Length Affect Your Image? The only thing that changes when you use a different focal length lens is the cropping of your image! Optical aberrations aside, short focal length or wide angle lenses do not distort close subjects, and long focal length or telephoto lenses do not compress subject features. What really causes these familiar effects discussed so often in popular texts is a change of perspective: a change in the camera’s physical position relative to your subject. (Figure 2). When you move in close to a subject, it becomes very large in relation to its background. That over- large nose you get with a wide angle lens portrait is because you’ve probably moved in very close to the subject in order to fill the frame, and the nose, being closest to the lens, is now very large in relation to the ears. This is a matter of your proximity to the subject and has nothing to do with the lens itself. (Figure 1). When you look at a distant scene through a long focal length or telephoto lens, elements in the scene may appear compressed, almost right on top of each other. Once again, this has nothing to do with the lens, but is simply a matter of the tight framing on the subject. If you put the camera down and frame the scene just as tightly with your hands, the elements of the scene will appear as “compressed” as they did through the lens. What about zoom lenses as opposed to fixed focal- length lenses? Do they help make your choice easier? Well, yes and no. If the optics are up to snuff, a zoom lens can provide a great deal of convenience−it’s a zillion focal lengths in one piece of hardware. But that convenience can lead to overly casual, rather than critical, vision. Imagine a photographer out for a walk. He (or she) comes across a detail or a scene of interest. Camera goes up to eye, hand zooms lens to frame the subject, auto-focus and metering do their jobs, shutter goes click and it’s on down the path. Would the image have been more powerful if our photographer had moved in close to some boulder in the foreground, making it monolithic in relation to the background? Maybe. Or maybe backing up a bit might have let some tree branches frame the scene. The point in all this is that to maximize the impact of a visual statement it is important to give thought to the image structure first. Is the composition better closer in? Farther back? Up, down left or right? Once you pick your camera position, then choose the focal length that gives the cropping you want. If your first guess is too tight, use a shorter lens; if it’s too loose, use a longer lens. If you don’t have a lens that is quite right, use one slightly shorter than you would like and crop. Where do you focus, and how does the aperture affect an image? In a certain way, the opening question should be the other way around. There is a law of physics that governs the relationship between shutter speed and aperture (f-stop). Shutter speeds are pretty easy to understand: 1/60 second is one half as much time as 1/30. F-stops are a little different: f/8 is one half the light of f/5.6, which is half the light of f/4! The point is, for any shutter speed/f-stop combination, one-half the exposure time with twice the light equals the same total amount of light given to the film. 1/60 @ f/4 = 1/30 @ f/5.6 = 1/15 @ f/8. There is always the inescapable relationship between exposure time and aperture. If you are photographing a sports event, you will likely go with a fast shutter speed and let the aperture fall as it will. This article will focus on aperture as primary. F-Stop #s vs. Depth-of-Field A lens can only truly focus on one plane. With a perfect lens that plane would be equally sharp at any aperture−but everything nearer or farther would rapidly become unsharp. Increasingly smaller apertures reduce this apparent unsharpness, increasing what is called depth-of-field. The smaller the aperture (f/16 is smaller than f/4), the greater the apparent sharpness. In Figure 3, image A is focused approximately on the line of traffic in the foreground. The chain-link fence is way out of focus, as is the distant railing. The wide- open aperture (f/1.4) necessitated a very fast shutter speed resulting in the cars frozen in time. Image B is with the lens stopped down 4 stops (f/5.6). The point of focus was not changed, but the fence is now a good deal sharper, as is the distant railing, but at the now much longer exposure time, the nearby car, while still sharp in focus, is blurred in time. Image C is still focused in the same place but the lens is now stopped down 3 more stops to f/16. The fence now appears to be quite sharp as does the distant railing, but the car is now quite blurred at 1/15 second. It is a total coincidence that the images seem to show the same car. Most fixed-focal length lenses have an engraved scale allowing you to evaluate how much apparent sharpness (depth-of-field) you can get at various apertures. Figure 4 shows a Hasselblad 80mm lens set at f/22. As the lens aperture is stopped-down, the depth of field increases in the proportion of 1/3 toward the lens from the plane of critical focus and 2/3 beyond the plane of focus. Image A shows the lens focused at about 3.3 feet, and at f/22 the depth of field runs from 3 feet away to 4 feet. Image B shows what would happen if we did a landscape with the lens focused on infinity. The image would only be “sharp” from about 17 feet away to distant mountains. If we instead focused at 17 feet (this is called the “hyperfocal” distance) the image would now be sharp from about 9 feet to the mountains (image C). There are two ways to plan how to make this work. One way is to choose your aperture first and see how much depth-of-field you get, and the other is to find out what aperture you need to work with and then see how much depth of field you need to work within. Let’s say your camera is on a tripod, and you want as much as possible near-and-far to be sharp. Take the Infin- ity mark on the lens and place it over the engraving for your smallest aperture. The lens is now focused automatically at the hyperfocal distance and you can read the depth of field on the focus scale of the lens. In this example (Figure 4, Image C), f/22 gives you a pretty sharp image from about 9 feet to infinity. Lets say the camera is NOT on a tripod, and you can’t manage to stop down to f/22, but only to f/8. In this case, you would place the Infinity mark over the f/8 index. You would now see that the image would only be sharp from about 20 feet to infinity (See green arrows, Image C). What if your lens doesn’t have markings? A lot of mod- ern zoom lenses have distance scales, but no depth-of- field markings. If this is the case, you can find the hyperfocal distance by putting the nearest subject and distant subject marks on the lens an equal distance from the central focus mark. If your camera has a “depth of field preview” button, this can be a useful aid in seeing just how much is sharp−or not! But the actual depth of field for any given f-stop will just be a guess. One bit of fun with f-stops: Sometimes, you can make a stronger statement by limiting how much is in focus. Just leave the lens at its widest aperture. The image on the left was done with a 200mm lens at f/4.5 focused exactly on the near marker, and the image on the right was done at f/22 with the lens set at the hyperfocal distance. (Figure 5). One last thing I’d like to comment on in this writing: lens quality. Photo gear can be expensive, no doubt about it. Especially at an entry level, the prospect of getting an off-brand lens for a lot less than the brand that has your camera manufacturer’s name on it can be awfully tempting. In these days of computer-aided engineering design a “Brand X” lens can be quite good −but there is an equally good chance that it will not measure up to the quality or durability of a top brand. Do your research and read reviews for a particular lens and if you need to save dollars, look for quality used gear from a reputable source. Hopefully, all of this will help you have a better understanding of the relationship between your vision, your lens and your results.
<urn:uuid:3643b277-7c0d-4db3-8c34-eea7d646afc2>
CC-MAIN-2017-04
http://phototechmag.com/understanding-lenses/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00070-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952842
1,972
2.859375
3
In mathematics, everything is made up of even perhaps the microcosmic universe, possibly the world or chance fields. In a nutshell, the chances mla format heading that experts often speak about are those who actually exist in the truth of our world. Individuals may say they’re imagining items, however, they do exist. After you throw something (or a wave, or perhaps even a photon( or some other particle) to a fibrous area, the tide becomes a portion of their”rigid body” with the topic. There is A example if the electric energy is turned on. Thus when a scientist speaks about a human body in physics,” he is talking about the way the mechanical movements of a human body, or the tide of an electric energy, or even so the voltage of a resistor could be altered into a linear possible gap in space. Even a number of all people attempt to answer a query http://www.tntemple.edu/ while it is all about friction a proton, an electron, or even any particle. The best answer might be turned into a order differential equation in 3 variables. The energy and momentum are not conserved, because of the. So what is a free energy ? It’s the kinetic energy and prospective power of an object as soon as the thing is in movement. A difference is an issue in physics which is electrostatics. Electrostatics would be the study of the way electrostatic fee is transferred in to bodies. To the conclusion, the fee is saved inside masses which are fat to move. Protons and electrons have such masses. The electrons move around without the need of being halted from the protons. The next law of thermodynamics tells us that electricity is maintained. If energy is mass must equal the power. So the majority of a particle should be viceversa and proportional to the energy it has. For practically any approach that may be viable, bulk is due towards the power in the computer system. That is to say, same day essay reviews in the event that you think there is a mass constant, then you have zero theory for getting the power out of a system. What’s just a fringe in theory is you will discover the ones which prefer the former theory on the latter. They are the people who prefer fusion more than chemists. The vitality is simply home of an individual person. Thus there ought to be a reverse relation in between the energy density. The magnetic and electric fields are two in brute drive of the three fields. These fields are the vector and scalar potentials, and so they truly have been exactly the scalar potentials that’ll carry. Hence, the universe and all the matter and energy in it are really just a single kind of system using several parts.
<urn:uuid:a29f2d75-acd9-44c1-8eb0-8050a2d524b7>
CC-MAIN-2022-33
https://www.jainkoch.com/whats-a-fringe-in-physics/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00076.warc.gz
en
0.954594
579
2.828125
3
This class action lawsuit is the consolidation of three distinct cases against the United States Navy. The first case, Chaplaincy of Full Gospel Churches v. Danzig (1:99-cv-02945-RMU), was filed on November 5, 1999 in the U.S. District Court for the District of Columbia. The second case, Adair v. Danzig (1:00-cv-00566-RMU), was filed on March 17, 2000, also in the D.C. District Court. And the third case, Gibson v. U.S. Navy, was filed on April 28, 2006 in the U.S. District Court for the Northern District of Florida (3:06-cv-00187-MCR-MD) but was then transferred to the D.C. District Court on September 29, 2006 (1:06-cv-01696-RMU). These cases progressed independently until June 18, 2007, at which point they were consolidated into one, thereby creating In re Navy Chaplaincy (1:07-mc-00269-GK). In order to serve the spiritual needs of its members and their families, the U.S. Navy maintains a chaplain corps which it divides into four broad categories: Roman Catholic, Liturgical Protestant, Non-Liturgical Protestant, and Special Worship. The principal plaintiffs in this case are several current and former chaplains identifying as Non-Liturgical Protestant. Represented by private counsel, these plaintiffs allege that the Navy discriminated against them on the basis of religion, in violation of the First Amendment's Establishment Clause, the Fifth Amendment's Equal Protection Clause, and the Religious Freedom Restoration Act (RFRA), 42 U.S.C. § 2000-bb, et seq. Specifically, the plaintiffs allege that the Navy unconstitutionally established and maintains a discriminatory system for the promotion, assignment, and retention of chaplains in a manner that disadvantages chaplains of non-liturgical Protestant faiths. According to the plaintiffs, the Navy carries out this discrimination through its various selection boards, which are responsible for reviewing the job performance of chaplains for purposes of determining personnel decisions. I. Dismissal of Two of Plaintiffs' Claims On February 1, 2000, the defendants filed a motion to dismiss the complaint in the Adair case. Nearly two years later, on January 10, 2002, the District Court (Judge Ricardo M. Urbina) denied defendants' motion to dismiss for all but two of plaintiffs' claims. Adair v. England, 183 F. Supp. 2d 31, 68 (D.D.C. 2002). As Judge Urbina wrote, "[T]he court grants the defendants' motion to dismiss the plaintiffs' claims that chaplains should not rate other chaplains and that more than one chaplain should not sit on a chaplain promotion board." Id. at 60. The plaintiffs requested that the Court reconsider the dismissal of these two claims, but the Court denied their motion on August 5, 2002. Adair v. England, 209 F.R.D. 1, 2 (D.D.C. 2002). In response to this denial, the plaintiffs filed a motion requesting the Court to certify the dismissals as final judgments so that plaintiffs could appeal, but the Court--on May 6, 2004--denied this motion as well. Chaplaincy of Full Gospel Churches v. England, 221 F.R.D. 255, 257 (D.D.C. 2004). Years later, the plaintiffs again requested the court to reconsider its January 10, 2002 ruling, arguing that the reconsideration was warranted due to evidence obtained during the discovery process. But on March 21, 2012, the Court denied this request, just as it had done previously. In re Navy Chaplaincy, 850 F. Supp. 2d 86, 96 (D.D.C. 2012). II. The Discoverability of the Chaplain Selection Boards On October 29, 2002, the plaintiffs filed a motion to compel the Navy to release members of its various selection boards from their oaths of confidentiality, thereby allowing them to be deposed about board proceedings. On September 2, 2003, the Court ruled in favor of the plaintiffs. Chaplaincy of Full Gospel Churches v. Johnson, 217 F.R.D. 250, 253 (D.D.C. 2003) rev'd in part, vacated in part sub nom. In re England, 375 F.3d 1169 (D.C. Cir. 2004). However, on July 27, 2004, the D.C. Circuit Court (before Judge Douglas H. Ginsburg, Judge Merrick B. Garland, and Judge John G. Roberts Jr.) reversed in part the District Court's decision, holding that the requested disclosure of information was barred by 10 U.S.C. § 618(f). In re England, 375 F.3d 1169, 1170-71 (D.C. Cir. 2004). Subsequently, the plaintiffs filed a constitutional challenge to § 618(f), arguing that the provision, as applied to them, denies them an opportunity for meaningful judicial review because the evidence barred by § 618(f) is essential to their claims. On September 11, 2006, the District Court rejected this argument and denied plaintiffs' motion for declaratory judgment. Adair v. Winter, 451 F. Supp. 2d 210, 212 (D.D.C. 2006). Notably, the D.C. Circuit Court's opinion regarding the discoverability of the Navy selection boards was limited to the Navy's promotion boards. In re England, 375 F.3d 1169, 1170-71 (D.C. Cir. 2004). Since the parties did not analyze whether 10 U.S.C. § 618(f) barred disclosure for each selection board independently, the D.C. Circuit Court vacated the District Court's decision and remanded the case for further consideration with respect to the selective early retirement boards and the continuation on active duty boards. Id. at 1182. Once remanded, the District Court (Magistrate Judge John M. Facciola) held on March 7, 2006 that discovery of the selective early retirement board proceedings was not barred by 10 U.S.C. § 501 et seq. Chaplaincy of Full Gospel Churches v. England, 234 F.R.D. 7, 13 (D.D.C. 2006). The defendants moved for reconsideration, which the District Court (Judge Urbina) initially denied on September 11, 2006. Adair v. Winter, 451 F. Supp. 2d 202, 204 (D.D.C. 2006) on reconsideration, sub nom. In re Navy Chaplaincy, 512 F. Supp. 2d 58 (D.D.C. 2007). Ultimately, though, on October 1, 2007, the Court granted the defendants' motion for reconsideration due to a change in law that occurred subsequent to the Court's earlier September 11, 2006 opinion. In re Navy Chaplaincy, 512 F. Supp. 2d 58, 61 (D.D.C. 2007). As the Court explained, "On October 17, 2006, the President signed the National Defense Authorization Act . . . The new federal statute broadened the nondisclosure clause of the Act to include all board deliberations convened under 10 U.S.C. § 611, which includes [selective early retirement] boards . . . ." Id. III. Standing, and the Existence of Discriminatory Intent. Throughout the lawsuit, plaintiffs have frequently sought interim preliminary injunctions that would prevent the Navy from carrying out particular policies. The plaintiffs filed one such motion on June 5, 2003, seeking an injunction to prevent the Navy from allowing Catholic chaplains to remain on active duty past the statutory separation age in order to qualify for retirement pay. The court denied this motion on February 7, 2005. Plaintiffs appealed, and on July 7, 2006, the D.C. Circuit Court (before Judge Karen LeCraft Henderson, Judge Judith W. Rogers, and Judge Janice Rogers Brown) issued an opinion affirming the denial of the structural injunction but vacating the District Court's denial of the preliminary injunction. Chaplaincy of Full Gospel Churches v. England, 454 F.3d 290 (D.C. Cir. 2006). The D.C. Circuit found that the District Court had erred in its determination that the plaintiffs had failed to satisfy the irreparable injury prong of the preliminary injunction framework. Id. at 305. As a result, the D.C. Circuit remanded the case so that the District Court could rule on whether the plaintiffs met the remaining elements necessary for obtaining a preliminary injunction. Id. Once remanded, the District Court--on October 15, 2007--again denied the plaintiffs' motion, holding that the plaintiffs lacked standing to challenge the particular policy for which the plaintiffs were seeking an injunction. In re Navy Chaplaincy, 516 F. Supp. 2d 119, 123 (D.D.C. 2007) aff'd, 534 F.3d 756 (D.C. Cir. 2008). The D.C. Circuit Court (before Judith W. Rogers, Judge Brett M. Kavanaugh, and Judge Laurence H. Silberman) affirmed this decision on August 1, 2008, over a dissent by Judge Rogers. In re Navy Chaplaincy, 534 F.3d 756, 758 (D.C. Cir. 2008). On July 22, 2011, the plaintiffs filed another motion for a preliminary injunction, this time with respect to three chaplain selection board policies: (1) staffing the seven-member selection boards with two chaplains, (2) enabling board members to keep their votes secret, and (3) allowing the Chief of Chaplains or his deputy to serve as the selection board president. The Court denied the motion on January 30, 2012. In re Navy Chaplaincy, 841 F. Supp. 2d 336 (D.D.C. 2010) rev'd in part, vacated in part, 697 F.3d 1171 (D.C. Cir. 2012). Plaintiffs appealed, and on November 2, 2012, the D.C. Circuit Court (before Judge Karen LeCraft Henderson, Judge Judith W. Rogers, and Judge David S. Tatel) vacated the denial and remanded so that the District Court could clarify its reasoning on the plaintiffs' likelihood of success on the merits. In re Navy Chaplaincy, 697 F.3d 1171, 1180 (D.C. Cir. 2012). Specifically, the D.C. Circuit was unsure whether the District Court viewed the insufficiency of the plaintiffs' claims to be legal or factual. Id. Once the case was remanded, the District Court (Judge Gladys Kessler) on February 28, 2013 again denied plaintiffs' motion for a preliminary injunction. In re Navy Chaplaincy, 928 F. Supp. 2d 26 (D.D.C. 2013) aff'd, 738 F. 3d 425 (D.C. Cir. 2013). The plaintiffs offered evidence that non-liturgical Protestant chaplain candidates for promotion were less likely to be successful than other chaplain candidates, but the discrepancy was only 10 percentage points. The Court's ruling was based on its determination that these statistics failed to show any discriminatory intent behind the challenged policies, or in their implementation. Id. The D.C. Circuit Court (before Judge David S. Tatel, Judge Brett M. Kavanaugh, and Judge Stephen F. Williams) affirmed this decision on December 27, 2013, emphasizing that the statistical study had failed to include any controls (for experience, etc.), and therefore did not suggest that plaintiffs were likely to succeed on the merits. In re Navy Chaplaincy, 738 F.3d 425 (D.C. Cir. 2013). The case is ongoing; motions for summary judgment have been filed by both sides and are pending. Jordan Rossen - 02/16/2014
<urn:uuid:04520cd2-f083-454c-8599-bac18748f40c>
CC-MAIN-2017-04
https://www.clearinghouse.net/detail.php?id=12551
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00220-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937082
2,508
1.585938
2
The Black College Review covered one presentation of the Foster Care Campaign at the City Council's March youth-only hearing. The FCC youth were back in front of Council Chair Vincent C. Gray earlier this month to reiterate the need for the center. You can watch both hearings by going to the Office of Cable Television Web site and watching them on demand. Wednesday, May 20, 2009 Young people rock as advocates! Watch out adult advocates: The Foster Care Campaign (FCC) is here and they are a force to be reckoned with! The youth-led FCC is but one program operated by the Young Women's Project. The most public Foster Care Campaign work of late relates to the creation of a youth transition center. The young people involved are calling on the mayor and council to create and fund a center where young people who will age out of foster care can receive the services and supports they need. Youth aging out too often enter adulthood without regular and consistent adults in their lives.
<urn:uuid:ffc9da0d-7428-46ed-9c9b-b6c3ff228b57>
CC-MAIN-2017-04
https://susiecambria.blogspot.com/2009/05/young-people-rock-as-advocates.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00383-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965341
197
1.804688
2
Lately I have been working on a game, which is temporarily called "League of Power". The concept itself is simple, players create their own skills out of the abilities they are given, develop them and battle other players. I have taken advantage of the new map format, SIDE_MAP, to create a semi-3D environment similar to isometric, you can rotate the screen around and interact with the environment in 3 dimensions. The character itself is my old trusty chibi-rayman style mob. The compass on the HUD shows in the direction of North at all times. The skills displayed on the Hotbar are all custom made from the abilities the character possesses, the icon on the skill is also customized from several parts, which are available in the customization process. Jumping on buildings is one of the simple applications of the three dimensions of movement which are available for the characters. Abilities which the players can obtain are categorized into several. Basic, Super Power, Travel Power and Sub Power. Basic abilities are the commands, which everyone possesses, for example making the character move, turn or jump. Super Power as an ability is the main source of the players power. Depending how much the player uses it or how efficiently they can manage it, the power shall provide them with an advantage over others, either by augmenting their physical characteristics or manipulating the environment. The next up in line is the Travel Power, the ability which gives the player different possibilities to incorperate the Super Power they have obtained, so far there are four: Super Speed, Super Jump, Levitation and Teleportation, each of those gives the player benefits, which mean either life or death. Finally the Sub Power, I haven't given much thought to it yet, however it is something of a secondary power or supplementary power next to the main one, probably a nerfed version of Super Power. As you probably have noticed, there are several circle like things on the map, they are pressure pads, jumping pads and teleporters. They are activated by stepping on them, as the names would suggest. I decided to do something like this since I am bored out of my mind by all the games where powers are preset and players aren't really able to come up with something original or creative. The skill creation might appear confusing at first to some, but eventually people get used to it and grow to love it. As time goes on I can add more powers and abilities, which the players can take advantage of in combat. Copyright © 2017 BYOND Software. All rights reserved.
<urn:uuid:f0d15502-697e-4448-9fd1-6ec225b649a8>
CC-MAIN-2017-04
http://www.byond.com/forum/?post=115551
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00514-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967219
529
1.515625
2
World Health Organization Global Strategy for Cervical Cancer Elimination - 1st Anniversary On the 17th of November 2021, the world came together to celebrate the 1st year anniversary of the WHO Global Strategy for Cervical Cancer Elimination. In conjunction with this, Program ROSE highlights stories of how Malaysians from all walks of life have joined in the efforts to make cervical cancer a rare disease. A Collaboration between PPUM and Program ROSE “The power of community to create health is far greater than any physician, clinic or hospital” - Mark Hyman The pandemic has led to many challenges for healthcare workers. However, this did not stop University Malaya Medical Centre volunteers from going into different communities alongside ROSE Foundation to offer ROSE cervical screens, sponsored by Etiqa to the under-screened communities. This joint effort has connected more than 10 communities in both urban & rural areas and empowered hundreds of women! The Role of Men in Cervical Cancer Elimination “Communities, countries and ultimately the world are only as strong as the health of their women” Michelle Obama Traditionally, women’s health and empowerment are viewed solely as their own issues, and women’s well-being are often overlooked as their priority has always been looking after their families. Times have now changed and MEN can play a key role in keeping their female counterparts’ healthy and strong. Men’s involvement in women’s health promotion can result in significant positive outcomes, and one simple way to support your loved ones is to encourage them to practice self-care. Self-care is extremely important and allows women to value their health and emotional needs, especially when they are so heavily burdened with domestic responsibilities. A Sister’s Love in Action – Nanthini and Puva Nanthini is a cervical cancer survivor. Diagnosed three years ago, she underwent treatment and, in the process learned more about cervical cancer and the importance of early detection. Today, she has become a strong advocate for cervical cancer prevention. And what better than to start at home! Nanthini succeeded in persuading Puva to have a HPV PCR test. Puva’s initial reaction was fear and reluctance. However, it was through Nanthini’s love and perseverance that convinced Puva to take the test. Watch the clip to discover the rest of their journey. ‘Give a ROSE’ to your loved ones Cervical cancer doesn’t differentiate against anyone – any woman can get cervical cancer. Voon Mei had a ROSE HPV PCR test and received treatment that prevented her from developing cervical cancer. As she strongly believes in self-love and empowering women to take care of themselves, she decided to organize a screening program on behalf of Lions Club with ROSE, that would allow other women to also access this life-saving screening test. A Collaboration with ROSE and Women of Will “A woman’s health is her capital” - Harriet Stowe Women face various economic restrictions in their daily lives – they are less likely to be employed, being paid less, and tend to be involved in vulnerable jobs. In addition, women also bear the burden of unpaid care and domestic work. Women of Will (WOW) aims to empower and transform women’s lives through entrepreneurship to create self-sustainable communities. We are proud to be able to join hands with WOW to promote self-care and women empowerment through the self-sampling ROSE HPV PCR test for cervical cancer elimination. "Keep it simple and focus on what matters. Do not let yourself be overwhelmed" - Confucius At a recent screening program at PPR Kerinchi, ROSE encountered a participant who was very reluctant and hesitant to do the ROSE HPV PCR test due to her painful experience with pap smear test. Thanks to her friend sharing her experience after performing the ROSE test and the ROSE team patiently explaining the self-sampling process, she was finally convinced to perform the self-sampling ROSE HPV PCR test! Not only did she overcome her fear, she was surprised to find the test painless, quick and easy! With the newfound sense of relief and accomplishment, she has become ROSE HPV PCR strongest advocate and supporter and been spreading the message to her community about the importance of cervical screening. GSC "Anita" Charity Screening “Art is not what you see, but what you make others see” Art is often used as a medium to tell a story, and, the movie #ANITA conveyed an important, moving message and chronicles the life journey of famous actress and singer, Anita Mui, who succumbed to cervical cancer at the tender age of 40. In collaboration with Sony Pictures and GSC, ROSE Foundation was able to amplify the message that cervical cancer can be prevented if detected early by performing HPV PCR self-test which is available now. We’d like to thank Sony Pictures and GSC for the advocacy and support shown to ROSE’s objective to eliminate cervical cancer in Malaysia, by donating the proceeds of today’s charity screening of #Anita to ROSE. We are indeed grateful for the wonderful recognition of ROSE and not forgetting everyone who bought tickets to #Anita – THANK YOU! PPR Pekan Kepong “When there’s a will, there’s always a way.” Watch how Program ROSE HPV PCR self-test helped women overcome health screening barriers and obstacles caused by Covid-19 pandemic, by bringing HPV screening right to the doorstep of the under-screened and under-privileged communities. HPV PCR self-sampling test is recommended by WHO for cervical screening over pap smears. At Program ROSE, we are fortunate to be part of the Malaysian movement towards elimination of cervical cancer. We believe "a journey of a thousand miles begins with a single step" - Lao Tzu Program ROSE & Malaysia celebrated the WHO Cervical Cancer Elimination Day of Action On 17 November 2021, along with 194 other countries, Malaysia celebrated the WHO cervical cancer elimination Day of Action. ROSE Foundation is proud to be at the forefront of the Malaysian movement, together with all our partners, collaborators, volunteers, advocates & supporters, ROSE trustees & team members, towards a cervical cancer free Malaysia.
<urn:uuid:7d390f58-8d2f-4216-86f5-640d41acc8c1>
CC-MAIN-2022-33
https://www.programrose.org/who-1st-anniversary
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00473.warc.gz
en
0.959436
1,344
1.90625
2
I love the drama of teenagers. Even the over the top, bad apple, Ritalin popping insanity of them -- sometimes especially for this (I can relate, I wasn’t exactly an angel). And lately it’s been hard to not think about teenagers with all of these hysterical girls lining up for the newest teen sensation, Twilight. I haven’t seen the movie yet but so far I’m staunchly defending the hype simply for the fact that teenage girls are wandering the streets, not paunchy fan boys. Teen girls were the original fans after all (Frank Sinatra bobby-sockers, Elvis, The Beatles) and I am both in awe of and a bit terrified by their primal screams of ear-splitting rapture (but at least they let it go). And though it's safe and nice that girls are reading novels and nutting out over a vampire movie, I do hope they get their noses out of the books and bodies out of the theater to at least experience a little bit of trouble (only a little). With that, here’s a brief history of some (some, not all, that will take another list) of my favorite troubled teens on screen -- a genre that as every teen wishes, never gets old. Dead End (1937) The first in the series of pictures that depicted that rough and tumble group of depression-era youths, The Dead End Kids (later known as The Bowery Boys) is also one of their best. Though Angels With Dirty Faces is their finest film appearance (They Made Me A Criminal with John Garfield is a strong contender as well), Dead End was our first glimpse of the wise-acre bunch that included Billy Halop, Huntz Hall and Leo Gorcey (you really should read his autobiography--a total gas). Beautifully directed by William Wyler, the picture stars Humphrey Bogart as a gangster returning to his old neighborhood, a slum where the boys fight, steal and generally run amuck to the concern of the nice young woman Sylvia Sidney (gorgeous) who’d like better for them. Though the boys are snarly little jerks at times, they're often very funny and touching. The film offers a sensitive look at what its title states—a dead end—and how the poor are fighting for survival. As the nice architect Dave (Joel McCrea) states about the boys: “What chance have they got against all this? They gotta fight for a place to play, fight for the likes of something to eat, fight for everything. They got used to fighting. ‘Enemies of Society,” it says in the papers. Why not? What have they got to be so friendly about?” Indeed. Rebel Without A Cause (1955) “You’re tearing me apart!” As the misunderstood, sensitive, red-jacket wearing, bad boy teen practically forced to contend with violence, James Dean became the ultimate symbol of teen rebellion in Nicholas Ray’s stunningly beautiful Rebel Without a Cause. Boys wanted to be like him, women wanted to date him (or save him) and parents understood some of what their kids were going through -- perhaps. We know how the story goes -- Dean, new to his California school, tries to fit in but ends up facing off with the bad kids via that famous deadly chicken run. Showing his bond with a confused Natalie Wood and a deeply troubled, puppy killing Sal Mineo (who is clearly in love with Jim), the film remains a touching portrait of alienated kids acting out mostly because they’d like just a little more love, attention and understanding from their (gulp) parents -- especially if one of your parents is Jim Backus wearing an apron. The Blackboard Jungle (1955) Richard Brooks’ studied look at teen rebellion, race relations and teacher-student friction in a tough high school has been somewhat underrated over the years. Maybe for the fact that the more classic film, Rebel Without a Cause, was released the same year and has gained classic status. But Jungle is nearly as good, and more of a social commentary on teachers, race and rebellion. Glenn Ford gamely steps in as the new teacher at a school filled with thugs, the meanest of the bunch being a terrific Vic Morrow. The one kid with promise is the conflicted Sidney Poitier (in one of his earliest roles) which leads Ford to seek out any kind of future the young man may have. It’s an effectively dark film, rough-looking and dangerous, featuring two excellent performances by Ford and Poitier and it has the distinction of helping popularize rock and roll music by featuring Bill Haley and the Comets’ “Rock Around the Clock” (in its opening credits). Teens were so excited by this movie that reportedly fights would break out in theaters, showing how much modern day teen rebellion was alive and kicking on and off the screen. Pretty Poison (1968) I will never, ever stop talking about Tuesday Weld. I love her so much, that as I've said numerous times, it almost hurts. Lord Love a Duck, Wild in the Country, The Cincinnati Kid, Play it as it Lays, Thief and on and on... But my favorite Weld performance? As Sue Ann Stepanek in Pretty Poison. Pretty Poison is the definitive Tuesday Weld movie. Playing the beautiful but deadly high-school majorette to Anthony Perkins twitchy, creepy fire-starter, she is the deliciously deviant underbelly of America's heartland. Where blondes are supposed to be good girls but, in her case, are most definitely not. Made in 1968 and directed by Noel Black, the picture was something of a dud upon release (too sexually disturbing? too strange?) and has achieved cult status ever since. And deservedly so. With it's violence, pitch black comedy and sexy viciousness (watch Tuesday commit murder and immediately want to have sex after) the picture is wonderfully subversive and deeply strange. And Weld...she is charming, scary, beautiful and sickly erotic. Need I explain the plot? The manipulation of Perkins (who thought he was doing the manipulating)? The killing of her mother? The crazy, beautiful, psycho intensity of Weld? No. You really should watch it for yourself. Again, Tuesday, Tuesday. As Tiny Tim sang, "If only Tuesday Weld would be my wife." A Clockwork Orange (1971) What’s teen rebellion in the future like? According to Stanley Kubrick’s A Clockwork Orange, really, really scary. But then the whole world is pretty effing scary in the Anthony Burgess-adapted picture that was so controversial it was banned in England (Kubrick’s choice) for decades. Malcolm McDowell ‘s Alex, sociopathic teen leader of the “Droogs” gracefully terrorizes citizens in his snazzy all-white get-ups (and fantastic hats) while enjoying extra enriched milk, ultra violence, the in-out-in-out and the inspiring elevation of Beethoven (the one thing that gives him something of a redeemable soul). After a horrifying /hilarious attack on a lady fond of cats and phallic artwork, he’s arrested, sent to prison and put through a series of brutal psychological experiments that will make him (as we all remember) nauseated by the sight of violence. Basically, extreme Prozac or that terrifying anti-smoking program from the ‘80s (remember the Schick aversion therapy?). Since Alex narrates the film, we’re in the odd predicament of almost being charmed by this violent offender, leading us to seriously question the B.F. Skinner inspired methods of “curing” him. Horrifying, brilliantly filmed (the first half hour is a mini-masterpiece in itself), morbidly funny and graced by the delicious deviance of McDowell (who had a hard time shaking his character through the rest of his career) A Clockwork Orange is not only a masterful study of rebellion but also of the problematic systems that attempt to squash it. Over the Edge (1979) The Cheap Trick songs get me every time. An under-looked teen classic (I first saw it on TV as a young one and it never left me) directed by Jonathan Kaplan, Over the Edge is not only one of the most realistic movies about teenage rebellion it's also a scathing indictment against some of the more ill advised methods of Urban planning. The story has young Carl (Michael Eric Cramer) moving to an ugly subdivision called New Granada (somewhere in the Southwestern United States) where kids are doing what they do best when bored, alienated and disgusted: rebelling. Smoking dope, carrying switchblades, fighting, taking acid in school (one of the film's funnier moments), these kids aren't dropping out simply because they're thoughtless, they are in fact, deeply unhappy with how sterile life is turning out. New Granada is a shit-hole, a place where even the nice houses look like you could put your fist through a wall, and their varied families (Carl's appears a liberal, which underscores the frustration going on with his sell out, though sympathetic parents) seem to be kidding themselves. It's a depressing place, a depressing new world and the teens are the only ones who can truly verbalize (or act upon) this. Kaplan completely gets why kids need to find an alternate world within their icky planned community, even if it's a destructive one. Check out both a young Matt Dillon and Vincent Spano who are especial stand-outs here. If you hated junior high, hated high-school, swilled Boone's wine and bummed around abandoned houses while rocking out to Cheap Trick, you will relate. And we think young girls today are over-sexed, coked up and wild. Please. Take a look at Adrian Lyne’s entertaining yet telling and I think incredibly realistic debut film Foxes, an intriguing picture for having such a sympathetic take on female rebellion. Starring Jodie Foster, Marilyn Kagan, Kandice Stroh, and Cherie Currie (appropriately famous for helming the great all-girl rock band The Runaways), the movie follows four San Fernando Valley girls as they venture into the mean streets of Hollywood for parties, boys and concerts. Some, like Foster, have a pretty good head on their shoulders while others, Currie, are on the road to ruin. It’s a sexy movie (remember, it’s Adrian Lyne of 91/2 Weeks, the underrated Lolita and Fatal Attraction fame), but again, quite sensitive towards these troubled girls -- they are never depicted as a bunch of airheads and are restless for a reason. Maybe they're just too smart. And truly, Cheri Currie was the (cherry) bomb. I love these girls. The Outsiders (1983)/ Rumble Fish (1983) Francis Ford Coppola directed two of the most gorgeous, poetic and in moments, ingenious teen rebellion movies ever made with his back to back classics, The Outsiders and Rumble Fish (both adapted from S.E. Hinton’s popular young adult novels). The Outsiders, about early 1960’s “Greasers” in Tulsa, Oklahoma, is the more melodramatic of the two, a movie about boys that some believe was made really for girls. These are Greasers read Gone with the Wind, know Robert Frost poems by heart and talk an awful lot about their feelings. But the film’s melodrama is what makes it so magical, evoking not only a stylish era, but also the nostalgia we feel for pictures like Rebel Without A Cause. It also cast actors who would later become big stars like Matt Dillon, Patrick Swayze, Ralph Macchio, Emilio Estevez, C. Thomas Howell, Rob Lowe and of course, Tom Cruise. Rumble Fish, by contrast was the more experimental and darker of Coppola’s Hinton adaptations. The story about teen rebel Rusty James (Matt Dillon, again) and his hero worship for older brother/local legend Motorcycle Boy (a gorgeous, brilliant Mickey Rourke in one of those performances that marks you as a kid) is a beautiful meditation on what it means to actually grow up. While Rusty sees the coolest guy who ever lived, Motorcycle Boy knows he’s not worth much outside his big-fish-in-a-small-pond world. Shot in black and white with only the eponymous fish of the title shown in vivid color, Rumble Fish is as socially relevant and lyrical as it is artistically beautiful. Reese Witherspoon has become one of the most popular, revered and highest-paid actresses working today -- and I guess for good reason. She’s a wonderfully versatile performer who can skillfully move from fluffy dumb comedies like Legally Blonde to pointed satires like Election to serious, full-bodied biopics like Walk the Line. But there was a time when Witherspoon was extra daring, extra subversive (and I miss this part of her). Take her role in this little blast of comic pulp craziness, Freeway, in which she plays the trashy daughter of a prostitute who hitchhikes her way to grandma’s house. Based on the The Little Red Riding Hood fairy tale, Reese encounters all sorts of dubious characters and situations along the way, chiefly a Big Bad Wolf type played by a wonderfully deviant Kiefer Sutherland. What’s so powerful about Freeway (directed by talented Matthew Bright who really ought to make more movies) is that while we’re laughing at many of her darkly comical situations, we also grow to care about this girl, no matter how much a rotten apple she may be. Also, how can you not find the girl adorable when, shocked that Sutherland isn’t dead after popping him with a gun, she proclaims: “Mister, I shot you a whole lot of times!” thirteen is the perfect title for this jagged little pill (sorry for that very teen girl reference) of a movie since it works, in many ways like a horror movie -- a Friday the 13th for parents. Directed by Twilight’s (ever heard of Twilight?) Catherine Hardwicke with gritty, melodramatic weight the picture finds thirteen-year-old friends Tracy (Evan Rachel Wood) and Evie (Nikki Reed) becoming way too out of control for their own good. They buy sexy clothes, experiment with drugs, get piercings, hang with bad boys, shoplift -- you name it these girls are doing it. Some parents should watch this hard-hitting film -- it's more sobering than going through your teenager’s diaries (unless your daughters are Pauline Parker and Juliet Hulme, in which case you should be impressed and scared for your life) and though it does play over-the-top at times, teenage girls are over the top, dammit. And good for them injecting extra drama into our, as Lina Lamont intoned, "humdrum lives." If not for the film's honesty (the film was co-written with Reed when she was 13) and the lead actresses’ talent and realness, it could have been a hokey mess. Instead it’s a scary cautionary tale and a weirdly good time. (Oh god...I used to play slap with my sister.) Lock up your daughters! Or your sons -- not sure who is worse off. "A kid who tells on another kid is a dead kid."
<urn:uuid:97eb223d-028c-429d-b996-d52c94463cde>
CC-MAIN-2017-04
http://sunsetgun.typepad.com/sunsetgun/2008/11/ten-troubled-teens.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00251-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958138
3,265
1.546875
2
The White House has made addressing climate change a centerpiece of its policy agenda. Simultaneously, low-emissions energy in general—and solar power in particular—has seen a large influx of private capital in recent years, a hallmark of a maturing industry that is less reliant on government support. Read MoreA day in the sun: Solar's revival sends stocks on a tear U.S. demand for alternative energy is on the rise, even as renewable initiatives falter abroad. In a report on power infrastructure, the Federal Energy Regulatory Commission recently noted that alternative energy—including biofuels and hydropower—accounted for 88 percent of newly installed electric generating capacity in the U.S. for the month of May. Moves by the EPA will help renewable energy industries even more, advocates say. Read MoreMain Street braces for weather Armageddon "There's no question that EPA's proposed new air-quality standards for power plants will expand the use of solar nationwide, but it's still way too early to tell by how much," said Ken Johnson, a spokesman for the Solar Energy Industries Association, in response to an inquiry from CNBC.
<urn:uuid:059320cd-c347-46cc-81c7-a3f159a431c6>
CC-MAIN-2017-04
http://www.cnbc.com/2014/06/25/environmental-rules-and-greenhouse-gases-epa-talks-about-coal-and-renewable-energy-wins.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00348-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937904
235
2.28125
2
As I worked on HYDEsim, I discovered some interesting things about the Google Maps API. Well, let’s call them what they are: limitations. (And let me say right up front that if I missed ways to get around these limitations, then I’ll happily be corrected. Either way, these are the impressions of someone whose first project in the API took about two days, and was in the end basically a success, which speaks volumes to the quality of the API.) The first and most important limitation was that the Google Maps API permits the creation of two types of objects. The first type is icons, the most obvious example of which are those little push-pin symbols in Google Maps that mark locations. The second is polylines, which are how Google Maps draws the “get from here to there” routes on the maps. You get both any time you ask for driving directions, like these from Norwalk, CT to New York City, NY. Note that they’re polylines, not polygons. You could certainly draw a polygonal shape using a polyline, but you couldn’t easily fill it with a color, let alone a translucent color. And as for a circle… well, if you want to draw enough line segments so that you approximate the roundness of a circle, you certainly can. It just doesn’t seem like a great idea. Plus there’s no simple way to fill it in. So in order to draw the overpressure rings, I created a 1000×1000 pixel 24-bit PNG of a circle. To create a ring, I first used the Google Maps API to figure out the latitude and longitude boundaries of the map. From that, I determined the number of miles per degree based on the latitude, and then calculated the number of miles per pixel (mpp) within the view. From there, I determined how wide a ring needed to be to be the right size, created an icon at that size using the big PNG, and added it as an icon. Okay, so that solved the problem of putting the rings on the map. What it didn’t solve was what happened if the zoom level changed, because icons (being raster images) don’t zoom with the map. By default, you wouldn’t want them to: if the pushpin kept growing with the map as you zoomed in, eventually it would get huge and blocky and obscure half the view. Therefore, the upshot was that every time the zoom level changed, I had to rip away the rings and rebuild them entirely, based on the new mpp value. It was easy to trigger the process: GEvent.addListener(map, "zoom", zoomLimit); That’s the API at work for me. I just tack a listener onto the zoom event, and I’m ready to go. Cool. Rebuilding the icons—well, not so cool, although it doesn’t seem to kill the tool’s performance. All this zoom handling was necessary because icons, as you might expect, are given dimensions in pixels. Polylines, on the other hand, have each point defined with longitude/latitude coordinates. That’s why polylines do scale with change in zoom level—as, again, you’d want them to do by default. If I could have defined my icons’ sizes using longitude/latitude measures instead of pixels, I could have avoided the whole “recalculate the ring sizes every time the zoom level changes” bit and shaved two or three hours off of my development time. (Which was, in total, 12 hours or less.) Of course, if the API provided polygonal primitives, I’d have avoided even more hackery. If I could have just drawn the circles as circles, using longitudinal degrees as the unit of sizing, then there’d have been even less work and a shorter development time. Something like this: var base = new GShape(); base.type = circle; base.anchor = new GPoint(-73.9971, 40.7223); // longitude,latitude base.radius = 0.0273548; // degrees of latitude …or something to that effect, with properties for the color and thickness of the outline, and also for the color and transparency of the interior. And so on. By doing it this way, the shapes (and there could easily be many other types) would be like filled polylines, and would scale in size along with the map. That would have made HYDESim a whole lot easier to create. You might say, “That’s all well and good, Eric, but how many reasons are there to draw circles on a map besides charting widespread destruction?” I thought of a few possibilities: - Explicitly showing the scope of a “show me hotels within this many miles of the specified address” type of request - Someone looking to recreate the WIMPUR map in Google Maps - Plotting Iridium flare intensities I’m sure there are countless more. As well, allowing for actual filled polygons would add extra possibilities to applications like chicagocrime.org, which uses polylines to draw ZIP code boundaries. With filled polygons, they could shade the ZIP code in question… or shade all other ZIP codes while leaving the current one unshaded, in order to give it some extra visual pop. There was one other thing I encountered that’s either a limitation, or I just couldn’t figure out how to deal with it. If you click on a detonation point in HYDESim, it pops up a “blowup” window (their term, not mine!) that shows a zoomed-in view of that point on the map. The overpressure ring overlays are faithfully reproduced on that map, but they aren’t scaled to its zoom level. They exactly match the overlays on the main map, and zooming in and out in that window has no scaling effects. Ideally, I’d just remove the overlays from the zoom window while leaving them in place on the larger map. I couldn’t find a way to do it. Failing that, I wanted to have the overlays correctly scaled. No dice there either. If there is a way to do either of these and I missed it, hopefully someone will let me know. If not, it’s something I hope the API adds in the future. The final observation has to do with the icons and interactivity. I wanted to set the overpressure rings to be event-transparent. In other words, I wanted to make it so that the rings didn’t exist as far as the event model was concerned. That way, you could click-and-drag the map even if there’s a ring underneath the mouse pointer. This didn’t appear to be possible, although again, maybe I just couldn’t figure out how. I did play around with the imageMap property, but it didn’t seem to have much effect. Figuring that out would be nice, though. I could leave the detonation point active for popping open the blowup window, and make the rest inert. Oh, and one more thing—the fact that the Google Maps API key only works for a specific directory, and not any of its subdirectories, drove me up the wall. Instead of generating a key for meyerweb.com that would cover anything I might do on the site, I’ll have to generate a new key for every new directory. This is why I set up the directory /eric/tools/gmap/, but that just seems so… confining. Similarly, it was annoying that the key was completely bound to the full address. I generated the key for meyerweb.com/eric/tools/gmap/, so if anyone types in www.meyerweb.com/eric/tools/gmap/ they’ll get a key error. It would be nice if at some future time the keys were a little more flexible than they are now.
<urn:uuid:c427b507-1803-4596-99e9-3df85810a6dd>
CC-MAIN-2017-04
http://meyerweb.com/eric/thoughts/2005/07/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00499-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945451
1,725
2
2
DR-HO'S® Digestive Detoxifier is an all natural supplement that aids in digestive detoxification and promotes healthy intestinal flora. This product contains 16 natural ingredients with no animal byproducts or hard-to-digest ingredients. One container contains enough capsules to be used daily for 30 days. Our bodies are victim to stress, pollution, toxins and unhealthy diets. Most people are too busy to look after themselves properly, which results in consumption of fast foods, refined carbohydrates, packaged foods alcohol, junk food, deep fried foods and foods containing high levels of sugar, salt and saturated oils. Juggling time between work, travel and family leaves little time to prepare and eat healthy all the time. certain medications, stress, rushing around, poor bowel habits can impact your overall good health and well-being. Keeping your intestines and colon clean is one of the most important daily routines for promoting digestive wellness and maintaining health; it’s your healthy choice. Cleansing and detoxifying your body, along with using digestive remedies, helps promote regularity. Regular bowel movements help eliminate accumulated toxins and waste that may be extremely harmful to our bodies. A compound within black walnut known as Juglone helps to fight bacteria and worms, and also helps to promote normal motility. The use of black walnut hulls will also assist with hemorrhoids, liver and gallbladder problems and has also been used to treat headaches, hepatitis and skin conditions. Is known to be used for appetite loss and indigestion as well as to aid poor digestion, stomachaches, menstrual problems, worm infestations, lack of intestinal muscle tone and inflammation of the digestive tract. Wormwood stimulates the bitter receptors of the taste buds which causes an increase in digestive enzymes and stomach acids. The oil contained within the herb is also believed to slow or even stop certain types of bacteria. Wormwood has also been used for liver and gallbladder problems. Is used for fungal infections. Other compounds within Pau D’arco appear to combat bacterial, viral and parasitic infections and may have anti-inflammatory properties as well. This will help to eliminate parasites and reduce any inflammation in the digestive tract. Has also been used to combat Candida. Substances within Pau D’arco known as naphthaquinones which have been tested in laboratory environment show potent antifungal properties. Has been used to eliminate intestinal parasites and to reduce water retention (bloating). Pumpkin seed has demonstrated anti-oxidant and anit-inflammatory properties. Has also been used to relieve urinary difficulty due to enlarged prostates obstructing the bladder, as well as kidney inflammation, nausea, diabetes and seasickness. These cloves have been used to combat stomach ailments and bad breathe by promoting regular digestion. It is known for its antiviral, antibacterial and pain-killing effects. Has also been known to assist with bronchitis, colds, cough and fever, tendency of infection, sore throat and dental pain. Has been used to eliminate worms from the intestinal tract and help with menstrual and uterine problems. It also helps to promote urination. Herbalists have recommended it for menopausal symptoms and to treat ovarian cysts. Has been used to relieve gas, stomach pain, and indigestion and missed menstrual periods. Has also been known to help with sore throat, poor circulation, wounds, skin diseases and oral inflammation. Acts as an anti-oxidant and immune system booster which helps the immune system fight the overgrowth of candida albicans. It has also been used for digestive ailments, menstrual pain, diabetes, coughs, colds, bronchitis, hardening of the arteries, high blood pressure and high cholesterol. Is an herb which has been used as a cleansing agent. It is said to act as a tonic for the digestive system by restoring normal motility to the intestinal tract and also to improve menstrual flow. Hyssop leaf has also been used for intestinal inflammation, gallbladder problems, fevers, respiratory ailments, liver complaints and poor circulation. Specifically known as a spice in Indian cuisine turmeric has been used to ease indigestion, excess gas, bloating and other stomach ailments. Has also been recommended for use with stomach ulcers. Turmeric has displayed powerful anti-oxidant properties which help to fight disease. Its anti-oxidant properties are said to be as powerful as those found in vitamins C and E and even beta-carotene. Has been used for indigestion as well as stimulating the digestive system and improving bowel movement. It stimulates the taste buds which increase digestive enzymes. Has been used to relieve gas, digestive cramps, fights bacteria and acts as a general decongestant. It will help to increase the production of bile which aids in the digestion process. Peppermint leaf has also been linked in helping with intestinal pain, painful menstruation, morning sickness, nausea and vomiting. Is primarily used as a digestive aid. It also helps with many stomach problems. Fenugreek has been used to reduce blood sugar and appetite loss. Has traditionally been used as a digestive aid as well as to kill parasites and alleviate abdominal pain. It may also have some properties which boost the immune system. Has been used to alleviate constipation and also acts as a detoxifying agent helping to eliminate toxins from the body. Yellow dock powder also helps in the production of bile which aids the digestion process. Echinacea is believed to be an immunostimulator, stimulating the body’s immune system and warding off infections. We understand that pain relief is an immediate need for most people. For that reason, we offer two flexible shipping options to help get you your relief as soon as we can. We offer the two following shipping options: • Sure Post (3-10 Business Days) $5.99 • UPS Rush Shipping (3 Business Days) $24.99 We also offer free shipping on all orders over $300 before tax and provide a 25% discount on shipping when you buy more than one product. Read our full Shipping Policy here. DR-HO'S Digestive detoxifier can be used to help: • Support the immune system • Promote balanced intestinal flora • Reduce bloating, gas & constipation • Diarrhea, fatigue, indigestion, cramping & more How To Use The Digestive Detoxifier. DR-HO'S Digestive Detoxifier is an all natural supplement that aids in digestive detoxification and promotes healthy intestinal flora. Using the Digestive Detoxifier is simple, take 3 vegi-capsules in the morning on an empty stomach with a large glass of water (6-8 ounces / 180-240 ml) or as directed by your health care practitioner. A 2-3 month program is recommended to adults for a complete first time cleanse. It is important to note that the Digestive Detoxifier is the first step in Detoxify-Cleanse-Regulate process of the DR-HO'S® 30-Day Digestive Cleanse. Help and Frequently Asked Questions. Can I take this multivitamin while I am pregnant? No, do not use this product if you are pregnant or breastfeeding. Are there any side effects? Depending on the initial state of toxic level in your system, during the first phase of cleansing and detoxifying process, you may experience fatigue, cramping, skin irritation or loose stool. These are all normal reactions while doing a cleanse and will usually only last a few days. Once these reactions pass, you should feel revitalized and less sluggish than before you start the cleanse. If it does not, you should stop taking the product and consult your physician as it may be the sign of a more serious condition. If you experience any other discomfort or allergic reaction, please consult your doctor first before using the program again.
<urn:uuid:c3b743ec-af83-4433-a07f-9f642b056b98>
CC-MAIN-2017-04
https://drhonow.com/digestive-detoxifier.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00544-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948297
1,645
1.539063
2
Target Google, say internet users Almost two-thirds of internet users want governments to do more to force search engine giant Google to comply with rules on privacy and use of personal data, according to a poll. More than three-quarters (79%) of internet users are concerned about their online privacy, according to the survey commissioned by the Big Brother Watch campaign group. The analysis comes after Google was last week threatened with criminal proceedings by the UK information watchdog after further personal data unlawfully collected by its Street View cars was discovered. Nick Pickles, director of Big Brother Watch, said: “Online privacy is a global issue of real importance to people and the overwhelming message is that citizens do not feel their authorities are doing enough to stop the desire of large companies to collect vast amounts of data on them. “The widespread support for EU regulators to do more to ensure Google complies with existing privacy regulations highlights how people want to see real, concrete action taken to protect their privacy. “Germany has set an example to be followed, taking strong legal action against companies who do not respect people’s privacy. “The fact many of the highest-profile privacy lawsuits have been tackled first there and data protection law is vigorously enforced clearly contributes to citizens feeling their rights are being defended. “Sadly, around the rest of the world, it is clear people do not have this confidence and want more done to reign in companies like Google.” The research carried out by ComRes for BBW, saw 10,354 people polled in nine countries – the UK, Germany, France, Spain, India, Japan, South Korea, Brazil and Australia. It also found that two-fifths (41%) of consumers believe they are being “harmed” by big companies gathering large amounts of personal data for internal use. People in India (94%), Brazil (90%) and Spain (90%) were the most concerned about their online privacy, ahead of the UK, where the figure was 68%. European data protection authorities have written to Google seeking information about its new Google Glass device and how the company intends to ensure compliance with data protection laws. Last week the Information Commissioner’s Office (ICO) handed the US multinational an enforcement notice demanding that it destroy four discs containing information it took from unsecured wifi networks. Google had previously pledged to destroy all data collected in this manner, but admitted last year that it “accidentally” retained the additional discs. The ICO has warned Google that failure to comply with the legal order will be considered as contempt of court, which is a criminal offence. A spokesman for Google said it was proceeding with a plan to destroy the data. Leave a Comment! Community Terms & Conditions These content standards apply to any and all material which you contribute to our site (contributions), and to any interactive services associated with it. You must comply with the spirit of the following standards as well as the letter. The standards apply to each part of any contribution as well as to its whole. be accurate (where they state facts); be genuinely held (where they state opinions); and comply with applicable law in the UK and in any country from which they are posted. Contributions must not: contain any material which is defamatory of any person; or contain any material which is obscene, offensive, hateful or inflammatory; or promote sexually explicit material; or promote violence; promote discrimination based on race, sex, religion, nationality, disability, sexual orientation or age; or infringe any copyright, database right or trade mark of any other person; or be likely to deceive any person; or be made in breach of any legal duty owed to a third party, such as a contractual duty or a duty of confidence; or promote any illegal activity; or be threatening, abuse or invade another’s privacy, or cause annoyance, inconvenience or needless anxiety; or be likely to harass, upset, embarrass, alarm or annoy any other person; or be used to impersonate any person, or to misrepresent your identity or affiliation with any person; or give the impression that they emanate from us, if this is not the case; or advocate, promote or assist any unlawful act such as (by way of example only) copyright infringement or computer misuse. Nurturing a safe environment Our Silversurfers community is designed to foster friendships, based on trust, honesty, integrity and loyalty and is underpinned by these values. We don't tolerate swearing, and reserve the right to remove any posts which we feel may offend others... let's keep it friendly!
<urn:uuid:d565a65a-2c28-49d8-8bc3-f09e2e9caf6d>
CC-MAIN-2017-04
https://www.silversurfers.com/technology/internet-technology/target-google-say-internet-users/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00177-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948459
951
1.9375
2
August 27, 2008 Logan Gives Tech-Toting Travelers an Outlet By DONNA GOODISON Logan International Airport has made it easier for travelers to plug in their laptops and recharge their cell phones and iPods while waiting for flights.The Boston airport has installed 500 110-volt AC-power outlets and 500 USB-ports under terminal seats and tables. Logan officials wanted to provide a convenient, comfortable and safe way for airline passengers to operate their equipment with reliable power sources - without having the cords becoming tripping hazards. "We all travel these days hooked up with electronics," said Sam Sleiman, director of capital programs and environmental affairs for Massport, which runs Logan. "We've been noticing throughout the airport that people are looking for plugs and sitting on the floor next to any outlet that they find." Finding AC outlets at airports has proved a challenge for many travelers. There are even Web pages that document where to access them behind vending machines, on walls in dining areas, or by moving seats. The increasing use of those outlets has prompted some airports - Logan excluded - to cap them to prevent access by non- airport employees. Logan's new AC outlets and USB ports are located in Terminals A, C and E and near Gate 37 in Terminal B. Logan will install a different system in areas of Terminal B where airlines have their own seating and holding rooms. The airport had considered soliciting corporate sponsors to pay for the $157,000 project in return for pasting their logos next to the outlets, but officials wanted to install them quicker than a bidding process would allow. "That does not preclude it in the future if any company wants to approach us to sponsor these things," Sleiman said. "But we will never charge the passengers or users for it because, in this day and age, we believe that these are an essential service that we have to provide our customers." CAPTION: POWERING UP: Logan International Airport recently installed USB ports and power outlets so that passengers can recharge their electronic devices while waiting to take off. STAFF PHOTO BY MARK GARFINKEL Originally published by By DONNA GOODISON. (c) 2008 Boston Herald. Provided by ProQuest LLC. All rights Reserved.
<urn:uuid:257fe674-c6cc-43c9-8ecf-70f79499fe4a>
CC-MAIN-2017-04
http://www.redorbit.com/news/business/1535627/logan_gives_techtoting_travelers_an_outlet/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00272-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958268
462
1.859375
2
why is my 7yr old only likes junk food and not real food Pam - posted on 04/07/2014 HI! I had the same complaint regarding my 11 year old son. His desire to eat not only junk food but carbs as a whole. He rarely ate proteins, which was a major concern for me. His pediatrician did not have much input or gave me much assistance. I decided to take him to a wellness doctor, where we learned he was retaining a lot of yeast in his tummy from previously taking antibiotics. According to the doctor, your body will crave carbs and sugar when you have yeast in your tummy. We were given a vitamin called Yst Redux and it was like a miracle. My son began eating as he should and growing as needed. Hope this helps!!! Join Circle of Moms Sign up for Circle of Moms and be a part of this community! Membership is just one click away.Join Circle of Moms
<urn:uuid:8b83b6c3-b8e5-4959-a988-2db150110dd5>
CC-MAIN-2017-04
http://www.circleofmoms.com/welcome-circle-moms/why-is-my-7yr-old-only-likes-junk-food-and-not-real-food-817844
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00446-ip-10-171-10-70.ec2.internal.warc.gz
en
0.990638
197
1.742188
2
Virtual Mentor. October 2011, Volume 13, Number 10: 712-717. Criminal Convictions and Medical Licensure State medical boards, tend to follow social policy as expressed in U.S. law, which designates moral turpitude outside the clinic as a cause for restricting professional licenses. Herbert Rakatansky, MD In 1992 an Ohio physician failed to file one of his employee’s quarterly federal tax returns (a misdemeanor); in 1995 he failed to pay estimated taxes of about $160,000 (a felony). This occurred during a time when he was managing his own business affairs. In 1998 he pled guilty in federal court and paid, in addition to restitution, a $2,000 fine and served 6 months of monitored home confinement. In 2000, the Ohio board of licensure suspended his license for 90 days based on the interpretation of the law that the misdemeanor crime involved “moral turpitude.” The physician took the medical board to court, but the court affirmed the board’s license suspension. Immediately, the physician appealed the trial court’s decision, and, in 2002, an Ohio court of appeals reversed the trial court’s decision, stating, “We believe appellant’s misdemeanor offense under the circumstances of the present case did not rise to the level of baseness, vileness, or the depravity in private and social duties which man owes to his fellow man, or to society in general” . The appeals court asked the licensing board to review the case again based upon only the felony, and the board reaffirmed the suspension, which was subsequently upheld by the Ohio Supreme court in 1994. This case asks whether a doctor’s behavior outside the professional arena should be considered by a regulatory authority as a factor in deciding the doctor’s fitness to practice. There is general agreement that competence and behavior occurring within the practice of medicine are proper criteria to consider. Seemingly similar questions have been asked about other endeavors. Can a bad person be a good artist, actor, and so on? Should we exhibit Picasso’s paintings of women even if he is known to have treated them badly? Should we listen to or perform the music of Richard Wagner, knowing he was an outspoken anti-Semite? These questions may seem analogous but they are not. In these examples we may choose to admire and enjoy the creations of the artists and simultaneously dislike the artist as a person. When encountering the art (visual, aural, or performance) we need not and actually often do not interact personally with the artist. We are experiencing and evaluating the artistic product, not the artist, and, significantly, we do not consider the transgressions of one artist a reflection on the total universe of artists. Doctors are different. Patients almost always interact personally with their doctors (only a few specialties such as radiology and pathology have little direct patient contact). Patients do not interact with the products produced by doctors; the patient-doctor relationship is the product. The unwritten social contract doctors have with patients is based on trust. Each patient trusts that his doctor will act only in his or her best interests. Trust in medical institutions is generated by extension of the trust one has in one’s individual physicians and by the reputation of the institution itself. In many circumstances the patient does not choose the specific doctor and, even if he or she does choose, there may be little objective basis for that choice. Rather, patients “trust” that their welfare and best interests will be the paramount factors in the decisions made by the medical system and the doctors who treat them. The loss of trust in doctors, individually and collectively, is a patient safety issue. Without trust, persons in need of care will not be forthcoming with accurate health information, are unlikely to be compliant with medical treatments, and in some cases may not utilize the health care system at all. So it is important to consider the effect of aberrant extraprofessional behavior on the trust the patient has in her personal doctor and consequently in the profession as a whole. We must also question whether the identified behavior puts patient safety at risk. Social policy as expressed in U.S. law designates “moral turpitude” as a valid reason to restrict the licensing of professionals, including but not limited to, doctors and lawyers, and also as a criterion for admission to the U.S. (as a visitor or immigrant). Moral turpitude is defined by state law and specifically in our index case as: “an act (of) baseness, vileness, or the depravity contrary to accepted and customary rule of right and duty between human beings” . Other states have definitions very much the same. The societal view of what constitutes such behavior has varied over time; note, for example, the changing view of behaviors associated with same-sex romantic relationships. The Federation of State Licensing Boards, in its model legislation for state medical license boards, lists many grounds for sanctioning medical licenses including “the commission or conviction of a misdemeanor involving moral turpitude or a felony, whether or not related to the practice of medicine, or the entry of a guilty, nolo contendere plea, or deferred adjudication (without expungement) to a misdemeanor involving moral turpitude or a felony charge” . The U.S. State Department, however, lists a number of specific crimes as examples of moral turpitude. The list includes “tax evasion (willful),” “an intent to defraud,” and “fraud against revenue or other government functions” . A law enacted in Illinois in 2011 mandates permanent revocation without a hearing of the license of a health care worker convicted of forcible felony or criminal battery against a patient “including any offense based on sexual conduct or sexual penetration” or one who is required to register as a sex offender . No discretion to the board is allowed. It seems highly likely that a search of state laws would confirm that the right of a medical licensing board to restrict a doctor’s license for behavior involving moral turpitude is either enshrined in law or accepted in practice. It is critical to note that any felony or a misdemeanor involving moral turpitude may be the offense. We depend on the criminal justice system to punish illegal behavior and deter others from committing it, both by preventing the perpetrator from continuing bad behavior and by meting out retribution for what has already been done. The license to practice medicine is granted to ensure competency and protect patient safety. Ideally, restriction of the license should be invoked only for reasons related to competence and patient safety and not used as a punishment per se. As a matter of policy, however, it is clear that the connection between “moral turpitude” outside the practice of medicine and the ability to practice medicine safely has been accepted as social policy. This connection was clearly stated in 1956 by the attorney general in the state of Washington in an advisory opinion as follows: Why this is so and whether it is true in all cases is worth discussing. We can consider four qualities or types of behavior to illuminate the question. Honesty. Patients assume that doctors are honest, that they will not misrepresent findings or diagnoses during the course of the patient-doctor relationship. Patients assume that their doctors will honestly recognize and deal with conflicts of interest. Not only do patients make this assumption, but this principle is also a basic ethical imperative. It is explicitly stated as one of the nine AMA Principles of Medical Ethics . Patients trust the entire universe of doctors to adhere to this standard. Dishonesty in the context of medical treatment is an obvious breach of professionalism. It is likewise reasonable to believe that dishonesty outside the professional arena may extend into the doctor’s dealings with patients. Why should a doctor who lies about his income tax, an action that has well known and predictable consequences, not behave dishonestly in the medical sphere, an area over which he exerts far more control and in which the consequences, if any, are less predictable and likely to be less consequential? A pattern of dishonesty in any area of a doctor’s life may be damaging to patient trust in the doctor and by extension in the profession and detrimental to the best interests and safety of that doctor’s patients. Criminal behavior. Conviction of a crime generally has a pejorative influence on one’s reputation. Public trust in the convicted doctor and the entire profession is eroded. Should a doctor convicted of a crime outside the medical arena have restrictions (temporary or permanent) imposed on his or her practice of medicine? The licensing board restricts practice to protect patients. The licensing board should not mete out retribution, as the state does; it should strive to protect patients by preventing further criminal behavior that affects competence or patient safety. If the licensing authority has reason to believe that the commission of a crime or the presence of “moral turpitude,” however defined, may affect competency or safety, then restriction of practice is justified. Health. It is the responsibility of each doctor to be physically and emotionally healthy so his or her function is not impaired while treating patients. In considering the case of the Ohio physician, one could ask the question: Did an underlying illness contribute to the dishonest behavior? Does the doctor have bipolar disorder and did he in a manic phase accumulate debt and imperil his financial status? Was his judgment about cheating on his tax return influenced by an illness such as depression or addiction? The doctor must pay the legal penalty for breaking the law, as must any person. As a part of its deliberations about the restriction of privileges to practice, the licensure board should consider referring the doctor for medical and psychiatric evaluation. The finding of a treatable illness should be a factor in the decision of the licensure board. The best resource for this is a physician health program (PHP). Most states have such programs associated to different degrees with local licensure boards and state medical societies . Boundary violations with patients. Patients trust that information and the access to physical and the emotional closeness granted to doctors in the course of the patient-physician relationship will be used only for therapeutic purposes. The use of such information or access to satisfy the physical or emotional needs of the doctor constitutes a boundary violation. It is important to emphasize that the responsibility for understanding and enforcing this obligation rests 100 percent with the doctor. The universally accepted prohibition against a sexual relationship with a patient dates back to the time of Hippocrates. Criminal sexual behavior outside the medical arena (e.g., exhibitionism, child pornography, rape) may be especially destructive of the trust patients have in the doctor and the profession We must also ask whether these behaviors outside the professional arena put patients at risk of boundary violations. Criminal behaviors involving sexual boundaries occurring outside the practice environment may be indicators of a risk for such behaviors to occur in the professional sphere and thus constitute a risk to patients whether or not the patients are aware of these behaviors. The American Medical Association’s Code of Medical Ethics is the generally accepted standard of professional behavior. In addition to the AMA ethics code, medical professional organizations, medical staffs, and institutions frequently have their own codes and standards of behavior. Professional organizations and institutions should evaluate members’ behavior in accordance with these established ethical standards and take action about membership and clinical privileges to protect patients and enhance trust in the profession. Ultimately it is the responsibility of the state licensing board to protect the public by adjudicating individual cases, taking into account any possible underlying illness, utilizing appropriate due process, and relying on review by the court as allowed by law. We can conclude that, to the extent that morally intolerable or illegal behavior outside the medical arena is construed as posing a danger to patients due either to the specific behavior or potential loss of trust in the doctor or the entire profession, regulatory or judicial sanctions on the practice of medicine are appropriate. This conclusion is supported both by our ethical imperatives and by our legal system. Herbert Rakatansky, MD, is clinical professor of medicine emeritus at Warren Alpert Medical School of Brown University in Providence, Rhode Island. He was a member and chair of the American Medical Association Council on Ethical and Judicial Affairs. He is a member of the Miriam Hospital ethics committee and chairs the Rhode Island Medical Society physician health committee. Related in VM The viewpoints expressed on this site are those of the authors and do not necessarily reflect the views and policies of the AMA. © 2011 American Medical Association. All Rights Reserved.
<urn:uuid:86c627a3-df98-4b55-9472-f35af14d5b9d>
CC-MAIN-2017-04
http://journalofethics.ama-assn.org/2011/10/pfor1-1110.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00541-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954934
2,572
1.757813
2
[WikiLeaks founder Julian Assange] argued that, when a regime's lines of internal communication are disrupted, the information flow among conspirators must dwindle, and that, as the flow approaches zero, the conspiracy dissolves. Leaks were an instrument of information warfare. - The New Yorker, June 6, 2010 This argument from Julian Assange, the force behind WikiLeaks and this week's massive Afghan war document leak, goes to the heart of one of the key findings of Janine's book Shadow Elite: that a new breed of power broker whose cachet is in their exclusive access to and control of official information (or information that once would have been official) has come to influence. These players use privatized information to advance their own agendas and those of their allies and networks, even while ostensibly working in the public interest. WikiLeaks is a declared combatant in this information warfare: high-tech, good-government vigilantes. The group acts as the consummate outsider, a crucial role in the shadow elite era, willing to push the envelope because it stands squarely outside the established power structure. But just as this shadow elite upends traditional process and flouts institutions as it exerts influence, WikiLeaks has upended the old-fashioned venues of investigative journalism and watchdog organizations. While it is surely good that WikiLeaks has emerged as a counterweight -- a tool for making the powerful squirm -- WikiLeaks has enormous power itself, the kind of unaccountable power that its founder decries. WikiLeaks takes some of its tactics (secrecy, a willingness to bend the rules, ambiguity) from that new breed of power broker it may well seek to take down. There is nothing new in this. A spy network can be best challenged by a counter-network. Janine also saw this kind of mirroring of tactics in Poland under communism where the Opposition thrived on close-knit trust-based networks of secrecy and enforcement of loyalties, just as Communist Party operatives demanded of those in their circles. What is new, of course, is the advent of ever more complex digital technologies. As Janine writes in Shadow Elite, these technologies lend themselves to new forms of power and influence that are neither bureaucratic nor centralized in traditional ways, nor are they generally responsive to traditional means of accountability. Bureaucracy gets pushed aside by so-called "adhocracy," executive power/one-man shows flourish, with institutional checks and balances flouted. These are some of the signature developments of the shadow elite era, and WikiLeaks is clearly a creature of that era. It calls itself an "an uncensorable system for untraceable mass document leaking," using cutting-edge technology to give insiders a quick, more secure way to make public huge amounts of data. NYU media critic Jay Rosen describes it as "the world's first stateless news organization...": In media history up to now, the press is free to report on what the powerful wish to keep secret because the laws of a given nation protect it. But WikiLeaks is able to report on what the powerful wish to keep secret because the logic of the Internet permits it. This is new. Just as the Internet has no terrestrial address or central office, neither does WikiLeaks. While that suggests a diffuse structure, it still appears driven by the passion and drive of one man: hacker Julian Assange, who said to Der Spiegel, "I enjoy crushing bastards." In a more temperate moment, Assange said he hoped WikiLeaks would usher in an "age of whistleblowing," at a time when the powerful few have monopolized vast amounts of should-be public information, and when traditional investigative journalism has been gutted by news budget cuts. But for a group that prides itself on transparency, there's a certain irony in the fact that the group itself is hard to pin down and therefore defies some of the standards of accountability. Though Assange says they have a rigorous authentification process, he said Tuesday WikiLeaks does not know the source of the leaked documents, adding, "we never know the source of the leak." He said security for individuals is a concern, but national security is not: "it is not our role to play sides for states. States have national security concerns, we do not have national security concerns." Some press watchdogs are troubled by all this. Bob Steele, the director of the Prindle Institute for Ethics at DePauw University, said to the Wall Street Journal that WikiLeaks should be more open and transparent about their methods. Steven Aftergood, head of the project on government secrecy at the Federation of American Scientists has described WikiLeaks as "information vandals" who "must be counted among the enemies of open society because it does not respect the rule of law nor does it honor the rights of individuals." Lucy Dalglish, executive director of the Reporters Committee for Freedom of the Press, which fights for journalists' rights to obtain and publish secret information, told USA Today, " I get concerned about this...who are these people?" Of course, the fact that it is hard to answer that question is part of what makes WikiLeaks the novel and uniquely powerful force that it is: the secrecy, diffuse structure, encryption technology, and the willingness to make public what others may not. Insiders are surely more willing to leak if they think they will leave few if any electronic fingerprints, anonymous even to WikiLeaks itself. WikiLeaks' amorphous, "stateless" set up provides legal cover: Yale University law professor Jack Balkin told the Journal that the Justice Department might find it hard to gain jurisdiction against WikiLeaks, and even if it succeeded in winning a judgment against it, it could be hard to enforce. All this makes the WikiLeaks model promising to democracy, but also inherently resistant to transparency and accountability. This appears to be the phenomenon of the resistance having adapted the technique of the dominant group. Assange seems to believe that the evasive, elusive M-O is a necessary weapon against an enemy - those in power, including the shadow elite - who use their own obfuscatory tactics to hide their tracks as they press personal agendas and hoard information. According to the New Yorker, Assange thinks that "illegitimate governance was by definition conspiratorial--the product of functionaries in 'collaborative secrecy, working to the detriment of a population.'" WikiLeaks counters that with its own collaborative secrecy, and herein lies the conundrum of the opaque organization championing transparency. From the New Yorker: Soon enough, Assange must confront the paradox of his creation: the thing that he seems to detest most--power without accountability--is encoded in the site's DNA, and will only become more pronounced as WikiLeaks evolves into a real institution. Some, including WikiLeaks critic Steven Aftergood at the Federation of American Scientists, think WikiLeaks has taken a step forward in that evolution, showing restraint this time by withholding some documents because of possible threats to individuals. And WikiLeaks also agreed to include traditional news organizations in its latest endeavor, though forcing them to act on the data fast. Former New York Times investigative reporter Philip Shenon made the point on PBS NewsHour that his old employer might have sat on the Afghan war documents "months, years" in order to properly vet the material, had WikiLeaks not required that they put them out in a matter of weeks. Some call this irresponsible, but supporters would argue that the real problem is with the "real institutions," too embedded in the power structure and too deferential. In an age when power brokers have seized information and the public literally doesn't know what it's missing, Assange believes the world needs an equally aggressive, agile and resilient opponent, an "intelligence service of the people," one that seeks to agitate those misusing power wherever they can be found. In the eyes of the law, WikiLeaks might be, conveniently, "nowhere,"out of reach. But as NYU's Rosen , the location listed on Wikileaks' Twitter profile is: everywhere. How will Donald Trump’s first 100 days impact YOU? Subscribe, choose the community that you most identify with or want to learn more about and we’ll send you the news that matters most once a week throughout Trump’s first 100 days in office. Learn more
<urn:uuid:ea47cbfd-59b4-4828-ae1a-1f0141341a8a>
CC-MAIN-2017-04
http://www.huffingtonpost.com/janine-r-wedel/emshadow-eliteem-wikileak_b_663534.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00297-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952413
1,663
1.929688
2
|By Chris Ware, Herald-Leader| The book was the seminal document in reporting and commentary that focused national attention on the mountainous Cumberland Plateau, led to the creation of the Appalachian Regional Commission and, the newspaper says, "forever changed Appalachia." Reporters John Cheves and Bill Estep write, "Coal mining was subjected to new taxes and new worker-safety and environmental laws. In the 1980s, Kentucky finally outlawed the 'broad-form deed,' a controversial legal device that allowed coal companies to strip-mine people's land against their will." But the Whitesburg lawyer and former state legislator "never recognized this success," they write. "Ultimately, Caudill concluded that Appalachia could not be fixed because its people were broken, its gene pool hopelessly watered down by inbreeding among the 'dullards' who wallowed in ignorance and 'welfarism' in isolated hollows." The story reveals that Caudill and eugenicist William Shockley conceived a program to pay some families to undergo sterilization. "Caudill's admirers . . . prefer that his legacy be advocacy of wise environmental stewardship and the courage to challenge long-entrenched powers, as a writer, a citizen-activist and a teacher," Cheves and Estep write, and quote University of Kentucky historian Ron Eller, the leading historian of modern Appalachia: "No one else at the time was saying the things that Harry was saying about the corruption in the relationships between business and government." Part of an e-book the newspaper will publish, the biography is the first of Caudill. Former Los Angeles Times reporter Rudy Abramson nearly completed one, but "died in 2008 before he could publish it," the paper reports. "The manuscript rests with Abramson's grown children, who don't wish to discuss it." Abramson was a co-founder of the Institute for Rural Journalism and Community Issues, which publishes The Rural Blog. (Read more) UPDATE, Jan. 11: Cheves did an hour-long interview with WMMT-FM of Whitesburg, Caudill's home town. Lister to it here.
<urn:uuid:da5a0048-b360-404e-a5a8-fa346e7467c3>
CC-MAIN-2017-04
http://irjci.blogspot.com/2012/12/paper-starts-year-long-look-at-e-ky.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00037-ip-10-171-10-70.ec2.internal.warc.gz
en
0.973217
448
2.34375
2
- Run Time - 1 hour and 59 minutes VP Content Ratings - Sex & Nudity “You have heard that it was said, ‘You shall not commit adultery.’” Madonna’s first stint at film direction takes us back and forth in time between the 1990s when an unhappily married young woman becomes entranced with the possessions of the Duke and Duchess of Windsor and the 1930s when the man born to be King of England was falling in love with an American divorcé still married to her second husband. Depending on your viewpoint, this is either an elaborate justification for adultery, or the chronicle of a woman daring to break free of the conventions of society that enslave her. No need to tell you which is Madonna’s view. Wally Winthrop (Abbie Cornish) obviously sees her many visits to Sotheby’s auction gallery as an escape from her brutish husband. The effects of the estate of the Duke and Duchess of Windsor are on display prior to the upcoming auction. As she looks at the exquisite jewelry, dishes, and furnishings there are flashbacks to the Duke (James D’Arcy) and his affair with the American Wallis Simpson (Andrea Riseborough) who is visiting England with her husband. Attracted to each other, they defy the gossip of society, which increases as his ill father King George V approaches death. When he proposes to her, declaring that he will give up the throne, she observes that she will be “the most hated woman in England,” by no means an exaggeration—she is an American commoner, and worst of all, still married. Meanwhile in the film’s present time (the 1990s), Wally’s life progresses, an observant auction security guard named Evgeni (Oscar Isaac), noticing her comings and goings, takes great interest in her. Romantics will love this justification for adultery, whereas others might well question the decision of both women. The film is a bit like Julie and Julia with its juxtaposition of a modern day character against one in the past. This leads to the question of why this is necessary? Might it not be better to concentrate on the more interesting of the two? Or does this help us perceive the present more clearly, especially the status of women? Most critics panned the film, but I still found it interesting in that it tells us as much about Madonna as the two women in front of the camera. Note: Discussion questions are available with this review for those subscribing to the Visual Parables journal. The journal also includes many extras–book reviews, the use of films for church seasons, a lectionary related column, and more. Hundreds of old reviews are also available in the subscribers; section. Check out the sample issue.
<urn:uuid:f5bcd8b2-768e-40d2-b0cc-782d33214bc0>
CC-MAIN-2022-33
https://readthespirit.com/visual-parables/w-e-2012/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00072.warc.gz
en
0.959983
624
1.890625
2
by Rob Williams on May 30, 2011 in Motherboards We’ve been a little short on motherboard content lately, so to kick things back into action we’re taking a look at four P67-based motherboards at once – all benchmarked using our newly revised test suite. The boards we’re looking at are the ASUS P8P67 Deluxe, GIGABYTE P67A-UD4, Intel DP67BG and MSI P67A-GD65. Thanks to the fact that we can see our environment diminish in front of our eyes due to our global habits, being “green” has become a priority of many like never before. Thankfully, companies have also jumped on the bandwagon by developing the most power-efficient products possible, to help us reduce our overall footprint – and save money to boot. Being the base of a PC, it might not seem obvious that one motherboard may draw more power than another, but because all of the extra chipsets and features piled onto one motherboard may not be on another, there can in fact be a discernible difference between various models. Because the CPU is the biggest power draw in a PC for most people, we single that out in our testing. If a board has a poor power design, it could end up drawing more power than needed, and likewise, if a board has an excellent power design, it could offset the extra power draw of additional components. It is important to note, however, that while one board might draw more power than another, it shouldn’t be considered a bad thing if it’s filled to the brim with features. If a board has little in way of features but draws the same amount of power as a beefier model, that’d be reason for alarm. To test for power consumption, the computer is first boot up and left to sit at idle for five minutes at the Windows desktop, at which point the current wattage is recorded if stable. To test for full CPU load, LinX is run with ~7000MB memory usage for a total of five minutes. During the run, the highest point the wattage reaches on the meter is captured and becomes our “Max Load”. Being as feature-rich as it is, it’s no surprise to see ASUS draw more power than the others, and for the opposite reason, it’s expected to see Intel draw the least amount of power. Interestingly, though GIGABYTE’s board draws a little less power at full load, it draws a lot more than the Intel and MSI at idle.
<urn:uuid:467e18fe-f448-4384-9e60-d8c4a4e8d035>
CC-MAIN-2017-04
http://techgage.com/article/intel_p67_roundup_asus_gigabyte_intel_msi/17/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00191-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951902
539
2.21875
2
Panel 4: Corpus-based translation studies (Claudio Fantinuoli, Federico Zanettin) Corpus linguistics has become a major paradigm and research methodology in linguistics and translation studies, with applications ranging from professional human translation to machine (assisted) translation and terminology, from descriptive linguistic and translation research to language teaching and translator training. In the last 20 years or so, taking advantage of technological advancements in terms of computational power and availability of electronic texts, enormous progress has been made as regards the development of applications for professional translators and machine translation system users. Translation memories and statistical machine translation have changed the way translated texts are created and consumed. At the same time, corpus-based work has entered the curricula at translation training institutions, and theoretical and descriptive research has investigated topics such as translation universals, translation ideology, translator style, and interpreted language. Whereas the success of machine (assisted) translation systems relies on automation and data quantity, descriptive and pedagogic applications depend on manual analysis and data quality. Corpus-based research in descriptive translation studies critically depends on the availability of suitable tools and resources. Yet, there is still a lack of user-friendly tools allowing researchers in the soft sciences to create and analyze corpora, especially but not exclusively parallel ones, according to the standards of the discipline. As the necessary steps to prepare corpus resources may be technically complex or daunting in terms of manual labour required, those who have the technical expertise (programmers, computational linguists etc.) are very often not willing to spend time on the manual tasks, while those who are prepared to get their hands dirty with the texts (linguists, translation scholars and students) are often not capable of stitching together the various tools available f! or corpus analysis. Thus, many corpus-based descriptive translation investigations suffer from a piecemeal, fragmentary and tentative approach; the variety of data sets, methods and tools used do not combine into a single overall framework and the results are often hardly commensurable. To unfold the full potential of corpus linguistics methodologies, new high-quality, easy to use linguistic resources are needed by corpus-based translation studies scholars. This panel aims to provide a framework for discussing corpus data, tools and approaches which may allow translation scholars to collaborate among them and with the NLP community, in order to improve the quality of resources and make them available and accessible, with the ultimate goal of bridging the gap between the hard and soft sides of this multi-faceted field. This panel welcomes contributions related, but not limited to the following topics: - NLP-oriented perspectives and methods for T&I research - Corpus-based methodologies and T&I studies - Annotation models for descriptive translation studies - Translation and corpus design - Qualitative and quantitative approaches to corpus analysis in T&I studies - Corpus-based translation studies and minority languages - Accessibility issues: copyright and data distribution - Corpus compilation tools for T&I studies - Metadata for descriptive translation research - Methods and techniques for data collection - Corpus-based analysis of translation shifts - Parallel corpora in T&I studies - Alignment of parallel corpora - Usability of software for corpus building and analysis - Spoken corpora and alignment of transcriptions and audio/video recordings
<urn:uuid:92b75ad7-23d6-4e3b-94ea-721651a39346>
CC-MAIN-2017-04
http://www.fb06.uni-mainz.de/est/48.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00013-ip-10-171-10-70.ec2.internal.warc.gz
en
0.90631
681
1.992188
2
Does it take you an excessive amount of time to fall asleep? Do you have trouble turning your brain off and just relaxing when it’s time to wind down? Do you find yourself even waking up in the middle of the night due to anxiety, stress or worries? Then guided sleep meditations may be right for you. According to VeryWellMind, guided sleep meditations are a “method for helping you to let go of worrying thoughts and relax your body before bed. Like other forms of meditation, this practice involves moving your focus away from your thoughts to sensations in your body.” With regular practice and use, guided sleep meditations have been proven to reduce one’s trouble with falling and staying asleep. Achieving a rejuvenating sleep experience is extremely important for lowering stress, and can even improve one’s immune system. According to the American Sleep Association, thirty percent of adults have suffered from short-term problems with insomnia, ten percent have chronic difficulties with falling or staying asleep, and a third of adults report getting less than seven hours of sleep per night. These numbers are extremely troubling because adults need at least seven to nine hours of sleep to fully function at their best. Guided sleep meditations target one’s thinking process at night. Its goal is to “reduce the impact of worrying thoughts and tensions in your body on your sleep.” To achieve this, you will start by listening to an audio recording that will direct you through each step. The guided sleep meditation that you choose will employ the use of a “body scan.” This is the process of “directing your attention away from the thoughts to noticing the sensations in your body without trying to change them.” As the meditation commences, the guide will direct you through various parts of your body, challenging you to notice the “heaviness, tension, tingling, temperature, and tightness” of each body part. It will then direct you to relax and release that tension by “breathing into that part.” The meditation will also target your thoughts, instructing you to let them wander away from you as if they were clouds or leaves floating by. It may also employ the use of breathing exercises, visualization, and even the practice of giving gratitude. Ultimately, you will feel your body soften as you begin to breathe more deeply. Guided sleep meditations are able to be a huge relief to sleeping issues and ailments because they activate the parasympathetic nervous system which helps one to lower their heart rate and slow down their breathing rate. It’s so effective that you may even notice that you’re falling asleep during the exercise – and what’s even better is that you’re sure to see improvements during your day; regular users of guided sleep meditations reported feeling less fatigued and depressed. One thing’s for sure, guided sleep meditations are definitely worth the try.
<urn:uuid:fe757807-af7f-46eb-abc9-24650561cb0a>
CC-MAIN-2022-33
https://21ninety.com/having-trouble-falling-asleep-find-out-if-a-guided-sleep-meditation-is-the-perfect-solution-for-you
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00672.warc.gz
en
0.954361
611
1.945313
2
tl;dr: The ODROID-C2 is a very solid competitor to the Raspberry Pi model 3 B, and is anywhere from 2-10x faster than the Pi 3, depending on the operation. The software and community support is nowhere near what you get with the Raspberry Pi, but it's the best I've seen of all the Raspberry Pi clones I've tried. The original Raspberry Pi was the first mass-market 'single board' computer that kicked off a small computing revolution in terms of hardware interaction via GPIO, experimental monitoring, automation, and robotics projects, etc. Through the past few years, it has evolved from being a very slow and limited computing platform to being as fast as some lower-specced smartphones, and can now run a desktop Linux environment bearably well. The Raspberry Pi 2 and Pi 3 (just announced on Feb 29—see my review of the Pi 3 here) were the first models with quad core processors, and they're both decent generic Linux computers, especially for the low $35 price tag! Once the Pi became a popular product, similar single board computers were introduced with different features and functionality, in a similar price range. I recently reviewed one of the main competitors, the Orange Pi Plus, which for $39 offers faster networking, onboard fast eMMC storage, and a bevy of other features—but which also requires a lot more effort to get up and running, and has nowhere near the community and documentation surrounding the Raspberry Pi. Another primary competitor in the space is the ODROID, from Hardkernel. The original ODROID-C1 was already a decent platform, with a few more features and more RAM than the comparable Pi at the time. The ODROID-C2 was just announced in February, and for $39 (only $5 over the Pi 3 price tag) offers a few great features over the Pi 3 like: - 2GHz quad core Cortex A53 processor (Pi 3 is clocked at 1.2 GHz) - Mali-450 GPU (Pi 3 has a VideoCore IV 3D GPU) - 2 GB RAM (Pi 3 has 1 GB) - Gigabit Ethernet (Pi 3 has 10/100) - 4K video support (Pi 3 supports HD... drivers/support are usually better for Pi though) - eMMC slot (Pi 3 doesn't offer this option) - UHS-1 clocked microSD card slot (Pi 3 requires overclock to get this speed) - Official images for Ubuntu 16.04 MATE and Android (Pi 3 uses Raspbian, a Debian fork) The Pi 3 added built-in Bluetooth and WiFi, which, depending on your use case, might make the price of the Pi 3 even more appealing solely based on a feature comparison. But features and specs are really just the tip of the iceberg. As I found when reviewing the Orange Pi, there are many factors you have to consider when evaluating what single board computer makes the most sense for your projects or usage; especially if you're not a hardcore Linux kernel hacker, you might want to consider factors like the user community, forums, and software support you get from the companies/foundations behind the boards. Acquiring an ODROID-C2 Unlike the Pi 3 (and pretty much every Pi since the B+), there's no huge run on ODROID-C2s, so I went to the official USA distributor's site (AmeriDroid) and bought an ODROID-C2 for $41.95 plus $7 shipping (I also added in an official clear case and the recommended power adapter, for convenience—though you can power the ODROID-C2 through the USB OTG port just like the Pi). Note that there was a recent post in the ODROID forums stating that the first batch of ODROID-C2s had already been sold out as of March 16, but many distributors still have them in stock. Getting a Pi 3 can be an exercise in frustration; almost a month in, it's only in stock in some stores, and people are still price gouging by selling at higher prices with cheaply-assembled Pi starter kits and on eBay. I was lucky to find them in stock at my local Micro Center for list price; the situation should improve over time... but considering the Pi Zero is still perpetually out of stock everywhere, the Pi Foundation definitely needs to beef up its manufacturing and distribution partnerships to meet demand! A view of the ODROID-C2 and Pi 3 from the top. A view of the ODROID-C2 and Pi 3 from the side. One of the first major differences between the Pi 2/3 and the C2 is the massive heat sink that's included with the ODROID-C2. Based on my observations with CPU temperatures on the Pi 3, the heat sink is a necessity to keep the processor cool at its fairly high 2 GHz clock. The board itself feels solid, and it feels like it was designed, assembled, and soldered slightly better than the larger Orange Pi Plus, on par with the Pi 3. One extremely thoughtful feature is the ODROID-C2 board layout mimics the Pi B+/2/3 almost exactly; the largest components (e.g. LAN, USB, HDMI, OTG, GPIO, and even the screw holes for mounting!) are identically placed—meaning I can swap in an ODROID-C2 in most situations where I already have the proper mounts/cases for a Pi. Setup and first boot The process for setting up an ODROID-C2 is pretty much the same as the Raspberry Pi; you download the official OS image from the appropriate wiki page (in this case, I downloaded Ubuntu 16.04 1.1), expand the image file (since it's a large .xz file, I used The Unarchiver for Mac to expand it), then flash it to a microSD card. On my Mac, I inserted a Samsung EVO 16GB card, ran diskutil unmountDisk /dev/disk2, then ran sudo dd if=image-expanded.img of=/dev/rdisk2 bs=1m to copy the image to the microSD card. The official Ubuntu image is over 5 GB, so it takes a little time. (For the Pi, there's an official CLI-only 'Raspbian Lite', which clocks in around 1 GB, so it's little faster to copy.) The microSD card slot is in a peculiar location, just clearing the GPIO pins on the underside. Insert the microSD card into the slot on the underside of the ODROID-C2 (it's in a bit of a strange location, with the card sticking out over the soldered GPIO pin connections), then plug in your keyboard, mouse, and HDMI monitor, and then plug in power to boot it up. It boots to a pleasing Ubuntu desktop login page (default admin username is odroid with the password odroid), and after first boot, everything is configured and ready to go. One nice thing about the setup experience is you don't have to manually run sudo raspi-config and expand the filesystem manually (or do the same via a GUI config panel)—on first boot, the OS expands the filesystem to cover your whole microSD card automatically. The official Ubuntu MATE environment is nice, but for better efficiency, I used the ODROBIAN Debian Jessie ARM64 image for ODROID-C2 instead. The download is only 89 MB compressed, and the expanded image is ~500 MB, making for an almost-instantaneous ddoperation. There are some other images available via the community as well, but ODROIBIAN seems to be the most reliable—plus it already has excellent documentation! Using the C2 Since it defaults to Ubuntu MATE, the desktop environment is pleasant (more so than Raspbian's default GUI), and it even comes with both Chromium and FireFox installed, so you can choose from one of the two most popular and well-supported browsers. However, after I ran sudo apt-get update && sudo apt-get upgrade (which took quite a while the first time) to make sure all packages were up to date), neither Chromium nor FireFox would launch; they would launch and then quit after a few seconds. So I re-imaged the card (which took a couple hours) and tried again. Chromium took about 4 minutes to launch the first time (it seemed like nothing was happening, but one CPU core was spiked at 100% the whole time), and FireFox took about 8 seconds the first time. After that, both took 4-5 seconds to launch, and nothing seemed slow or inconsistent when using them. Most apps that come preinstalled with MATE worked flawlessly, though every once in a while FireFox or Chromium would crash and need to be restarted (Chromium much more so than FireFox—see this forum topic). Hopefully this is just a growing pain with a relatively new ODROID revision and a new OS distribution, but it's a little disconcerting, especially after hearing grief on some forums about Hardkernel being stuck on the Linux 3.x kernel for a while. It's hard to match the level of software/OS support the Raspberry Pi foundation and community provides, but of all the single board computers, the ODROID-C2 and the Hardkernel community seem to have the most solid footing; reading through forum posts like Ubuntu 16.04 LTS for ODROID-C2 makes me confident that the Hardkernel devs and community are working to smooth out the rough patches, and in just the past month, the progress has been excellent! Benchmarking the C2 vs Pi 3 vs Orange Pi Plus For the Pi Dramble, I have a few pain points with the current generation of Raspberry Pis; I could always use more raw CPU speed (that's the main bottleneck for authenticated web requests), but one of the even more important considerations is network bandwidth—the Pi 3's limited bus only allows up to ~95 Mbps over wired lan, or up to ~321 Mbps if using a USB 3.0 adapter. The ODROID-C2's faster CPU clock, default UHS-1-clocked microSD reader, and built-in Gigabit Ethernet port paint a great portrait on paper—but the proof is in the pudding. As with all my other reviews, I've run the ODROID-C2 through my benchmarking gauntlet to compare it to the Pi 3 and Orange Pi Plus. Others have already beaten the CPU benchmarks to death; architecturally, the quad-core Cortex A53 64-bit processor is very close to the Pi 3's processor; however, the .8 Ghz faster clock rate and larger memory allocation does provide a marked increase in performance over the Pi 2/3 for many tests, including some real-world Drupal web application tests later in this post. A fast and reliable network link is important if you either need lots of throughput for things like serving lots of web traffic or passing around files on a network (e.g. using the ODROID-C2 as a NAS). I have comprehensive networking benchmarks posted on the Pi Dramble site for the Pi 2 and Pi 3, but let's see how the ODROID-C2 compares: The raw stats: - 100 MB file download (via 100 Mbps Internet, onboard Gigabit Ethernet): 10.7 MB/s (10.6 MB/s on Pi 3) - 100 MB LAN file copy from ODROID-C2 to Mac (onboard Gigabit Ethernet): 32.7 MB/s (13.98 MB/s on Pi 3) - 100 MB LAN file copy from Mac to ODROID-C2 (onboard Gigabit Ethernet): 39.5 MB/s (9.98 MB/s on Pi 3) iperfraw throughput (onboard Gigabit Ethernet): 938 Mbps (321 Mbps on Pi 3) iperf gave absolutely an absolutely rock solid 938 Mbps, which is awesome—the Orange Pi was a little shaky in its results, varying in test runs from 300-750 Mbps, but never getting near a full 1 Gbps throughput. The Raspberry Pi 3 can get 95 Mbps on the built in 10/100 Ethernet port, or up to 321 Mbps on a Gigabit USB 3.0 adapter. The ODROID-C2 delivers on the networking throughput in spades; pair it up with a nice SSD in a USB enclosure and a fast eMMC card, and this could be an excellent option for NAS or any kind of streaming! For some projects (and in general, in my opinion), the amount of power that's drawn is an important consideration. Typically, the less current draw the better, especially if you don't have as good a quality power supply, or might need to run the board off a battery for certain applications (e.g. mobile robotics, mobile sensors, mesh networks). I have a good overview of power consumption for the various Raspberry Pis, and here are a few stats for the ODROID-C2: The raw stats: - Idle, no keyboard: 350 mA (260 mA on Pi 3) - ApacheBench webserver stress test: 800 mA (480 mA on Pi 3) - 400% CPU load: 650 mA (730 mA on Pi 3) The most surprising thing to me is how the ab stress test (basically hitting Drupal hard for a long time, pegging the CPU cores, the memory, and the microSD card at the same time with uncached requests) used a lot more power on the ODROID-C2 vs the Pi 3. The Pi 3 must have a little better power optimization overall, while the ODROID-C2 has a little better power optimization for the CPU itself. Storage / microSD card Unfortunately, I am not able to test the eMMC performance at this time as I don't have the required module, but I did run a set of benchmarks against the built-in microSD card reader (using a Samsung EVO 16 GB card), comparing the results to a Raspberry Pi 3 running Raspbian (with the microSD card reader overclocked): The raw stats: hdparmbuffered: 35.29 MB/s (40.88 MB/s on RPi) ddwrite: 30.2 MB/s (39.1 MB/s on RPi) iozone4K random read: 9.64 MB/s (11.77 MB/s on RPi) iozone4K random write: 2.04 MB/s (2.36 MB/s on RPi) I posted more comprehensive benchmarks for microSD cards on the Raspberry Pi, but what I think may be even more interesting is running the OS off the eMMC; it promises to be 5-10x faster than even the fastest microSD cards I've tested, and it's not too expensive an addition to the ODROID-C2 (the 8GB eMMC module with Ubuntu is currently $21). Without microSD card overclocking turned on for the Pi, the numbers for the Pi are all basically halved—be wary of any benchmarks that claim the Pi 2/3 are 2x slower than the ODROID-C2 or other boards... the only real difference in that case is the Pi defaults to a more stable slower clock for the microSD reader, but if you have good microSD cards (UHS-1 or better), there's not much risk to overclocking the reader. For my purposes, one of the most comprehensive benchmarks is one that tests the full LEMP stack, pegging all four CPU cores, hitting disk I/O heavily, and consuming most of the onboard RAM. I used the Drupal Pi project to quickly install the LEMP stack on the ODROID-C2, with Nginx 1.6.x, PHP 7.0.x, and MySQL 5.6.x. It installs a copy of Drupal 8.0.5, which can be a pretty heavyweight application if you bypass all of Drupal's caching. Here are the results: The raw stats: - Anonymous (cached) requests (Drupal 8.0.5, PHP 7): 183.93 req/s (128.03 req/s on Pi) - Authenticated (uncached) requests (Drupal 8.0.5, PHP 7): 16.18 req/s (12.02 req/s on Pi) - Cached requests (Nginx as reverse proxy): 9,860 req/s (2,220 req/s on Pi) The ODROID-C2 is almost 40% faster than the Pi 3 across the board... meaning I'm a little bit tempted to switch a couple of the Pis in my existing Pi Dramble out with ODROID-C2s, just for the nice speed boost! Here are the full Drupal benchmarks on a Pi 2 and Pi 3 for comparison. Note that, when measuring fully cached results—where the network bandwidth is the limiting factor—the ODROID-C2 blows the Pi out of the water, even if the Pi uses a Gigabit USB 3.0 adapter, due to the incredible speed advantage the onboard 1 Gbps Ethernet provides. Summary and recommendations A few years into the small single-board ARM computer revolution, the playing field is starting to level out; the Raspberry Pi is perpetually the leader in terms of breadth of community and mindshare, while various clone manufacturers try to differentiate based on slightly differing feature sets and spec bumps. Some clones' documentation and community are painfully inadequate, leading to a bad initial experience and frustration with any small issues. The ODROID-C2 is a very solid competitor to the Raspberry Pi model 3 B, and is anywhere from 2-10x faster than the Pi 3, depending on the operation. It's network performance, CPU performance, and 2 GB of RAM are extremely strong selling points if you thirst for better throughput and smoother UIs when using it for desktop computing. The Mali GPU cores are fast enough to do almost anything you can do on the Raspberry Pi, and the (smaller, but dedicated) community surrounding the ODROID-C2 is quick to help if you run into issues. The ability to easily install Android or Ubuntu MATE (or one of the community distros, like ODROBIAN) is a benefit, and instructions are readily available (more so than other clones). One of the best advantages of the C2? You can likely grab one within a few days, shipped via one of Hardkernel's distributors. Good luck getting a Pi 3 at list price in the next few weeks! The fact that I'm considering adding an ODROID-C2 to my Raspberry Pi Dramble cluster should indicate how highly I regard it as an alternative to the Raspberry Pi 3 for use as a headless server. For single-board beginners, and for general stability and ongoing support, you'll have more success and happiness starting with a Pi 2 or Pi 3. But for those used to the ecosystem and the limitations of ARM-based Linux, the ODROID-C2 is a very nice product! You can buy the ODROID-C2 from ameriDroid for $41.95.
<urn:uuid:e3f969b1-f8f4-4a22-a44c-f334f45dce3a>
CC-MAIN-2017-04
https://www.jeffgeerling.com/blog/2016/review-odroid-c2-compared-raspberry-pi-3-and-orange-pi-plus
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00395-ip-10-171-10-70.ec2.internal.warc.gz
en
0.923313
4,109
1.953125
2
A Transformative Care Model The hospital at home model makes acute hospital-level care available to adults and particularly older adults where they live, rather than in a traditional hospital setting. This alternative is needed because hospitals are not always the right environment for many patients. A substantial body of literature points to the hazards of hospitalization, notably for people 65+, including delirium, pneumonia, falls, polypharmacy, pressure sores, and infections. Persons 80 years and older and those with cognitive impairment are at particular risk for death during hospitalization. The COVID-19 pandemic raises additional challenges and dangers for these older patients as well. While programs have been stood up in health systems in England, Canada, Israel, Australia and other countries, researchers at the Johns Hopkins Schools of Medicine and Public Health initially developed hospital at home in North America in the mid-1990s. During the last 25 years, hospital at home models have been broadly studied and tested. A wide range of research, including a 2012 meta-analysis of hospital at home programs, has demonstrated significant improvements in patients’ health, as well as lower costs. Additionally, in several surveys, patients and family members have rated the quality of hospital at home care as better than care provided in hospital. While the model of care may vary, hospital at home programs provide patients with daily nursing visits and oversight by doctors and/or nurse practitioners. Providers are on call 24 hours a day/7 days a week. A typical hospital at home program includes a combination of in-person visits, video visits, and telehealth monitoring. Treatments such as oxygen therapy, intravenous fluids, and antibiotics can be administered through the program. Hospital at home programs may be configured in different ways in different systems and communities to creatively care for people in their homes. They may have different names, for example, Hospital in the Home or Home Hospital. Some programs are run out of the emergency department, offering patients with a defined set of diagnoses the option of being “admitted” into their homes, rather than the hospital. Other programs may use community paramedics, House Call programs, or clinics to refer patients. The diversity of hospital at home programs highlights the commitment to innovation that is often necessary to implement these approaches. These variations also point to Hospital at Home Users Group™ members’ willingness to find solutions that are unique to their health systems, hospitals, and communities. Examples from successful Hospital at Home program implementations. The Science of Hospital at Home: Hospital at Home models have been subject to a wide range of rigorous research and testing.
<urn:uuid:f9f7644b-c072-43d5-8c1d-d7be31aba033>
CC-MAIN-2022-33
https://www.hahusersgroup.org/about-hah/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00474.warc.gz
en
0.961436
533
2.59375
3
sginap - timed sleep and processor yield function long sginap (long ticks); The sginap system call provides two functions. With an argument of 0, it yields the processor to any higher or equal priority threads immediately, thus potentially allowing another thread to run. Note that because normally the user has no direct control over the exact priority of a given thread, this does not guarantee that another thread will run. With an argument which is non-zero, sginap will suspend the thread for between ticks-1 and ticks clock ticks. That is, it will suspend for at least ticks-1 clock ticks, but less than ticks clock ticks. The length of a clock tick is defined by CLK_TCK in the include file <limits.h>. This is the same for all SGI systems. Note that if the calling thread is interrupted by a signal before the specified number of ticks has elapsed, sginap will return prematurely. sleep(3), alarm(2), pause(2), schedctl(2), setitimer(2). If the calling thread remains suspended for the requested number of ticks, sginap returns 0. If, however, the thread is interrupted prematurely by a signal, it returns the number of unexpired ticks in the PPPPaaaaggggeeee 1111 [ Back ]
<urn:uuid:ae307ccb-00ab-48e3-a93f-c2ed82f1bbd5>
CC-MAIN-2022-33
https://nixdoc.net/man-pages/IRIX/man2/sginap.2.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00666.warc.gz
en
0.847009
326
2.171875
2
The chaos of COVID-19 being around has forced many people to make hard decisions. Similarly, while it is spreading and the government recommends you to stay safe, you will think about your kids before anything. It is natural as the expected reaction by the parents. However, there is a simple way to express your love for the kids, and it is to follow the proper SOPs. Our children may be careless about their health concerns, but together we can implement all the precautions to keep them safe from COVID-19. How can you play your role in keeping safety measures? Yes, the adults can help themselves to read the following precautions carefully and implement them and make sure everyone is doing the same. - Phase up the reopening of the schools as per the age group to maintain and prevent children from any kind of large crowds and gatherings. - Minimize the interaction by stopping taking classes of 4-hour shifts twice in a day. It would be best if you cover students through the shifts than gathering them all in the same class. - Assign the same teacher for a fixed group of children to avoid the mixing of different age groups. - Make your school or university buildings less crowded. Keep the class density of students as low as possible. - Install a proper screening process in the school or university to check the temperature of all the kids or children entering the premises. It is a basic measurement to just avoid any kind of unfortunate situation regarding COVID-19 in the future. - Broadcast regular notices and announcements for spreading awareness about the Coronavirus. You can post signs, announce, or set up a message on email to let children know and understand the level of risks. - Maintain regular cleaning and disinfection protocols daily. Clean the surfaces by disinfecting them using all the right equipment and techniques. - Also, make your ventilation system work perfectly. Even if there are any damages, you must not compromise on it now. Get it fixed as soon as possible. - Install physical barriers wherever needed. These are usually to keep people 6 feet from each other, for example, at reception or helpdesk. - Offer health compensation for the highly sick staff and limit their presence on the premises of a school or any educational institute. - You can offer healthy options for the students, too, especially to the ones going through any type of illness or sickness. - Cultivate the culture of virtual events and conferences, etc. - There should be a focal person as a medical expert in an educational institute or associated with them, so parents can know who to contact if they have questions or concerns. - Notify staff and students on every level of any new or old restrictions regarding COVID-19. - Use better and improved hygienic processes to keep the cycle of cleanliness going on by the students and staff. - Install sanitizer and disinfectant spray at the entrance of the gate. This one is especially for the hostels. Moreover, you must behave as a responsible citizen. Small children are innocent and often unaware of the huge risks. However, you are an adult, and you must follow all the SOPs to ensure that you are playing your part in safety precautions for Coronavirus. Life never comes with standard procedures. The standards are produced as a society to achieve some common goals. Similarly, now we need these SOPs for ourselves and our children to be safe and fight the battle with a brave heart. So, you play your role and let the others play theirs to accept the new normal until things are settled.
<urn:uuid:206a7a8a-4cdd-40cf-b5fd-3041b62c3709>
CC-MAIN-2022-33
https://sheranwalagroup.com/covid-19-precautions-for-schools-and-educational-institutions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00270.warc.gz
en
0.951806
742
2.640625
3
Heading Back To The Office After The Pandemic? Maybe Not So Fast! A survey by Pew finds that more than half of people who shifted to work from home after the coronavirus hit would like to keep that arrangement, and many others would like the flexibility to work outside the office some of the time. Also in health news, your sleep may be affected by diet, flu shots are up this year and volunteering may have a surprise benefit. Post-Pandemic, Most Americans Who Can Want To Continue Working From Home Most Americans now teleworking from home want to keep doing so, with more than half saying they would work remotely after the pandemic, a new Pew Research Center report finds. The national survey of U.S. adults reveals that while the coronavirus may have changed the location of our jobs — whether in an office or from home — it hasn’t significantly reshaped our work duties and culture for a majority of employed adults. (Arvedlund, 12/11) The New York Times: How Foods May Affect Our Sleep This has not been a very good year for sleep. With the coronavirus pandemic, school and work disruptions and a contentious election season contributing to countless sleepless nights, sleep experts have encouraged people to adopt a variety of measures to overcome their stress-related insomnia. Among their recommendations: engage in regular exercise, establish a nightly bedtime routine and cut back on screen time and social media. But many people may be overlooking another important factor in poor sleep: diet. A growing body of research suggests that the foods you eat can affect how well you sleep, and your sleep patterns can affect your dietary choices. (O'Connor, 12/10) Ellen DeGeneres Announces She Has Covid-19 Ellen DeGeneres announced on Thursday that she has tested positive for Covid-19. The popular talk show host tweeted the news from her verified Twitter account. "Hi Everyone," DeGeneres wrote. "I want to let you all know that I tested positive for Covid-19. Fortunately, I'm feeling fine right now. Anyone who has been in close contact with me has been notified, and I am following all proper CDC guidelines. I'll see you all again after the holidays. Please stay healthy and safe." (Respers France, 12/10) And in news on the flu -- CDC Reports Record Flu Vaccine Distribution Approximately 188 million doses of the flu vaccine have been distributed throughout the U.S., the most ever during a single influenza season, according to data published Wednesday by the Centers for Disease Control and Prevention (CDC). The CDC noted that the country hit the record late last month, with an estimated 44.5 million adult flu vaccinations administered in pharmacies by Nov. 21, a 46 percent increase from 2019. (Castronuovo, 12/10) Doctors Facing Burnout Could See Job Repercussions For Seeking Antidepressants As a freshly minted psychiatrist, the last step on my path to practicing medicine was to complete an application for medical licensing in my home state. Every physician, after completing residency training, is required by law to apply and obtain a license in the state he or she intends to practice. On the application, I came across the ominous question: Have you currently or in the past been diagnosed with a mental illness that might affect your ability to perform your job? (Safai, 12/10) I Found My Secret To Feeling Younger And Stronger. The Pandemic Stole It Away. Back in early January, before COVID-19 was as familiar as the furniture, I went in for my annual physical. My doctor looked at my test results and shook his head. Virtually everything was perfect. My cholesterol was down. So was my weight. My blood pressure was that of a swimmer. A barrage of blood tests turned up zero red flags. “What are you doing differently?” he asked, almost dumbfounded. (Horovitz, 12/11)
<urn:uuid:0afce993-9f88-4f63-b1b5-c4f1364d65c5>
CC-MAIN-2022-33
https://khn.org/morning-breakout/heading-back-to-the-office-after-the-pandemic-maybe-not-so-fast/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz
en
0.961424
854
1.875
2
Hunding's Saga - 35: King Eadmund 'Ironside' Betrayed, Wrong-Footed by Fight-Shy Eadric Streona's Folly Knut Sveinsson's ambition called for cunning and leadership. Danes would not follow a fool Knut first wanted the ealdorman on his side. The Merician ealdorman had second thoughts. The ealdorman was Aethelred's man, and although he was cut off from joining his king he held back from giving Knut Sveinnson his oath. Knut shrugged and turned to Eirik, 'This is one horse that will not drink; we must win over his followers and harness them to our war-waggon. They can do little otherwise, with the north cut off from this king's home shires. Eirik, how many men do we have?' 'More of the Danelaw lords have flocked to your standards, my Lord King, although many of them still hold with Eadmund 'Ironside'. We need to show them that we do not hold it against them that they have kept their oaths to the West Seaxan aetheling, as they call him. Give him time, and he will tire of 'Streona' and his hedging. We can push him southward with our ships cutting into the rivers along the east and west coasts. There are Dyflin Danes in the west who are willing to give you their support, Lord'. 'Good - although I am not yet your king. Yet, give me time... Everything in its own sweet time, Eirik. Thorkell, what are your thoughts?' Knut turned on his heels to hear how his friend saw things. Once the scourge of the Danish isles, Thorkell 'Havi' had bethought himself. Jomsborg no longer had the might it once had. Many had taken the pay of the eastern lords, some fighting alongside the Wends against the Seaxans on the mainland. Time would tell if he had jumped the right way, in bringing what was left of his men to Knut. Here was a kingdom to be shared out, a young king who would tire of war-making... although his men were doughty warriors. who did not know when to yield. He would soon ensure they yielded to Knut, however. He cleared his throat, 'My Lord', Thorkell weighed his words. He knew better than to bring down Knut's wrath on his head, but he needed to put to this would-be king that without a strong arm his kingdom would never come about. 'My Lord, I think you are too soft on them'. 'Too soft?' Knut chewed his lower lip, taken aback. He thought that if he pushed the Danelaw nobles too hard they might go over to Eadmund. Aethelred was old, they would desert his army wholesale. He fixed Thorkell with a stare, saying nothing at first, then, 'Soft, you say? Do you want them to go over to Eadmund and Aethelred?' 'They are unlikely to go over to Aethelred in droves, Lord. Eadmund's numbers are growing. Leave it too long and even our Danes could go over to him!' 'You feel strongly that way, Thorkell?' Knut joked, 'What has stopped you from joining him?' Thorkell cast Knut a hurt look; Eirik was puzzled, but brightened when Knut slapped Thorkell on the back and laughed, 'Thorkell, my friend! Your loyalty has never been short. The aetheling Eadmund would be hard-pressed to find a leader for his men as good as you are - and you are mine!' Thorkell fixed Knut with an odd look. It was time to turn the tables, 'You are sure?' It was Knut's turn this time to be taken aback, 'If you wish to join -' he began, looking awkwardly at Thorkell. Time seemed to drag. Thorkell cut him short before he could say any more, 'Two can play that game', Thorkell laughed hoarsely, Knut and Eirik laughed with him, 'My Lord I am yours to command, you know'. Loud laughter drowned any other sound in the camp, and Hunding knew he was with a winning king. Tofig and Herjolf smacked the insides of their shields with their axes, along with each other man within the camp. 'First we must find either Eadmund or Aethelred', Knut cupped a hand under Eirik's right elbow. 'Aye, though which way to go before they show under our noses?' Eirik's words brought nodding from other nobles. 'We should have word soon, trust me my good friend. I have sent riders every way. Aethelred will not want to take us on from the front, that much he has learned from the past. Eadmund will not want to tackle us head on, either', the young lord mused. They have too much to lose'. 'As do we', Eirik put in. 'We will not lose', Knut smiled and ruffled Eirik's coarse hair, 'no we will not lose, mark my words. 'I hope we can say that by the end of the year', Eirik mumbled. 'What have you eaten for your morning meal, my old friend - too many oats, perhaps? You need to take more meat!' 'Aye, Lord. I shall eat a horse before the day is out. Perhaps I should start with yours?' Eirik chuckled. Were he Sleipnir, I should have more meat!' 'Maybe he is Sleipnir, Eirik. I shall reach Eadmund before the rest of you, and show these Aenglishmen how to fight!' More laughter. A rider came, dismounted and led his horse towards Knut, 'My Lord, there is a great army to the south, near Snotingaham!' 'How many, would you say?' Eirik asked. 'There could be hundreds that I saw. Thegns to the north of the burh say there are others further west, in Deoraby', the rider answered Eirik on a nod from Knut. 'Eadmund, do you think, Lord?' Thorkell wondered aloud, and asked the rider, 'Did anyone tell you who they were? Did you wait long enough to learn more about the leaders of this army? Do we send other riders to do what you ought to have done?' 'They seemed to think it was Ealdorman Eadric, from the west', the rider sniffed. 'Go, find something to eat', Knut told the rider. He turned back to Eirik and Thorkell, 'Does Eadric think he can take us on, or is he coming to join with us?' 'Your guess is as good as mine. But we must make for the road to Snotingaham. Every man to be ready before the next tide', Knut gave Eirik warning and turned to Hunding. 'You know the river to the south, Hunding?' 'Aye, my Lord. We can sail as far as Newerce, where the Defna meets the Treonta. It would not be wise to sail beyond there, as we could be cut off. A rider sent west from Newerce could tell whether there was a threat, and Snotingham is a half-day's march' Knut shook his head, Eirik agreed with his lord and Thorkell stood, arms folded staríng at Hunding, 'That does not sound so wise to me, Hunding. We can leave men and ships at Newerce to guard the river Defna. We have enough of both, so we should use them', Thorkell half-laughed. 'We will ask you about the rivers, but you should keep your own counsel when it comes to warfare -' 'He might be right', Knut waved Thorkell silent. 'Why do you say it would be best to march from Newerce, Hunding?' 'They would not know about your coming, Lord. They would think you are coming from Gagnesburh anyway, further to the north. You would take them off guard coming from the east. They would think you to ride overland as t they might. If some men were sent overland from Gagnesburh, whoever it is at Snotingham would go out to meet them'. 'Thorkell - when you tell this fellow he should keep to sailing, remember he has fought with Basil 'the Bulgar-slayer'; he will have learned something from the great leader. I should send all my men to fight under him!' Thorkell winced, but said no more. Eirik looked sideways at Hunding and raised his bushy eyebrows, 'With you we could take the kingdom, my good fellow. That night with Gunnlaug -' Eirik stopped himself. 'Eirik? What was that?' Knut's brow beetled. 'You have not been pushing our young friend at my wanton sister, have you? You know she is betrothed to Jarl Ulf!' Knut shook his head and stared briefly at Hunding, askance, 'Did anything happen?' 'I was drunk, my Lord', Hunding answered the unspoken question, to which Knut merely shook his head at Eirik and strode away, talking earnestly with Thorkell. 'I should watch my mouth', Eirik mumbled sidelong at Hunding. 'You should', Knut turned fully and stared him down. 'Hunding is more able at keeping his own counsel - another thing he learned from serving in the east, most likely. Come, Eirik, we must make ready for the next few days' fighting'. Half Knut's fleet rowed upriver from Gagnesburh. Riders went ahead on both banks, to watch out for the Danelaw thegns loyal to Eadmund. Half as many again rode south overland, first to Roedeford and then south along the Great North Road from Markham. There was indeed a great number of men camped outside Snotingham, at the West Brycg ford, but they were led by Danelaw thegns who had been left behind for lack of mounts when Eadmund summoned men to join him in Lunden. Their men cornered at the riverbank by the Danish horsemen, the thegns yielded to Knut. 'Ealdorman Eadric is on his way here from Deoraby', one of the thegns told Eirik, who spoke for Knut. Eirik and Thorkell did not want these thegns to know who their leader was, and dug more. The thegn, who gave his name as Harding told that Eadric was on his way south to join Eadmund, who had gallen out with his father. 'Why are you telling me this?' Eirik quizzed Harding. 'We do not trust Eadric. The Miercans are a shifty lot', Harding spat on the earth. 'We were told that Eadric would have horses for us, but he sent a rider to tell us that all his horses are needed! So we have to wait here like a gathering of fools'. 'If we leave you here, what then? Will you strike at our backs and tell your king you cut down a Danish army?' Thorkell's sword was half-drawn as he asked. 'Why should we help Eadric', Harding scowled. 'If he cannot see fit to give us his precious horses? No we will go back to our stock and our fields. We are land-men, not warriors. Our oath is to the king, but he cannot be bothered to help us. We might as well give our oath to the Dane, Knut Sveinsson. Do you think he would give us horses?' 'You may as well go back to your tasks, Thegn Harding', Thorkell looked along the lines of men. They did not look like warriors, and Knut would only be hampered by them on his way south to meet Eadmund in battle. He wanted a hard-hitting fist. Even this thegn looked as if he was beyond his fighting years. Thegn Harding turned to his men and waved them away. The fyrd would not be needed after all, 'Ealdorman Eadric will not be as fast as he likes, either. The rivers to the south-west have burst their banks, and the Treonta is high under the bridges to the south-west of here. Not very good for riding, I fear...' A faint, perhaps rueful smile came over him. He did not wish the ealdorman ill will as such. He did not know him that well yet. He was thinking and Hunding tried to read his thoughts, to weigh where next they were likely to aim for. 'You might well wonder where to next', Knut read Hunding well. 'How to cut the heart from this Ealdorman Eadric's resolve? He is not a fighting man, we have seen that. We only have to put ourselves between him and his king, my friend. This river reaches into his lands, is that true Hunding?' Hunding only nodded. He had thoughts of his own now and, looking across flooded meadows near Snotingaham, he scratched his beard and beamed. 'What is that broad smile for, Hunding?' Knut's brow furrowed deeply. 'Keep ships here and sail around the coast into the Themese, Lord', Hunding answered. 'I think we will find 'Ironside' east of Lunden'. Next - 36: Eadmund Ironside Fights On Nobody's fool, when he took the reins of the Kingdom of England one of his earliest acts was to see off the two-faced ealdorman* Eadric 'Streona'. Having had dealings with the ealdorman of Mercia and none of them impressive, he had him executed. He just could not trust a fellow who had wormed his way around Aethelred and Eadmund and would have tried the same with him. As it was he had problems with some of his Danish followers who rebelled later ... read on © 2012 Alan R Lancaster
<urn:uuid:452abead-a59c-4377-b7e5-7d48a6f471cf>
CC-MAIN-2022-33
https://hubpages.com/literature/THE-SAGA-OF-HUNDING-HROTHULFSSON-35-King-Eadmund-Betrayed
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00070.warc.gz
en
0.985361
3,115
1.804688
2
GUESS WHAT! WE'RE GOING FOR TWO! Reaching our goal of $67,500 with 36 days left in the project brings us to a crossroad in our journey. Do we call it a success? Or do we continue with movement and build two orphanages, rescue twice the children, and make twice the difference. We said it from the beginning, we are declaring we can make a difference, a big difference. Lets continue to take a stand—build two orphanages and rescue 100 children. This year, Elevate is gearing up to do something bigger than we have ever done before—we are choosing to rise up and take action to help end someone's suffering in this world. Human trafficking, poverty, child slavery, hunger, millions of orphans with no one to turn to and more. The situation is breath-taking but we can make a difference. That's right, we're declaring we can make a difference in these overwhelming problems that seem so hopeless and plague our humanity. Instead of looking away or ignoring the problems completely, we are choosing to face them head on. By partnering with Angel House through the 15for50 project, we are imparting hope to 50 suffering children in Andhra Pradesh, India. Will you join us in building an orphanage from the ground up. Elevate (Student Ministry of Milestone Church) doesn't build orphanages, but the good news is Angel House does and we love their blanket approach to all aspects of the child's life. Angel House is an organization that builds and staffs orphanages in some of the most neglected regions of India, including the state of Andhra Pradesh. In these orphanages children are forever removed from the slums and given a safe and comfortable place to sleep, nourishing food and a first-rate education taught by loving people who strive to make a difference in those kids lives. We have 10 weeks to raise the funds needed for this project. Angel House will break ground on the orphanage in December and in June of 2012 a small team (including the student who raised the most money) will travel to Andhra Pradesh, India for the dedication ceremony. SHOW YOUR LOVE FOR THE MOVEMENT GET UP. DO SOMETHING For questions or more information contact us at [email protected]
<urn:uuid:48fe6fe4-5c63-4c13-9891-67c62a12add6>
CC-MAIN-2017-04
https://www.crowdrise.com/15for50elevate/fundraiser/milestonechurch/296
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00061-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943213
471
1.515625
2
Portable Executable Format Revision as of 05:35, 18 September 2012 by Joachim Metz The Portable Executable Format is used by Windows to store executable code. The format is also used to store other types of data, e.g. like Multilingual User Interface (MUI) strings and EventLog messages. - Wikipedia: Portable Executable - PE and COFF Specification, by Microsoft - Blog about pefile, by Ero Carrera
<urn:uuid:f3a5955c-35a5-469d-8fce-1edf208c3852>
CC-MAIN-2017-04
http://www.forensicswiki.org/w/index.php?title=Portable_Executable_Format&oldid=11798
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00366-ip-10-171-10-70.ec2.internal.warc.gz
en
0.858802
99
2.453125
2
I was really excited when I saw a story in the New York Times last week about MySpace and MTV teaming up to present the 2008 presidential candidates to young people in a new way. Young people participate in politics very little, sadly. The last time I checked, statistics showed that about two-thirds of eligible voters between 18 and 24 don't vote – which is disappointing because if we all voted, we could completely change the outcome of even a major election. That said, I think this new development is fantastic. MySpace and MTV are teaming up to produce "candid, unfiltered discussions" between young voters and the major presidential candidates from the Republican and Democratic parties. The actual discussions with the candidates will be held on several college campuses throughout the country, and broadcasted live on MTV and MySpace, and people can send in their own questions just like for the YouTube debates, using MySpaceIM, cell phones, and email. “We are lowering the barriers to entry, setting a high-water mark for direct engagement between presidential candidates and average Americans,” said Chris DeWolfe, a.k.a. that other guy who founded MySpace who is NOT Tom. Pretty cool, I think. Between YouTube debates and MySpace/MTV candidate forums, it seems like America is finally paying attention to young people and trying to engage our generation in the political process!
<urn:uuid:91cebb10-7198-4ffe-8ebb-ca5bd9e0fab8>
CC-MAIN-2022-33
https://www.uchic.com/politically-savvy-myspace-and-mtv-bring-politics-college-students/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00267.warc.gz
en
0.964036
286
1.914063
2
Airmen and soldiers assigned to Kandahar Air Field salute in Kandahar, Afghanistan Monday as a U.S. flag is raised to half staff in honor of the six airmen from the 41st Rescue Squadron, Moody AFB, killed in a helicopter crash Sunday evening. A U.S. Air Force Pave Hawk helicopter on a mercy mission to help two Afghan children crashed in southeastern Afghanistan, killing all six people on board.U.S. Army, Spc. Jim Wagner, HO/AP MOODY AIR FORCE BASE - The flight crew was just a couple of weeks from returning to south Georgia when their Pavehawk helicopter crashed during a nighttime mission to save two injured Afghan children. All six people on board were killed, and news of the deaths thrust this base and the city of Valdosta into mourning Monday. ''We share the grief just like it was someone who had lived in Valdosta for 50 years,'' Mayor Jimmy Rainwater said. ''They all know how dangerous it is and we know how dangerous it is. War is not pleasant for anybody.'' More than 1,000 people - a third of this base - have been sent overseas, so when word of the accident spread, nearly everyone worried that it was someone they knew. ''This hits very close to home,'' said Crystal Bennett, a teacher who has many children from the base in her class. She was upset that the national media focused on the war in Iraq has treated the helicopter crash as merely an afterthought. ''There needs to be more coverage of the folks in Afghanistan,'' she said. ''To me this is just as important.'' The helicopter crew from the 41st Rescue Squadron is trained to use HH-60G Pavehawk helicopters to save downed pilots, sometimes in enemy territory. They crashed Sunday during a flight to pick up two Afghan children who had severe head injuries and bring them back to Kandahar for treatment. The 41st is part of the 347th Operations Group, the Air Force's only pararescue group. It has been credited with saving more than 40 lives since it arrived in the region about 16 months ago, said Col. Tom Trask, its commander. ''They were doing exactly what they were trained to do,'' Trask said. ''It's one of the most dangerous places in the world to fly. There's mountains and dust.'' Trask said two helicopters took off from Kandahar and flew for about 90 minutes. The helicopters were about 1,000 feet in the air, preparing to hook up to a C-130 plane for refueling when the group ran into some bad weather, Trask said. It was unclear exactly what caused the crash, but Trask said it was not related to enemy fire. Pilot Lt. Col. John Stein, co-pilot 1st Lt. Tamara Long Archuleta, flight engineer Staff Sgt. John Teal, gunner Staff Sgt. Jason Hicks and pararescuemen Master Sgt. Michal Maltz and Senior Airman Jason Plite were killed. Their hometowns and ages were not released, but a spokesman for Archuleta's family in Belen, N.M., talked to the media.The 23-year-old, who has a 3-year-old son, was to be married in June. Her parents, Richard and Cindy Long of Belen, were notified by Air Force officials of her death Sunday night. They are ''brokenhearted of course but also very proud of their daughter and realize she was doing what she wanted to do and believed in what she was doing,'' said Jay Armstrong, a family friend and pastor at First United Methodist Church in Belen. Helicopter crews from Moody have been going to Afghanistan for 60- to 90-day shifts. The flight team had been in the region for a couple of months and was about to rotate home, while the pararescue specialists had just arrived, Trask said. Crisis counselors would be available for base personnel and a memorial service will be held Thursday. ''Any time you have a tragedy like that, it affects everyone,'' Trask said. ''We're used to coming together to take care of the airmen and the families. People rally around.'' Last March, Senior Airman Jason Cunningham, a pararescueman based at Moody, was fatally shot in Afghanistan while he treated wounded soldiers. Ghanshyam Patel, who owns a convenience store across the street from Moody's gate, said the crash was the only thing his customers were talking about Monday. ''All the papers are gone, everybody wants to read about it,'' he said. ''I feel bad, they could be my customers.'' Published in the Athens Banner-Herald on Tuesday, March 25, 2003. © 2017. All Rights Reserved. | Contact Us
<urn:uuid:321dcb82-03a9-43ba-a735-95e48f9962ef>
CC-MAIN-2017-04
http://onlineathens.com/stories/032503/war_20030325029.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00110-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980316
991
1.585938
2
Lakes in Azerbaijan and Armenia – May 24th, 200940.7N 47.0E Two lakes are visible amidst mountain ranges in Azerbaijan (right) and Armenia (left). The long lake near the center is the Mingacevir Reservoir, in Azerbaijan’s Kur-Araz Lowlands. It was created by the Mingacevir Dam, whose total capacity is 15.6 cubic kilometers of water. The length of the reservoir is 70 km, width from 3 to 18 km, deepest point about 75 meters and total area 605 km². Apart from the River Kur, the reservoir feeds two channels of the 172 km-long Upper Qarabag Channel and the 123 km-long Upper Sirvan Channel. These channels are used to irrigate 10,000 square kilometres of area in the steppes of Mil, Mugan and Sirvan. Moving to the southwest, across the Bozdag Mountain chain into Armenia, one comes to Lake Sevan, in the province of Gegharkunik. It is the largest lake in Armenia and one of the largest high-altitude lakes in the world, fed by 28 rivers and streams. Only 10% of the outgoing water is drained by the Hrazdan River, while the remaining 90% evaporates. Before human intervention dramatically changed this ecosystem, the lake was 95 metres deep, covered an area of 1,360 km² (5% of Armenia’s entire area), had a volume of 58 km³ and a perimeter of 260 km. The lake surface was at an altitude of 1,950 m above sea level.
<urn:uuid:14a20674-99e1-44fe-8a91-3b037219429e>
CC-MAIN-2017-04
http://www.eosnap.com/image-of-the-day/lakes-in-azerbaijan-and-armenia-may-24th-2009/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00015-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930657
334
2.921875
3
Tomas Rakos is an expert on public participation and community engagement who has worked on over 200 projects in such countries as US, UK, France, Tunisia, Colombia, India, Zambia, and the Czech Republic. Tom’s key expert areas include participation process design, stakeholder mapping and engagement, youth participation strategies, civic tech consulting, participatory budgeting, participatory urban planning, quantative and qualitative data gathering and analysis, project and organization management, strategic planning for communities of various sizes, and capacity building. In the past he co-founded and ran D21, social enterprise that provided SW and consulting services on public engagement processes. He led a team that for the past four years implemented digital voting solution for the NYCC Participatory Budgeting (PB) process. Besides NYC he has been practically involved in around 20 other PB processes in the Czech Republic, India, Zambia, France and Scotland. He is currently focusing on bringing participatory principles into smart city planning processes. His cooperation with the City of Prague’s Institute of Planning and Development led into creation of series of policy analysis and strategic recommendation papers on how to implement better participatory strategies in areas of urban planning and placemaking as well as systematic changes in structures of the municipality’s government bodies and departments in favor of more inclusive and participatory approach. Tom is frequent lecturer and trainer for audiences of mayors, city officials, participation practitioners, government institutions, urban planners, media and NGO workers. He is a founder of the ParticipationFactory – international consulting group which helps governments on all levels with designs of participatory processes, civic-tech implementation and capacity building. Tomas is a former Czech Radio and Czech Television reporter where he worked as a Middle East correspondent. He studied Arabic and Hebrew Studies at the Charles University in Prague. He speaks Czech, English, Hebrew and German. He is based in Prague, Czech Republic.
<urn:uuid:c49a10ed-c804-4451-9e44-ff4915e9783f>
CC-MAIN-2022-33
https://techcamp.america.gov/bios/tomas-rakos-3/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00078.warc.gz
en
0.94596
384
1.546875
2
Sri Lankan dance is a universe of different styles, costumes, and instruments, all with traditional roots and rituals Kandy is Sri Lanka’s ancient cultural capital, and one of the most popular activities here is to take in a Cultural Show. These shows are dazzling displays of the country’s rich cultural heritage, weaving in folktales and legends with epic costumes, dancing and music (mostly percussive). These are the kind of richly ornate performances that also happen at weddings, which are undertaken with a powerful solemnity. Cultural shows can also have slightly wilder elements (that definitely won’t be at a Sinhalese wedding) like fire-eating or hot coal-walking. It’s usually a first-come-first-served seating situation, so wherever you go, try and show up early. The world of Sri Lankan dance is full of different styles, influences, and rituals: there’s Sabaragamuwa dancing, masked Ruhunu dancing, cleansing Ves dancing, and Udekki dancing, to name a few. The Udekki dance is especially challenging because of the level of expertise required to play the udekki drum. The 'low country' dances or Pahatha Rata Natum are usually 'devil dances' to chase away evil and sickness, and often involves wearing masks. Much of Sri Lankan dance traditions are influenced by the indigenous Vedda culture – the Veddas are an extremely endangered, nearly extinct community on the island that predated Indian exploration. Music is usually simple and rhythmic. Traditionally, dancers were men, but thankfully we’re in a different century now where women are allowed to train. However, given that progress is slow, and that dance tradition is based on centuries-old rituals and practises, women have had to adapt male costumes for their own use. Historically, Sri Lankan dance also has caste elements, which have become less significant in the modern age; this is partly due to the fact that traditional moves have influenced other forms of dance choreography, such as ballet. Of course, one can catch cultural shows in Colombo and other places around the country, but since Kandy is the old royal capital, there’s something extra special about Kandyan cultural shows, especially its classical dance. There are regional variations in instruments and dancing, from the type of drums used and how they’re played, to different dance styles and costumes. The Kandyan school of classical Sri Lankan dance is called the Uda Rata Natum, native to the hill country, and is performed to rhythmic percussion. Within Kandyan dance are a host of different dance forms, which draw from Sri Lankan tradition and folktales, and often include animal symbolism. The most well-known Kandyan dance is probably the Kohomba Kankariya, a lengthy night-time performance said to be derived from an ancient healing ritual named after the god, Kohomba. The Kohomba Kankariya originally helped to heal King Panduwasdeva, afflicted by a curse disguised as an illness. There are several meanings to the dance, including blessing a household or community, and to repel evil. Given its overnight timing, there are often elements of comedy and pageantry mixed into the performance, to make sure the audience is still awake.
<urn:uuid:e7298fad-839a-4dd8-91d5-b8a2f950f3b5>
CC-MAIN-2022-33
https://www.inspiringvacations.com/au/sri-lanka-tours/experience-articles/snapshot-cultural-dance-shows/2505
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00070.warc.gz
en
0.956623
708
2.78125
3
Mosab Hassan Yousef Mosab Hassan Yousef was born in Ramallah, in the Palestinian West Bank, in 1978. His father, Sheikh Hassan Yousef, is a founding leader of Hamas, internationally recognized as a terrorist organization and responsible for countless suicide bombings and other deadly attacks against Israel. Yousef was an integral part of the movement, for which he was imprisoned several times by the Shin Bet, the Israeli intelligence service. He withstood torture in prison only to discover Hamas was torturing its own people in a relentless search for collaborators. He began to question who his enemies really wereIsrael? Hamas? America? While in an Israeli prison, Yousef was approached about becoming a spy for the Shin Bet. Initially, Yousef accepted the offer with the idea that he would betray them, and in hopes he could use the role to protect his father and family. Later, as Yousef saw the hypocrisy within Hamas and became a Christian, he used the position to save lives on both sides of the conflict. Yousef worked as a double agent within Hamas for nearly 10 years. He became a vital intelligence asset for the Israeli government while serving side-by-side with his father within the upper ranks of Hamas. After a chance encounter with a British tourist, Yousef started a six-year quest that jeopardized Hamas, endangered his family, and threatened his life. He has since embraced the Christian faith and sought political asylum in America. His story was revealed in the 2008 Fox News documentary "Escape from Hamas." Yousef 's first book, Son of Hamas, written with Ron Brackin (SaltRiver), released March 2, 2010. In Son of Hamas, Yousef reveals new information about this dangerous terrorist organization and unveils the truth behind his own secret role. He describes his surreal journey to a new faith that instructed him to love his enemies. And he tells the story of the agonizing decisions that led him to walk away from his family, friends, and homeland. For blog updates from Yousef, visit www.sonofhamas.com.
<urn:uuid:9bbdc092-5fd0-4528-9d6e-5ae432911c7b>
CC-MAIN-2016-44
https://www.tyndale.com/authors/mosab-hassan-yousef/1223
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00519-ip-10-171-6-4.ec2.internal.warc.gz
en
0.982401
432
1.664063
2
Anonymous Person from NARRAGANSETT, RI United States Gr 3 The Complete Common Core State Standards Kit - CD-158171 These cards will be very helpful this year. I like the fact that the standards are written for teachers on one side and students on the back. Reading the standards in down to earth kid-friendly language helps ME understand the lesson's goal more clearly! Was this review helpful to you? Browse for more products in the same category as this item:
<urn:uuid:0bc3f036-94f8-43ec-b681-a9a2d409d7c7>
CC-MAIN-2017-04
http://www.k12schoolsupplies.net/Gr-3-The-Complete-Common-Core-State-Standards-Kit-p/cd-158171.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00188-ip-10-171-10-70.ec2.internal.warc.gz
en
0.924662
100
1.507813
2
Yet what surprises me most of all at this time is that what I have written consists, as it were, almost entirely of quotations. – Compositions so produced are to poetry what mosaic is to painting. – It is the craziest mosaic technique you can imagine – and the very mind which directs the hands in formation is incapable of accounting to itself for the origin, the gradations, or the media of the process. Shelley with Benjamin: A critical mosaic is an experiment in comparative reading. Born a century apart, Percy Bysshe Shelley and Walter Benjamin are separated by time, language, temperament and genre – one a Romantic poet known for his revolutionary politics and delicate lyricism, the other a melancholy intellectual who pioneered a dialectical method of thinking in constellations. Yet, as the above montage of citations from their works demonstrates, their ideas are mutually illuminating: the mosaic is but one of several images that both use to describe how literature lives on through practices of citation, translation and critical commentary. In a series of close readings that are by turns playful, erotic and violent, Mathelinda Nabugodi unveils affinities between two writers whose works are simultaneously interventions in literary history and blueprints for an emancipated future. In addition to offering fresh interpretations of both major and minor writings, she elucidates the personal and ethical stakes of literary criticism. Throughout the book, marginal annotations and interlinear interruptions disrupt the faux-objective and colourblind stance of standard academic prose in an attempt to reckon with the barbarism of our past and its legacy in the present. The book will appeal to readers of Shelley and Benjamin as well as those with an interest in comparative literature, literary theory, romantic poetics, and creative critical writing.
<urn:uuid:6f85dffc-5905-4f55-a42c-7706da215385>
CC-MAIN-2022-33
https://www.uclpress.co.uk/collections/work-114095/products/194242
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00673.warc.gz
en
0.960515
356
2.171875
2
The U.S. Supreme Court issued a decision Tuesday that dealt a blow to a key provision of the Voting Rights Act, striking the core of the civil rights legislation until Congress could agree on a new formula for determining which states needed extra oversight on voting. Chief Justice John Roberts wrote the opinion, which ruled unconstitutional Section 4 of the Voting Rights Act of 1965 that determined which states with a history of discrimination would be required to obtain federal permission before making any changes to voting procedures. The 5-4 ruling, which determined the law was outmoded based on "decades-old data and eradicated practices," said the it could not be enforced until Congress determined new standards by which jurisdictions would be covered. “Our country has changed, and while any racial discrimination in voting is too much, Congress must ensure that the legislation it passes to remedy that problem speaks to current conditions," Roberts said in his decision. Roberts's opinion distinguished between the specified coverage of Section 4 -- which only dealt with nine states -- from Section 5. "Our decision in no way affects the permanent, nationwide ban on racial discrimination in voting found in [Section] 2," he wrote. "We issue no holding on [Section] 5 itself, only on the coverage formula. Congress may draft another formula based on current conditions." Roberts was joined by Justices Antonin Scalia, Anthony Kennedy and Samuel Alito. Justice Clarence Thomas wrote a concurring opinion, adding that he would have also used the same criteria to strike down Section 5, which sets out the "preclearance" requirements for the jurisdictions identified in Section 4. Justice Ruth Bader Ginsberg wrote the dissent, and was joined by Justices Stephen Breyer, Sonia Sotomayor, and Elena Kagan. Ginsberg read her dissent from the bench, a move meant to emphasize her strong disagreement with the ruling. Both the ruling opinion and the dissent used the law's success to argue their side: For the majority, the improved voter turnout and registration among minorities was proof that the covered jurisdictions no longer necessarily needed extra oversight, while the dissent pointed to some 700 objections from the Department of Justice that prevented discrimnatory practices. The Voting Rights Act is considered among the most important pieces of civil rights legislation, and has been renewed in whole four times since it was passed in 1965. However, the data used to determined which states were required to seek permission from the Department of Justice to make any changes to election procedures -- including dates, polling places, and hours -- was based on election data from 1972. Tuesday's ruling sends the debate back to Congress, where deep political divisions mean any attempt at passing new provisions would face a steep challenges. The nine states that, until Tuesday's decision, required preclearance under Section 4 were: - Alabama, except for the city of Pinson - Alaska - Arizona - Georgia, except for the city of Sandy Springs - Louisiana - Mississippi - South Carolina - Texas, except for Jefferson County Drainage District Number Seven and Northwest Austin Municipal Utility District Number One, and - Virginia, except for 24 counties and seven independent cities. In addition, specific counties in California, Florida, New York, North Carolina and South Dakota were identified by Section 4. President Obama issued a statement Tuesday, expressing his frustration with the court's decision: "I am deeply disappointed with the Supreme Court’s decision today. For nearly 50 years, the Voting Rights Act – enacted and repeatedly renewed by wide bipartisan majorities in Congress – has helped secure the right to vote for millions of Americans. Today’s decision invalidating one of its core provisions upsets decades of well-established practices that help make sure voting is fair, especially in places where voting discrimination has been historically prevalent. As a nation, we’ve made a great deal of progress towards guaranteeing every American the right to vote. But, as the Supreme Court recognized, voting discrimination still exists. And while today’s decision is a setback, it doesn’t represent the end of our efforts to end voting discrimination. I am calling on Congress to pass legislation to ensure every American has equal access to the polls. My Administration will continue to do everything in its power to ensure a fair and equal voting process." Here is the court's full decision:
<urn:uuid:7f874a56-559a-46af-b1ac-f74a29558117>
CC-MAIN-2016-44
http://www.upi.com/Top_News/Blog/2013/06/25/Supreme-Court-strikes-key-Voting-Rights-Act-provision/7071372169677/?rel=6821372261532
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.36/warc/CC-MAIN-20161020183841-00178-ip-10-171-6-4.ec2.internal.warc.gz
en
0.957771
875
2.0625
2
What to ask Siri in your iPhone? If you are an iPhone user, Siri is the one function that you should be able to make the most use of. Siri is a wonderful virtual assistant provided by Apple which fulfils all our menial tasks and also answers all our questions. Let us see some of the tips and tricks that will be helpful for you to make the most out of Siri in your iPhone. Also Read: 5 Tips for Swift IOS Developer Language 1. Ask Siri to Generate Random Password To do this, invoke Siri and say “Wolfram Password” or “Wolfram Alpha Password”. This will create a random password of length 8 characters. If you want a more lengthy one, then try “Wolfram 14 character password”. What Siri does here is, it access the Wolfram Alpha service and gets the output from there. Similar to this, it can get you few list of services directly with a voice command. 2. Do Conversions on-the-go Siri can convert ounces into litres, pounds in to kilograms, Celsius into Fahrenheit and so on. You no more need to remember any conversion factors, or have a separate app in your phone to do that. Siri can do it all for you on the go. Not only that, Siri can also do currency conversions too. This feature would be much handy when you travel abroad and do your shopping. 3. Find a Spelling quickly As of iOS 9, Siri can spell any word you ask for it. If you can pronounce a word properly, then Siri can give you the correct spelling of the word. Autocorrect and spell-check are so good with Siri, that it makes your life so easy. Be it ‘cat’ or ‘supercalifragilisticexpialidocious’, Siri is out there for your help. 4. Remember this later Starting from iOS 9, Siri can now understand the context of what you are seeing on your iPhone screen. So if you want to put something in your reminder list, for example a website which you are browsing, then you just need to bring up Siri and then tell her to remind you about ‘this’. Siri will add that item to your reminders list, with a link to the page or item that you had given the instruction for. 5. Learn to Pronounce Names People often find it difficult with Siri to make it understand how you pronounce your name, or the name of any of your friends or family members. There is an easy way for you to learn how Siri pronounces names. Just tell Siri ‘learn to pronounce James George’s name’. Siri will then ask you to say both first name and the last name. When done, Siri will offer you different pronunciations to select from. 6. Find Photos Siri knows more about your photos than before. Starting from iOS 9, Siri searches can now narrow things down to find the photo which you were looking for. Just tell Siri to show all the photos you took in a month, or at a place, or even better, the picture you took at a place on some month, then Siri will open the photos app, and show only those pictures that match your request. Siri can also identify videos, selfies and panoramas too. 7. Interact with settings If you find it difficult to find something in the settings in your iPhone, Siri may be able to help you out to find them and even turn some of them on or off. Tell Siri to switch off Bluetooth and it will do it. Previous Post: Auto Click FB Like Button – No Coding Knowledge Required Next Post: How to Copy Visible Cells Only in Excel using VBA ? 7 Amazing Things to Say to Siri Top5 Trending Posts
<urn:uuid:10f7c31b-7d5f-40fa-9365-b31f6e645f29>
CC-MAIN-2017-04
https://officetricks.com/best-things-to-say-to-siri/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00519-ip-10-171-10-70.ec2.internal.warc.gz
en
0.869479
800
2.34375
2
Here’s some bittersweet news that’ll throw you for a loop: According to NBC News, thousands upon thousands of wild Vietnamese pot-bellied pigs are making their way across Puerto Rico, eating and reproducing to their little pink hearts’ desire. But for as awesome as that sounds, it’s actually taking its toll on the U.S. territory’s residents. Countless locals have reported droves of feral pigs waddling up and down their streets, gnawing at their gardens, and leaving remarkably long trails of urine and excrement all over the island, but unfortunately, a lot of those reports were complaints. Somewhere along the line, these descendants of former pet pigs have begun making for more headaches than smiles, and since the swine are now reproducing at an alarmingly fast rate, it’s beginning to seem near-impossible to stop them. Aside from the sheer number of pigs, a major setback in managing the population is that the animals are so riddled with disease that they can’t be eaten. In the latest effort to alleviate the problem, Puerto Rico recruited crews from Georgia, Alabama, and Florida to help remove the pigs and take them elsewhere. But, because these huge, awesome pigs are so numerous and scattered all over, officials aren’t optimistic about the plan: “It was out of control,” said Gustavo Olivieri, Caribbean district assistant supervisor for the U.S. Department of Agriculture’s Animal and Plant Health Inspection Service regarding the masses of pigs outside San Juan. “We realized there were way more animals than we anticipated.” Damn. While it’s definitely cool that these pigs somehow found their way to a beach – beautiful, sunny Puerto Rico no less, all just running around in the sun, goofing in the ocean, digging holes in the sand – it sucks that it’s gotten to the point where the locals and the pigs are butting heads. If only the pigs and the humans could figure out some sort of compromise, so that the pigs could be free to do their sweet-ass pigs-in-the-sun thing, but the humans didn’t get so annoyed. Maybe if the humans let the pigs inside their houses once in a while, they’d be less ornery? Or if not their houses, maybe at least into common spaces, like the mall? Maybe the government could designate parts of the beaches specifically for the pigs where humans aren’t allowed to go? It definitely doesn’t have to be one of those ideas, they’re just meant to get the wheels turning. In any event, here’s to hoping that both the humans and the pigs can find a way to appreciate that the other side is just trying to do their best, and that life is short. If everyone can start there, this whole mess should be sorted out sooner than later.
<urn:uuid:23c8ca46-a1f7-42aa-8210-1f50a403d4d1>
CC-MAIN-2022-33
https://menshumor.com/viral/an-army-of-diseased-wild-pigs-is-pillaging-puerto-rico-heres-why-thats-bad/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00066.warc.gz
en
0.957466
611
2.375
2
buffcacher is a simple Python script that shows how to use use free RAM on your machine to cache arbitrary key-values. Think of it like memcached running on your local machine, only with elastic memory usage and faster. What should a 'cache' be? It means a lot of things, but to my mind the default programming type should be: "keep around expensive-to-generate bits of read-only data in case we need them again, or until the computer really needs that RAM for something else" Don't get too excited about Java's soft references - those are objects living in the small bit of your RAM assigned to your JVM. Don't get excited about abusing varnish either (in this context; there's plenty else to get excited with varnish about, of course). You would be unlikely to want your cache to hit disk - you don't want it backed by a file. But varnish is so nice and fast much because of it exploiting the VM - virtual memory - system on your OS. All mainstream OSes have much the same strategy - unused pages of RAM are used to cache disk IO automatically. If your application is reading and/or writing to the same bits of a file, its likely getting reads back straight from the OS 'buffer cache' without hitting disk. And this happens much more than you think, since all the code and libraries are, at this level, just files too. So I made a quick and dirty filesystem to (ab)use the OS VM system for the caching of arbitrary objects without them writing through to file. As the buffer cache sits in front of the filesystem, the filesystem's reading and writing can look like this: Now its a case of tracking where you have written your cached items to in some file on this filesystem, and if your reading back of the cached value at some later time succeeds, those bytes were read from the OS's cached pages! In this way its easy to cache items in the OS and let them compete for free RAM with the IO pages. As caching is diminising returns, there's likely plenty of free RAM to store the hot IO and these cached values, with the remainder of free RAM churning with the speculative storing of soon-discarded cold pages of things. I used FUSE to get this working. But it was quite slow. Unfair to say it's extremely slow, since, it is faster than memcached running on the same machine :) But imagine a kernel module filesystem to do this... that'd be blazingly fast. The key lookup could be inside the kernel too; I could imagine a lookup being a dreaded You could go further; if you are using some NoSQL server, or even memcached, you likely have it on another node. As sets are a fraction of the gets, you could have a single thread on each client that listens to the NoSQL server for the hashcodes of set keys, and invokes some ioctl that invalidates them in the common cache. This way, all your redis or whatever reads on each of your webserver nodes could be cached locally. And of course your language of choice could use such a mechanism under the hood for a proper soft reference system using an My code took a shortcut - every key is aligned on a page boundary; with a small amount of extra accounting, you could pack them tightly if you always keep the last partially-used page in an explicit buffer. That's the kind of shortcut that prototypes can take :)
<urn:uuid:fed6f357-db7e-4b3c-9b62-a2a1aa1a71b9>
CC-MAIN-2017-04
https://sites.google.com/site/williamedwardscoder/buffcacher_proto_1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00272-ip-10-171-10-70.ec2.internal.warc.gz
en
0.938309
725
2.828125
3
This picture shows the original line drawing of a gTérbum produced by Ngak’chang Rinpoche as the blueprint for the professional mould makers. It shows the shape and size of the gTérbum to be produced by the Aro UK sangha. At first it was thought that it might be possible to buy white ware that could be decorated. However, after quite an extensive search through ceramic suppliers catalogues and looking round major retail suppliers, it was found to be impossible to get hold of a lidded jar that was quite the right size and shape to transform into a Treasure Vase. Ngala Nor’dzin could find several varieties of ginger jar with six sides, but could not find one with four sides. At this point it was decided to make the vases from scratch and Ngala Nor’dzin arranged to have professional plaster of Paris moulds made by a pottery in Stoke on Trent. From Ngak’chang Rinpoche’s designs, they made a block mould, a case mould and working mould for both the vase body and the lid. Once the moulds were ready, Ngala Nor’dzin experimented with a few casts from the working mould. At first we thought it would be ideal to use porcelain to produce a high quality product. However the shape of the gTérbum meant that the neck of the vases tended to sag into the shoulder, at the high temperature firing required to mature porcelain. We finally settled on a china casting slip that was still slightly translucent and held the shape of the Treasure Vase at maturation temperatures. Then Ngala Nor’dzin began experimenting with glazes on the chosen body, to attempt to bring Ngak’chang Rinpoche’s vision of the gTérbum into being. Rinpoche’s vision described the body of the Treasure Vases as blue on the inside and yellow on the outside, with these colours reversed on the lid. Unfortunately, owing to the translucent quality of the body, the inner blue glaze distorted the yellow outer glaze giving it a strange greenish hue. Also experiments with on-glaze colours revealed problems with producing clear, clean white on a coloured body. In the end it was decided to keep the ceramic body white with blocks of decoration complementing the shape of the vase. The decoration was to include representations of the elements and the syllable ‘dzam’ with an emphasis on the colours yellow and blue. A small team of keen apprentices was assembled for a retreat to actually begin the project to make one hundred and eleven gTérbums. The process of slip casting involves pouring liquid slip into the mould, waiting until a film of clay has built up on the inside of mould, due to the absorption of water from the slip by the porous mould, and then pouring off the excess slip for re-use. With each casting the mould becomes damp, reducing its ability to absorb moisture and to allow a layer of drying slip to build up on its inside. Once the mould is damp, casting takes longer and is less efficient and successful, until it reaches the point that the mould is saturated and unusable until it has been dried out. It was therefore essential to make more working moulds, so that a reasonable number of bodies could be cast on a weekend retreat. With only one working mould, only one person could work at a time and only about three casts a day could be made. Hence the first task of the project was to make a further nine working moulds. Ngala Nor’dzin said: The first task in making new moulds was to seal the case moulds in order to cast working moulds from them. Plaster of Paris sticks readily to itself, so the case moulds had to be painted with soft soap to create a resistant barrier. Little did I realise that learning these processes at art college would be put to such auspicious use in the future! The sides of the case moulds were slatted off with wood tied tightly to them with string. Liquid plaster solution was poured into the sealed case moulds. They were knocked to remove air bubbles and left to set. Once firm enough to handle, though still hot from the chemical reaction, the wooden boards were removed, and the edges of the moulds rounded off neatly with a knife.
<urn:uuid:b344defc-e7b2-405e-bdc2-9ffc4fc97ba1>
CC-MAIN-2022-33
https://www.aroencyclopaedia.org/shared/text/g/gterbum_ph_03_plan_eng.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00071.warc.gz
en
0.964872
921
2.234375
2
The larvae of the parasite gasterophilus, commonly known as the botfly, attaches to the mucosal lining of the equine stomach, which can cause gastritis and may lead to ulceration in horses. There are three types of gasterophilus: - G. intestinalis – the common bot. Adults leave eggs glued to horse hair, most commonly on the forelegs and shoulders. Eggs hatch after a week when stimulated by licking. - G. haemorrhoidalis – the nose or lip bot. These attach their eggs to the hairs of the horse’s lips. They emerge after a few days and crawl into the horse’s mouth. - G. nasalis – the throat bot. Lay eggs on the hairs of submaxillary region, which then hatch in approximately one week. After crawling into the horse’s mouth or obtaining passage through licking, botflies burrow into the tongue and interdental spaces where they remain for approximately a month before making their way into the gastrointestinal tract. Gasterophilus larvae then attach to the mucosal lining of the stomach with oral hooks. G. intestinalis and G. nasalis are most common and attach near the margo plicatus or in the gastric fundus and duodenum, respectively. After developing for 8-10 months, they eventually pass in the horse’s feces, pupate in the soil for 3-5 weeks, and then emerge as adults. Presentation and Symptoms of Gasterophilus Infection The primary pathogenic effect of gasterophilus infection is ulceration at the site of attachment accompanied by a hyperplastic reaction around it. Oral stages may cause cause sinus tracts with mucopurulent discharge. Clinical signs of gasterophilus include mild gastritis and gastric ulceration. However, a large parasitic infection may be present with no clinical symptoms. It may also cause stomatitis and pain on eating. Symptoms typical of gastric pathology in horses, including gasterophilus infection, may include weight loss, lack of appetite, changes in body condition and hair coat, changes in behavior, difficulty maintaining condition, stereotypies such as cribbing or wood chewing, or underperforming. However, these symptoms may also be attributed to a wide variety of foregut and hindgut conditions, making differential diagnosis crucial. Diagnosing Gasterophilus Parasite Infection Specific diagnosis of gasterophilus infection is difficult. It it typically confirmed by visually identifying larvae as they pass in the feces. Environment and history are crucial to diagnosis; likelihood of infection may be deduced based on the horse’s individual history, the local seasonal botfly cycle, and the observation of bot eggs on horse’s hairs within a given herd. Treating Gasterophilus in Horses Ivermectin has typically been found to be effective against both oral and gastric stages of bots. When used as part of a routine parasite control program, appropriate ivermectin use has been shown to effectively control gasterophilus in horses. However, updated AAEP guidelines for parasite control strongly recommend foregoing a routine approach in favor of regular fecal testing and monitoring, with therapy based on identified parasite load as determined by testing. This selective strategy is believed to provide more effective parasite control overall in the face of growing anthelmintic resistance. While anthelmintics will treat the gasterophilus challenge, they will not aid the horse’s digestive tract to recover. Given that varying levels of damage to the digestive tract can occur, it would be prudent in this situation to ensure overall gastrointestinal function is supported throughout treatment and beyond. Clearly, the basic principles of feeding should apply but promoting a healthy absorptive surface, as well as a stable hindgut environment, should be key targets for additional intestinal support.
<urn:uuid:609b2bf5-a244-4678-8b6e-73a017fa1212>
CC-MAIN-2022-33
https://www.succeed-vet.com/equine-gi-disease-library/gastritis/gasterophilus/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00469.warc.gz
en
0.934401
804
2.875
3
Code Portability From Device to Device Source code utilizing MPLAB® Harmony libraries for one PIC32 device can be easily reused for another PIC32 device. Harmony is based on Microchip peripherals and designed around those peripherals. These abstracted libraries make the peripherals easier to use. So, regardless of which part you’re using, these libraries use the same (or very nearly the same) interface. This code portability dramatically reduces the time it takes to migrate code from one device to another. This lowers NRE (non-recurring engineering) charges for code development and shortens time to market. The way MPLAB® Harmony libraries provide portability is by providing a consistent, well defined and well documented set of interface functions that do not change from part to part as long as the same feature is supported by both parts. The following graphic shows a section of the Harmony help file that describes and defines the Harmony timer peripheral library (PLIB). Notice the contents tree on the left describes the library’s abstraction model and provides sections on how to use the library and manage different timer configurations (synchronous, asynchronous, gated, and others). This is vital information that would be missing if MPLAB Harmony only provided a header file to document the library. The “Library Interface” topic, shown on the right, provides a nice hyperlinked table that breaks down and lists all of the functions and data types (and other elements) that make up the interface to the timer peripheral library. This provides a handy programmer’s reference when you’re using a library and you just want a reminder of what functions it supports and what their parameters are. This code is an example of what a simple “blinky light” demo might look like when using a peripheral library. Notice the clear and consistent naming convention. The inversion of verb and object may seem a little odd at first, but it groups the functions alphabetically and helps make the library easier to understand. Also, notice that you can easily tell what the program is doing because the function names describe what they do. This code example is exactly the same as the previous example, but it was written for a different PIC32 device. Note the peripheral library function names stay the same. The function definitions for these peripheral libraries may change slightly from part to part, but you don't have to worry about this. Just include Harmony's device specific library file in your project. This file frees you from dealing with the peripheral configuration details for a specific device. For example, you will not have to know the name of the Timer0 enable bit and which register it lives in.
<urn:uuid:f80e3a92-8804-4179-947a-96c56e6a9006>
CC-MAIN-2017-04
http://microchip.wikidot.com/tls2500:mplab-harmony-portability
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00373-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908503
549
2.40625
2
This is not a drill! Potential Loch Ness Monster fossils have been unveiled in Scotland. As the enduring legend has it, Scotland’s oldest lass Nessie, is from the prehistoric ichthyosaur family, as is this exciting discovery – so maybe we’ve found her cousin. Washed up on the shores of the Isle of Skye in 1966, the Storr Lochs Monster caused a splash as it is the most complete ichthyosaur ever found in Scotland, the Daily Mail reports. And this is what the ‘monster’ looked like and it could be what Ol’ Nessie looks like too (if you believe in that sort of thing). It’s safe to say, it wasn’t quite what we were expecting: — Ntl Museums Scotland (@NtlMuseumsScot) September 5, 2016 Seriously, where’s the long neck? Anyway, after 50 years in-waiting, the fossilised skeleton of a 170 million-year-old Jurassic predator are being carefully examined by paleontologists at the University of Edinburgh. Dr Steve Brusatte, of the University of Edinburgh’s School of GeoSciences, said: Ichthyosaurs like the Storr Lochs Monster ruled the waves while dinosaurs thundered across the land. Their bones are exceptionally rare in Scotland, which makes this specimen one of the crown jewels of Scottish fossils. It’s all thanks to the keen eye of an amateur collector that this remarkable fossil was ever found in the first place, which goes to show that you don’t need an advanced degree to make huge scientific discoveries. — Ed Uni Press Office (@EdinUniMedia) September 5, 2016 The fossils have been put on display at the National Museums Scotland yesterday after a careful extraction of the bones from the rock it was encased in. The ancient reptiles had a dolphin-like shape and grew to about 4m with hundreds of cone-shaped teeth. Not taking a ‘dig’ or anything but I’d be pretty ‘petrified’ of these creatures (sorry, had to be done).
<urn:uuid:c40ab262-d597-4aff-9b22-4cedf2d75d92>
CC-MAIN-2017-04
http://www.unilad.co.uk/animals/the-mystery-of-the-loch-ness-monster-may-have-finally-been-solved/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00128-ip-10-171-10-70.ec2.internal.warc.gz
en
0.942579
456
2.3125
2
Edited By: W Engels 265 pages, 41 figs, 12 tabs A comprehensive volume giving an insight into the fascinating world of insect sociality. It discusses reproductive strategies and important regulatory mechanisms, and points out the role of hormones and pheromones in caste development and caste functions. The problems that a highly complex society raise, and the solutions that insects have evolved to meet them are also discussed. There are currently no reviews for this product. Be the first to review this product! Your orders support book donation projects I don't know how you got a book printed 26 years ago in the conditions that I received it (like new) but you do it! ABSOLUTELY AWESOME! Search and browse over 110,000 wildlife and science products Multi-currency. Secure worldwide shipping Wildlife, science and conservation since 1985
<urn:uuid:690f693d-5592-4a9a-adf5-92d7eda3831f>
CC-MAIN-2016-44
http://www.nhbs.com/title/31711?title=social-insects
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00149-ip-10-171-6-4.ec2.internal.warc.gz
en
0.906742
174
1.9375
2
Lasted edited by Andrew Munsey, updated on June 14, 2016 at 9:28 pm. Discussion page for Directory:Stephen Kundel's Motor Video of second version prototype shows a quickly vibrating motor, with electrical input. As it accelerates, less electrical input required. Over-unity not documented. (Just click on the " There was an error working with the wiki: Code.) Where can a person order the sheaves and other parts from? Is there a hobbies catalog that has such parts? Thanks in advance! This is very interesting stuff! Let me explain... I'm sure most of you have heard of the Irish company Steorn who have claimed to have created a self sustaining device using permanent magnets. I have been reading and posting on the Steorn forum for some time and Sean McCarthy has posted quite a few clues on their device over there, (a list of these clues can be found here). Using these clues I thought I would attempt to replicate their device and came up with this. I was amazed when several people came back to me and suggested my device loked similar to the Kundel motor and also that the Kundel motor was listed as a possible Over Unity device! That's one heck of a coincidence. From the Kundel website it states that the reciprical rotor magnet is held between 2 rotational stator configurations and that the stators are made up of alligned permanent magnets in a state of attraction. If you want to try something interesting try misalligning the stator magnets on oposite rings and arrange them so they are repelling. What you will find is that the rotation will always be in one direction, (either clockwise or anticlockwise depending on the direction the rotor magnet is facing). If you want to test if the motor is Over Unity you could always hook up two of them so the rotational output of one device is fed into the reciprical input of the other or connect a motor to the input, a generator to the output and compare the two. WhiteLite 11:10, 9 Dec 2006 (EST)== See also == There was an error working with the wiki: Code
<urn:uuid:08c3afb1-15da-4e71-8182-9b7c0ae97f4f>
CC-MAIN-2017-04
http://peswiki.com/talk:directory:stephen-kundels-motor
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00566-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955909
442
1.765625
2
The CNCA sees three major pathways: Reducing manufacturing process emissions; Reducing combustion emissions through fuel switching; and Increasing distributed electricity generation. The California Nevada Cement Association (CNCA) announced its plan for the industry to achieve net-zero carbon emissions by 2045, outlining key opportunities and actions to achieve this goal. The California cement industry supports the state’s greenhouse gas (GHG) reduction goal and is committed to achieving carbon neutrality, consistent with the reality that it is necessary to curb emissions in order to avoid the worst impacts of climate change. “Releasing this industry-wide roadmap is an exciting and critical step toward carbon neutrality,” says Tom Tietz, Executive Director of CNCA. “However, we cannot get to net-zero alone and this roadmap is also an invitation for state leaders, environmental groups and stakeholders throughout the cement-concrete-construction value chain to collaborate on pursuing this bold goal.” CNCA is a not-for-profit organization committed to developing sustainable and economical construction solutions for California and Nevada with an emphasis on the use of cement and concrete. CNCA provides expert technical leadership, design assistance, research, and educational opportunities designed to responsibly transform our built environment and improve the lives of the people throughout the region. The member companies of the CNCA are cement producers and shippers that manufacture cement products. Cement is the main ingredient in concrete, one of the most durable, resilient and affordable building materials. Concrete is essential in building homes, structures and critical infrastructure that can withstand and provide protection from fires, floods and other consequences of a changing climate while also delivering use-phase emissions savings over a full lifetime. CNCA’s Roadmap to Carbon Neutrality - Reducing manufacturing process emissions - Reducing combustion emissions through fuel switching - Increasing distributed electricity generation Many of the technologies, fuels, materials, and processes for dramatically reducing the industry’s emissions footprint already exist. However, barriers including statutory, regulatory, and permitting hurdles, market acceptance barriers, cost challenges, supply limitations and technology gaps delay or constrain their deployment and limit their impact. More can and must be done to create the necessary conditions for the industry to move forward with large-scale, long-term investments in emissions reduction. “We are committed to providing innovative and sustainable solutions including low-carbon cement and concrete that is critical to a low carbon future and circular economy,” says Allen Hamblen, President and CEO of CalPortland Company, a member of CNCA. “We recognize there are no shortcuts to achieve carbon neutrality. We look forward to working with key policy and regulatory decision makers to urgently address barriers to emission reduction opportunities.” Opportunities for 2021 The roadmap details key emissions reductions strategies for each pathway, but the three immediate, most impactful opportunities for 2021 are: - Acceptance of Portland Limestone Cement (PLC) for Caltrans projects. PLC uses more limestone to reduce emissions up to 10% while maintaining the integrity and performance of traditional cement. Currently, 34 other state departments of transportation have adopted it for their construction projects, yet PLC is currently not accepted for Caltrans-specified construction projects. As one of the state’s largest consumers of cement, anticipated Caltrans acceptance would have broad impact and influence in many cities and counties that would create new markets for lower-carbon cement. - Invest in a promising and critical long-term technology – carbon capture, usage and storage (CCUS). CCUS can offer a carbon capture rate upwards of 90% of process and combustion emissions, but projects are extremely capital intensive and lengthy permitting processes add uncertainty. Innovation-supportive policies that catalyse public and private investment is needed for research and development as carbon neutrality will be out of reach for the California cement industry until cost-effective CCUS technology is commercially available. - Reduce combustion emissions by switching to lower emissions alternatives. Using engineered waste materials and biomass as fuel would drive a substantial reduction in emissions while also diverting waste from landfills or incineration. “We are committed to decarbonizing over the next 24 years using this roadmap as our guide,” Steve Wise, President of National Cement of California – a CNCA member – says. “The road to decarbonization can have exponential impact but can’t be done by one company alone. That’s why we’re joining to do our part in having a positive impact.”
<urn:uuid:94dbc489-828a-4e51-8df1-23afc11d7466>
CC-MAIN-2022-33
https://www.worldconstructiontoday.com/news/california-nevada-cement-associations-roadmap-to-reach-net-zero-carbon-emissions-by-2045/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00277.warc.gz
en
0.929194
933
2.296875
2
Monday, the third of October of the said year, at the hour of midnight, we set sail, making the course auster, which the levantine mariners call Siroc, entering into the ocean sea. We passed the Cape Verd and the neighbouring islands in fourteen-and-a-half degrees, and we navigated for several days by the coast of Guinea or Ethiopia; where there is a mountain called Sierra Leona, which is in eight degrees latitude according to the art and science of cosmography and astrology. Sometimes we had the wind contrary and at other times sufficiently good, and rains without wind. In this manner we navigated with rain for the space of sixty days until the equinoctial line, which was a thing very strange and unaccustomed to be seen, according to the saying of some old men and those who had navigated here several times. Nevertheless, before reaching this equinoctial line we had in fourteen degrees a variety of weather and bad winds, as much on account of squalls as for the head winds and currents which came in such a manner that we could no longer advance. In order that our ships might not perish nor broach to (as it often happens when the squalls come together), we struck our sails, and in that manner we went about the sea hither and thither until the fair weather came. During the calm there came large fishes near the ships which they called Tiburoni (sharks), which have teeth of a terrible kind, and eat people when they find them in the sea either alive or dead. These fishes are caught with a device which the mariners call hamc, which is a hook of iron. Of these, some were caught by our men. However, they are worth nothing to eat when they are large; and even the small ones are worth but little. During these storms the body of St. Anselme appeared to us several times; amongst others, one night that it was very dark on account of the bad weather, the said saint appeared in the form of a fire lighted at the summit of the mainmast, and remained there near two hours and a half, which comforted us greatly, for we were in tears, only expecting the hour of perishing; and when that holy light was going away from us it gave out so great a brilliancy in the eyes of each, that we were near a quarter-of-an-hour like people blinded, and calling out for mercy. For without any doubt nobody hoped to escape from that storm. It is to be noted that all and as many times as that light which represents the said St. Anselme shows itself and descends upon a vessel which is in a storm at sea, that vessel never is lost. Immediately that this light had departed the sea grew calmer, and then we saw divers sorts of birds, amongst others there were some which had no fundament. There is also another kind of bird of such a nature that when the female wishes to lay her eggs she goes and lays them on the back of the male, and there it is that the eggs are hatched. This last kind have no feet and are always in the sea. There is another kind of bird which only lives on the droppings of the other birds, this is a true thing, and they are named Cagaselo, for I have seen them follow the other birds until they had done what nature ordered them to do; and after it has eat this dirty diet it does not follow any other bird until hunger returns to it; it always does the same thing. There are also fish which fly, and we saw a great quantity of them together, so many that it seemed that it was an island in the sea. After that we had passed the equinoctial line, towards the south, we lost the star of the tramontana, and we navigated between the south and Garbin, which is the collateral wind [or point] between south and west; (…)
<urn:uuid:15ea0054-99ea-4ad7-9ab0-72f370a9de77>
CC-MAIN-2022-33
https://www.elkano500ago.com/en/news/pigafetta--1519-10-03/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00073.warc.gz
en
0.987853
817
2.390625
2
Theatre is an incredible medium for illuminating the dark corners of history and revealing their relevancy. “Bill W. and Dr. Bob” does just that, written with an acute commitment to historical accuracy by Sam Shem and Janet Surrey. This is the story of Alcoholics Anonymous, formed organically in Akron, Ohio by two entrepreneurial alcoholics following the Great Depression. The show is transporting; every aspect feels characteristic of the “Greatest Generation”. The dialogue is long-winded and formal, littered with witty, dry humor, characteristic of early 20th century works. Under the direction of Seth Gordon, the acting is stately. The actresses are bold and empowered with the spirit of Rosie the Riveter, while the actors are loaded with humility as they accept their alcoholism. With grandiose stature and speech, Patrick Boll is superb as Bill W., the stockbroker turned sobriety exponent. Denise Cormier is unmatched as Lois, Bill's aggrieved and “spunky” wife. Among the play's shortcomings are its length, running over two hours, and its unrelenting antiquity. “Bill W. and Dr. Bob” reflects little in the way of modern innovations in humor, but its largely elderly audience is vocally exuberant throughout. Younger generations may feel out of place and unamused at the Soho Playhouse, yet they will leave with a greater knowledge and understanding than they came in with. Through June 1 at Soho Playhouse.
<urn:uuid:3df6d195-eb9a-4a09-baa8-ec1bdb8279ba>
CC-MAIN-2022-33
https://stagebuddy.com/theater/theater-review/review-bill-w-dr-bob
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00470.warc.gz
en
0.958057
312
1.765625
2
Jen Hui Liao's Self-Portrait Machine is a device that takes a picture of the sitter and draws it but with the model's help. The wrists of the individual are tied to the machine and it is his or her hands that are guided to draw the lines that will eventually form the portrait. The project started with the observation that nearly everything that surrounds us has been created by machines. Our personal identities are represented by the products of the man-machine relationship. The Self-Portrait Machine encapsulates this man-machine relationship. By co-operating with the machine, a self-portrait is generated. It is self-drawn but from an external viewpoint through controlled movement and limited possibility. Our choice of how we are represented is limited to what the machine will allow. [Follow me on Twitter.]
<urn:uuid:68e687e0-6e9e-4cd3-b629-3452463201f0>
CC-MAIN-2017-04
http://posthumanblues.blogspot.com/2009/07/eye-of-beholder.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00565-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971699
168
2.21875
2
grip the baby mouse, 1st squeak dip it in sauce, 2nd squeak bite it, 3rd squeak. That's why it's called Three Squeaks. The raw material is preferably rat cubs, but recommended is alive, to be condiments epigenetic food. The so-called "three-squeak" ", Is when you use chopsticks to rat cubs, cubs mouse will issue a "squeak," the called out, and then when you put the Cubs hairless mouse gets spicy seasonings after rat cubs will "squeak" is called cry, and finally when you mouse cubs into the mouth, it will issue a final bang called; this is the famous "three squeak," the. Spices according to personal taste modulation, (salt and pepper, hoisin sauce, lamb spices, creative enough on the line.) However, pink hairless mice fed cubs use honey. Long tail of mice that bacteria and infectious diseases, so with the rats in captivity more comfortable. |Liveleak on Facebook|
<urn:uuid:98d4c875-f8f2-45ea-b7af-5aabce020669>
CC-MAIN-2017-04
http://www.liveleak.com/view?i=9dc_1371560196
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00003-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94231
230
2.296875
2
About the course The course reflects the National Minimum Standards and Core Curriculum for Immunisation Training for Registered Healthcare Practitioners (Public Health England, revised February 2018) equating to 2 days of learning. The course is designed to support you to develop both the theoretical and practical knowledge and skills required of all immunisers. Following the completion of this course you should attend annual immunisation updates. Before attending the one-day interactive classroom-based theoretical training session, you are required to complete a pre-course workbook. You must have the support of a work-based mentor in order to successfully complete the practical assessment aspect of the course. - The aims of immunisation, national vaccine policy and schedules - The immune response to vaccines and how vaccines work - Vaccine-preventable diseases - The different types of vaccines, their composition and the indications and contraindications - Current issues in immunisation - Communicating with patients, parents and carers about vaccines - Legal issues in immunisation - Storage and handling of vaccines - Correct administration of vaccines - Anaphylaxis and adverse reactions - Documentation, record keeping and reporting - Strategies for optimising immunisation uptake. NMC Registered Nurses new to administering and/or advising on immunisation and vaccination.
<urn:uuid:b5109762-d700-4bdd-b0f7-075522d6bf38>
CC-MAIN-2022-33
https://www.stwtraininghub.co.uk/training-hub/training-education-and-cpd/stw-s-portfolio-of-courses/t-e-foundation-of-immunisation-registered-hpc-s
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00472.warc.gz
en
0.891459
278
2.296875
2
21 апреля 2009 | Автор: Admin | Рубрика: English литература » Словари и энциклопедии на английском языке | Комментариев: 0 H. W. Fowler , R. W. Burchfield, "The New Fowler's Modern English Usage" Oxford University Press, USA; | ISBN: 0198610211 | 896 pages | Djvu | 11,6 Mb An icon to those who write and think about words, Fowler's has not been updated since 1965. (It was originally published in 1926.) Burchfield, the chief editor of The Oxford English Dictionary and its four-volume supplement, is perhaps the best equipped to tackle this monument. His revision pulls a much-loved and slightly eccentric work out of the charm of the past and into the whirlwind of today's language. In a simple, alphabetical arrangement, the third edition covers grammar, syntax, style, word choice, and advice on usage. Some of the contents have been changed completely: there are explanations of the differences between British and American usage, new pronunciation guidelines, and new entries reflecting the politicizing of speech (sexist language, political correctness). The most famous and endearing aspect of Fowler's, the treatment of the split infinitive, has been rewritten to provide more explanation than wit. Some of the contents have only been updated and clarified, retaining the same examples. For instance, the second edition seeks to define "dead letter" apart from "its Pauline and post-office uses"; the new edition changes this to "apart from its theological and post-office uses"; both use "quill pens, top hats, [and] steam locomotives" as examples of objects that have fallen out of fashion. The result is a work that is different from the original and more useful, but academic libraries will want to keep the first and second editions as well. Other libraries will definitely want to update their copies; this work will be a standard in the field for years to come.?Neal Wyatt, Chesterfield Cty. P.L., Va.
<urn:uuid:4a341cef-6703-4cd7-9b02-20dda9065bd2>
CC-MAIN-2017-04
http://www.knigka.su/english/dictionaries_and_encyclopedias/96480-The_New_Fowler_s_Modern_English_Usage.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00008-ip-10-171-10-70.ec2.internal.warc.gz
en
0.887494
498
2.375
2
Alors, la semaine prochaine, nous allons lire quelques fables surnaturelles qui s’inspirent de croyances celtes…. préparez-vous avant la classe I made a florilege of resources from where to start. in the Celtic World Source: Bettina Arnold Lecture given at the University of Wisconsin-Milwaukee, October 31, 2001 Night of the spirits; Feast of the Dead; New Year’s Eve; the year’s turning; Calends of winter; Summer’s End; one of the “joints of the year”; beginning of the barren time; day of divination; festival of the harvest; doorway into the new year; Mischief Night; Punky Night; Samhain; Nos Calan gaeaf; All Hallow’s Eve. These are all descriptions of one of the most important seasonal festivals of the Celtic world, the night of October 31, this evening, Halloween. In Wales it is known as Hollantide, in Cornwall Allantide, and in Brittany Kala-Goanv. Samhain’s equivalent on the Christian calendar is All Saints’ Day, introduced by the Catholic church partly to supplant the pagan festival of the dead. Halloween’s counterpart is the other great “hinge of the year”, April 30, Beltain or May Day Eve, which marks the beginning of summer. To understand the significance of these seasonal festivals, we need to step back in time for a moment, closer to the food production cycle than most of us are today. In pre-Christian Europe, most important holidays were celebrated on the evening of the day before the actual date of the transition from one season to the next, since the easiest way of measuring the passing of time was by observing a complete cycle of the moon – the origin of the english word “month”. Samhain was the end of summer and the beginning of the new year. It coincided with the rounding up of the herds for culling and penning, the storing of crops, and the beaching and repairing of fishing boats and gear, all in preparation for the coming winter. Warfare officially came to an end at Samhain, partly for practical reasons related to weather, but raiding, especially of cattle, seems to have peaked between Michaelmas (September 29) and Martinmas (November 11), at least in the Border region of Scotland, where we have 16th century accounts of such activity during this time. Herds under cover are concentrated and easier to steal, whereas before Lammas (August 1) the cattle were dispersed in the high shielings. According to one official writing in the 16th century, at Samhain “are the fells good and drie and cattle strong to drive”. Night rides across landscapes like the Border region in Scotland looked a lot less attractive by Candlemas (February 2), due to the foul weather and the weaker state of the cattle. So Samhain was known in some, but not all, Celtic regions as as the feast of peace and friendship, during which no weapon was lifted. Hunting in Scotland also appears to have been limited by law to the period from Beltain to Samhain, in order to give the deer and especially the wild pig, a chance to breed. Samhain coincides with the onset of the breeding season of the wild pig, which lasts from November to January. The pig, wild or domestic, was thus the “sacrificial” animal of Samhain, and it is the pig that is associated with tribute from clients to lords: The Irish law tracts specify that “the name of the food that is carried to the lord before Christmas…is the Samhain pig.” The Catholic Church added its own explanation, depicting St. Patrick as giving the original Samhain pig to St. Martin, in gratitude for his tonsure. Animals that might not make it through the winter were slaughtered at Samhain, to be consumed in communal feasts associated with the festival. The pastoral basis of the two halves of the year shows up in the terms used to describe food: meat was called “winter food” while dairy produce was called “summer food” or “white meat”. The timing of Samhain coincided with the availability of large stocks of food after the harvest, which is why this was the time that political assemblies were called, fairs and regional markets were held, horse races and other competitions were organized, and religious rituals were celebrated to mark the passing of the old year. According to the Irish sources, the Assembly of Tara, the seat of the High King of Ireland, the most important of the oneachs, or fairs, was held on Samhain. Alcoholic beverages such as mead and beer would also have been available in large quantities at this time of year, since the period just after the harvest meant a surplus of grain was available for the production of alcohol, which had to be consumed quickly in the days before refrigeration. Medieval Irish had their own ways to stop the undead Source: Institue of Technology Sligo Two skeletons discovered with large stones wedged into their mouths, were buried in this way around 1300 years ago to stop them rising from their graves to haunt the living, according to new documentary featuring the work of archaeologists from the Institue of Technology Sligo and St.Louis University. Such “deviant burials” are associated with vampires and also with revenants or ghosts who were believed to come back among the living, unless steps were taken to contain them in their graves. The skeletons, both male, were found side by side in a historic site overlooking Lough Key Co Roscommon, and according to Chris Read, lecturer of Applied Archaeology at IT Sligo, this is the only such discovery of this kind in Ireland. Similar discoveries have been made in Britain and other European countries. In 2006 the remains of a medieval “vampire” were discovered among the corpses of 16th century plague victims in Venice. The female skull had a rock thrust into the mouth, evidence that female “vampires” were often blamed for spreading the plague through Europe, according to experts. Read, along with his colleague Dr Thomas Finan from St Louis University, excavated 137 skeletons from a site at Kilteasheen, Knockvicar Co Roscommon during a series of digs from 2005 to 2009, in a project funded by the Royal Irish Academy. The archaeologists believe that there were close to 3,000 skeletons on the site spanning the centuries from 700 to 1400. The two skeletons with stones in their mouths were not buried at the same time but both were males – one elderly and the other a young adult. Both are believed to have been buried in the 8th century. This puts them outside the time frame for vampires – a phenomenon which emerged in European folklore around the 1500’s. Read explained that this remarkable discovery could reflect the ancient fear of revenants who were believed to have had the power to come back from their graves to harass their loved ones or others against whom they had a grudge. “One of them was lying with his head looking straight up and a large black stone had been deliberately thrust into his mouth while the other had his head turned to the side and had an even larger stone, wedged quite violently into his mouth so that his jaws were almost dislocated,” explained the archaeologist. He and a colleague, osteo-archaeologist, Dr. Catriona McKenzie carried out detailed tests on the skeletons at IT Sligo this summer. Read stressed that the revenant theory would be impossible to prove absolutely, but said there was no doubt that the skeletons had been subjected to deviant burials which are sometimes associated with demonic possession. Revenants or the “walking dead” often tended to be people who were outsiders in society when living, according to the IT Sligo lecturer . There is a known tradition of revenants in Irish folklore and indeed it has been suggested that Bram Stoker got the inspiration for Dracula, not from a Romanian folk tale, but from an Irish legend about an evil chieftain who had to be killed three times after he came back looking for a bowl of blood to sustain him. The IT Sligo/St Louis team became interested in the Kilteasheen site because of its links to the O’Conor kings of Connacht and also because of historical references to a Bishop’s Palace which had been constructed there in the 1200’s. They were amazed to discover that a raised platform on the land owned by John and Tina Burke from Knockvicar, was in fact a burial ground which had been used over several centuries. Initially, considerable circumstantial evidence prompted speculation that they had found a Black Death-related burial ground, but radio carbon dating ruled that theory out. Read pointed out that Kilteasheen is adjacent to the Boyle river which was a “medieval motorway” linking Lough Key with the Shannon. But the layers of history there go back much further as a number of pre-historic artefacts including stone tools and arrow heads were also found on the site. The Medieval Walking Dead source medievalist.netOn January 1, 1091, an army of the dead came to Normandy. For one priest, it would be a night that he would never forget. The medieval world believed in ghosts and spirits – there are countless stories from the Middle Ages how people were visited by the dead. While people would naturally be frightened if they came across a ghost, rarely would the ghost itself come to haunt or torment the living. Instead they often appeared to those people that they knew while they were alive, and usually wanted something from them. The concept of purgatory was fully realized in the medieval period – that when a person dies their soul doesn’t automatically go to Heaven or Hell. The Roman Catholic doctrine believed that even if the soul was not condemned to Hell, it still needed to be purified before entering Paradise. This would be Purgatory, where the souls would get tortured and punished for their sins. The living world could help the dead in getting out of Purgatory – mainly by praying for their souls. By the late Middle Ages it was a popular practice for people to leave money in their wills to hire priests that would perform Mass for their souls. Many of the ghost stories from the Middle Ages involve souls that were in Purgatory, but contacted their living relatives to ask for them to do something that would help relieve their suffering and assist them in entering Heaven. These could range from paying a debt, fulfilling a vow, or just making sure they were being prayed for. One of the strangest stories to be written down in the Middle Ages comes from the pen of Orderic Vitalis, a twelfth-century monk. From the abbey of Saint Evroult in Normandy, Orderic wrote his Ecclesiastical History, offering one of the best accounts of the Anglo-Norman world up the year 1141. Orderic wrote about the reigns of the kings William I to Stephen, the political events that happened locally and abroad, and even about the news coming from his own monastery. At one point in Book Eight of his Ecclesiastical History, Orderic pauses from discussing the warfare between William Rufus and his rebellious count Robert of Belleme, and states, “I am sure that I should not pass over in silence or consign to oblivion something that happened to a priest in the diocese of Lisieux on January 1st.” Orderic explains that the priest was named Walchelin, and “he was a young man, strong and brave, well-built and active.” On the night of January 1, 1091, he was returning home after a visiting a sick man at the far end of his parish. He was travelling along the road, far from from any homes, when he heard the sounds of a great army coming towards him. Walchelin believed that these were the soldiers of Robert of Belleme, and he decided it would be best for him to hide behind the trees and let the army pass by. Orderic relates what happened next: But a man of huge stature, carrying a great mace, barred the priest’s way as he ran and, brandishing the weapon over his head, cried out, ‘Stand; go no further.’ The priest obeyed at once and stood motionless, leaning on the staff he was carrying. The stern mace-bearer stood beside him without harming him, waiting for the army to pass by. Walchelin stayed at the side of the road as he watched thousands of people walk by. First came the peasants, who were carrying across their necks and shoulders their clothes, animals, furniture and other worldly goods. To the priest they seemed to be a mob of people who were carrying off the plunder from an attack. Then came hundreds of women, riding side-saddle on horses, but the saddles were marked with red hot nails. As the women rode, they would jump off their saddles and into the air, and then land back on the nails, leaving them burned and stabbed. After them came a crowd of priests, monks, even bishops and abbots, all dressed in black cowls and groaning and lamenting as they passed by. “Next followed a great army of knights in, which no colour was visible save blackness and flickering fire. All rode upon huge horses, fully armed as if they were galloping to battle and carrying jet-black standards.” What scared Walchelin so much was that he recognized many of these people – they were his neighbours and fellow clergy, but they had all died in recent years. There were even people that Walchelin and others thought to be good Christians, even considered saints. But they were here too, walking with this army of the dead. The worst of this group were those being carried on biers, suffering terrible punishments: On the biers sat men as small as dwarfs, but with huge heads like barrels. One enormous tree-trunk was borne by two Ethiopians, and on the trunk some wretch, tightly trussed, was suffering tortures, screaming aloud in his dreadful agony. A fearful demon sitting on the same trunk was mercilessly goading his back and loins with red-hot spurs while he streamed with blood. Walchelin at once recognized him as the slayer of the priest Stephen, and realized that he was suffering unbearable torments for his guilt in shedding innocent blood not two years earlier, for he had died without completing his penance for the terrible crime. As Walchelin watched them pass by he realized this was Hellequin’s Army, which apparently had been a folktale for many years (although Orderic Vitalis is our earliest writer to talk about them). Throughout the twelfth-century this legend would spread around around Western Europe. Walter Map (1140-c.1210) explained that they got their name from ancient Briton king named Herla, who made a deal with a Dwarf king. The dwarf gives him a small dog, and tells Herla and his companions that they cannot dismount from their horses until the dog jumps off of Herla’s arms, otherwise they will be all turned to dust. Herla soon realizes the dog will not leave his arms, and so he and his companions are doomed to wander the Earth as a kind of undead. There are several tales about Hellequin’s Army, or Hellequin’s Hunt, some of which involve King Arthur or other medieval legends. Church writers apparently associated this ghostly ramble with Purgatory, offering a horrific example to the living on what awaits those who sinned when they died. As Walchelin continued to watch the medieval horde pass before his eyes, he said to himself, “I have heard many who claimed to have seen them, but have ridiculed the tale-tellers and not believed them because I never saw any solid proof of such things. Now I do indeed see the shades of the dead with my own eyes, but no one will believe me when I describe my vision unless I can show some token to living men. I will catch one of the riderless horses following the host, quickly mount it and take it home, to compel the belief of my neighbours when I show it to them.” He tried to grab the first riderless horse he saw, but it bolted away before Walchelin could reach it. Another steed came along: The horse stopped for the priest to mount, breathing from its nostrils a great cloud of steam in the shape of a tall oak-tree. The priest put his left foot in the stirrup and, seizing the reins, placed his hand on the saddle; immediately he felt an intense burning like raging fire under his foot; and an indescribable cold struck into his heart from the hand that held the reins. Just then four of the dead knights rushed towards them, shouting ”Why are you molesting our horses? Come with us. None of our people has harmed you, yet you try to take what is ours.” Walchelin was very frightened, but one of the knights told the others not to harm the priest. He identified himself as William of Glos, and he spoke about how his sins in life were punishing him in his death: “But most of all usury torments me. For I lent my money to a poor man, receiving a mill of his as a pledge, and because he was unable to repay the loan I retained the pledge all my life and disinherited the legitimate heir by leaving it to my heirs. See, I carry a burning mill-shaft in my mouth which, believe me, seems heavier than the castle of Rouen. Therefore tell my wife Beatrice and my son Roger that they must help me by quickly restoring to the heir the pledge, from which they have received far more than I ever gave.” As Walchelin heard more about this knight’s sins and his demands, he decided not to help him: “It is not right to declare such things. In no circumstances will I carry your orders out to anyone.” The knight in a terrible rage then put on his hand and seized the priest by the throat, dragging him along the ground and threatening him. His victim felt the hand that held him burning like fire, and in his great anguish cried out suddenly, ‘Blessed Mary, glorious Mother of Christ, help me!” Just then another knight appeared, waving a sword in his right hand and saying “Wretches, why are you murdering my brother? Leave him and be gone.” This new knight came to Walchelin and revealed himself to be his brother Robert, who died in England. But Walchelin did not recognize him, or believe him, even after Robert revealed things that only his brother would know. Finally the dead knight exclaimed: ”I am amazed by your hardness and obstinacy. I brought you up after both our parents died, and loved you more than any living person. I sent you to schools in France, kept you well-provided with clothes and money, and in many other ways furthered your progress. Now you have forgotten all this and disdain even to recognize me.” It was only then that Walchelin believed him, and the two brothers talked for a while. Robert explained: “After I last spoke to you in Normandy I left for England with your blessing; there I reached my life’s end when my Creator willed, and I have endured severe punishment for the great sins with which I am heavily burdened. The arms which we bear are red-hot, and offend us with an appalling stench, weighing us down with intolerable weight, and burning with everlasting fire. Up to now I have suffered unspeakable torture from these punishments. But when you were ordained in England and sang your first Mass for the faithful departed your father Ralph escaped from his punishments and my shield, which caused me great pain, fell from me. As you see I still carry this sword, but I look in faith for release from this burden within the year.” Finally, as the last of Hellequin’s Army went by, Robert said, ”I cannot speak longer with you, my brother, for I am compelled to hasten after this wretched host. Remember me, I beg: help me with your prayers and compassionate alms. In one year from Palm Sunday I hope to be saved and released from all torments by the mercy of my Creator. Take thought for your own welfare: correct your life wisely, for it is stained by many vices, and you must know that it will not be long enduring.” Once the ghostly army had gone, Walchelin fell ill for a week, but he slowly recovered and told the local bishop of what he saw. Orderic Vitalis reveals that he himself had heard this story from Walchelin himself, and even saw the scar on his face caused by the evil knight. Walchelin would live for at least another fifteen years. Orderic sums up this event by writing, “I have recorded these things for the edification of my readers, so the just men may be encouraged in good, and the vicious may repent of evil.” The Ecclesiastical History of Orderic Vitalis, Vol.4 , edited and translated by Marjorie Chibnall (Oxford, 1973) The Written World: Past and Place in the Work of Orderic Vitalis, by Amanda Jane Hingst (Notre Dame, 2009) Ghosts in the Middle Ages: The Living and the Dead in Medieval Society, by Jean-Claude Schmitt (Chicago, 1998) Medieval Ghost Stories: An Anthology of Miracles, Marvels and Prodigies Author: Andrew Joynes Publisher: Boydell Press Summary Stories of restless spirits returning from the afterlife are as old as storytelling. In medieval Europe ghosts, nightstalkers and unearthly visitors from parallel worlds had been in circulation since before the coming of Christianity. Here is a collection of ghostly encounters from medieval romances, monastic chronicles, sagas and heroic poetry. These tales bore a peculiar freight of spooks and spirituality which can still make the hair stand on end. Look at the story of Richard Rowntree’s stillborn child, glimpsed by his father tangled in swaddling clothes on the road to Santiago, or the sly habits of water sprites resting as golden rings on the surface of the river, just out of reach. The writer and broadcaster Andrew Joynes brings together a vivid selection of these tales, with a thoughtful commentary that puts them in context and lays bare the layers of meaning in them. Ghosts in the Middle Ages: The Living and the Dead in Medieval Society Author: Jean-Claude Schmitt Publisher: University Of Chicago Press Summary Through this vivid study, Jean-Claude Schmitt examines medieval religious culture and the significance of the widespread belief in ghosts, revealing the ways in which the dead and the living related to each other during the middle ages. Schmitt also discusses Augustine’s influence on medieval authors; the link between dreams and autobiographical narratives; and monastic visions and folklore. Including numerous color reproductions of ghosts and ghostly trappings, this book presents a unique and intriguing look at medieval culture. The Place of the Dead: Death and Remembrance in Late Medieval and Early Modern Europe Author: Bruce Gordon Publisher: Cambridge University Press Summary Although much has been published on the social history of death, this is the first book to give a comprehensive account of attitudes toward the dead–above all the “placing” of the dead, in physical, spiritual and social terms–in order to reveal the social and religious outlook of past societies. The contributions range widely geographically, from Scotland to Transylvania, and address a spectrum of themes: attitudes toward the corpse, patterns of burial, forms of commemoration, the treatment of dead infants, the nature of the afterlife, and ghosts. Witches, Werewolves, and Fairies: Shapeshifters and Astral Doubles in the Middle Ages Author: Claude Lecouteux Publisher: Inner Traditions Summary This title reveals the nature of medieval belief in the double of the soul and demonstrates the survival of a pagan belief that each individual owns three souls, including a double that can journey outside of the body. It explains the nature of death and Other Worlds hidden beneath the monsters and superstitions in stories from the Middle Ages. Monsters werewolves witches and fairies remain a strong presence in our stories and dreams. But as Claude Lecouteux shows their roots go far deeper than their appearance in medieval folklore; they are survivors of a much older belief system that predates Christianity and was widespread over Western Europe. Through his extensive analysis of Germano-Scandinavian legends as well as those from other areas of Europe Lecouteux has uncovered an almost forgotten religious concept – that every individual owns three souls and that one of these souls the Double can – in animal or human form – leave the physical body while in sleep or a trance journey where it chooses then re-enter its physical body. While there were many who experienced this phenomenon involuntarily there were others – those who attracted the unwelcome persecution of the Church – who were able to provoke it at will: witches. In a thorough excavation of the medieval soul Claude Lecouteux reveals the origin and significance of this belief in the Double and follows its transforming features through the ages. He shows that far from being fantasy or vague superstition fairies witches and werewolves all testify to a consistent ancient vision of our world and the world beyond.
<urn:uuid:1eb7429a-387c-45b9-8a57-e0b66d186562>
CC-MAIN-2022-33
https://juliettebourdier.net/2013/10/30/halloween-lets-do-it-medieval-way/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00676.warc.gz
en
0.976382
5,399
2.625
3
View as PDF Subpoenas can be used to obtain evidence from other parties which may not be readily available to the issuing party. This article will discuss what a subpoena is and the formal requirements of a subpoena. It will also discuss compliance with a subpoena and the grounds for setting aside a subpoena. A. What is a subpoena? Rule 33.1 of the Uniform Civil Procedure Rules 2005 (NSW) (‘UCPR’) defines a subpoena as being an order requiring a person or party (ie the addressee) to give or produce evidence. There are three different types of subpoenas that can be issued: • Subpoena to give evidence – where the addressee is required to attend court and give evidence; • Subpoena to produce – where the addressee is required to produce a copy of the subpoena and the specific document or thing ordered to be produced; and • Subpoena to give and produce evidence – where the addressee is required to both give evidence at court and produce a document or thing. B. Form of subpoena There are formal requirements of a subpoena that must be complied with to ensure that they are in the approved form.1 Pursuant to rule 33.3, these requirements include: • The subpoena must not be addressed to more than one person. As such, the issuing party will need to prepare and file a separate subpoena document for each party. For example, if the issuing party wishes to issue a subpoena to produce to three different banks, then three subpoena documents need to be prepared (one for each bank). • Unless ordered otherwise, the subpoena must identify the addressee (ie by name or position). If the addressee is a corporation, then a person holding the position identified in the subpoena is to comply with the subpoena. • A subpoena to give evidence must specify the: • Date for attendance; • Time for attendance; and • Place for attendance. • A subpoena to produce evidence must: • Identify the document / thing to be produced (eg bank records); and • Specify the date, time and place for production of the document or thing. The place for production would either be the court or another person/place authorised by the court to accept the evidence. C. Filing and serving the subpoena A subpoena becomes an order of the court once it has been: • Filed in court; and • Served personally on the addressee.2 The subpoena will specify the last date by which the subpoena must be served to the addressee. The last date for service is either: • Five days before the earliest date on which the addressee is required to comply with the subpoena; or • An earlier / later date that has been fixed by the court.3 Once the subpoena has been served on the addressee, the issuing party is then required to serve a copy of the subpoena to each active party involved in the case.4 D. Compliance with the subpoena The addressee must comply with the requirements of the subpoena. However, compliance is not required unless the subpoena has been served on the addressee on or before the last date of service.5 An exception to this rule is when the addressee already has knowledge of the subpoena. If the addressee has actual knowledge of the subpoena and its requirements (by the last date for service), then the addressee needs to comply with subpoena and its requirements even if service has not occurred.6 Regarding a subpoena to give evidence, an addressee does not need to comply with the requirement of attending court to give evidence unless the issuing party has given them ‘conduct money’, being an appropriate sum to cover the addressee’s costs of attending court (eg travel expenses).7 The conduct money must be given at a reasonable time before the date that the addressee is required to give evidence. Comparatively, an addressee must comply with a subpoena to produce either: • By attending court at the date, time and place specified and producing the document or thing at court; or • By delivering the subpoena and the document or thing to the Court Registrar at least two days before the specified date for production.8 Unless specifically stated in the subpoena, an addressee may produce a copy of any document required by the subpoena rather than the original. D.1. Costs and expenses of compliance The issuing party may be ordered by the court to pay the addressee any reasonable loss or expenses that they may have incurred in complying with the subpoena.9 An amount is generally fixed by the court and is separate from any conduct money or witness expenses that may be paid to the addressee. E. Setting aside a subpoena Failing to comply with a subpoena (without a lawful excuse) is considered to be contempt of court.10 However, a party or any person with a sufficient interest may apply to have the subpoena set aside on the ground11 that it is an abuse of process. Setting aside a subpoena to produce documents on the grounds of an abuse of process can be claimed using one or more of these reasons: • The subpoena is being used as a substitute for discovery – the court has held that subpoenas should not be used as a ‘fishing exercise’ to discover evidence;12 • The subpoena is oppressive – a subpoena may be oppressive if it has insufficient particularisation (ie not specific enough) or is too onerous;13 • The subpoena has an improper purpose – a subpoena must not be used for some purpose not related to the case (eg for private gain); • The documents specified for production in the subpoena have a lack of relevance to the proceedings;14 and • The subpoena does not have a legitimate forensic purpose – the issuing party must specify the legitimate forensic purpose for which production of the documents is sought. Comasters Law Firm can help clients issue subpoenas or have subpoenas set aside. 1 Uniform Civil Procedure Rules 2005 (NSW) r 33.3(1) (‘UCPR’). 2 Ibid r 33.5(1). 3 Ibid r 33.5(1). 4 Ibid r 33.5(2). 5 Ibid r 33.6(2). 7 Ibid r 33.6(1). 8 Ibid r 33.6(4). 9 Ibid r 33.11(1). 10 Ibid r 33.12(1). 11 Ibid r 33.4. 12 NSW Commissioner of Police v Tuxford NSWCA 139. 14 Trade Practices Commission v Arnotts Limited (No 2) (1989) 21 FCR 306. © Comasters August 2020. Important: This is not advice. Clients should not act solely on the basis of the material contained in this paper. Our formal advice should be sought before acting on any aspect of the above information.
<urn:uuid:88c4dcf0-f77e-4d57-bcdb-cbf6c658ab07>
CC-MAIN-2022-33
https://comasters.com.au/portfolio_page/subpoenas/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00073.warc.gz
en
0.896433
1,448
2.796875
3
Any variety of wine can be used in cooking, Aellen says. She says those sold as cooking wines often are high in sodium. Wine aids in digestion and calms the nerves, Aellen says. A six-ounce glass of dry wine has about 70 calories, she says. Sweeter wines contain a higher sugar content and have more calories. The use of wine in food is a matter of taste and preference, says Aellen, author of "Cooking with Wine." "You have to think of what you're serving; you don't want to confuse the palate," Aellen says. In the cookbook, now in its second edition, Aellen notes that wine is a flavoring agent. Fruit acid helps to tenderize meats and has a sour taste. Tannin in the wine has a bitter, astringent taste, and sweetness comes from any residual unfermented sugar. The alcohol has very little flavor and mostly is boiled off with the steam in cooked foods. Gift says she often uses wine when making stir-fry dishes, and she experiments with different varieties. She uses wine instead of oil as a base, which is a more healthful choice for people who want to eliminate oil from their diet. Gift says she changes the amount she uses, depending on the recipe. "I cook the old-fashioned way - a dab here and a dab there," Gift says. Aellen, who has been married to Jack Aellen, president of Berrywine Plantations, for 46 years, says she never tires of experimenting with wine in recipes. "I'm a far cry better cook than I was 46 years ago," she says. A.T. Gift Co. makes sweet wines, and Gift uses many varieties in her cooking. She says the plum flavor makes a good marinade for venison, apple is a good base for stir-frying and stuffing, and cherry is good in cakes or as a ham glaze. If a bottle of wine in the refrigerator goes flat, it still can be used for cooking. Use it in salads, stir-fry dishes and dressings. Here are more tips for cooking with wine: - Use your imagination. Add wine to a recipe, and write down the amount used, Gift says. If you like the result, make it again; if you don't, vary the amount next time. - Make the most of marinades. Use the same variety of wine you will be serving with the meal to marinate meats before grilling, National Pork Producers Council recommends. Substitute wine for the citrus juice or vinegar in the marinade recipe. The same principle applies when finishing a grilled meat with a wine glaze. Serve guests the same wine that you will use for the glaze, and they will note a flavor connection. Fish and pork tenderloin need to be marinated from 30 minutes to two hours to acquire new flavors. Tougher cuts need to be marinated longer. - Don't go overboard. Add wine gradually to a recipe, Aellen says. Start with one-eighth of a cup or a couple of tablespoons, and go from there, Aellen says. "Keep tasting it as you go," she says. "It's a learning process."
<urn:uuid:e40814b2-9614-4649-bcf4-c1520a1ea266>
CC-MAIN-2017-04
http://articles.herald-mail.com/1997-05-06/news/25123586_1_cooking-wines-sweeter-wines-sweet-wines
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00227-ip-10-171-10-70.ec2.internal.warc.gz
en
0.968534
689
1.867188
2
Shazia Javed’s documentary 3 Seconds Divorce was made before the historic Supreme Court ruling that struck down the practice of triple talaq and the controversial Muslim Women (Protection of Rights on Marriage) Bill, 2017, which proposes to criminalise instant divorce. The experiences of the women featured in the film are a reminder of why protests against the practice have raged over the decades. 3 Seconds Divorce will have its Indian premiere in the international competition section at the Mumbai International Film Festival that will run between January 28 and February 3. Javed, who lives in Mississauga in Canada, said she had wanted to make a film on the topic for years. “Triple talaq is a subject that I have wanted to explore ever since I was a school-going girl growing up in Delhi,” said Javed, who has previously directed the short films Namrata and Can you hear me? “As a Muslim, this has been one of the practices I struggled to come to terms with. I then came across the works of scholars and academics who dismissed the whole idea of this being a part of Islam. I remember reading an article in a mainstream Indian newspaper on this subject by Asghar Ali Engineer and it made so much sense to me as a female, as a Muslim, as an Indian and as a human being.” Javed focuses on women who have both been cast aside by instant divorce and have been subjected to the practice of halala, in which a man can remarry his ex-wife after she has married another man, consummated the union, and has been divorced. The filmmaker also explores the efforts of the Bharatiya Muslim Mahila Andolan, which is among the groups that petitioned the Supreme Court for a ban on triple talaq. The 54-minute documentary was shot between 2014 and 2017, and includes interviews with BMMA members. “They were doing the surveys, they were drafting alternate laws, they were counselling women at the grassroots level,” Javed said. “And there were other organsations too doing this work. The subject did pick up a lot more steam over the years and we were able to capture that. So the film is not just about this practice; it became the story of the women who were speaking up against this.” One case study speaks for many other women: Mumbai resident Lubna, who overcomes her shock at being summarily divorced by enrolling in college and becoming an activist while raising her son. Lubna’s story is highly representative, Javed feels. “She is trying to juggle work, motherhood and activism all at the same time. Sometimes her spirits are high and sometimes circumstances take a toll on her. But she doesn’t give up. Her story relates the emotional labour that goes into a movement like this and the personal losses that activists incur.” The decision to focus on a single character emerged from Javed’s desire to “delve deeper and not just wider”, but there are testimonials from other women too, who have been dismissed in a matter of seconds, some of them for trivial reasons. These include women who have been thrown out soon after their in-laws have run through the money spent on the wedding ceremonies. The film emphasises that the effects of triple talaq are especially harsh on poor and working-class women. Javed came away with immense admiration for their courage in the face of impossible circumstances. “I interviewed women in the slums of Mumbai who questioned why the men has so much control on their lives and why women has no home to call their own but only a maika or a sasural,” the filmmaker said. “They wanted me to make this film – they willingly came in front of the camera. I was honestly amazed at their resilience. They are living in particularly hard situations in communities that do not allow women to get an education; where they do not have access to employment opportunities of their calibre, where their married lives resemble walking on egg shells.” Javed’s comprehension of the practices of triple talaq and halala have expanded after making 3 Seconds Divorce – for one thing, she has understood better the price paid by the rejected women and their families. “I began to understand the dynamics of control, patriarchy and dowry behind this practice,” she said. “I knew that there are imams and muftis who defend this but actually interviewing them and listening to their justifications was another thing altogether. Most of them are totally clued out of the experiences and needs of the women. Nor do they seem to care to learn.”
<urn:uuid:323716cd-77b7-47c2-bd7b-354021b3cd35>
CC-MAIN-2022-33
https://scroll.in/reel/866317/documentary-3-seconds-divorce-revisits-the-effects-of-triple-talaq-on-muslim-women?fbclid=IwAR0nyUAwsoehJwQCMBkhDvySbX885h25IvMEZlhY8VQNYeN5P50deAopcbs
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00270.warc.gz
en
0.986434
968
1.773438
2
See reader questions & answers on this topic! - Help others by sharing your knowledge Platforms Available for MS-DOS / MS-Windows (Borland C++, Microsoft), OS/2 (Borland C++), Novell, Macintosh MPW, and various Unix systems, including NeXT (NeXTStep) and Sun OS (Sun C++). See web site for details. POET Software Corporation 999 Baker Way Suite 100 San Mateo, CA 94404 U.S.A. Toll Free: 1-800-950-8845 Direct: (415) 286-4640 Fax: (415) 286-4630 Email: [email protected] Web: http://www.poet.com Compuserve: GO POETSW POET Software, GmbH Fossredder 12 D 22359 Hamburg Germany Voice: +49 (0)40 / 60990 0 Fax: +49 (0)40 / 60398 51 Email: [email protected] > Statice (Symbolics) >From: [email protected] (Markus Fischer) Newsgroups: comp.databases.object,comp.lang.lisp Subject: Statice now runs on Unix Date: 15 Jun 93 14:55:48 GMT Hi there, since I've never seen 'Symbolics' or 'Statice' in comp.database.object, this might be interesting: A few days ago, Symbolics announced the availability of a beta- release of their ODBMS 'Statice' on Unix platforms. It is quite powerful and tightly integrated within Common Lisp. Currently, Symbolics and LUCID are supported. People (like me) used to Symbolics' Genera development environment can continue to use Statice there (where it has been already successfully employed in 'real world' applications) and now also use it on Unix Workstations. (Those are the cheaper boxes, I guess). Both kinds of platforms can be freely intermixed in a network. Statice is based on standards of Lisp: CLOS and CLIM (Common Lisp Object System, resp. Common Lisp Interface Manager) Here's the address of Symbolics in Germany; they're mostly responsible for Statice on Unix: Symbolics Systemhaus GmbH Mergenthalerallee 77 6236 Eschborn (til June 31) 65760 Eschborn (from July 1) Tel. (49) 6196-47220, Fax (49) 6196-481116 Contact person is Dr. Thomas Neumann ([email protected]). Also: "Update Database Schema" brings an existing database into conformance with a modified schema. Changes are classified as either compatible (lossless, i.e., completely information-preserving) or incompatible (i.e., potentially information-losing in the current implementation). Basically, any change is compatible except for the following: -- If an attribute's type changes, all such attributes extant are re-initialized (nulled out). Note that Statice permits an attribute to be of type T, the universal type. Such an attribute can then take on any value without schema modification or information loss. -- If a type's inheritance (list of parents) changes, the type must be deleted and re-created, losing all extant instances of that type. This is Statice's most serious current limitation. The simplest workaround is to employ a database dumper/loader (either the one supplied by Symbolics or a customized one) to save the information elements and then reload them into the modified schema. [Lawrence G Mayka <[email protected]>] > UniSQL UniSQL, Inc. produce a unified object-relational database systems that let users move to an object-oriented paradigm while perserving existing investments in SQL-based applications. Supports a while range of languages, databases and platforms. Prices start at $3,995. UniSQL offers a state-of-the-art suite of integrated object-oriented database systems and application development products which can be used separately or together to support complex development projects which use object-oriented development techniques, integrate sophisticated multimedia data, and require true multidatabase access to relational and object-oriented databases. The UniSQL product suite includes: UniSQL/X Database Management System; UniSQL/M Multidatabase System; and UniSQL/4GE Application Development Environment User interfaces include: C++, C, Object SQL, SmallTalk, and ODBC Database interfaces include: Ingres, Oracle, Sybase, UniSQL/X, and EDA/SQL UniSQL offers: - A wide selection of user interfaces including C++, SmallTalk, C, Microsoft's ODBC, both embedded (static and dynamic) and interactive Object SQL, and UniSQL and 3rd-party development tools. - Mission-critical database features such as a high-level query language (SQL/X), cost-based query optimization, automatic transaction management, automatic concurrency control, dynamic schema evolution, dynamic authorization, physical disk structuring options, and installation tuning parameters. - The UniSQL Multimedia Framework which provides natural and uniform database system support for all types of large unstructured data objects. The Multimedia Framework also provides for seamless integration of multimedia devices such as fax machines, CD jukeboxes, satellite feeds, image compression boards, etc. - The UniSQL/M Multidatabase System enables developers to manage a collection of multi-vendor databases -- Ingres, Oracle, Sybase, DB2, UniSQL/X, and others -- as a single federated database system with full object-oriented capabilities. The majority of UniSQL customers use UniSQL database products for mission-critical applications which require object-oriented, multimedia, post-relational, and heterogeneous database capabilities. A typical UniSQL customer is a Fortune 500 company, a commercial software developer, or government organization that is using UniSQL database products to: - support mission-critical application development projects which are being developed using object-oriented programming languages and development techniques, - support applications which must integrate many different types of corporate data -- text and documents, tabular data, images and audio, engineering drawings, GIS data, procedural data (programs), etc. -- into a single application context. - support the full object-oriented development paradigm using existing relational database systems such as Ingres, Oracle, Sybase, and DB2. - logically integrate one or more relational and object-oriented databases to form a single, homogenized database server which supports both relational and object-oriented facilities. UniSQL was founded in May 1990 by Dr. Won Kim, President and CEO, delivering the UniSQL/X DBMS in March of 1992. With its world-class database research and architectural team, UniSQL has perfected what the database industry has sought since the mid-1980s: a fully object-oriented data model that is a natural conceptual outgrowth of the popular relational model. Both the UniSQL/X DBMS and the UniSQL/M Multidatabase System represent the first of a powerful new generation of client-server database systems that support the full object-oriented paradigm yet retain all of the strengths and capabilities of relational database systems including support for ANSI-standard SQL. For more information, contact: UniSQL, Inc. 8911 N. Capital of Texas Hwy Suite 2300 Austin, Texas 78759-7200 U.S.A. Voice: 1-800-451-3267 (512) 343 7297 Fax: (512) 343 7383 Email: [email protected] > Unisys Universal Repository Unisys Corporation makes available the Unisys Universal Repository, a fully object-oriented repository for access, concurrent sharing and immediate updating of all business information for workgroup software development. Using an open, extensible architecture, the Universal Repository enables encapsulation of legacy applications and data in addition to use of new object-oriented information, and allows integration of leading development tools and objects. Information reuse is achieved through built-in hooks which encourages data and business rule interchange among popular application development tools. This enables developers to continue using their preferred tools and to reuse existing models and data. The Universal Repository uses the object database from Versant Object Technology Corporation, EXCHANGE bridging technology from leading U.K. integration and metadata specialist Software One Limited. EXCHANGE allows use of repository data with a wide range of the most popular front-end design, analysis and modeling tools including Texas Instruments IEF, Knowledgeware IEW and ADW, Intersolv Excelerator and Unisys LINC Design Assistant III. When integrated with the Universal Repository, information created by tools can also be stored for reuse. A CASE Data Interchange Format (CDIF) bridge supports the loading and unloading of business information to and from the repository. Users can also access the Software One Core Model (SOCM), a neutral interoperability model comprised of the objects required to describe tool models. The Unisys Universal Repository is available now for Sun Solaris platforms, with support for UNIX and Windows clients. A version for Windows NT Client and Windows NT Server is also under development. The Unisys Universal Repository is available immediately for independent software vendors (ISVs) under OEM licensing agreements. Sales to end-users will be through select resellers. The introductory stand alone price ranges from $1,900 ($U.S.) to $9,000 ($U.S.) depending on selected options. Call for more information and the location of the nearest Unisys authorized reseller. Contraste Europe S.A. OSMOS Relational Object Database Voice: (714) 380-6460 Email: [email protected] Web: http://osmos.unisys.com Contact: Gordon DeGrandis [email protected] > Versant (Versant Object Technology) See also: http://www.versant.com Versant is a client/server object database management system (ODBMS) targeted at distributed, multi-user applications. Versant runs on UNIX and PC platforms. Versant provides transparent language interfaces from object-oriented programming languages such as C++ and Smalltalk. Versant also supports a C API. Versant is built with an object-level architecture, which means that operations are generally performed on the object (or group thereof) level. Key Versant features include: Performance ----------- * Object-level locking for fine granularity concurrency control * Server-based query processing to reduce network I/O * Dual caching to speed warm traversals * Dynamic space reclamation and reuse Distribution ------------ * Immutable, logical object identifiers for data integrity * Object migration (transparent relocation across nodes) * Transparent cross-node references (distributed db) * Automatic two-phase commit Other ----- * Schema evolution (online via lazy updates) * Standard workgroup features (e.g., versioning, checkin/out) * Detachable, personal databases * DBA utilities Provide object database management system and development tools for multi-user, distributed environments. Supports C++ and Smalltalk access. Argos is their application development environment product. It's built on ParcPlace VisualWorks. Versant Object Technology Corporation 1380 Willow Road Menlo Park, CA 94025 U.S.A. Voice: (415) 329-7500 Fax: (415) 325-2380 3872 Larkspur CourtLoveland, CO 80538 U.S.A. Voice: (303) 593-9871 Fax: (303) 593-9874 Email: [email protected] Web: http://www.versant.com > VisualWorks ParcPlace Systems, Inc. produce Smalltalk based development tools including VisualWorks, a client/server tool that includes a database application creator for rapid application development. ParcPlace Systems, Inc. 999 East Arques Avenue Sunnyvale, CA 94086-4593 U.S.A. Voice: (408) 481-9090 Other Models ------------ Research Systems ________________ > GRAS -------------------------------------------------------------- GRAS - A Graph-Oriented Database System for SE Applications Copyright (C) 1987-1993 Lehrstuhl Informatik III, RWTH Aachen -------------------------------------------------------------- See the GNU Library General Public License for copyright details. Contact Adresses: Dr. Andy Schuerr Lehrstuhl fuer Informatik III, University of Technology Aachen (RWTH Aachen), Ahornstr. 55, D-5100 Aachen Email to [email protected] GRAS is a database system which has been designed according to the requirements resulting from software engineering applications. Software development environments are composed of tools which operate on complex, highly structured data. In order to model such data in a natural way, we have selected attributed graphs as GRAS' underlying data model. A first prototype of the GRAS (GRAph Storage) system - described in /BL 85/ - was already realized in 1985. Since this time gradually improving versions of the system have been used at different sites within the software engineering projects IPSEN /Na 90/, Rigi /MK 88/, MERLIN /DG 90/, and CADDY /EHH 89/. Based on these experiences, almost all parts of the original prototype have been redesigned and reimplemented. Thus, nowadays a stable and efficiently working single-process version of the system GRAS with interfaces for the programming languages Modula-2 and C is available as free software for Sun workstations (the GRAS system itself is implemented in Modula-2 and consists of many layers which might be reusable for the implementation of other systems): Via anonymous ftp from ftp.informatik.rwth-aachen.de in directory /pub/unix/GRAS in file gras.<version-no>.tar.Z. There are several files containing documentation, sources, binaries, application examples, and libraries. All binaries are for Sun/4 machines. Sun/3 binaries are shipped only if explicitly requested. You have to use the following sequence of operations for installing the GRAS system at your site: 1) 'ftp ftp.informatik.rwth-aachen.de' (with login name "anonymous" and password equal to your mail address). 2) 'cd pub/unix/GRAS' (for changing the current directory). 3) 'binary' (command for changing ftp mode). 4) 'get gras.<version-no.>' (use 'ls' for finding the currently used GRAS version nr.). 5) 'bye' (for exiting ftp). 6) 'uncompress gras.<version-no>.tar'. 7) 'tar xvf gras.<version-no>.tar' (creates a subdirectory GRAS_2 for the Modula-2 implementation of GRAS including its C-interface). 8) Follow the instructions in file GRAS_2/README. The current version has programming interfaces for Modula-2 and C and supports: - the manipulation of persistent attributed, directed node- and edge-labeled graphs (including the creation of very long attributes and of attribute indexes). - the manipulation of temporary/volatile generic sets/relations/lists, - the coordination of graph accesses by different GRAS applications (multiple-read/single-write access with graphs as lock units), - error recovery based on shadow pages and forward logs, - nested transactions and linear undo/redo of arbitrarily long sequences of already committed graph modifying operations based on forward and backward logs, - event-handling (with certain kinds of graph-modifications as events and graph-modifying transactions as event-handlers), - primitives for version control comprising the capability for efficiently storing graphs as forward/backward deltas to other graphs, - and primitives for declaring graph schemes and for incremental evaluation of derived attributes. Furthermore, tools for (un-)compressing graphs and a X11R5-based graph browser are part of this release. A multi-process version of the system GRAS supporting the inter- action of multiple client and multiple server processes within one local area network is nearby completion (version 6.0/0). Thus, the GRAS system may be considered to be the core of a graph oriented DBMS environment. The development of such an environment based on a very high-level specifications language named PROGRES is under way (the underlying calculus of this specification language are so-called PROgrammed GRaph REwriting Systems). This environment will comprise the following tools (a prerelease of this environment might be made available upon request): - a syntax-directed editor for graph schemes, graph rewrite rules, and sequences of graph rewrite rules, - an incrementally working consistency checker, - an incrementally working compiler&interpreter translating PROGRES specifications into sequences of GRAS procedure calls (for C as well as for Modula-2), - and an "enhanced" graph (scheme) browser. References ---------- Refer to the following publications for further info about GRAS, PROGRES, and related topics: /BL85/ Brandes, Lewerentz: A Non-Standard Data Base System within a Software Development Environment. In Proc. of the Workshop on Software Engineering Environments for Programming-in-the- Large, pp 113-121, Cape Cod, June 1985 /DHKPRS90/ Dewal, Hormann, Kelter, Platz, Roschewski, Schoepe: Evaluation of Object Management Systems. Memorandum 44, University Dortmund, March 1990 /Feye92/ Feye A.: Compilation of Path Expressions (in German), Diploma Thesis, RWTH Aachen (1992) /Hoefer92/ Hoefer F.: Incremental Attribute Evaluation for Graphs (in German), Diploma Thesis, RWTH Aachen (1992) /HPRS90/ Hormann, Platz, Roschweski, Schoepe: The Hypermodel Benchmark, Description, Execution and Results. Memorandum 53, University Dortmund, September 1990 /KSW92/ * Kiesel, Schuerr, Westfechtel: GRAS, A Graph-Oriented Database System for (Software) Engineering Applications. Proc. CASE 93, Lee, Reid, Jarzabek (eds.): Proc. CASE '93, 6th Int. Conf. on Computer-Aided Software Engineering, IEEE Computer Society Press (1993), pp 272-286 Also: Technical Report AIB 92-44, /Klein92/ Klein P.: The PROGRES Graph Code Machine (in German), Diploma Thesis, RWTH Aachen (1992) /Kossing92/ Kossing P.: Modelling of Abstract Syntax Graphs for normalized EBNFs (in German), Diploma Thesis, RWTH Aachen (1992) /LS88/ Lewerentz, Schuerr: GRAS, a Management System for Graph- Like Documents. In Proceedings of the Third International Conference on Data and Knowledge Bases, Morgan Kaufmann Publ. Inc. (1988), pp 19-31 /Nagl89/ Nagl (ed.): Proc. WG'89 Workshop on Graphtheoretic Concepts in Computer Science, LNCS 411, Springer-Verlag (1989) /NS91/ Nagl, Schuerr: A Specification Environment for Graph Grammars, in Proc. 4th Int. Workshop on Graph-Grammars and Their Application to Computer Science, LNCS 532, Springer- Verlag 1991, pp 599-609 /Schuerr89/ Schuerr: Introduction to PROGRES, an Attribute Graph Grammar Based Specification Language, in: /Nagl89/, pp 151-165 /Schuerr91a/ * Schuerr: PROGRES: A VHL-Language Based on Graph Grammars, in Proc. 4th Int. Workshop on Graph-Grammars and Their Application to Computer Science, LNCS 532, Springer- Verlag 1991, pp 641-659 Also: Technical Report AIB 90-16 /Schuerr91b/ Schuerr: Operational Specifications with Programmed Graph Rewriting Systems: Theory, Tools, and Applications, Dissertation, Deutscher Universitaetsverlag (1991) (in German) /SZ91/ * Schuerr, Zuendorf: Nondeterministic Control Structures for Graph Rewriting Systems, in Proc. WG'91 Workshop in Graph- theoretic Concepts in Computer Science, LNCS 570, Springer- Verlag 1992, pp 48-62 Also: Technical Report AIB 91-17 /Westfe89/ Westfechtel: Extension of a Graph Storage for Software Documents with Primitives for Undo/Redo and Revision Control. Technical Report AIB Nr. 89-8, Aachen University of Technology, 1989 /Westfe91/ Westfechtel: Revisionskontrolle in einer integrierten Soft- wareentwicklungsumgebung, Dissertation, RWTH Aachen, 1991 /Zuendorf89/ Zuendorf: Kontrollstrukturen fuer die Spezifikationssprache PROGRES, Diplomarbeit, RWTH Aachen, 1989 /Zuendorf92/ * Zuendorf A.: Implementation of the Imperative/Rule Based Language PROGRES, Technical Report AIB 92-38, RWTH Aachen, Germany (1992) /Zuendorf93/ * Zuendorf A.: A Heuristic Solution for the (Sub-) Graph Isomorphism Problem in Executing PROGRES, Technical Report AIB 93-5, RWTH Aachen, Germany (1993) * : All reports marked with an asterisk are available via anonymous ftp from ftp.informatik.rwth-aachen.de in directory /pub/reports/... . See also PROGRES documentation. [See also APPENDIX E] > IRIS (HP Labs) [Iris is a system out of HP Labs that began as a prototype and eventually became a commercial product. I believe it was eventually incorporated into the new HP product, OpenODB. - clamen] Long and short system summaries can be found in: [FISH89] D.H. Fishman et. al. Overview of the Iris DBMS. In Won. Kim and Frederick H. Lochovsky, editors, Object-Oriented Concepts, Databases and Applications, chapter 10, pages 219--250. Addison-Wesley, Reading, MA, 1989. [FBC+87] D.H. Fishman, D. Beech, H.P. Cate, E.C. Chow, T. Connors, J.W. Davis, N. Derrett, C.G. Hock, W. Kent, P. Lyngbaek, B. Mahbod, M.A. Neimat, T.A. Tyan, and M.C. Shan. Iris: An object-oriented database management system. ACM Transactions on Office Information Systems, 5(1):48--69, January 1987. The abstract of the latter (written early in the project) follows: The Iris database management system is a research prototype of a next-generation database management system intended to meet the needs of new and emerging database applications, including office automation and knowledge-based systems, engineering test and measurement, and hardware and software design. Iris is exploring a rich set of new database capabilities required by these applications, including rich data-modeling constructs, direct database support for inference, novel and extensible data types, for example to support graphic images, voice, text, vectors, and matrices, support for long transactions spanning minutes to many days, and multiple versions of data. These capabilities are, in addition to the usual support for permanence of data, controlled sharing, backup and recovery. The Iris DBMS consists of (1) a query processor that implements the Iris object-oriented data model, (2) a Relational Storage Subsystem (RSS) -like storage manager that provides access paths and concurrency control, backup and recovery, and (3) a collection of programmatic and interactive interfaces. The data model supports high-level structural abstractions, such as classification, generalization, and aggregation, as well as behavioral abstractions. The interfaces to Iris include an object-oriented extension to SQL. On Schema Evolution (from original survey): Objects in the Iris system may acquire or lose types dynamically. Thus, if an object no longer matches a changed definition, the user can choose to remove the type from the object instead of modifying the object to match the type. In general, Iris tends to restrict class modifications so that object modifications are not necessary. For example, a class cannot be removed unless it has no instances and new supertype-subtype relationships cannot be established. Commercial Systems __________________ > IDL (Persistent Data Systems) IDL is a schema definition language. Schema modifications are defined in IDL, requiring ad-hoc offline transformations of the database, in general. A simple class of transformations can be handled by IDL->ASCII and ASCII->IDL translators (i.e., integer format changes, list->array, attribute addition). [conversation with Ellen Borison of Persistent Data Systems] ADDITIONAL REFERENCES: John R. Nestor. "IDL: The Language and Its Implementation". Prentice Hall. Englewood Cliffs, NJ., 1989. > Kala Kala Technical Brief Summary Kala(tm) is a Persistent Data Server managing distributed, shared, arbitrarily complex and evolving persistent data. Kala is highly efficient and secure. Kala manages the visibility of persistent data elements to its clients, thus supporting any types of transactions, versions, access control, security, configurations. Kala does not restrict you to any particular model. Kala provides the mechanism, but imposes no policy. Usable as either a link library communicating to a server or as a standalone, Kala is compact and simple. Kala is used for applications such as: kernel of DBMS products, substrate for extended file systems, implementation of language persistence, data manager for groupware applications as well as applications which deal with large, complex, and changing volumes of data (text databases, financial distributed transaction systems). Our current customers use Kala in applications ranging from CASE repositories to CAD systems, from document management for financial institutions to OODBMS platforms, from real-time applications to database research. Kala is a component of broad reuse. Motivation The simplest persistent data storage available to you is the file system on your disk drive. File systems have some attractive characteristics; their performance is good, they can hold any data, they're easy to use, and, of course, the price is right. Conversely, files are unreliable. They provide no mechanism for in maintaining data consistency and only primitive data sharing facilities. Few file systems offer version control and all require that you transform data between "internal" and "external" forms all the time. Unlike a file system, a true database management system provides mechanisms for sharing data and for ensuring the integrity of the data. It supports transactions and version control, although the specifics of these functions may not be exactly what your application needs. Finally, a database system is scalable, and much more robust than a file when your hardware or software fails. The downside to a database system is that, compared to a file system, it is slower by an order of magnitude or more. Also, a database system generally confines you to dealing only with the kind of data that it can handle. In addition, a database is usually very complicated, difficult to learn and use, and expensive, both in terms of your cost of operation and in the amount of system resources they consume. Whether you choose a file system or a database manager, then, you have to sacrifice either economy or performance. Is there a happy medium? Something with the speed and flexibility of files, the reliability, shareability and robustness of databases, and at a cost that won't break your wallet or the available hardware? Sure there is! Kala is a first in a new breed of products, persistent data servers, aimed squarely at the yawning gap between DBMSs and file systems. Overview Kala is *not* a DBMS. Instead, you use Kala whenever the few canned combinations of DBMS features do not meet the needs of your application. A DBMS product constrains you to accept *its* choice of an end-user graphical interface, a query language binding, a specific high level data or object model, a particular transaction model, a single versioning scheme, etc. This either compromises your application's functionality, or forces your to spend substantial development effort and money to bridge the impedance mismatch to the application. Instead, Kala allows *you* to develop no more and no less than the functionality you need. You build your domain specific functionality our of a small set of primitives with very little code. Your gains in productivity, efficiency, and flexibility are substantial. To sustain this level of flexibility and reuse, Kala manages any data that you can represent in machine memory out of bits and references. Examples include records, dynamically linked graphs and lists, executable code, and object encapsulations. Kala can handle data as small as one bit, and as large as the virtual memory and more, while being totally unaware of the data's semantics. Its stores and retrieves data efficiently, and compactly over a distributed and dynamically reconfigurable set of Stores. Upon retrieval, Kala dynamically relocates embedded references to retain the original topological structure of the data, thus preserving referential integrity. Kala also supports active data, physical store management, and automatic archiving. Kala repackages the fundamentals and universals of data management in one reusable data server, separating them from the application domain specific models and policies. Kala defines a low level interoperabi- lity point for the data storage domain, just as X does for the display domain and Postscript does for the printing domain. Kala has matured through four successive versions to its present industrial strength implementation and stable API. Kala is lean, compact, and portable. Kala is a high performance, low overhead system. We call it a Reduced Instruction Set Engine (RISE). Unlike large, complex, and typically bulky DBMS products, Kala is small, simple, and suitable for managing anywhere from a single diskette to terabytes of distributed data. Benefits * For those who need functionality traditionally associated with databases, but cannot tolerate the overhead and complications DBMS products introduce, Kala offers a flexible, compact, performant, elegant, and simple alternative. * For those whose application domain requires data models where the mapping to those offered by today's DBMS products is cumbersome, introduces development and execution overhead, and is not portable across multiple linguistic and environmental platforms, Kala offers a data model independent interface against any data model expressible in terms of bits and pointers can be easily built. * For those who need DBMS functionality or qualities that no single DBMS product now has, Kala offers the opportunity to build that functionality now with little effort out of a simple set of primitives, and not wait for one vendor or another to deliver it later. * For those who have determined that the only viable option for their application's persistent data needs is the file system, and have resined to the idea that they will have to build everything else they need from scratch, Kala offers an off-the-shelf implementation without loss of any of files' advantages. * For those who need performance, size, portability, storage compactness, and industrial strength that no single DBMS product can now satisfy, Kala offers all of the above now. * For those who realize that while object-level interoperability is a strong desideratum, the likelihood of a single, universal such model in the foreseeable future is quite low, Kala offers a solid, long term alternative. Data store interoperability that brings us beyond file systems is the best practical bet. Kala is the basis for data store interoperability now. * Finally, for all of you who are concerned about the economics of software, and take the view that there are many elements that could contribute negatively to the soundness of your business, such as operational costs, software maintenance costs, software licensing costs, software development and learning costs, etc., you will find Kala an economically sound, sensible, and practical product. Features - The execution architecture is that of multiple (communicating) servers and multiple clients. Kala can also be configured in a standalone (single process) mode. Kala's IPC is built for maximum performance, portable to any given datagram protocol. - The managed data elements are made out of uninterpreted bits and references. Data elements (named `monads') are universally uniquely identified. Bits are stored with no overhead. References, represented in memory as native machine pointers, are stored very compactly, introducing an average of 2.5 bytes overhead. - Kala is a fully recoverable system, short of media damage. Recovery from hardware failures can be supported by the layer beneath Kala. - The Kala primitives support arbitrary transaction models, including classic short transactions, long (persistent) transactions, nested transactions, shared transactions, pessimistic and optimistic policies, etc. Concurrency control is achieved through two locking mechanisms (short-term and long-term (persistent, shared) locking), with full support for atomicity of operations and two-phase commit. - The Kala primitives support arbitrary versioning models, allowing versions to co-exist in split/rejoined networks, various version organization strategies (single-thread, tree, DAG, etc.). Kala primitives provide mechanisms for arbitrary access and update triggers, such as notifications, security checks upon access/update, etc. __ with no limitations on what the trigger code does. Kala provides protection measures against virus and other intruding executions. - The Kala primitives support a wide range of access control, security and protection models, including revocable access rights, access control without the overhead of ACL management, arbitrary access validation routines, etc. Kala does not introduce any more security holes than the operating environment already has. - Kala has primitives for physical store allocation and de-allocation management, for a wide spectrum of store administrative tasks, as well as licensing administration. The latter includes application- sensitive time-limited client-connect-based licensing, as well as metered (connect/load/store) usage. Kala can be set up to do automatic archiving and backup of its physical store. - Kala provides a wide spectrum of licensing schemes, usable by platforms and applications built upon Kala to their customer base. Kala provides renewable licenses, perpetual licenses, full protection against duplication without hardware (hostid) support, metered (pay-by-use) usage, etc. - And more ... not fitting on this page-long Technical Brief. Availability o Kala is available now on Sun platforms (SunOS / 68K & SPARC), as well as on 80x86/MS-DOS (both Microsoft and Borland compilers & runtimes supported) platforms. If you are interested in a port to your favorite platform, call us to discuss our Development and Porting Partnership Programme. o Kala's interface is ANSI C, also callable from C++. If you are interested in an interface or a binding to your favorite programming language, please call us to discuss out Development Partnership Programme. o For pricing and other information, please contact us by phone, fax or via e-mail at [email protected] On Schema Evolution (from original survey): Kala manages an untyped persistent store, implementing the semantics of robust, distributed, secure, changing, and shareable persistent data. Layers built upon the Kala platform can implement the semantics of objects with the same properties. As it operates below the schema layer, Kala does not address schema evolution directly. However, It supports the building of schema'ed layers above it and below the application, and those layers can provide for schema evolution conveniently using Kala primitives. This parts-box approach requires extra work on the part of the developer compared to out-of-the-box solutions, but provides power and flexibility sufficient for relatively low cost solutions in difficult environments (e.g. graph-structured data, dynamic classing) where no out-of-the-box solution is available. REFERENCES: Segui S. Simmel and Ivan Godard. "The Kala Basket: A Semantic Primitive Unifying Object Transactions, Access Control, Versions, annd Configurations Penobscot Development Corporation Penobscot Development produces and markets Kala, a persistent data server managing distributed, shared, arbitrarily complex and evolving persistent data. Kala manages the visibility of persistent data elements to its clients, thus supports all types of transactions, versions, access control, security, configurations. Kala does not restrict you to any particular model. Kala provides the mechanism, but imposes no policy. Usable as either a link library communicating to a server or as standalone, Kala is compact and simple. Kala is not an OODBMS. Instead, you use Kala whenever the few canned combinations of DBMS features do not meet the needs of your application. This parts-box approach requires extra work on the part of the developer compared to out-of-the-box solutions, but provides power and flexibility sufficient for relatively low cost solutions in difficult environmentsi (e.g. graph-structured data, dynamic classing) where no out-of-the-box solution is available. Penobscot Development Corporation One Kendall Square Building Suite 2200 Cambridge, MA 02139-1564 U.S.A. Voice: (617) 267-5252 Fax: (617) 859-9597 Email: [email protected] > Pick With Pick and its variants you only have problems if you want to redefine an existing field. Because of the way the data are stored and the separation of the data and the dictionary you can define additional fields in the dictionary without having to do anything to the data - a facility which we have found very useful in a number of systems. There is no general facility to redefine an existing field - you just make whatever changes are required in the dictionary then write an Info Basic program to change the data. We have seldom needed to do this, but it has not been complicated to do. If a field in the database is no longer used, it is often easiest simply to delete the reference to that field in the dictionary, and accept the storage overhead of the unused data. In such cases, while the data cannot be accessed through the query language, (Pick)Basic programs can still access them. [Geoff Miller <[email protected]>] Interfaces ---------- Research Systems ________________ > Penguin (Stanford) Penguin is an object-oriented interface to relational databases. Penguin has its own simple language-independent object model with inheritance for composite objects defined as views (called view-objects) of a relational database. These view-objects represent data according to application requirements in such a way that multiple applications can share overlapping, but different, sets of data. Multiple applications may share data by having overlapping schemata with differing composite objects and differing inheritance mappings. We have a C++ binding, which supports multiple inheritance. The result is a framework for collaboration among multiple users, each with differing perspectives about the system and its data. For additional information, please contact [email protected] References: ``A C++ Binding for Penguin: a System for Data Sharing among Heterogeneous Object Models,'' Arthur M. Keller, Catherine Hamon, Foundations on Data Organization (FODO) 93, October 1993, Chicago. ``Querying Heterogeneous Object Views of a Relational Database,'' Tetsuya Takahashi and Arthur M. Keller, Int. Symp. on Next Generation Database Systems and their applications, Fukuoka, Japan, September 1993, to appear. ``Updating Relational Databases through Object-Based Views,'' by Thierry Barsalou, Niki Siambela, Arthur M. Keller, and Gio Wiederhold, ACM SIGMOD, Denver, CO, May 1991. ``Unifying Database and Programming Language Concepts Using the Object Model'' (extended abstract), Arthur M. Keller, Int. Workshop on Object-Oriented Database Systems, IEEE Computer Society, Pacific Grove, CA, September 1986. Commercial Systems __________________ >AllegroStore See Databases & Development Sept. 5, 1994, p1. "Lisp, Smalltalk Languages Given Database Systems" Quote: Franz, based in Berkeley, Calif., is now shipping AllegroStore, which the company calls the first object database system designed for object-oriented Lisp. [...] The database is based on the ObjectStore engine from Object Design, also in Burlington. It supports multiple clients and servers, [...] Franz is at 800-333-7260 or 510-548-3600. > DBTools.h++ Rogue Wave Software A leading producer of C++ class libraries including Tools.h++, Heap.h++, C++ Booch Components, and DBTools.h++ for accessing relational databases, such as SYBASE, from C++ programs. Rogue Wave recently merged with Inmark Development (zApp), so their products now includes visual builders, visual interfaces, and code generators for C++ developers. Rogue Wave Software, Inc. 260 S.W. Madison Avenue P.O. Box 2328 Corvallis, OR 97339 U.S.A. Toll Free: 1-800-487-3217 Direct: (503) 754-3010 Fax: (503) 757-6650 Email: [email protected] Web: http://www.roguewave.com >OBJECT GATEWAY Object Gateway is a modeling, mapping and code generation tool that lets you look at existing relational data in Oracle, Sybase and other servers as if they are object oriented. It is a 100% client-resident and runs on Microsoft Windows platforms. Schema Genie, the design time component of Object Gateway, lets you design an ODMG-style object model for your SQL database. Once the model is designed, you can generate a variety of language interfaces for it (C++, C, OLE Automation and Visual Basic are currently supported). Object Engine is the run-time component of the system and it implements the object data model by supporting features such as activation and deactivation of objects, complex object assembly, inheritance, relationships and cache management. Object Browser is a component of the system that lets you browse through and manipulate data based on the object model that you defined. The central tenet of Object Gateway is that inside every complex relational database, there is an object model waiting to get out. Such a model reduces the abstraction level mismatch between modern, object oriented client tools and SQL servers. Automatic generation of an object oriented data access layer eliminates the need for programmers to hand-craft code to do the same. For more information, please contact Sierra Atlantic at the address below: Sierra Atlantic Inc 830 Hillview Court, Suite 270, Milpitas, CA 95035 Phone: (408) 956 3006 Fax: (408) 956 3001 Email: [email protected] > Persistence PERSISTENCE(TM): BRIDGING THE GAP BETWEEN OBJECT ORIENTED DEVELOPMENT AND RELATIONAL DATA Persistence is an application development tool which provides object oriented access to existing relational data. Persistence uses an automatic code generator to convert object models into C++ classes which know how to read and write themselves to a relational database. Leverage existing data Persistence enables object oriented access to existing relational databases. Applications built with Persistence can work side by side with legacy systems. Automate database access By generating the methods to convert relational data into objects, Persistence saves the developer from having to write literally hundreds of lines of code per class. Speed application development With Persistence, major changes to the application object model can be completed in minutes, not weeks. Quality Persistence generates tested, bug-free code. Using Persistence helps ensure the reliability and reusability of your applications. Performance At Runtime, Persistence manages an object cache to enhance performance while ensuring data integrity. The Persistence object cache can provide a factor of ten performance improvement for data intensive applications. Portability Code generated by Persistence is database independent. You can choose which database to work with at link step, increasing application portability. TECHNICAL SPECIFICATIONS The Persistence Database Interface Generator converts object schemas into C++ classes. Custom Code | v Object schema ---> Persistence ----> Generated Generator Classes ^ | v Persistence Object Cache ^ | v Legacy Data Encapsulation Each class generated by Persistence maps to a table or view in the database. - Query using ANSI SQL or attribute values - Add custom code to generated classes - Preserve custom code when model changes Inheritance Persistence supports inheritance of attributes, methods and relationships. - Propagate superclass queries to subclasses - Use virtual methods for polymorphism Associations Persistence maps associations to foreign keys in the database. Each class has methods to access related classes. - Ensure referential integrity between classes - Specify delete constraints for associations Object Caching The Persistence Runtime Object Management System caches objects during transactions and ensures data integrity. In the object cache, Persistence "swizzles" foreign key attributes into in-memory pointers, speeding object traversal. Transactions When a transaction is committed, Persistence walks through the object cache and writes out changes to the database. Environment Platforms/Operating systems Persistence will support all major Unix and Intel platforms - Sun/SunOS 4.x, Solaris 2.x - HP/HP-UX 8.0, 9.0 - IBM/AIX (planned 11/93) - Intel/NT (planned 3/94) Development Tools Persistence supports all major C++ compilers and integrates with GE's OMTool, allowing developers to go straight from an object model to a running C++ application. - Cfront 2.1: ObjectCenter 1.0, SPARCompiler, ObjectWorks - Cfront 3.0: ObjectCenter 2.0, SPARCompiler, Softbench C++ - GE's OMTool Databases Persistence provides database independence. With our Objectivity integration, we also provide a clear migration path to object databases. - Oracle V6, V7 - Sybase 4.x - Ingres 6.x - Objectivity ODBMS - Informix (planned 9/93) - ODBC (planned 3/94) CUSTOMER QUOTES "We wanted to use object technology while continuing to support our legacy systems. Persistence made this feasible by automating over 30 percent of our development cycle." Steve Hunter, Sterling Software "Persistence cut our development time by approximately 40%, because we would have had to do all the mapping functions ourselves." Jim Adamczyk, Partner, Andersen Consulting "I'm convinced we'll save weeks or months of time because of Persistence." Mike Kubicar, SunSoft Defect Tracking Team "The good thing is that you can change your object model and just re-generate the database interface classes at the press of a button." Richard Browett, Product manager, K2 Software Developments, Ltd. "The Persistence package saved at least 25 to 50 percent of the development time, and seemed extremely robust. Support has been nothing short of phenomenal." Stew Schiffman, DuPont Research and Development FOR MORE INFORMATION Persistence Software, Inc. 1700 S. Amphlett Blvd. Suite 250 San Mateo, CA 94402 U.S.A. Voice: 1-800-803-8491 (415) 341-7733 Fax: (415) 341-8432 Email: [email protected] Web: http://www.persistence.com > Subtleware Connecting C++ with Relational Databases Subtleware for C++ (Subtleware) is a software development toolset which openly automates C++ connectivity to relational databases by providing: * A C++ pre-processor that automatically generates the code necessary to read and write C++ objects to a relational database. * A schema mapper that defines C++ classes from relational database schema, and * A class library that simplifies C++ application access to existing relational data, SUBTLEWARE INCREASES PROGRAMMER PRODUCTIVITY Subtleware vastly simplifies the coding necessary for C++ to work with relational databases: * It jump starts application development by generating C++ class definitions from relational database schema. * It speeds application development by eliminating the need to write hundreds of lines of database mapping code per class. * It dramatically reduces application maintenance time by eliminating the need to modify the database mapping code with each C++ class definition change. As a result, C++ application developers can focus on what brings value to their organization, application development; and, C++ application development projects can reduce their development costs as well as speed their time-to-market. SUBTLEWARE IS DESIGNED TO BE OPEN * Subtleware adds value to your C++ development environment! Subtleware fits into your existing C++ development environment by working with your preferred C++ design tools, compilers, and class libraries. No Subtleware-specific design tools are necessary. * Subtleware works directly with your existing C++ class definitions! * Subtleware adds value to your relational database systems! Your C++ applications can work concurrently and share data with your other relational database applications. Subtleware makes your existing relational database into a powerful OODBMS. * Subtleware library source code and generated code is freely available! No run-time fees are imposed. SUBTLEWARE IS WIDELY AVAILABLE Subtleware runs on a wide range of computing platforms: * PC's running Windows 3.x, Windows NT, OS/2, and DOS. * Unix workstations, including Sun and HP. Subtleware supports a variety of database interfaces: * ANSI SQL * ODBC * Oracle * Sybase * Watcom * Informix (planned 8/95) * Ingres (planned 10/95) * ODMG (planned 12/95) Subtleware supports virtually all C++ 2.x and 3.x compilers, including: * Borland C++ * Microsoft Visual C++ * HP C++ * SunPro C++ SUBTLEWARE IMPROVES SOFTWARE QUALITY Subtleware generates well-documented, bug-free code. Furthermore, Subtleware code generation can be customized for your application requirements. Using Subtleware greatly increases the reliability and reusability of your applications. SUBTLEWARE OPTIMIZES APPLICATION PERFORMANCE Subtleware generates static SQL code that can be linked directly into your application or packaged as a DLL or shared library. Subtleware does not require the use of high-overhead, run-time modules for managing your persistent objects.
<urn:uuid:a139b5ec-a641-4afd-9d64-fc30ee9131cf>
CC-MAIN-2017-04
http://www.faqs.org/faqs/object-faq/part8/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00493-ip-10-171-10-70.ec2.internal.warc.gz
en
0.84633
10,688
1.84375
2
Recently, a couple who had rescued a deer and nursed it back to good health — only for the state of Indiana to charge them with a misdemeanor and a jail sentence of 60 days. It’s quite the conundrum – they broke the law, but to punish a man for acting righteously is the height of wickedness. In the Bible, God annihilates the cities of Sodom and Gomorrah for such depravity. If it were a felony offense, the couple would be put before a jury, who must decide only on the facts of the case, on whether they committed the alleged crimes. Except that last sentence is false. The entire legal system has conspired to keep jurors blind to one of their most powerful privileges – that they judge the facts AND the law. If a juror accepts that the person on trial did indeed violate the law, the juror may still return a finding of ‘not guilty’ because they consider the law unjust. This right is known as jury nullification. It has had a long and storied history; famously, a man was accused of sedition in New York in 1735, while it was still under the control of the British crown. There was no question that he, John Peter Zenger, had violated the law, with his truthful criticism of the government. But the jury returned a verdict of ‘not guilty’ because they deemed the law unjust. In the years before the American Civil War, juries in the North refused to convict runaway slaves under the ‘Fugitive Slave Act,’ because they believed escaping bondage was not a crime. Jury nullification has also been practiced in Canada and the United Kingdom. The Government Cover-Up In 1794, in the case of Georgia v. Brailsford, the US Supreme Court ruled that judges were obligated to inform jurors of their right to jury nullification. A hundred years later, in Sparf v. United States, the Court ruled that judges were not obligated to tell the jury of their rights to judge the law. Later rulings would affirm the right of the courts to bar the defense from telling jurors that they could use jury nullification. A 1997 ruling held that a juror can be removed if he intends to use jury nullification; a 2001 California Supreme Court ruling involving a statutory rape case held that jurors must effectively snitch when a fellow panelist is opting for jury nullification. In 1994, the courts in Colorado ended up going on a witch hunt after a woman started arguing for jury nullification to her fellow jurors. She turned out to have a drug-related sentence, 12 years prior, which she had not been asked about during jury selection. The government charged her with perjury, for not disclosing her prior drug sentence, even though she answered all jury selection questions truthfully. Said Clay Conrad, author of a book on jury nullification, “It is obvious from the context of the entire case they prosecuted her for her verdict. If they can punish jurors for their verdicts, the jury system is just a living fossil brought out to harm people. There is nothing left if jurors can’t be independent and vote their own consciences.” To use jury nullification is to ‘obstruct justice’ these judges held, shredding the power of jury nullification. The court tried to convict her of perjury based on things she said during jury deliberations, deliberations which may not be used in court proceedings so that jurors can speak candidly among themselves when making decisions. I asked an older lawyer friend of mine about jury nullification, and he steadfastly denied that what I was proposing was legal. I asked another friend who is an attorney, and he had never heard of it, despite a successful career. In fact, federal prosecutors indicted a man for telling people about jury nullification, saying that “advocacy of jury nullification, directed as it is to jurors, would be both criminal and without Constitutional protections no matter where it occurred.” In other words, the feds were too happy to baldly suppress free speech, in the case of a retired chemistry professor handing out pamphlets on juror rights. Thankfully, he was acquitted. Honest, accurate coverage of jury nullification is the exception, not the rule. For a captivating illustration of jury nullification, see this brief work, by the illustrator of the internet sensation ‘Go The F**K To Sleep.’ Noted libertarian Ron Paul is also a prominent advocate of jury nullification. What You Can Do The next time you hear some self-righteous jackass ask if you voted, ask them if they know what ‘jury nullification’ is. While your election votes will probably never make a difference, your vote in a jury trial in a criminal case is decisive—a guilty verdict is required from all twelve jurors. Without your assent to his guilt, the defendant cannot be convicted. You must look to your own beliefs to decide when jury nullification is appropriate. But it’s not hard to imagine them: - The War on Drugs – someone is on trial for felony possession of marijuana: not guilty - Domestic Violence – A man is facing jail time for slapping his wife after she was caught cheating on him: not guilty - The Right To Bear Arms – A woman is charged with illegal weapons possession after confronting a mugger with a handgun, in a city where it is impossible for a law-abiding citizen to legally carry a firearm on his person: not guilty - Self-Defense – A homeowner is charged with murder for shooting a burglar: not guilty - Sexual Assault – A man is charged with sexual assault for not using a condom during sex: not guilty - Assault – A man is charged for punching a woman who physically started a fight with him: not guilty - Child Support – A man is charged for non-payment of child support for a woman who lied about being on the pill and refused to get an abortion: not guilty - Statutory Rape – A 17 year old male turns 18 and continues to sleep with his 17 year old girlfriend, and then gets charged with statutory rape: not guilty In short, if a defendant committed something you don’t consider a punishable crime, and you believe it would be a violation of your conscience to convict the defendant, you simply vote ‘not guilty.’ Outcome: either the jury is hung, giving the defendant another trial, or the defendant is acquitted completely. I cannot think of any other power you have a citizen that is as easy, potent and immediate as jury nullification.
<urn:uuid:a1ba4a9c-256e-4e76-88a0-cdd6d6d6364d>
CC-MAIN-2017-04
http://www.returnofkings.com/4386/the-lazy-mans-way-to-subvert-the-system-and-deliver-justice
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00559-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972453
1,359
2.578125
3
Young people as teachers and learners: challenging the novice-expert dichotomy Fuller, Alison and Unwin, Lorna (2004) Young people as teachers and learners: challenging the novice-expert dichotomy. International Journal of Training and Development, 8, (1), 32-42. (doi:10.1111/j.1360-3736.2004.00194.x). Full text not available from this repository. Conventionally, apprenticeship is understood as a linear journey from novice to expert in which 'old-timers' mould their successors. This paper challenges the assumptions that expertise is equated solely with status and experience in the workplace, and that all novices and experts, regardless of context, are seen as the same. |Digital Object Identifier (DOI):||doi:10.1111/j.1360-3736.2004.00194.x| |Subjects:||L Education > LC Special aspects of education > LC5201 Education extension. Adult education. Continuing education| |Divisions :||University Structure - Pre August 2011 > School of Education > Lifelong and Work-Related Learning University Structure - Pre August 2011 > School of Education |Accepted Date and Publication Date:|| |Date Deposited:||29 Jun 2006| |Last Modified:||31 Mar 2016 12:10| |RDF:||RDF+N-Triples, RDF+N3, RDF+XML, Browse.| Actions (login required)
<urn:uuid:af6eb92f-4298-41cf-9881-b8d3b2d7653c>
CC-MAIN-2017-04
http://eprints.soton.ac.uk/39829/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280899.42/warc/CC-MAIN-20170116095120-00576-ip-10-171-10-70.ec2.internal.warc.gz
en
0.778469
325
2.015625
2
Lees, C., 2010. The Grand Coalition and the party system. German Politics, 19 (3-4), pp. 312-331. This article examines the formation of the Grand Coalition in the context of the German party system and draws upon a synthetic analytical framework derived from formal coalition theory. It argues that both the SPD and CDU/CSU would have anticipated that the Grand Coalition would have generated relatively high levels of inter-party conflict as well as significant electoral costs. The article demonstrates that the CDU/CSU's motives for entering a Grand Coalition were quite evident but those of the SPD were more questionable. The SPD's course of action is only explained by a number of specific policy objectives, a desire to minimise co-ordination costs, and through the concept of pure time preference, in which SPD elites demonstrated a preference for an established coalition model over new and untested coalition options. The article concludes that, whilst it is not possible to demonstrate that the Grand Coalition increased the rate of party system fragmentation, it failed to stabilise the declining vote share for the two Volksparteien. |Item Type ||Articles| |Departments||Faculty of Humanities & Social Sciences > Politics Languages and International Studies| |Publisher Statement||Lees_2010_German_Politics_19_3_4_312.pdf: This is an Author's Accepted Manuscript of an article published in Lees, C 2010, 'The Grand Coalition and the party system' German Politics, vol 19, no. 3-4, pp. 312-331, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/09644008.2010.515773| Actions (login required)
<urn:uuid:1ab0eaf3-1e31-4baa-b157-e82fe8e0c891>
CC-MAIN-2017-04
http://opus.bath.ac.uk/25970/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00216-ip-10-171-10-70.ec2.internal.warc.gz
en
0.869751
365
1.984375
2
Manufacturing resource planning Manufacturing resource planning (MRP II) is defined as a method for the effective planning of all resources of a manufacturing company. Ideally, it addresses operational planning in units, financial planning, and has a simulation capability to answer "what-if" questions and extension of closed-loop MRP. This is not exclusively a software function, but the management of people skills, requiring a dedication to database accuracy, and sufficient computer resources. It is a total company management concept for using human and company resources more productively. Key functions and features MRP II is not a proprietary software systems and can thus take many forms. It is almost impossible to visualize an MRP II system that does not use a computer, but an MRP II system can be based on either purchased–licensed or in-house software. Almost every MRP II system is modular in construction. Characteristic basic modules in an MRP II system are: - Master production schedule (MPS) - Item master data (technical data) - Bill of materials (BOM) (technical data) - Production resources data (manufacturing technical data) - Inventories and orders (inventory control) - Purchasing management - Material requirements planning (MRP) - Shop floor control (SFC) - Capacity planning or capacity requirements planning (CRP) - Standard costing (cost control) and frequently also Actual or FIFO costing, and Weighted Average costing. - Cost reporting / management (cost control) together with auxiliary systems such as: - Business planning - Lot traceability - Contract management - Tool management - Engineering change control - Configuration management - Shop floor data collection - Sales analysis and forecasting - Finite capacity scheduling (FCS) and related systems such as: - General ledger - Accounts payable (purchase ledger) - Accounts receivable (sales ledger) - Sales order management - Distribution resource planning (DRP) - Automated warehouse management - Project management - Technical records - Computer-aided design/computer-aided manufacturing (CAD/CAM) The MRP II system integrates these modules together so that they use common data and freely exchange information, in a model of how a manufacturing enterprise should and can operate. The MRP II approach is therefore very different from the "point solution" approach, where individual systems are deployed to help a company plan, control or manage a specific activity. MRP II is by definition fully integrated or at least fully interfaced. MRP and MRPII History and evolution Material requirements planning (MRP) and manufacturing resource planning (MRPII) are predecessors of enterprise resource planning (ERP), a business information integration system. The development of these manufacturing coordination and integration methods and tools made today's ERP systems possible. Both MRP and MRPII are still widely used, independently and as modules of more comprehensive ERP systems, but the original vision of integrated information systems as we know them today began with the development of MRP and MRPII in manufacturing. MRP (and MRPII) evolved from the earliest commercial database management package developed by Gene Thomas at IBM in the 1960s. The original structure was called BOMP (bill-of-materials processor), which evolved in the next generation into a more generalized tool called DBOMP (Database Organization and Maintenance Program). These were run on mainframes, such as IBM/360. The vision for MRP and MRPII was to centralize and integrate business information in a way that would facilitate decision making for production line managers and increase the efficiency of the production line overall. In the 1980s, manufacturers developed systems for calculating the resource requirements of a production run based on sales forecasts. In order to calculate the raw materials needed to produce products and to schedule the purchase of those materials along with the machine and labor time needed, production managers recognized that they would need to use computer and software technology to manage the information. Originally, manufacturing operations built custom software programs that ran on mainframes. Material requirements planning (MRP) was an early iteration of the integrated information systems vision. MRP information systems helped managers determine the quantity and timing of raw materials purchases. Information systems that would assist managers with other parts of the manufacturing process, MRPII, followed. While MRP was primarily concerned with materials, MRPII was concerned with the integration of all aspects of the manufacturing process, including materials, finance and human relations. Like today's ERP systems, MRPII was designed to tell us about a lot of information by way of a centralized database. However, the hardware, software, and relational database technology of the 1980s was not advanced enough to provide the speed and capacity to run these systems in real-time, and the cost of these systems was prohibitive for most businesses. Nonetheless, the vision had been established, and shifts in the underlying business processes along with rapid advances in technology led to the more affordable enterprise and application integration systems that big businesses and many medium and smaller businesses use today. Material requirements planning (MRP) and manufacturing resource planning (MRPII) are both incremental information integration business process strategies that are implemented using hardware and modular software applications linked to a central database that stores and delivers business data and information. MRP is concerned primarily with manufacturing materials while MRPII is concerned with the coordination of the entire manufacturing production, including materials, finance, and human relations. The goal of MRPII is to provide consistent data to all members in the manufacturing process as the product moves through the production line. Paper-based information systems and non-integrated computer systems that provide paper or disk outputs result in many information errors, including missing data, redundant data, numerical errors that result from being incorrectly keyed into the system, incorrect calculations based on numerical errors, and bad decisions based on incorrect or old data. In addition, some data is unreliable in non-integrated systems because the same data is categorized differently in the individual databases used by different functional areas. MRPII systems begin with MRP, material requirements planning. MRP allows for the input of sales forecasts from sales and marketing. These forecasts determine the raw materials demand. MRP and MRPII systems draw on a master production schedule, the breakdown of specific plans for each product on a line. While MRP allows for the coordination of raw materials purchasing, MRPII facilitates the development of a detailed production schedule that accounts for machine and labor capacity, scheduling the production runs according to the arrival of materials. An MRPII output is a final labor and machine schedule. Data about the cost of production, including machine time, labor time and materials used, as well as final production numbers, is provided from the MRPII system to accounting and finance. For the companies that want to integrate their other departments with their manufacturing management, ERP software are necessary. MRP II systems can provide: - Better control of inventories - Improved scheduling - Productive relationships with suppliers For design / engineering: - Improved design control - Better quality and quality control For financial and costing: - Reduced working capital for inventory - Improved cash flow through quicker deliveries - Accurate inventory records Authors like Pochet and Wolsey argue that MRP and MRP II, as well as the planning modules in current APS and ERP systems, are actually sets of heuristics. Better production plans could be obtained by optimization over more powerful mathematical programming models, usually integer programming models. While they acknowledge that the use of heuristics, like those prescribed by MRP and MRP II, were necessary in the past due to lack of computational power to solve complex optimization models, this is mitigated to some extent by recent improvements in computers. - Document automation for Supply Chain and Logistics - Enterprise resource planning (ERP) - Just-in-time (business) - Material requirements planning (MRP) - Scheduling (production processes) - Supply chain management - Distribution resource planning - Warehouse management system - Warehouse control system - Shum, Paul (2003). Knowledge and Innovation Culture as Determinants of Financial Performance in New Product Development. Australia: The International Journal of Knowledge, Culture and Change Management. - Monk, E. and Wagner, B., Concepts in Enterprise Resource Planning, 2nd Edition, 2006, Editor, Mac Mendelsohn, Canada: Thomson Course Technology. - Wolsey, Laurence (2006). Production Planning by Mixed Integer Programming. Springer. ISBN 978-0-387-29959-4.
<urn:uuid:7821e369-edb4-4183-8f69-f064118d55ff>
CC-MAIN-2016-44
https://en.wikipedia.org/wiki/Manufacturing_resource_planning
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00064-ip-10-171-6-4.ec2.internal.warc.gz
en
0.916214
1,788
2.875
3
If you're looking for an enriching place to build your occupational therapy career, consider getting your license in Michigan. You can choose from a variety of OT jobs in healthcare, school and skilled nursing settings, working with patients of all ages. This guide highlights the information you need to know about practicing as an occupational therapist in the state. Learn about obtaining your licensure, average salaries and jobs offering generous pay and benefits. If you need details beyond what's provided here, please get in contact with our staffing experts who can help kickstart your occupational therapy career in Michigan. How to Get Your Michigan Occupational Therapy License Licensure is handled by the Michigan Board of Occupational Therapists. While it usually takes four to six weeks to process applications, time lines can vary. Occupational therapists in Michigan earn an average mean salary that's below the national average. However, Michigan is an affordable place to live and work, with a cost of living that's about 10% less than the national index. With borders touching four of the Great Lakes, Michigan is second only to Alaska with more than 3,200 miles of freshwater shoreline. Beautiful beaches, lush forests, sandstone cliffs and plenty of waterways make this Midwestern region a standout. If you want to spend time in the Great Lakes State, connect with our recruiters. They're ready to facilitate your job search and licensure to help you start working sooner. How long does it take to receive your occupational therapy license in Michigan? It typically takes between four and six weeks to receive your occupational therapy license in Michigan. This is slow compared to other occupational therapy licenses across the United States. Michigan occupational therapy contact information Michigan Board of Occupational Therapists P.O. Box 30670 Lansing, MI 48909 Phone: (517) 241-0199 Fax: (517) 241-9416 Michigan Occupational Therapy Salary Information Being an allied traveler, especially with Med Travelers, comes with a lot of amazing benefits. Our staffing specialists strive to make your journey hassle-free, providing prearranged housing, generous medical benefits, a 401(k) retirement account and travel reimbursement. Travel OTs can also push their earnings over the national average. Michigan OTs earn an annual mean salary of $78,010, which is less than the national mean of $86,210. Travel OTs can make up to 20% more than permanent staff because of the urgent need for their skills. Does travel occupational therapy appeal to you? Browse through our inventory of OT job postings across the country to see where you could be working, and apply today to have our recruiters match you to the perfect job.
<urn:uuid:3e71ca8f-11c0-49e8-ac9b-1591a54d197a>
CC-MAIN-2022-33
https://www.medtravelers.com/state-boards/occupational-therapy/michigan/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00471.warc.gz
en
0.923917
573
1.695313
2
How to find the correct /dev/ttyS*? I am going to use serial port to do some communication stuff. when the program comes to open("/dev/ttyS0", O_RDWR|O_NOCTTY ); programme hangs with output "pemission denied". What's the problem? Is it because I used wrong device name? How can I know which tty device my serial port is using? My Linux box has a ps2 mouse and a keyboard. and there is one COM port, which I am trying to use.
<urn:uuid:ab51231a-d3d3-426e-81a2-255bf9265efd>
CC-MAIN-2017-04
http://www.linuxquestions.org/questions/linux-software-2/how-to-find-the-correct-dev-ttys*-202343/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00536-ip-10-171-10-70.ec2.internal.warc.gz
en
0.901273
119
2.15625
2
Is there still a rap against the OWS movement for being ill-defined? It seems I’m still hearing this, even though the fact that one could pretty much paste all the sections of The New York Times to a wall and play “Pin the Tail on the OWS Concern” and a majority of the time you’d stick the pin right on a story the 99 percenters would take issue with. Just because there are unending problems within this country and across the globe doesn’t mean a movement’s attempt to address many of them is misguided or should be dismissed for a lack of clarity. Anyway, The Nation’s collected a few of the ideas from the 99 percent in a nice forum. Here’s what the editors had to say: The astonishing growth of Occupy Wall Street reflects a widespread understanding that our political system has failed to address the worst economic disaster since the Great Depression. As William Greider points out in this issue, the housing foreclosure crisis continues to smother the economy, and yet both parties are, for the most part, standing with the banks in denying adequate relief for millions of underwater homeowners. There’s no shortage of smart policy proposals to address the crises that beset us, on everything from housing to fair taxation to corporate governance, student loans and racial justice. The problem is that our politicians are primarily answerable to the 1 percent, who fund their campaigns. The OWS movement is already a success for having raised all these issues—explored in the articles presented here. There it is again: The OWS movement has already succeeded, because just a few short months ago much of the press wasn’t talking about all of the things they’re talking about now. Check out The Nation’s forum, including Sam Pizzigati’s “OWS Revives the Struggle for Economic Equality,” Rinku Sen: “Race and Occupy Wall Street,” and much more. Source: The Nation
<urn:uuid:2acf0d43-41d1-4dcd-934e-0871fb509af7>
CC-MAIN-2017-04
http://www.utne.com/community/occupy-wall-street-99-problems-1-percent
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00212-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953754
415
1.578125
2
Six Healthfully Fatty Foods That Can Keep You At A Healthy Weight Someone who is recovering from an eating disorder may have difficulty recalling healthful eating habits and gaining back lost weight. Here is a list of six healthfully fatty foods that can aid in weight gain during recovery. Because the fat is left in whole milk, it contains 60 more calories than skim milk. When the fat is kept in milk, it also contains more vitamins and nutrients than alternative types of milk. Eaten with a healthy diet, red meat can help someone who is underweight put on more pounds. Fatty cuts with marbled meat, like the New York strip and rib-eye steaks, contain the most calories. While steak is high in protein and iron, it can be unhealthy when combined with saturated fats. Fruits like mangoes, bananas, pineapples, and papayas are full of natural sugars and fats. In the case of fruit, there’s no such thing as too much, so those seeking to gain weight don’t have to limit intake of this fatty food. In addition to weight gain, fruit can also increase energy levels. Peanut butter is a great choice for people looking to gain weight, because it’s full of protein and fats. It is also high in folate, magnesium, vitamin E, and vitamin B3. Each tablespoon contains 100 calories and four grams of protein. The best brands of peanut butter for positive weight gain are natural and do not contain extra sugar or other ingredients. Nuts are full of fat, nutrients, and fiber. Almonds are especially beneficial for those seeking to gain weight, because they are high in fat. Mixed nuts are also a good option because of the nutritional variety. They can be eaten alone or added to daily meals, like salad or breakfast cereal. Cheese is another versatile food that can be added to almost any dish. Most cheeses are high in fat, which can make weight gain easier. It is also high in protein, which makes it a delicious and nutritional snack on its own. Source: Active Beat
<urn:uuid:f875338e-e307-41bd-ad14-955da9c3adf5>
CC-MAIN-2016-44
http://www.eatingdisordersonline.com/articles/recovery/six-fatty-foods-that-can-help-you-gain-weight
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720972.46/warc/CC-MAIN-20161020183840-00250-ip-10-171-6-4.ec2.internal.warc.gz
en
0.951968
433
2.140625
2
Today’s guitar lesson covers one of my favorite techniques, finger tapping. This technique was first made popular by Eddie Van Halen and became a big part of his early sound. Those of you who are familiar with finger tapping already know how difficult it can be. First, you must coordinate both hands while trying to hold onto the pick. Then you have to decide which fingers to use for tapping. When you finally get all of this together there’s often so much string noise that the lick sounds like a mess! This guitar lesson has three playing examples with guitar tabs and sound files. The hardest part about this technique is not the actual tapping itself, but being able to control all the potential string noise that can occur. That is why it is crucial to work on this very slowly, gradually building speed. While this is true for most cool techniques, it is imperative for finger tapping. Keeping this in mind, let’s move on to the first example. Example 1: This lick is a great tapping exercise. It starts in A pentatonic minor and ends in A Dorian (at the 32nd notes). I recommend to use the middle finger for tapping. This enables you to hold the pick as usual so that eventually you can combine picking and tapping as will be demonstrated in example 3. The effects that I used on this are digital delay and a little bit of chorus. To avoid string noise use your right hand palm to mute the strings as you tap. Listen to the MP3 Example 2: This example takes the whole idea a little further. I’m tapping with both my second and third fingers on my right hand. The benefits of doing this are huge. For starters, you will end up moving your right hand around a lot less, substantially reducing the amount of string noise that will occur. Also, you will be able to go a lot faster because you will not be jumping around so much. Last, but not least, it looks much cooler. This lick is in A major (or F# minor). Basically what I did to build this lick was hold down one arpeggio shape while I tapped another arpeggio shape on top of it. It kind of has a “mirror” effect. This time I used digital delay but no chorus. Listen to the MP3
<urn:uuid:a0c2fe5f-78c0-4ad3-b759-df0e3a531883>
CC-MAIN-2022-33
http://www.totalguitar.net/online-guitar-lessons/guitar-techniques/finger-tapping/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00670.warc.gz
en
0.955395
476
2.375
2
Thursday, September 20, 2012 U.S. Soldier--An Iraq War Resister--Arrested (Reuters) The first woman to flee the United States military as an Iraq war resister was arrested at the border in northern New York on Thursday after losing her bid to remain in Canada, according to an advocacy group that had campaigned on her behalf. The soldier, Kimberly Rivera, 30, a private who served three months in Iraq and traveled to Canada while on leave in 2007, was taken into custody at the Thousand Islands Bridge border station about 30 miles north of Watertown, N.Y., said Michelle Robidoux, spokeswoman with the War Resisters Support Campaign. “She presented herself voluntarily, was arrested and taken to Fort Drum,” Ms. Robidoux said. The Pentagon had no immediate comment. Private Rivera, who had been living in Toronto with her partner and four children, deserted because she developed an opposition to the mission in Iraq, Ms. Robidoux said. She was denied refugee status by Canadian authorities and last month lost her appeal of a deportation order. She had been given until Sept. 20 to leave Canada. is author of a dozen books (click on covers at right), including the new "THE TUNNELS: Escapes Under the Berlin Wall and the Historic Films the JFK White House Tried to Kill." He was the longtime editor of Editor & Publisher. Email: [email protected]. Twitter: @GregMitch
<urn:uuid:0cb4bc65-2d42-4020-944f-615f19634f36>
CC-MAIN-2017-04
http://gregmitchellwriter.blogspot.com/2012/09/us-soldier-iraq-war-resister-arrested.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00063-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972874
305
1.804688
2
Broccoli is a vegetable that should be found in every vegan chef’s kitchen. It has a high nutritional value, and can be used in various ways to make vegan dishes even tastier. Broccoli is a great source of Vitamin C, B, and B6, Magnesium, and iron, eaten raw or cooked. Cooking the flowers While many people say that broccoli florets are hard to prepare, they can easily be removed from the stem with a sharp knife. The florets can then be cooked as a whole, to be added to rice dishes, or to accompany main dishes. Cooked broccoli florets can be prepared on he hob, by adding enough water in the saucepan to cover the vegetables, and some salt for taste. They can also be eaten on their own, dipped into a vegan sauce. This is a great way of preparing broccoli, as it allows the vegetable to maintain its tender crispy texture, as well as its color. Place the florets and sliced stem pieces in boiling water for 10-15 minutes, then take them out and put them in ice-cold water. Shorter boiling times will make broccoli just soft enough to add to salads or side dishes. Steaming is another great way of preparing broccoli, as it helps preserving the color and the shape of the florets. The pieces will stay together, and look perfect to accompany any dish, or to be added to warm salads. Sauteing the broccoli on extra virgin olive oil will add the vegetable a different, bolder taste. You can add salt in the beginning, but make sure the hob is on low-medium setting, or the vegetables can turn brown. Roasting the broccoli florets in the oven is good for those who are looking for a crispy texture, and would like to add extra seasoning to the vegetable. Before roasting, olive oil mixed with seasoning can be spread on the surface for a more intense taste. Adding to sauces When making a sauce for rice, lentil, or bean dish, adding broccoli sliced into small pieces can provide the sauce with texture and flavour at the same time. White sauces can look dull without a bit of colour, and adding a few slices of the stem or florets can make the dish look more desirable. Some people like creating colorful rice dishes, and broccoli is the perfect choice for adding both color and flavor. As the vegetable can be added to the rice dish in the last five minutes, so it maintains its crispy, fresh texture. Slow Cooker Recipes Sliced or diced broccoli (the stem and the florets) can make the perfect slow cooker casserole. Other vegetables can be added, such as carrots, sweet potatoes, or parsnips. For extra texture, chickpeas, brown rice, or dried green peas can be added to the dish. To preserve the vitamins and minerals within broccoli, the best way of consuming them is raw. For vegans, the florets can be added to a banana, avocado, or even fruit smoothie. A hundred grams of broccoli provides 5 percent of the recommended protein intake, therefore, it is great for shakes designed for athletes, as well. Use water, for preparing the smoothie, or for a creamy texture add some coconut, almond, or soy milk. Raw broccoli in the juicer can provide plenty of antioxidants and a low-calorie start of the day. For extra taste, fresh lemon or lime juice can be added, as well as oranges and peaches. Broccoli, cut into small slices can be used as a main ingredient of salads, mixed with tomatoes, lettuce, and cabbage. It can also be sprinkled over a salad consisting of green beans, carrots, and cucumbers for extra color.
<urn:uuid:3c594289-56ca-4668-9f0d-745288ca480e>
CC-MAIN-2022-33
http://veganchef.tv/10-ways-to-prepare-broccoli/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00478.warc.gz
en
0.922231
806
2.734375
3
Tipu Sultan Victorious Battle against British scene 'In this world I would rather live two days like a tiger, than two hundred years like a sheep.' - Tipu Sultan, taken from Alexander Beatson's A View of the Origin and Conduct of the War with Tippoo Sultan, 1800) Tipu Sultan, known as the dreaded 'Tiger of Mysore', was a legend during his lifetime and is still regarded as an enlightened ruler in India. During the late eighteenth century he bitterly and effectively opposed British rule in southern India, posing a grave threat to the East India Company. It took almost forty years, and most of the Company's resources, before Mysore was added to the areas of British-ruled India.
<urn:uuid:540295c9-c3eb-49a9-bacb-c8fddd9d62ea>
CC-MAIN-2017-04
https://www.ytpak.com/watch?v=e9dbFPDa-Z4
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00425-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975013
151
2.921875
3
A Jerusalem rehabilitation center is defying a government order to transfer a Palestinian girl paralyzed in an Israel Defense Forces attack on militants to a hospital in the West Bank. Maria Amin, who turns six on Thursday, cannot get the care she needs in the Palestinian facility “so she won’t be going anywhere” until her well-being is assured, said Shirley Meyer of the Alyn Hospital Rehabilitation Center in Jerusalem. Maria was paralyzed from the neck down when the car she was traveling in was caught in a missile attack on a leader of the Islamic Jihad militant group in Gaza in May last year. Her mother, grandmother and older brother were killed. She was taken for treatment to Israel where the Defense Ministry covered her medical expenses and sponsored her father and younger brother to live with her at the hospital. She has now completed a rehabilitation program. It’s not as if Israelis are killing children in Gaza.
<urn:uuid:dbe0d99f-b767-4c34-95b8-a3446fdd7cdf>
CC-MAIN-2022-33
https://antonyloewenstein.com/sorry-about-maiming-you-little-girl/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00465.warc.gz
en
0.976598
188
1.609375
2
The report from the Center for Media Education (CME) comes as the Federal Trade Commission's workshop on the issue kicks off today. The agency will hear from experts about effective ways for commercial Web sites to get parental consent before gathering information from children younger than age 13--a practice mandated by the Children's Online Privacy Protection Act (COPPA) signed into law last year. The center reviewed 80 sites, including branded sites such as Lego, the Cartoon Network, Nintendo, and lesser-known sites such Yucky.com. Overall, 88 percent collect children's personal data, but more than a quarter do not have privacy policies, the CME study stated. Less than 26 percent ask for parental permission before collecting the information. The CME along with the Consumer Federation of America (CFA), Junkbusters, and other consumer groups, want the FTC to force companies to get hand-written permission before harnessing sensitive details from children. "The FTC must not give in to corporate lobbying for a weak and delayed application of the law," said Jason Catlett, founder of Junkbusters, a clearinghouse for privacy-protection measures. "Americans have precious few privacy rights, and this single online privacy law that Congress has granted should not be gutted by substandard rulemaking. The groups suggested methods for obtaining parental consent such as by mail or fax--forms could be printable from the children's Web site or mailed to the parent. They warned against another system, proposed by an assortment of online companies, which would enable Web sites to collect children's data and then send an email to parents without previously getting their consent. "These findings underscore the urgent need for clear and effective rules to protect children's privacy online," Kathryn Montgomery, president of the CME, said in a statement. "Parents must be involved when personal information is collected from their children."
<urn:uuid:40d72571-c85f-482a-b07a-9333a8ebc3e9>
CC-MAIN-2022-33
https://www.cnet.com/tech/services-and-software/popular-kids-sites-lack-privacy-info-study-says/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00077.warc.gz
en
0.948351
447
2.390625
2
Little Steps is an early intervention program designed to teach children with disabilities the vital kindergarten readiness skills they will need. This program can also help children who are attending daycare to successfully access those settings. Little Steps is a play based program which includes structured activities that mimic a day at Kindy. During the term if necessary children can be supported within their Kindy/childcare to assist them or their teacher/carers to help them function successfully within the Kindy/childcare environment. Children will learn play, communication and social skills, including: - Greeting their peers upon entry to the group setting - Transition between activities, including both group and independent play activities plus transition between spaces - Making appropriate requests for help or assistance from peers and teachers - Taking turns and waiting in a small group - Pair and small group structured and unstructured activities - Using expressive language within the different contexts of the program. At completion of the program, children will: - Independently greet their peers and teachers. - Independently transition between activities and spaces. - Request help in an appropriate manner for the situation. - Show their ability to take turns in a pair and small group situation. - With support participate in pair and small group activities. - Independently or with support use their expressive language to express their feelings and/or to request and ask/respond to questions When and Where? The program is led by a behaviour support practitioner who is a qualified teacher at our Melrose Park office within school terms. The program is conducted on a Friday morning from 9:30am – 10:30am.
<urn:uuid:a1ab5334-5858-4596-8e4d-c00b21127f42>
CC-MAIN-2022-33
https://www.benevolent.org.au/services-and-programs/list-of-programs/little-steps
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00466.warc.gz
en
0.957703
340
2.921875
3
Nevertheless, his work Tsukuda Island in Musashi Province is one of the gems of his opus. Hokusai lived between 1760 and died in 1849. He was born and died in Edo, which is now known as Tokyo. Tsukuda Island in Musashi Province depicts a scene in the Edo region, demonstrating Hokusai's deep engagement with the natural world around him. Tsukuda Island in Musashi Province is a very calm work of art. It depicts boats floating around the eponymous island. Fishermen can be seen working on the boats, and in the distance we see the green mountains with their white snow capped peaks. The rich, simple colours are very pleasant to behold and yet when the viewer looks more closely at the painting they see that it is a very intricate work of art. Tsukuda Island in Musashi Province is often described as a rhythmic painting. It is given this title because of the way in which the form of one object will be reflected in the form of another object. For instance, the boat laden with cotton bales has a form that echoes that of Mt Fuji itself. There is thus a sense that everything is connected. Tsukuda Island in Musashi Province is part of a wider series of paintings (of which the iconic 'The Great Wave' forms part) entitled '36 Views of Mt Fuji'. Thus, though the mountain seems to be something of a background decoration in Tsukuda Island in Musashi Province, it is part of a series that revolves around Mt Fuji. Solemn and majestic, the presence of the mountain is felt in every one of the works of art in this series.
<urn:uuid:1d74fd2d-db5d-4546-bd10-1846c68faf35>
CC-MAIN-2022-33
https://japaneseprints.org/hokusai/tsukuda-island/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00275.warc.gz
en
0.980415
341
2.359375
2
Temptation by Water. Diane Lockward. Nicholasville, KY: Wind Publications, May 15. 2011. 90 pages, Temptation by Water is Diane Lockward’s fourth collection of poems and as I did with her previous book, I marveled at how well she puts a collection together. Better than any other poet I can think of, her collections are balanced between the power of each individual poem to stand on its own and the way the poems work together to develop related themes. Temptation by Water focuses not only on the heart and the disappointment or fulfillment of its desires but also embodies a struggle toward remaining vulnerable, to braving loss and pain so as to still be willing to take the risks of truly living. Throughout the collection self-exposure and self-preservation ebb and flow like water, the heart pulses with reaching out toward beauty and the world, then pulls back into itself, elements of passion crystalizing inside it while others are discarded in the wake of new influxes. It is a complex collection of subtly explored emotions, penned with humor and wit, craft and experimentation. In these poems technical skill and playfulness combine into a subtle yet casual voice. For instance, in the poem “Pleasure” she concludes with an uncommon rhyme called an amphisbaenic rhyme. This is a type of slant rhyme where the words are reversed. Lockward rhymes “sleep” and “peels.” She also creates this rhyme phonetically with “slurp” and “pearls.” Only a truly deft writer could create such pyrotechnics in a poem that sounds completely at ease in its tone, which Lockward does not only in the poem “Pleasure,” but in the other poems throughout Temptation by Water. The opening poem and the title poem of the collection “Temptation by Water,” prepares us for the difficult and daring world we are about to enter. In it a woman wades into Henri Matisse’s painting “The Open Window” where there is . . . here and there a splash of black, like shadows foreboding something she cannot name. She floats inside the frame, like Alice free-falling down the hole, enters this other world. . . . . . . . . . . . . . . . . . . . . .The sea like liquid emeralds, a kind of paradise, not one human in sight, not one person she can name. This is a kind of paradise, but not paradise. We are about to enter a world of poems that is similar to Alice’s Wonderland, a place that has dangers, a place that is not static but where hard lessons are learned and growth is a little frightening. The rabbit hole here is the human heart, its desires, its realizations and disappointments and all it does in response to both. The first poem in the first section, “Weather Report” closes with . . . a slip of the tongue can change desire into disaster, how desire and water can sweep us away, and how we are all looking for someone to push back the waves, to grab hold of us, and keep us here, pressed to the earth. Of course, that desire to hold back mortality is impossible. No matter who we love, they too are mortal. That fact is confirmed 2 poems later in “Leaving in Pieces,” which is a humorous poem with a serious theme. The speaker’s husband loses his hair, the very thing the speaker says she married him for. Over the course of the poem, she kicks her husband out of their bed and replaces him with a dog, “his liquid eyes, his lustrous hair.” But the reason for it is that the husband’s bald head was always there forcing me to contemplate weighty subjects I preferred to ignore, like my own mortality. Love and desire in these poems is not just intimacy and acquisition but a battle with death. But that can’t be conquered and it comes “in pieces” or a little at a time: an aging mother’s ever stooping figure, winter taking over a garden, a lover lost. These reminders of mortality intimidate the heart that wants to do nothing more than withdraw into itself. So there’s the centipede who is a Lucky little arthropod, without our human flaws. He has no poetry, no art, no songs, but knows no fear when darkness enters a room. . . . . . .(“What He Doesn’t Know”) It’s a double-edged sword or a tongue-in-cheek conclusion, but either way it’s a metaphor by which the heart can guard itself. In another instance, a woman is “done now with ripeness, the mess of juice.” Or again, Humpty Dumpty is imagined as a cookie among others . . . baked by his mother, his grandmother, a procession of women in aprons, their slippers padding into the kitchen, women greasing pans, pre-heating ovens, their hands dipped in flour, fingers kneading butter, sugar, and eggs, women filling and enfolding him, bringing him home, wrapped in the unbreakable dough of their arms. These are examples of the heart contracting into itself to avoid the breakable world. But no real living is done there either and it slowly must find a way out of its lifeless securities. Sometimes it’s in taking a photo of natural beauty, as in “Capturing the Image.” Or, as is often the case with a Lockward poem, it’s a moment of the sensual pleasure in food as in “Onion,” or “Love Song with Plum” where the speaker takes the plum offered and concludes by confessing . . . I want to stand at the perimeter of this plum-luscious earth, sink a plumb line for balance, then plummet like a bird on fire, placate all my desires, my implacable hunger for the ripeness of my sweetheart’s plum. This is the renewal of the heart after the poem “Woman with Fruit” earlier in the collection declared the speaker “done now with ripeness, the mess of juice.” The collection affirms the growth of the heart’s struggle to risk living fully, and to accept the pains and loss that come with passion and love, with growth in a life that is fully lived. The final poem in the collection, “Seventh-Grade Science Project” affirms the risk of a girl catching butterflies and how it was worth it: . . . . . . . . . . . . The pin-pricked fingers, wasp . . . . . . . . . . . . stings, and blood on my arms . . . . . . were what I paid for my first A in science. All that summer I ran like something wild and left . . . . . . my multi-colored fingerprints . . . . . . . . . . . . on everything I touched. To go for that A, to live life passionately, requires accepting the bruises and losses, the “blood on my arms,” it is to be marked by the world and in turn to leave a mark. Temptation by Water is an affirmation not only of the temptation to plunge into the changing tide of life but a seduction, a masterful collection of poems you will not soon put down or soon forget.
<urn:uuid:a6a1b607-7bef-4bfc-aaa6-0da3f6126576>
CC-MAIN-2017-04
http://inermusic.blogspot.com/2012/03/reivew-of-temptation-by-water.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00447-ip-10-171-10-70.ec2.internal.warc.gz
en
0.942461
1,646
1.734375
2
For potato lovers, a great, nutritious substitute is to make mashed potatoes out of cauliflower. Cauliflower makes a tasty substitute for starchy potatoes. Charting your progress can be an effective way to track your weight loss over a long period of time. Step onto the scale often so that you are frequently motivated to do more. Seeing results will motivate you in reaching your goals quickly and efficiently. As trivial as this may seem, climbing the stairs is a good cardio exercise. This is beneficial for overall health as well as for weight loss. All things considered, it is not that tough to lose weight. In order to lose weight effectively, you have to put yourself in a mindset that allows you to constantly strive to maintain your diet and exercise regimen. It can be easy to talk about weight loss, but harder to make it happen. Today can be the day that you begin your weight loss journey. Consuming milk before meals can help you lose weight. Milk typically makes a person feel full, so if you drink a glass of milk before you eat, it will make you more likely to eat less than you otherwise would have. Milk is rich in calcium which helps build strong bones and muscles. Drink plenty of water if you are trying to lose a few pounds quickly. You will end up losing a lot of water weight if you lower your food consumption and increase the amount of water to up to a half gallon each day. You may not lose any weight from fat, but you lose water weight that can keep you fitting into your clothing easily. It is a struggle to lose weight, you shouldn’t allow this struggle to prevent you from succeeding. Putting the advice into action is going to help you work towards your weight loss goals. Stay as motivated as possible and you will succeed. Eat baked potato chips instead of the regular potato chip type to reduce fat consumption. Bakes potato chips contain a much lower fat content, which is great for your diet and health. It takes less exercise than many think to keep weight at a healthy level. Walking can help you maintain your weight. Walking is an effective way to lose extra weight. This activity helps to increase your blood flow so that you can stay healthy. You should walk at a swift pace for at least 30 minutes on most days to burn off around 250 calories per half hour stint. Switch it up with olive oil or vinegar if you are a big fan of salad dressing. This can reduce your fat content, which will do wonders for your overall weight. Consuming milk before meals can help you lose weight. To lose weight, you can try changing your diet to include more vegetables and fruits. In order to lose weight effectively, you have to put yourself in a mindset that allows you to constantly strive to maintain your diet and exercise regimen. If you lower your food consumption and increase the amount of water to up to a half gallon each day, you will end up losing a lot of the water weight. You may not lose any weight from fat, but you lose water weight that can keep you fitting into your clothing easily. The siren call of french fries has derailed many diets. If you want french fries that will help your scale go down instead of up, try baking them. Cut up some potatoes into half-inch fries. Many times, produce, meats and dairy products are all found in the outer aisles. Nasty processed foods that contain lots of sugar and salt, and not much else, make their homes in these aisles. Try to cook large meals and freeze some smaller portions. When your freezer is loaded with nutritious, healthy meal options, you will be less likely to waste your money– and your diet efforts– on fast food or carry-out. Are you having trouble losing weight and are about to give up because you” re becoming discouraged? Don” t take your eye off the ball. Read the article here to learn how you can achieve success in your weight loss efforts. Try eating a variety of foods. When you are eating, this will help you to stay happy. Eat a wide variety of foods in order to balance your diet. To lose weight, you can try changing your diet to include more vegetables and fruits. Try including fruit into smoothies or your breakfast cereal as a way of getting additional fruit in your diet.
<urn:uuid:6510dac1-e86f-4bf5-9073-9d8e2a6417ec>
CC-MAIN-2022-33
https://weightree.com/having-trouble-losing-weight-check-out-these-great-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00675.warc.gz
en
0.965032
890
2
2
So the writer could have meant the opposite of that. But it all depends on context. Not so long ago (less than 100 years ago in the UK) dentistry was so painful that a common 21st birthday present was to be fitted with false teeth. After a day's work, a man might take his teeth out and put them in a box. Then the door-bell might ring, and his wife might say 'Quick - get your teeth out'. Or maybe it is an idiom in some parts of the world... Student or Learner
<urn:uuid:ff109ea7-f216-4180-970f-d636f24aaf9b>
CC-MAIN-2016-44
https://www.usingenglish.com/forum/threads/81963-Get-one-s-teeth-out
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721387.11/warc/CC-MAIN-20161020183841-00448-ip-10-171-6-4.ec2.internal.warc.gz
en
0.981536
114
1.6875
2
With Jane and Joanne The object of this game is to make the greatest product. Place the deck of cards face down in the middle of the playing area. Any player draws a single card from the deck and places it face up. All players select a space on their gameboard. They write the number of the card in that space. Players draw five more cards and proceed to fill in all the spaces on their gameboards. Once all gameboard spaces are filled, players complete the multiplication. The player with the greatest product is the winner of that round. The winner earns 1 point. In the event of a tie, each player earns 1 point. Two completed gameboards using the six cards 2, 3, 4, 6, 7, and King (0) might look like this: Player 1 has the greatest product and earns 1 point for this round. The winner is the player with the most points after a set number of rounds or a set time limit. As players gain more experience with this game, they will develop strategies to maximize their chances of winning. Depending on multiplication skills being worked on, the number of cards used can be changed. Calculators may be used to check answers. Copyright © 2006 Education World
<urn:uuid:aed69970-a090-4b58-bce9-de9118fd2f0d>
CC-MAIN-2017-04
http://www.educationworld.com/a_lesson/boxcars/boxcars028.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00280-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947392
254
3.09375
3