text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
It is time for President Obama to award the Congressional Medal of Honor to Private First Class Guy Gabaldon for his heroic actions during the Battle of Saipan in the Second World War. While PFC Gabaldon died in 2006, awarding him the Medal of Honor would send a powerful, yet positive message to the rest of the world. His commanders had recommended him for the Congressional Medal of Honor, but he was awarded the Silver Star instead. His medal was later upgraded to the Navy Cross. Efforts to award him the Medal of Honor continued as late as 1998. One of the most important promises President Obama made during his presidential campaign was to restore the reputation of the United States to the rest of the world. One important way of doing this is award PFC Gabaldon with the Medal of Honor. This will send a message that the United States will honor those individuals who will turn to peace, even in the most unlikely of times. Gabaldon's Navy Cross citation reads as follows: The Navy Cross is presented to Guy L. Gabaldon, Private First Class, U.S. Marine Corps (Reserve), for extraordinary heroism while serving with Headquarters and Service Company, Second Marines, Second Marine Division, in action against enemy Japanese forces on Saipan and Tinian, Northern Mariana Islands, South Pacific Area, from 15 June to 1 August 1944. Acting as a Japanese Interpreter for the Second Marines, Private First Class Gabaldon displayed extreme courage and initiative in single-handedly capturing enemy civilian and military personnel during the Saipan and Tinian operations. Working alone in front of the lines, he daringly entered enemy caves, pillboxes, buildings, and jungle brush, frequently in the face of hostile fire, and succeeded in not only obtaining vital military information, but in capturing well over one thousand enemy civilians and troops. Through his valiant and distinguished exploits, Private First Class Gabaldon made an important contribution to the successful prosecution of the campaign and, through his efforts, a definite humane treatment of civilian prisoners was assured. His courageous and inspiring devotion to duty throughout reflects the highest credit upon himself and the United States Naval Service. ZUI also this article from OregonLive.com: Larry [Liss] is a Vietnam War hero ... a word I don't use lightly. But hero is exactly the right word to describe a pilot who piloted or copiloted an unarmed helicopter five times into a lopsided firefight into a jungle so dense with bamboo that he and his fellow pilot had to create a landing zone by chopping down the stalks with their rotors. Further, Liss jumped out of the Huey to help load people aboard, even as North Vietnamese fighters closed in, and he held onto two soldiers clinging to the outside of the craft as it hoisted itself into the air. Thanks to his efforts and those of two others on the same crazy, unplanned mission in 1967, some 87 South Vietnamese, Laotian, Cambodian and Chinese irregulars and a U.S. adviser were saved from capture or death. He was awarded the Distinguished Flying Cross for his actions that day. [A]t least two members of Congress are supporting the idea of giving Liss and his comrades an upgrade to the Congressional Medal of Honor, the nation's highest award. Sen. Jeff Bingaman of New Mexico and Rep. Joe Sestak of Pennsylvania have urged the Pentagon to award Liss and his comrades the honor, which might represent the last opportunity to confer awards to a group of Vietnam veterans. Liss's DFC citation reads as follows: The President of the United States takes great pleasure in presenting Captain Lawrence M. Liss the Distinguished Flying Cross for heroism while participating in aerial flight evidenced by voluntary actions above and beyond the call of duty in the Republic of Vietnam on 14 May 1967 while serving with the Aviation Detachment, II Field Force Vietnam. On that date, Captain Liss was pilot of an unarmed helicopter transporting the II Field Force Vietnam Staff Chaplain to Special Forces camps in the III Corps area for Sunday services. Arriving at Cau Song Be Special Forces Camp, he learned that a Civilian Irregular Defense Group company was engaged in heavy fighting with a numerically superior Viet Cong force a few miles away. Disregarding his own safety, Captain Liss volunteered his services to fly in reinforcements and evacuate wounded personnel. To successfully land on a narrow dirt road flanked by bamboo thickets and heavy foliage, Captain Liss had to use his rotors to cut through the dense underbrush, an extremely hazardous undertaking. Reinforcing troops were unloaded and the casualties were placed on the aircraft. Again using the rotors to clear a path for take-off, Captain Liss brought the wounded soldiers safely back to Cau Song Be. Upon landing, he was asked to return to evacuate the entire company. Captain Liss again courageously volunteered his services, disregarding his own safety. Sharing the flying responsibilities with the aircraft commander, he made five trips. The danger increased with each lift, not only because of the reduced number of personnel left to protect the perimeter against an intensified enemy attack, but because radio contact had been lost with the tactical air support aircraft and the helicopter had to be maneuvered through friendly air support fire and artillery fire flanking their flight path. Through the valiant efforts of Captain Liss, the Civilian Irregular Defense Group company was rescued and their casualties evacuated successfully. His exemplary professional skill and determination in the face of hostile fire and extreme danger to his own safety were instrumental in the successful accomplishment of the aircraft's mission. Captain Liss' extraordinary accomplishment was in keeping with the highest traditions of the military service and reflects great credit upon himself, II Field Force Vietnam and the United States Army.
<urn:uuid:6e939dd8-43e2-40db-bac5-90581abdb43c>
CC-MAIN-2017-04
http://theoldcoot.blogspot.com/2009/07/medal-of-honor-upgrades.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00571-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972071
1,173
2.203125
2
Davi Kopenawa, shaman and spokesperson of the indigenous Yanomami tribe in the Brazilian Amazon, visits the U.S. in 2014. Davi Kopenawa, a shaman of the indigenous Yanomami tribe in the Brazilian Amazon, walks down a short hallway toward the computer to Skype with me. In his 50s, Kopenawa wears a white, long-sleeve crew neck tucked into khaki slacks. Several strings of small, black beads adorn his neck, and his dark hair is combed neatly across his forehead, pushed behind his ears. He's visiting the San Francisco offices of Survival International, an indigenous rights group that has worked with the Yanomami since the 1970s — and with Kopenawa himself since the '80s. This is only the fourth time he has been to the U.S. Fiona Watson, Survival's research director, sits next to him to translate. In addition to his native language, Kopenawa can speak Portuguese nearly fluently. "In my Portuguese language, it's bom dia — good morning," he says. His voice is calm and direct, and he clears his throat softly before answering. He discusses a new technology initiative to help Kopenawa and his community document rights abuses committed by outsiders. Spearheaded by the Survival team, the TribesDirect project will set up a solar-powered, satellite Wi-Fi network in Kopenawa's community, with a camera the Yanomami tribe can use to quickly relay important messages. Survival is designing easy-to-use software, and will provide training to members of the community. The project is the first of its kind — a unique, albeit controversial, way to amplify indigenous voices.The project is the first of its kind — a unique, albeit controversial, way to amplify indigenous voices. In recent years, outsiders have posed a renewed threat to indigenous peoples in Brazil, including territory colonization, gold mining, logging and disease. The Brazilian government has been accused of blatantly disregarding indigenous rights, failing to address outsider abuses against the dozens of tribes in the Brazilian Amazon. The idea for TribesDirect is to spread awareness and report these rights abuses in near-real time, and to help the Yanomami follow and comment on tribal issues across the globe. If successful, Survival hopes other indigenous peoples around the world will be able to adopt this technology model, allowing them to speak for themselves to an international audience, encourage governments to take action and, ultimately, change the way outsiders treat them. Among the atrocities committed against the Yanomami and their land, Kopenawa cites cattle ranchers, or fazendeiros, who "are prepared to use firearms against the indigenous people. They use pistoleiros [gunmen] and they also cut down thousands of trees. They pollute the springs, and they take out all the natural plants and vegetation," he says. The Yanomami are also worried about big mining companies. More than 1,000 miners are currently working illegally on Yanomami land, according to Survival, transmitting diseases such as malaria and polluting the area. Over the past several years, the National Congress of Brazil has considered proposed bills that would open up indigenous territories for mining. The current legal framework for mining dates back to the 1960s. There's also the National Institute for Colonization and Agrarian Reform (INCRA), a government agency that has been accused of some of the worst deforestation and land divisions, not to mention rural workers who carve roads throughout the territory. "The most dangerous things of all are roads. They use huge tractors, which literally scrape the skin of the earth. They pollute all the streams, and they destroy lots and lots of trees. We call their machines 'giant beasts,' because they open up everything.We call their machines 'giant beasts,' because they open up everything.Once you have the big road, it enables colonization of our land and opening up lots of smaller roads," Kopenawa says. And although SESAI, Brazil’s indigenous health department, has improved health conditions, tribes still face low-quality services and a lack of universalized medicines and vaccines. Ida Pietricovsky Oliveira, a communication specialist at UNICEF, tells Mashable that the 2013 SESAI Management Report cited several alleged problems, including insufficient data for planning, difficulty buying supplies and inadequate training for intercultural care. The National Indian Foundation (FUNAI), the Brazilian government body responsible for policies and protection of indigenous peoples, did not respond to a request for comment. When the Yanomami experience such issues, they can use TribesDirect to communicate with the outside world, Survival's director Stephen Corry tells Mashable. It enables someone like Kopenawa to comment on challenges other tribal people are experiencing, especially if his community moves. The Yanomami people are nomadic, staying in one place for about two years and then moving elsewhere. They live in round, communal houses called shabonos, which can fit hundreds of people divided into families. Shabonos are spread anywhere between 12 and 125 miles away from each other, so they can occupy a large amount of space and store plenty of food. We don't live like the city people, where you all live on top of each otherWe don't live like the city people, where you all live on top of each other," Kopenawa says. It's in one of these shabonos where TribesDirect will likely be set up. As the largest relatively isolated indigenous tribe in Amazonia, there are between 30,000 and 35,000 Yanomami living in more than 200 villages along the border of Brazil and Venezuela. The population is made up of various groups, some of which are still considered "uncontacted" — their existence is known, but they have never had peaceful contact with outsiders (or, sometimes, even with other Yanomami communities). Kopenawa is president of Hutukara, an indigenous association founded in 2004 that comprises 12 Yanomami communities. Indigenous associations like Hutukara are common, including the Coordination of the Indigenous Organizations of the Brazilian Amazon (COIAB), which is the main organization of indigenous peoples of the Brazilian Amazon. "We know how to work together. Hutukara plays a very important role for the Yanomami. That is because Hutukara is a weapon for our people to defend the Yanomami's rights," he says. A Survival spokesperson tells me that Hutukara members will likely be the ones to use TribesDirect, becoming the project's very first tech pioneers. All footage will go to Survival first, whereupon the organization will encourage viewers to take action on its website. For example, viewers will be able to send letters to the Brazilian president about the gold miners in Yanomami territory. "We are going to try this," Kopenawa says of the TribesDirect project. Survival only just revealed the project to him during his U.S. visit in early May. But he still has speak to his community about it. "I think this equipment is a real weapon for our defense. It will send messages everywhere — ourmessage ... It's like an experiment. If it works, it will help us communicate with the cities and the whole world," he says. Many Yanomami, especially the younger people who sometimes travel to local cities, have encountered technology before. Communities talk to each other via a network of radios (radiofonia), health workers use microscopes to test for malaria and Hutukara's offices have computers for letters and newsletters. And TribesDirect is visual; it doesn't require the user to be literate, and it's less expensive than setting up radio equipment. They're living in the 21st century just as anybody else is, just differentlyThey're living in the 21st century just as anybody else is, just differently," Corry says. "I have absolutely no doubt that ... once the problems are sorted, [it] will be no harder for an average, younger Yanomami than it will be for anybody else [in the world]." They've already experienced some hiccups, though. Survival doesn't have a technical backup team to help with testing; it took them a while to realize the first iteration of the equipment was broken. "The Amazon is extremely humid, and there are a lot of insects that tend to get into delicate electronics. The gear has to be able to withstand all that," he says. Because of these glitches and the NGO's limited funds to replace the equipment, the timeframe for the TribesDirect project is taking at least three times longer than Corry would have liked. He hopes to have everything up and running within six months. And for anyone worrying that introducing such technology will disrupt the Yanomami culture, Corry argues that since it's completely under the community's control, TribesDirect can only benefit its users. "They can switch it on, they can switch it off. If they've got nothing to say, then they don't say anything. A people's culture is not shaken by the presence of some kind of external artifact. It's the ... outsiders stealing their resources, stealing their land, stealing their labor, and often just killing them all, and bringing diseases that kill," he says. When I tell Bruce Albert, a French anthropologist who has worked with the Yanomami since 1975, about the TribesDirect project, he says he doesn't see any immediate drawbacks. He has faith in the younger generation of Yanomami, and tells me in an email that they've attended bilingual schools since the 1990s and, as a result, have developed a strong grasp of modern technology. "Many of them have emails and Facebook pages," says Albert, who is also the research director at the Research Institute for Development in Paris and associate researcher at the Instituto Socioambiental (ISA) in São Paulo. ISA worked with Hutukara to help set up the network of radios in 18 strategic regions of Yanomami land. "Today more than ever they have to count on international support to counterbalance the very unequal power relations in which their society is embedded," Albert says. He believes the project has potential to help indigenous groups around the world, but it would take time and widespread effort. But is technology really the best way to spread awareness and protect indigenous rights? Albert says there isn't a single best way to do so, but the more advocates galvanize the greater public, the better. Books, documentaries, academic writings and articles are still important, he posits, but technology is a necessary addition. "The Internet is changing everything, shortening time and space, and the Survival project is a very clever way to adapt the struggle...to this new context. Quick and direct access to social and traditional media from the field can be...a fundamental weapon for new Yanomami generations to defend their land, culture and way of life," he says. More than anything, Kopenawa wants the world's support, and for people to understand what is really going on in his home. "We Yanomami people don't want to die," he says. "We want the government to respect us and to guarantee our lands, because our land is ours." Tags: GADGETS, HUMAN RIGHTS, INDIGENOUS RIGHTS, MASHABLE MUST READS, SOCIAL GOOD, Tech, US & World, WORLD
<urn:uuid:d62a60cb-da57-409f-9ddb-3c69fea39b62>
CC-MAIN-2017-04
http://hocdethi.blogspot.com/2014/07/remote-indigenous-tribe-adopts-wi-fi.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00310-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965823
2,379
2.390625
2
PSY 402 Topic 1 Discussion Question 1 Describe the emergency of cognitive psychology and neuroscience – what promoted the development of these fields, and what is the significance of the shift from behaviourism to cognitive psychology and neuroscience? What can we understand about human behaviour because of neuroscience that we could not have understood before? PSY402 Topic 1 Discussion Question 2 Describe two methods of research for studying neural function (describe at least one that uses the behavioural or cognitive approach). How do these methods complement one another? What are the limitations of each method? What does the case of Phineas Gage reveal about the localization of functions in the brain? How can modern neuroscientists and psychologists learn from his injury? PSY_402 Topic 2 Discussion Question 2 Given your understanding of the functions of the different lobes of the brain, how might a person be affected by damage to the temporal lobe? Frontal Lobe? Occipital Lobe? Parietal Lobe? PSY_402 Topic 3 Discussion Question 1 Choose a perceptual difference that demonstrates an irregularity or dysfunction in one of the projection pathways. Explain how it could affect everyday life. PSY402 Topic 3 Discussion Question 2 What are some of the differences in processing in the dorsal and ventral visual pathways? Imagine you have a friend who has an injured dorsal or ventral visual pathway, describe what that looks like, what deficits would be their daily functioning, what remains intact? Compare and contrast early and late selection models of attention, and provide examples of each. PSY_402 Topic 4 Discussion Question 2 Describe blindsight and unilateral neglect and explain the contribution of these phenomena to researchers, understanding of consciousness and attention. PSY_402 Topic 5 Discussion Question 1 Compare and contrast the four types of memory discussed in this week’s readings (from Chapter 9 of your textbook). PSY402 Topic 5 Discussion Question 2 Discuss one type of memory deficit, including what part of the brain is affected and how the memory process is interrupted. PSY402 Topic 6 Discussion Question 1 Discuss the effects of metacognitive regulation on memory performance. PSY_402 Topic 6 Discussion Question 2 How can college students use the information on metacognition to improve their academic work? What strategies will you employ in your future academic work? PSY_402 Topic 7 Discussion Question 1 Compare and contrast two different forms of aphasia. What part of the brain is specifically affected by each form and how would this affect the mental lexicon? PSY 402 Topic 7 Discussion Question 2 Chomsky’s theory on the evolution of language suggests that language is generative, meaning that humans have the ability to create a number of unique sequences. Do you agree or disagree with his theory? Give concrete examples from your readings to support your answer. PSY 402 Topic 8 Discussion Question 1 How does working memory relate to learning and intelligence? PSY 402 Topic 8 Discussion Questions 2 Describe the differences between fluid intelligence and crystallized intelligence. Provide an example for each.
<urn:uuid:504b5696-2eb0-41a8-bb2b-31c4d72a8bc0>
CC-MAIN-2022-33
https://oassignment.com/product/psy-402-discussion-questions-topic-1-till-8/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00270.warc.gz
en
0.888281
636
3.34375
3
Per4mance Anxiety | 1 Point of View by Sharon Moore-Foster What is it about a blank piece of paper, canvas whatever that intimidates even the most composed human being? Is it Undiluted Potential that stands like a towering monolith, casting (at first) a HUGE shadow over our modest, mortal selves? Is it the Mirror of Fables and Foibles, reflecting the disabling, destructive and self-deprecating views we carry in our arms so that we aren’t free to lift a brush or a pen? Perhaps could it be so simple that it is the perfection of the moment before engagement… the quiet before the storm of obsessive enquiry and unceasing labour. Once the mark, the word is committed, we are lost to our family, friends and co-workers. Even when we are physically present, we are either ghosts of ourselves, frustrating others as they attempt to relate, or we are a walking maelstrom of frenetic energy, multitasking ineffectively on one plane while our minds spirits float above the fray. What b.s. #! You sound like one of those ceramics monthly idiots, blathering on about what you think about art or if it is art or how good you are at talking about art. Who gives a d—? Just get in the studio and get to work! I argued, but Dad was right…not eloquent or tactful, but right nonetheless. His simple rule of thumb was: get up, put on your work clothes, grab your coffee and head out to the shop. He accomplished a huge body of work in his lifetime…not all finished, not all refined, not all sold…but a body of work to be proud of. As well as a hotel, several restaurants and houses, all of his grandchildren have amazing oak rolltop desks, deacon’s benches and cedar chests and a collection of his pottery. The sheer volume of his work demonstrated his daily work ethic and generated some beautiful pieces. What is this…a eulogy! #! Would you just shut up and get to work! Quit analyzing everything to death, get in the studio and get started. Something will happen, it always does. And I guess that’s the long and short of it all. If you have time to waste, or if you need to build up a surge of fear or angst-driven adrenaline before you get to work, work whatever distractions you desire into your game plan. It’s your process. But you may want to consider the merits of showing up where you need to be…studio, shop, spare room… dressed for work, coffee in hand and sees how it plays out. ~Sharon Moore Foster
<urn:uuid:3cf7b424-41cd-41cd-b16d-87fb1773f7dc>
CC-MAIN-2022-33
http://sharonmoorefoster.com/per4mance-anxiety/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00070.warc.gz
en
0.940555
569
1.515625
2
COVID-19 not only created a public health emergency, but also deepened the need for trusted community information, education, and connection that our libraries are designed to provide. Access to and use of all kinds of health, job, government, educational, and community resources are necessary to weathering the current situation and positioning communities for success. The Coronavirus Aid, Relief, and Economic Security (CARES) Act (Pub. L. 116-136 [March 27, 2020]) provided funds to the Institute of Museum and Library Services “to prevent, prepare for, and respond to coronavirus,…to expand digital network access, purchase internet accessible devices, and provide technical support services” for the benefit of communities impacted by the public health emergency. As part of the nation’s response to the pandemic through the CARES Act, IMLS sent State Library Administrative Agencies (SLAAs) $30 million in stimulus funds and awarded $15 million in discretionary grants to respond quickly, efficiently, and with significant impact to the national emergency. These projects focused on a number of needs. Many took concrete action to address digital inclusion needs. Some created opportunities for libraries to support positive socio-economic change now and in a future reopened environment. Others worked to sustain jobs, train staff, address the digital divide, plan for reopening, and provide technical support and capacity building for digital inclusion and engagement, giving priority to some of our highest-need communities. This panel consists of two State Librarians and two discretionary awardees who will share their projects and experiences in working to help libraries in the age of COVID-19. It will be moderated by two IMLS staff from State Programs and Discretionary programs. identify library trends with respect to the impact of CARES Act funding. develop their own project ideas to manage the aftermath of the pandemic at their own institution. to connect to resources available through State Library Administrative Agencies.
<urn:uuid:216026c2-fd5c-4385-a609-70da05c7e131>
CC-MAIN-2022-33
https://www.eventscribe.net/2021/ALA-Annual/fsPopup.asp?Mode=presInfo&PresentationID=872119
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00678.warc.gz
en
0.936251
407
2
2
- This lesson focuses on the vocabulary and skills students need to define, identify, discuss and apply a variety of informative writing techniques. The texts in this lesson are infographics related to marginalized people. Students are asked to apply the techniques they learn to an informative text of their own. - Language Education (ESL), English Language Arts, Language, Grammar and Vocabulary, Reading Informational Text - High School - Material Type: - Diagram/Illustration, Game, Lesson, Lesson Plan, Reading - Paige Myers, Oregon Open Learning - Date Added: - Creative Commons Attribution - Media Format: - Downloadable docs, Graphics/Photos, Interactive, Mobile No evaluations yet.
<urn:uuid:053960a5-45d7-494f-bd51-8dd37e09f156>
CC-MAIN-2022-33
https://www.oercommons.org/courseware/lesson/93912
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00474.warc.gz
en
0.822515
192
4.21875
4
The State of Jammu and Kashmir and its special status has always been a contentious issue and extremely polarising; what has brought the debate back into the limelight is the latest challenge to Article 35A of the Constitution of Indian pending in the Supreme Court. For those who arrived late, Article 35A along with Article 370 of the Constitution form the bedrock of special status of State of Jammu and Kashmir. Let us start at the start and see what Article 35A really is: What is Article 35A? It is a carte blanche (a French phrase, meaning “unlimited discretionary power to act; unrestricted authority”) given to the legislature of State of Jammu & Kashmir to decide as to who the “Permanent Residents” of the state are. This in turns helps the legislature to grant special privileges to such residents in land acquisition, jobs and other welfare schemes. Article 35A reads: “Saving of laws with respect to permanent residents and their rights. Notwithstanding anything contained in this Constitution, no existing law in force in the State of Jammu and Kashmir, and no law hereafter enacted by the Legislature of the State: (a) defining the classes of persons who are, or shall be, permanent residents of the State of Jammu and Kashmir; or (b) conferring on such permanent residents any special rights and privileges or imposing upon other persons any restrictions as respects— (i) employment under the State Government; (ii) acquisition of immovable property in the State; (iii) settlement in the State; or (iv) right to scholarships and such other forms of aid as the State Government may provide, shall be void on the ground that it is inconsistent with or takes away or abridges any rights conferred on the other citizens of India by any provision of this part.” When was this first introduced, and why? Article 35A was introduced by a Presidential order in the year 1954 to safeguard the unique identity of Kashmiri people. Since the J&K legislature possesses the power to decide who would be recognized as “Permanent Resident” (through a law ratified by 2/3 of the majority of the legislature), it ensured that the final word on the issue of permanent residency always remained firmly with the Legislature of the State of Jammu and Kashmir. It was introduced after a prolonged discussion between the then Prime Minister of India Pt. Nehru and Prime Minister of Jammu and Kashmir Sheikh Abdulla.(yes the PM of Jammu and Kashmir it is not a typo, we will discuss this but all good things must wait!), The article was introduced to insure that the ethnic milieu of the State of Jammu and Kashmir remains intact and further strengthen the accession of State of Jammu and Kashmir in the Union of India. How can constitution be amended by a Presidential order? If this question popped up in your head, then you are up to speed with Article 368 of the Constitution, which provides for power and procedure to amend the Constitution of India. Quite clearly, a presidential order clearly does not find mention as one of the mechanisms of amendment as per Article 368. Where is the power to be derived from then? The Answer to the question lies in reading of Article 370 (d) of the Constitution which reads: “Article 370: Temporary provisions with respect to State of Jammu and Kashmir …(d) Such of the other provisions of this Constitution shall apply in relation to that State subject to such exceptions and modification as the President may by order specify…” Thus it is clear that Article 370 (d) empowers the President to issue such orders. Can such exceptions and modifications be made without the knowledge of the parliament? A five judge bench while discussing Article 370 in Puranlal Lakhanpala vs President of India has held that the President can modify an existing provision in the Constitution under Article 370. The Court though was silent on the issue whether this can be done without the knowledge of the Parliament. What is the issue before the Supreme Court now? The Petition before the Supreme Court asserts that Article 35 A is against the “very spirit of oneness of India” as it creates a “class within a class of Indian citizens”. Restricting citizens from other States from getting employment or buying property within Jammu and Kashmir is a violation of fundamental rights under Articles 14, 19 and 21 of the Constitution. Another writ challenges Article 35A on the ground that it violates women’s right to property. The attempted dilution of the Article 35A is seen by the certain sections of Jammu and Kashmir as an attempt to alter the demographics of the state, by making it easy for people from outside the state to own land and settle there. At present, according to Constitution of J&K a “Permanent Resident” is defined as a person who was a state subject on May 14, 1954, or who has been residing in the state for a period of 10 years, and has “lawfully acquired immovable property in the state. Therefore, the issue has become a contentious one touching upon the autonomy of the State of Jammu & Kashmir on one hand, and sovereignty of the Parliament on the other. The Supreme Court has to tread a cautious line moving ahead, as the issue is fraught with grave political implications and cannot be treated as a pure legal question simpliciter. Whatever it decides, the same has to be in consonance with the intended purpose of the provision and not just the black letter of law.
<urn:uuid:5e076ca9-6509-451b-ab99-29f6591dd45e>
CC-MAIN-2022-33
https://rahulsiasblog.com/2018/08/12/explained-article-35a-of-the-constitution/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00477.warc.gz
en
0.945994
1,146
2.75
3
Biden Administration Will Enforce Nondiscrimination Protections in Health Care El departamento de Estados Unidos de Health and Human Services (HHS) announced today that the Office for Civil Rights will enforce Section 1557 prohibitions on health care discrimination based on sex to include sexual orientation and gender identity. The announcement represents a change in position from the previous administration, which had adopted rules that attempted to allow health care providers to deny care to transgender people. Section 1557 of the Affordable Care Act, also referred to as the Health Care Rights Law, prohibits discrimination on the basis of race, national origin, sex, age or disability in health care programs or activities. It is the first federal civil rights law to prohibit discrimination based on sex in health care. “Today’s announcement will save lives. It shows once again that the Biden administration is committed to improving the lives of transgender people and ensuring that we can receive the health care we need without fear of discrimination,” said Mara Keisling, executive director for the National Center for Transgender Equality. “As the US Supreme Court made clear in its Bostock v. Condado de Clayton decision, discrimination against transgender people is illegal.” NCTE led opposition to the Trump administration’s effort to reverse non-discrimination protections for transgender people through rulemaking, organizing health care providers to oppose the changes, and mobilizing massive public response through over 130,000 public comments.
<urn:uuid:9fc53a50-8dbf-4aa1-8c67-515c54f498ab>
CC-MAIN-2022-33
https://es.transequality.org/blog/biden-administration-will-enforce-nondiscrimination-protections-in-health-care
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00674.warc.gz
en
0.930168
300
1.796875
2
Antimicrobial resistance (AMR) is a growing threat to the health of humans and animals that requires global actions. In high-income countries, surveillance systems helped inform policies to curb AMR in animals. In low- and middle-income countries (LMICs), demand for meat is rising, and developing policies against AMR is urgent. However, surveillance of AMR is at best nascent, and the current evidence base to inform policymakers is geographically heterogeneous. We present resistancebank.org, an online platform that centralizes information on AMR in animals from 1,285 surveys from LMICs. Surveys were conducted between 2000 and 2019 and include 22,403 resistance rates for pathogens isolated from chickens, cattle, sheep, and pigs. The platform is built as a shiny application that provides access to individual surveys, country-level reports, and maps of AMR at 10 × 10 kilometers resolution. The platform is accessed via any internet browser and enables users to upload surveys to strengthen a global database. resistancebank.org aims to be a focal point for sharing AMR data in LMICs and to help international funders prioritize their actions. Antimicrobials are essential drugs that have helped considerably reducing infectious diseases mortality. However, in recent years, their overuse in human medicine and animal production1,2,3,4 has caused a rise in antimicrobial resistance5,6,7 (AMR). Globally, 73% of all antimicrobials are used in animals to prevent and treat infections8, but also to improve weight gain and productivity on farms9. The rise of antimicrobial use and resistance in animals is a growing concern for the future of animal health, and for the livelihood of billions of people who rely on animals for subsistence10,11. In addition, in recent years a growing body of evidence suggested that antimicrobial-resistant bacteria can be transferred between animals to humans12,13,14,15,16, and cause drug-resistant infections in humans17. As for other infectious diseases of global importance18,19,20, the rise of AMR in animals is a health challenge that requires close monitoring to coordinate international actions. In high-income countries, trends in AMR in animals are monitored via systematic surveillance21 by organizations such as the European Food Safety Authority (EFSA) in Europe, the National Antimicrobial Resistance Monitoring System for Enteric Bacteria (NARMS) in the United States, or the Canadian Integrated Program for Antimicrobial Resistance Surveillance (CIPARS) in Canada22. However, in low- and middle-income countries (LMICs), where demand for meat (and antimicrobials) is rising rapidly2,11, systematic surveillance systems remain largely absent23. International actions to set-up or scale-up surveillance systems in LMICs have been initiated24,25. However, these may take years to be fully operational to inform policymakers. In the short term, efforts to target investments in LMICs against AMR could be informed by point-prevalence surveys26 (PPS). Hundreds of PPS on foodborne pathogens are conducted each year across LMICs. In the absence of systematic surveillance systems, these could be used to document trends in AMR in food animals. In 2019, PPS that were initially scattered across the veterinary scientific literature were systematically reviewed to produce a first global map of AMR in food animals at a sub-national level26. In addition, the findings of systematic reviews of PPS could be used to identify hotspots of resistance in animals in LMICs where stewardship efforts should be focused, or to identify areas poorly surveyed, where recruiting local epidemiologists may help improve the assessments of the AMR situation. However, systematic surveys are time-consuming, need to be repeated frequently, and may require access to publications outside of the public domain. In addition, valuable information on AMR may be missed in systematic reviews due to i) linguistic barriers, ii) expensive publishing fees of international journals for researchers in LMICs, and iii) data availability restrictions from industry-program sponsor or governmental monitoring programs. An open-access platform for reporting results of PPS on AMR in real-time could help overcome these limitations and empower local communities of researchers. A platform designed with an intuitive interface may also encourage data sharing in the AMR community. This would not only improve the circulation of knowledge between researchers but also strengthen estimates of the AMR burden, and provide up-to-date information to policymakers who allocate resources for intervention. Online platforms have enabled data sharing in multiple scientific fields27,28,29,30. In epidemiology, they are used, amongst others, to integrate translational medicine data31, exchange datasets of high-risk tumors32, or disseminate estimates of the burden of malaria33,34,35. In AMR epidemiology, online platforms have been introduced to report drug-resistant infections in humans33. Thus far a comparable tool is missing for reporting AMR levels in animals. The development of such a tool to encourage data aggregation and visualization has been recognized as a priority by international donors36,37 and organizations38,39. Here, we introduce resistancebank.org, an online platform for surveys and maps of AMR in animals. First, we present a database of PPS reporting AMR rates globally. Second, we introduce local indicators of AMR burden available for download: maps and country-level reports. Third, we provide a step-by-step guide of the User Interface (UI), as seen by the visitors of the platform to upload their data in resistancebank.org. We conducted a systematic literature search in January 2019 and extracted information on resistance rates from 1,285 PPS. The search for PPS on AMR in food animals from LMICs was conducted in three bibliographic databases: PubMed, Scopus, and Web of Science. We targeted four indicator bacteria recommended by the World Health Organization’s Advisory Group on Integrated Surveillance of Antimicrobial Resistance (AGISAR). Titles and abstracts were deduplicated and screened for PPS. Books, meta-analysis, reviews, and PPS reporting on sick animals were excluded, according to the AGISAR guidelines40. In addition, we included data available in paper journals, Ph.D. and MSc thesis, and conference proceedings after field visits to five veterinary schools in India. All relevant data to AMR surveillance were screened across all manuscripts, including sampling size, animal hosts, bacterial species, sampling latitude and longitude. The resistance rates from antimicrobial susceptibility testing (AST) were aggregated by individual location/host/bacteria combinations. For each study, all tested antimicrobials and the number of isolates included in each assay were recorded. For the geospatial analysis, only antimicrobials recommended by the AGISAR were used. A description of the database variables reported in Table 1 can be found on resistancebank.org. For a detailed explanation of the methods used for the literature search see the Supplementary Materials of Van Boeckel & Pires, 201926. The database contains 22,403 resistance rates (n) extracted from PPS conducted on foodborne pathogens in LMICs between 2000 to 2019 (Fig. 1). The pathogens isolated for AST include Escherichia coli (n = 9,206, 41.09%), non-typhoidal Salmonella spp. (n = 7,080, 31.60%), Staphylococcus aureus (n = 4,828, 21.55%), and Campylobacter spp. (n = 1,290, 5.76%). The PPS were conducted in 72 out of the 135 countries classified as LMICs by The World Bank41. Overall, 61.4% of all PPS listed on resistancebank.org were conducted in Asia, 24.1% in Africa, and 14.5% in Central and South America (Fig. 1); 49.41% of PPS were collected in India, China, Brazil, and Iran. Across all studies, bacteria were isolated from poultry (38.35%), cattle (37.56%), pigs (15.28%), and sheep (8.81%). In addition, in 55.66% of the PPS, bacteria were isolated from food products, in 43.82% from living or slaughtered animals, and in the remaining 0.52% from drag swabs (e.g. fecal samples, eggshells). The platform includes resistance rates for 143 antimicrobials grouped in 37 different families based on their chemical structure42. Amongst all the resistance rates available in resistancebank.org, 13,163 (59%) are for drug-pathogen combinations recommended for AST by the AGISAR40. We used the leaflet R package to display spatial data35,46,47 and add geographic layers in the UI. For displaying the AMR maps, we used a geographic information system software (QGIS 2.1848) to produce raster tiles (light square images in.png format) at ten different zoom levels. We stored 2.8 million tiles on a GitHub Pages website linked, as an online resource, to the leaflet object used to define the maps. Depending on the zoom and map position, the platform loads just the necessary maps tiles to ensure smooth navigation across zoom levels. For remote data collection and storage, we used the R packages rdrop2 and aws3 to interface the platform with cloud storage services, respectively Dropbox and Amazon Web Services. With every new submission, reistancebank.org uploads the corresponding .csv file in an online folder, emptied every time a human operator approves the new submissions. The central database (and its main sub-datasets), the plots present in each pop-up window of the geographic markers, and all of the files downloadable from resistancebank.org are stored remotely too. We used functions implemented in packages of the ROpenSci project (e.g. europepmc) to gather the bibliographic information of the collected PPS. Finally, we used a reactive R Markdown document to generate AMR country reports downloadable from resistancebank.org in.pdf format. We connected the Markdown file (.Rmd format) to the source code of resistancebank.org through an input parameter, i.e., a country name present in the application that depends on a specific object (datasets, functions, etc.). This country name can be specified by the users directly in the UI (e.g., selection of an LMIC through a drop-down menu). Based on that choice, the R Markdown document uses just a specific set of data (or functions) associated with one country to produce its corresponding country report. The UI of resistancebank.org is organized around an interactive map (Fig. 2). The red map shows spatial variations in a summary metric of resistance: P50, the proportion of antimicrobials tested for which bacteria have developed a resistance higher than 50%26. This index has been predicted by geospatial models at 10 × 10 km resolution for every LMIC using PPS26. Updates of the P50 map will be conducted on an annual basis. The panel in the top-right corner is divided into three sections: the “Maps” section controls the activation of every geographic layer available on resistancebank.org (PPS, AMR map, satellite base map). In the “Data” section, users can download the database of PPS (.csv format) described in Table 1 via the “Resistance bank” button, as well as the P50 raster (.tif format) via the “AMR hotspots map” button. The “Country report” button displays a panel containing a summary of the AMR reports available for each country (Fig. 3). From this panel, it is possible to download the country report for each country where at least one PPS has been reported. Along with the report, users can also download a country-based subset of the central database (.csv format) containing all the data used to generate this output. Through the “Add your survey” menu, users can choose amongst two modalities for uploading their PPS data in resistancebank.org: either by filling an online form, or an Excel template (see next section). The last button in the “Data” section, “Filter data” allows users to filter the database for countries, animal species and animal sample origin, pathogens and if their combination with the antimicrobials aligns with the AGISAR guidelines. In addition, it is also possible to filter the database for an individual antimicrobial class defined by the World Health Organization based on its importance for human medicine42 (e.g. 3rd generation cephalosporine). Users can then download the filtered results or display them on the map. In the latter case, when users filter for the antimicrobial class, the geographic marker intensity colour of each survey will vary based on the average resistance rate for the selected antimicrobial class. Finally, the “Info” panel links to the software’s GitHub repository (https://github.com/hegep-eth/resistancebank.org) and a YouTube video (https://youtu.be/TpMQ_3JLJ2I) illustrating how to use the different sections of the platform. Uploading new data One of the objectives of resistancebank.org is to provide up-to-date data visualizations for policymakers continuously collecting evidence from potential users who conducted a PPS in LMICs. To this end, users can input their AST data on resistancebank.org using an online form or a pre-filled Excel template. The Excel template can be downloaded and subsequently uploaded from the platform via the “Upload template” button under the “Add your survey” section. Before integrating a new survey, the platform executes automatic verifications for possible misspelled words and typos. If necessary, typos are corrected after comparison with a set of correct words provided for every template field. If resistancebank.org recognizes errors that can’t be corrected automatically (e.g., numerical values outside an appropriate range, such as AMR rates higher than 100%), the platform will invite users to revise their inputs. If users wish to use an online form instead of an Excel template, a step-by-step user guide is provided in the next paragraph (“Use Scenario”). Following the submission of the template or the form, the application automatically performs bibliographic research in the NCBI and PubMed databases to control if the users have provided a valid Digital Object Identifier (DOI) of their study. The application will also automatically extract information on the author(s) name, study title, publication year, journal name, and a link to the journal website associated with the survey submitted. Following submission, a new temporary geographic marker is added on the map, while awaiting further verification by a human operator who is notified of a new submission by email. This marker is light blue, to differentiate it from dark blue markers corresponding to confirmed studies (see Fig. 2 or the YouTube video). The human operator verifies the new data through an internal auxiliary software developed to support resistancebank.org. These verifications include a critical interpretation of the resistance rates reported and breakpoints values used for each drug-pathogen combination. The human operator may contact the authors of the study to request corrections/clarifications, and then give its final approval to a submission and merge it with the other surveys in the database. After the upload of a new survey, a near-real-time update of the platform is triggered such as to update all outputs (database available for download and country-level reports). This final step enables resistancebank.org to present only the most recent aggregated AMR results based on the PPS available in the scientific literature. We describe examples of the possible use of the platform by a user who wants to upload his/her AMR survey conducted, hypothetically, on a farm near New Delhi, India. The subsequent steps (visually represented in Fig. 4 and the YouTube video) aim to give an overview of the functionalities of resistancebank.org and the procedure to submit a new survey. A user launches the online platform by connecting to https://resistancebank.org. The user starts exploring the AMR map and the PPS geographic markers (in the Controls panel section “Maps” these two geospatial layers are both active when the application starts). The user can zoom in on the desired location or type the location name in the navigation bar in the top left part of the UI to explore P50 levels near New Delhi. If the user has recorded the precise coordinates of the study, the input text box can also accept latitude and longitude (separated by a space) in decimal degrees. The map view is now centered in New Delhi. The user can start exploring the P50 levels around the city and the PPS information aggregated at the animal species level present in the geographic markers. Their pop-up window also contains a URL to connect the user to the journal webpage of the study to retrieve additional information besides the ones presented in resistanbank.org. Detailed information about the national AMR situation in India is available in the panel accessible through the “Country report” button. Once “India” is selected from the drop-down menu, the country report is ready for download, together with the database of the PPS data collected just in India. The user decides to upload a PPS in resistancebank.org. He/she clicks on the “Add your survey” button, a new panel will open, and then the user can decide to upload data through an online form or an Excel template. The hyperlink “.xlsx template” triggers the download of a .zip folder that contains the template and a guide on how to fill it. For this example, we will use the online form. In the upper section of the form, the user can input his contact information. The second section of the form concerns bibliographic information: if a DOI is available, fields as title, journal, and publication year will be automatically filled. In this section, the user must specify the study region, the location (e.g., city, address, or latitude and longitude), and the sampling scheme adopted for the study (if it is a routine, a longitudinal study, a one-time research survey, or a study mandated by public authorities). In the AMR section, every row corresponds to an AST. The mandatory fields are animal species, the animal sample origin (e.g., different swabs, stools, meat, eggshells, gut, dairy products, etc.), the pathogen, the AST method, the antibiotic tested, and the relative value of resistance. Other non-mandatory fields are the number of isolates (at least 10 to be valid for a survey or template submission), the prevalence, the strain used in the quality control of the AST performance, the report of the use of antimicrobials in the farms where animal samples were collected, and the breakpoints. If the researcher tested more than one antibiotic, he/she can add a row that will keep the information from the previous row, except for the new compound name and its resistance value. Once uploaded, the form panel closes automatically, notifying the user of the submission. The light blue geographic marker will appear on the location specified in the form. The geographic marker will remain in a temporary status until a human operator accepts the new submission and merges it with the existing database stored in resistancebank.org. Thus far, a large body of evidence on AMR trends in animals in LMICs was scattered across the veterinary literature. resistancebank.org is a starting point to integrate this information. The platform is a surrogate but not a substitute for state-of-the-art systematic surveillance systems49,50. The goals of the platform are to summarize current knowledge on AMR in animals and to provide a tool for strengthening its evidence-based surveillance with additional PPS in the future. Furthermore, it overcomes barriers associated with traditional scientific publication (publication fees and access fees), thereby improving the visibility of researchers from LMICs, empowering local communities of scientists, and encouraging national networks coordinators to release their findings onto the website. Locally, resistancebank.org could be used to encourage epidemiological investigations by field officers from LMICs in areas of particular interest. Globally, resistancebank.org offers the opportunity to support the actions of international funders such as the Bill & Melinda Gates Foundation, the Fleming Fund, the Food and Agriculture Organization, and the World Organization for Animal Health. In particular, areas identified as hotspots of resistance (P50 > 0.4) could be used to investigate the effects of stewardship campaigns, and alternatives to antimicrobials, such as vaccines and probiotics51,52. Before resistancebank.org, different studies have centralized AMR data to describe their large-scale trends both in foodborne and human pathogens6,26,53,54. However, the use of an online platform has multiple advantages over individual studies. First, given its open-access nature, downloading and uploading information can be done free by anyone. Second, the diversity of outputs: we provide maps, summary reports for policymakers but also detailed data about resistance rates in individual surveys, with the possibility to filter them at a national- and microbiological-level to better target interventions. Third, the information on resistancebank.org is continuously updated in near-real-time. Fourth, the platform provides a much-needed -and thus far missing- focal point of data for a community of researchers studying the epidemiology of AMR in animals. For humans, online platforms that display AMR trends do exist: the Surveillance Atlas of Infectious Diseases55 developed by the European Centre for Disease Prevention and Control, and resistancemap56, developed by the Center for Disease Dynamics, Economics and Policy, display, respectively, European and global yearly AMR trends in common human pathogens. However, unlike resistancebank.org, these platforms lack the high spatial resolution of the data, since they aggregate trends at the country-level. While such trends are informative, the granular information underlying them is unfortunately not available in open access. Furthermore, these platforms do not include a possibility for uploading new surveys or dataset by external users. Similar platforms focus on the genetic determinants of AMR57,58, and how these affect the spread of pathogens. These include, amongst others, Microreact59 and Nextstrain60, and are complementary to the phenotypic information provided on resistancebank.org. For animals, WHONET61 (https://whonet.org) stores users’ AST results obtained from individual bacterial isolates. However, this platform is not currently available for every operating system, and -to the best of our knowledge- does not include geographic information on AMR trends in a centralized context. In contrast, resistancebank.org can be used with any internet browser. Our platform has been developed to complement current tools available for AMR surveillance in animal production which requires international attention given its potential implications on human health, animal health, and the long-term sustainability of the livestock sector. The data presented in resistancebank.org come with limitations. The first set of limitations concerns the quality of the event-based surveillance data and comparability across surveys. In the human population, the majority of studies focus on diagnostic samples taken mainly from sick patients. In contrast, in animals, surveillance relies on different data collection contexts: sampling of living versus dead animals, sampling of animal food products, outbreak investigation, sample collection required by food regulatory authorities, etc. These different sampling contexts, which are inherent to event-based surveillance, represent a challenge to the harmonization and the interpretation of resistance rates reported on this platform. In particular, the surveys listed on resistancebank.org may differ in terms of i) sampling strategy (random or convenient), ii) animal breeds and farming systems, iii) the number of isolates tested per survey, iv) testing, and v) the degree of aggregation used for reporting antimicrobial rates in each survey (population versus isolate-level information). For these reasons, in resistancebank.org, we allow users to specify additional surveys information such as the sampling scheme, the guidelines and breakpoints used for AST, the quality control strains used, etc., to include as much information about these factors that may affect the interpretation of the resistance rates reported. The second set of limitations concerns the attempt to summarize trends in resistance across drug-pathogen combinations using P50: the proportion of drugs tested in a survey with resistance rates higher than 50%. From a practical perspective, P50 expresses the probability of providing treatments that work out of a portfolio of treatment options, when antimicrobial therapy is indicated for a medical condition. Multiple summary metrics have been proposed62,63,64,65 and debated66 to aggregate resistance rates to multiple drug-pathogen combinations. As with every attempt to reduce this complexity, P50 comes with sources of uncertainty. First, the number of drugs tested in each survey can differ, and this can typically be influenced by the methods used for antimicrobial susceptibility testing in different laboratories (diffusion vs dilution methods), although a good agreement has been shown between the methods67. Second, in some surveys, screening for resistance of second-line drugs such as imipenem may be conducted on a subset of the isolates and introduce bias in P50 estimates. In this study, sub-sampling for second-line antimicrobials was limited to 34 out of 1,940 estimates of P50. Third, P50 reflects the number of compounds with resistance higher than 50% rather than the number of classes of compounds with resistance higher than 50%. Therefore, resistancebank.org also provides resistance rates for classes of compounds considered medically important by the WHO42. The P50 is a summary metric intended to help resource allocation against AMR in countries where systematic surveillance is limited. However, because of the non-systematic nature of the data P50 summarizes, comparisons of resistance rates for individual drug classes should be preferred for informing public health strategies. The third set of limitations concerns the intensity of our data collection efforts between countries. Our online literature search was supplemented by field officers who collected PPS on paper during visits to veterinary schools. However, these field visits could only be conducted in India, where our collaboration network is extensive. Collaboration with international organizations could help leverage a larger network of field officers to supplement the information currently in resistanbank.org. We conducted the literature searches in six languages (English, Mandarin Chinese, Spanish, French, Portuguese, and German). Although these languages are spoken by 46.6% of the world population68, further inquiries in other languages could help supplement our database. Finally, the computational cost of re-running the geospatial model is currently preventing instantaneous updates of the AMR map on a global level and should be the focus of future research efforts to move from yearly updates of our maps to daily updates. For the reasons listed above, resistancebank.org is an imperfect surrogate to systematic surveillance systems. It is a platform reporting large-scale trends in AMR meant to help international funders to target their efforts in the short term and facilitate the development of a global systematic surveillance system in the long term. All data presented in this article are available at https://resistancebank.org. The scripts and the files of resistancebank.org are available in its GitHub repository (https://github.com/hegep-eth/resistancebank.org). We developed the platform through the R software (version 4.0.2) and the RStudio Integrated Development Environment (IDE; version 1.3.1073). In its current version resistancebank.org relies on the following dependencies: aws.s3 (0.3.21), dplyr (1.0.2), europepmc (0.4), ggimage (0.2.8), ggmap (3.0.0), ggplot2 (3.3.2), gmailr (1.0.0), gsubfn (0.7), leaflet (220.127.116.11), lemon (0.4.5), raster (3.3–13), rcrossref (1.0.0), rdrop2 (0.8.2.1), rgdal (1.5–16), rmarkdown (1.15), scales (1.1.1), shiny (1.5.0), shinyBS (0.61), shinyjs (1.1), shinyWidgets (0.5.3), stringr (1.4.0), svglite (18.104.22.168), sp (1.4–5). Goossens, H. Antibiotic consumption and link to resistance. Clin. Microbiol. Infect. 15, 12–15 (2009). Van Boeckel, T. P. et al. Global trends in antimicrobial use in food animals. PNAS 112, 5649–5654 (2015). Klein, E. Y. et al. Global increase and geographic convergence in antibiotic consumption between 2000 and 2015. Proc. Natl. Acad. Sci. USA 115, E3463–E3470 (2018). Tiseo, K. et al. Global Trends in Antimicrobial Use in Food Animals from 2017 to 2030. Antibiotics 9, 918 (2020). Chen, C. C. et al. Organ-level quorum sensing directs regeneration in hair stem cell populations. Cell 161, 277–290 (2015). Versporten, A. et al. Antimicrobial consumption and resistance in adult hospital inpatients in 53 countries: results of an internet-based global point prevalence survey. Lancet Glob. Heal. 6, e619–e629 (2018). Chantziaras, I., Boyen, F., Callens, B. & Dewulf, J. Correlation between veterinary antimicrobial use and antimicrobial resistance in food-producing animals: A report on seven countries. J. Antimicrob. Chemother. 69, 827–834 (2014). Van Boeckel, T. P. et al. Reducing antimicrobial use in food animals. Science (80-.). 357, 1350–1352 (2017). Organisation for Economic Co-operation and Development. Global antimicrobial use in the livestock sector. Working Party on Agricultural Policies and Markets (2015). The High Level Panel of Experts on Food Security and Nutrition (FAO). Sustainable agricultural development for food security and nutrition. (2016). Thornton, P. K. Livestock production: recent trends, future prospects. Philos. Trans. R. Soc. B. 365, 2853–2867 (2010). Tang, K. L. et al. Restricting the use of antibiotics in food-producing animals and its associations with antibiotic resistance in food-producing animals and human beings: a systematic review and meta-analysis. Lancet Planet. Heal. 1, e316–e327 (2017). Leverstein-van Hall, M. A. et al. Dutch patients, retail chicken meat and poultry share the same ESBL genes, plasmids and strains. Clin. Microbiol. Infect. 17, 873–880 (2011). Smith, T. C. et al. Methicillin-Resistant Staphylococcus aureus in Pigs and Farm Workers on Conventional and Antibiotic-Free Swine Farms in the USA. PLoS One 8, 1–5 (2013). Woolhouse, M., Ward, M., Van Bunnik, B. & Farrar, J. Antimicrobial resistance in humans, livestock and the wider environment. Philos. Trans. R. Soc. B Biol. Sci. 370, (2015). Ward, M. J. et al. Time-scaled evolutionary analysis of the transmission and antibiotic resistance dynamics of Staphylococcus aureus clonal complex 398. Appl. Environ. Microbiol. 80, 7275–7282 (2014). Liu, C. M. et al. Escherichia coli ST131-H22 as a foodborne uropathogen. MBio 9 (2018). Hay, S., Guerra, C. A., Tatem, A. J., Noor, A. M. & Snow, R. W. The global distribution and population at risk of malaria: past, present, and future. Lancet Infect Dis 4, 327–336 (2004). Bhatt, S. et al. The global distribution and burden of dengue. Nature 496, 504–507 (2013). Grobusch, M. P. & Kapata, N. Global burden of tuberculosis: where we are and what to do. Lancet Infect. Dis. 18, 1291–1293 (2018). Perez, F. & Villegas, M. V. The role of surveillance systems in confronting the global crisis of antibioic-resistant bacteria. PMC 28, 375–383 (2017). Acar, J. F. & Moulin, G. Integrating animal health surveillance and food safety: The issue of antimicrobial resistance. OIE Rev. Sci. Tech. 32, 383–392 (2013). Laxminarayan, R., Sridhar, D., Blaser, M., Wang, M. & Woolhouse, M. Achieving global targets for antimicrobial resistance. Science (80-.). 353, 874–875 (2016). United States Agency for International Development (USAID). Combating antimicrobial resistance. https://www.usaid.gov/global-health/health-systems-innovation/health-systems/combating-antimicrobial-resistance (2020). The Fleming Fund. https://www.flemingfund.org (2020). Van Boeckel, T. P. et al. Global trends in antimicrobial resistance in animals in low- and middle-income countries. Science (80-.). 365 (2019). Howison, J., Deelman, E., McLennan, M. J., Da Silva, R. F. & Herbsleb, J. D. Understanding the scientific software ecosystem and its impact: Current and future measures. Res. Eval. 24, 454–470 (2015). Nguyen, P. et al. The CHRS Data Portal, an easily accessible public repository for PERSIANN global satellite precipitation data. Sci. Data 6, 180296 1–10 (2018). Criscuolo, N. et al. High Biodiversity Arises from the Analyses of Morphometric, Biochemical and Genetic Data in Ancient Olive Trees of South of Italy. Plants 8 (2019). Criscuolo, N. G. & Angelini, C. StructuRly: A novel shiny app to produce comprehensive, detailed and interactive plots for population genetic analysis. PLoS One 15, 1–12 (2020). Emam, I. et al. PlatformTM, a standards-based data custodianship platform for translational medicine research. Sci. data 6, 149 (2019). Depuydt, P. et al. Meta-mining of copy number profiles of high-risk neuroblastoma tumors. Sci. Data 5, 1–9 (2018). Freifeld, C. C., Mandl, K. D., Reis, B. Y. & Brownstein, J. S. HealthMap: Global Infectious Disease Monitoring through Automated Classification and Visualization of Internet Media Reports. J. Am. Med. Informatics Assoc. 15, 150–157 (2014). Pfeffer, D. A. et al. MalariaAtlas: An R interface to global malariometric data hosted by the Malaria Atlas Project. Malar. J. 17, 1–10 (2018). Tomlinson, S., South, A. & Longbottom, J. Malaria Data by District: An open-source web application for increasing access to malaria information. Wellcome Open Res. 4, 151 (2019). Tacconelli, E. et al. Surveillance for control of antimicrobial resistance. Lancet Infect. Dis. 18, e99–e106 (2018). The Fleming Fund. Country Grants. https://www.flemingfund.org/grants-funding/country-grants/ (2020). Food and Agriculture Organization of the United Narions. Monitoring and surveillance of antimicrobial resistance in bacteria from healthy food animals intended for consumption. Regional Antimicrobial Resistnce Monitoring and Surveillance Guidelines (2019). Laxminarayan, R. et al. The Lancet Infectious Diseases Commission on antimicrobial resistance: 6 years later. Lancet Infect. Dis. 3099, 1–10 (2020). WHO. Integrated Surveillance of Antimicrobial Resistance in Foodborne Bacteria: Application of a One Health Approach. World Health Organization (2017). The World Bank. World Bank Country and Lending Groups. https://datahelpdesk.worldbank.org/knowledgebase/articles/906519 (2019). WHO. Critically Important Antimicrobials for Human Medicine. (2018). R Core Team. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. https://www.R-project.org/ (2019). Criscuolo, NG., Pires, J., Naqvi, J., Zhao, C. & Van Boeckel, TP. Source code for: resistancebank.org - An open-access repository for surveys of antimicrobial resistance in animals, Zenodo, https://doi.org/10.5281/zenodo.4604894 (2021). Chang, W., Cheng, J., Allaire, J., Xie, Y. & McPherson, J. shiny: Web Application Framework for R. R package version 1.4.0. https://CRAN.R-project.org/package=shiny (2019). Calderwood, J. et al. Hotspot mapping in the Celtic Sea: An interactive tool using multinational data to optimise fishing practices. Mar. Policy 116, 1–12 (2019). Moraga, P. SpatialEpiApp: A Shiny web application for the analysis of spatial and spatio-temporal disease data. Spat. Spatiotemporal. Epidemiol. 23, 47–57 (2017). QGIS Development Team. QGIS Geographic Information System. Open Source Geospatial Foundation Project, version 3.14. http://qgis.osgeo.org (2020). Hammerum, A. M. et al. Danish integrated antimicrobial resistance monitoring and research program. Emerg. Infect. Dis. 13, 1632–1639 (2007). Veldman, K. et al. Monitoring of antimicrobial resistance and antibiotic usage in animals in the Netherlands in 2018. Combined with NETHMAP-2019: Consumption of antimicrobial agents and antimicrobial resistance among medically important bacteria in the Netherlands. (2019). Vyas, U. & Ranganathan, N. Probiotics, prebiotics, and synbiotics: Gut and beyond. Gastroenterol. Res. Pract. 2012 (2012). Gaggìa, F., Mattarelli, P. & Biavati, B. Probiotics and prebiotics in animal feeding for safe food production. Int. J. Food Microbiol. 141, S15–S28 (2010). Okeke, I. N. et al. AMR Resistance in developing countries. Part 1: recent trends and current status. Lancet Infect Dis 5, 481–493 (2005). Koluman, A. & Dikici, A. Antimicrobial resistance of emerging foodborne pathogens: Status quo and global trends. Crit. Rev. Microbiol. 39, 57–69 (2013). European Centre for Disease Prevention and Control. Surveillance Atlas for Infectious Diseases. https://atlas.ecdc.europa.eu/public/index.aspx (2020). The Center for Disease Dynamics Economics & Policy. ResistanceMap. https://resistancemap.cddep.org (2018). Hendriksen, R. S. et al. Using Genomics to Track Global Antimicrobial Resistance. Front. Public Heal. 7 (2019). Köser, C. U., Ellington, M. J. & Peacock, S. J. Whole-genome sequencing to control antimicrobial resistance. Trends Genet. 30, 401–407 (2014). Argimón, S. et al. Microreact: visualizing and sharing data for genomic epidemiology and phylogeography. Microb. genomics 2, 1–11 (2016). Hadfield, J. et al. NextStrain: Real-time tracking of pathogen evolution. Bioinformatics 34, 4121–4123 (2018). Stelling, J. M. & Brien, T. F. O. Surveillance of Antimicrobial Resistance: The WHONET Program. Clin. Infect. Dis. 24, S157–S168 (1997). Havelaar, A. H. et al. A summary index for antimicrobial resistance in food animals in the Netherlands. BMC Vet. Res. 13, 305 (2017). Hughes, J. S. et al. How to measure the impacts of antibiotic resistance and antibiotic development on empiric therapy: New composite indices. BMJ Open 6 (2016). Magiorakos, A. P. et al. Multidrug-resistant, extensively drug-resistant and pandrug-resistant bacteria: An international expert proposal for interim standard definitions for acquired resistance. Clin. Microbiol. Infect. 18, 268–281 (2012). Laxminarayan, R. & Klugman, K. P. Communicating trends in resistance using a drug resistance index. BMJ Open 1 (2011). Vandenbroucke-Grauls, C. M. J. E. et al. The proposed Drug Resistance Index (DRI) is not a good measure of antibiotic effectiveness in relation to drug resistance. BMJ Glob. Heal. 4, 1–3 (2019). Bengtsson, S., Bjelkenbrant, C. & Kahlmeter, G. Validation of EUCAST zone diameter breakpoints against reference broth microdilution. Clin. Microbiol. Infect. 20 (2013). Ethnologue. What are the top 200 most spoken languages? https://www.ethnologue.com/guides/ethnologue200 (2020). This work was supported by the Branco Weiss Fellowship, and the Swiss National Science Foundation (SNF). The authors declare no competing interests. Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. About this article Cite this article Criscuolo, N.G., Pires, J., Zhao, C. et al. resistancebank.org, an open-access repository for surveys of antimicrobial resistance in animals. Sci Data 8, 189 (2021). https://doi.org/10.1038/s41597-021-00978-9
<urn:uuid:70b49a87-dfca-4c98-89f0-cee48f2cea6c>
CC-MAIN-2022-33
https://www.nature.com/articles/s41597-021-00978-9
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00674.warc.gz
en
0.851733
9,374
3.265625
3
VMWare Workstation / Virtual PC iSCSI Initiator : There are two fine iSCSI Initiator available, I used both of them to connect iSCSI Device on Guest OS VMWare Workstation / Virtual PC : You need 3 Windows 2003 Guest OS, one for AD and two for Cluster Node. Basic Steps I Follow: - On the host pc (my desktop), I install StarWind iSCSI. - Create image file for Quorum and other Disk. - In the guest operating systems, I install both StarPort and Microsoft Initiator 2.07, but you can install any one of them, don’t have to install both. - In the both guest operating system, I configure StarPort for first 3 iSCSI Device and configure Microsoft Initiator for last iSCSI Device. - Now I get 4 SCSI disks in Windows 2003 Guest OS , format and assign a drive letter. Step 1: Install StarWind on host System and Configure the virtual disks Install StartWind and After installation, open StarWind management Console, Now Right Click on localhost and click connect. On password box, type test, to connect StarWind. You can add devices and make them available over the network with iSCSI. For a basic cluster setup, we need a quorum disk and a data disk. I am using ImageFiles for this purpose. You can add device by clicking Add Device from context menu, And follow wizard to add image, here I added 4 ImageFiles, IMPORTANT: At the time of adding these devices, use the Allow multiple concurrent iSCSI connection(clustering) option to allow multiple initiators to connect to a single device. Step 2: Install 2 Nodes in VMWare/Virtual PC and install/configure StarPort or MS Initiator Setup following Network on VMWare, Public : A virtual network card that uses NAT networking for iSCSI and public connectivity. Private : A virtual network card that uses Host-Only that will be used for the cluster heartbeat. After installing the first guest, install the StarPort software or Microsoft Initiator 2.07 on it to connect remote iSCSI Device: Microsoft Initiator 2.07 In Disk Management, you can then format the disks and assign drive letters: Shut down the first guest and repeat the steps on second node (install StarPort/MS Initiator to configure the disks and assign the same drive letters). Step 3: Validate Cluster Configuration Before configuring cluster, must have to validate cluster configuration by using Microsoft Cluster Configuration Validation Wizard(ClusPrep). Download it from following location and install. Now run wizard. After clicking Next, select servers you want to configure cluster, and run the test. Wait until it finish, if everything configured properly, you will get a following screen (in my VM lab i get 100% success). I am attaching my validation report here, Report.chm (43.5 KiB, 746 hits) Step 4: Install and Configure Cluster Now Create your cluster, here I create CLUSTER as my cluster environment.
<urn:uuid:56dc3d52-adae-45b9-8b2e-88ae13d6dab3>
CC-MAIN-2017-04
http://technochat.in/2008/11/configure-cluster-on-vmware-using-iscsi/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00330-ip-10-171-10-70.ec2.internal.warc.gz
en
0.752718
664
1.570313
2
Not on display - Joan Miró 1893–1983 - Original title - Femmes, oiseau au clair de lune - Oil paint on canvas - Support: 813 × 660 mm frame: 1049 × 897 × 114 mm - Purchased 1951 Joan Miró born 1893 [ - 1983] N06007 Femmes, Oiseau au Clair de Lune (Women and Bird in the Moonlight) 1949 Inscribed 'Miró | 10 | 1949' on back of canvas Oil on canvas, 32 x 26 (81.5 x 66) Purchased from the Galerie Maeght (Knapping Fund) 1951 Prov: With Galerie Maeght, Paris (purchased from the artist 1951) Exh: Braque, Chagall, Kandinsky, La Fresnaye, Matisse, Miró, Arp ..., Galerie Maeght, Paris, February-March 1951 (no catalogue); Joan Miró, Tate Gallery, August-October 1964 (188, repr.); Kunsthaus, Zurich, October-December 1964 (188, repr.); Joan Miró, Grand Palais, Paris, May-October 1974 (65, repr.); Louisiana Museum, Humlebaek, November 1974-January 1975 (29, repr. in colour) Lit: Jacques Dupin, Joan Miró: Life and Work (London 1962), No.730, pp.392-5, repr. p.555 as 'Painting. 1 June, 1949' Repr: XXe Siècle, No.1, 1951, p.32 as 'Femme et Oiseau au Clair de Lune'; Jacques Prévert and G. Ribemont-Dessaignes, Joan Miró (Paris 1956), p.167 as 'L'Etoile blanche' 1948; Roland Penrose, Miró (London 1970), p.114 in colour When asked whether the title used here was correct, the artist replied (letter of 17 June 1954): 'To the whole of this series of paintings, which was executed very slowly, I gave on completion a general title of "Paintings", but later, to be more precise and give a more objective and concrete meaning, I entitled your picture "Femmes, Oiseau au Clair de Lune".' Jacques Dupin has pointed out that Miró's paintings of the period 1949-50 can be divided into two contrasting and complementary series: a series of very elaborate paintings noteworthy for the diversity and extraordinary refinement of their grounds (the present work is an example of this) and a further series of completely spontaneous paintings of a summary, gestural character. In the 'elaborate' paintings, he writes, 'Figures, birds, animals, stars, and signs play and combine with one another with an elegance and acrobatic sureness, a casualness in the revelation of mystery and a joy in their nostalgic evocation of a primitive world which together confound the imagination'. Ronald Alley, Catalogue of the Tate Gallery's Collection of Modern Art other than Works by British Artists, Tate Gallery and Sotheby Parke-Bernet, London 1981, pp.525-6, reproduced p.525
<urn:uuid:b4a56688-6c14-4592-ab13-49ee5d38df01>
CC-MAIN-2022-33
https://www.tate.org.uk/art/artworks/miro-women-and-bird-in-the-moonlight-n06007
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00678.warc.gz
en
0.824117
716
1.742188
2
A conversation with Dr. Anusha Samaranayaka (Dr. Anusha), KeyLeaf Lead Scientist – Proteins, and Dr. Rick Green, KeyLeaf’s President of Technology Development (Part 1 of 3) Can you give an overview of KeyLeaf’s activities in the plant-based protein space? Dr. Anusha: For over four decades, KeyLeaf has been helping companies to process, develop, optimize, and… A conversation with Dr. Anusha Samaranayaka (Dr. Anusha), KeyLeaf Lead Scientist – Proteins, and Dr. Rick Green, KeyLeaf’s President of Technology Development (Part 1 of 3) Can you give an overview of KeyLeaf’s activities in the plant-based protein space? For over four decades, KeyLeaf has been helping companies to process, develop, optimize, and commercialize various alternative protein ingredients. During the last 4 to 5 years, our work has mainly been focused on pulses (pea, chickpea, lentil, fava bean, and other beans), oat, and hemp. In addition to helping companies with their ingredient needs, we also undertake internal R&D projects to develop new technologies. We are also working with industry partners and academia to do collaborative research, which has so far led to the filing of four patents. As for our current R&D work, most of it involves extracting, isolating, and developing hemp protein components. We have some very exciting ingredients based on our work with hemp protein waiting to be debuted at an upcoming industry expo. What are the key drivers in the alternative plant protein market? In terms of market share, alternative plant protein has several drivers. Many consumers select plant proteins because they like the healthy image associated with them. Surveys say that 38% percent of US consumers associate plant-based proteins with health benefits, 17% believe that plant-based proteins offer superior nutritional value compared to animal protein, and 14% now believe there is no need to eat meat to intake adequate protein. I think the public’s interest in substituting animal protein with plant protein soared with the launch of the alternative meat burgers, which were picked up by grocery stores and restaurants. There was tremendous coverage in the media of the main companies involved. The new meatless burgers were looked upon as good for the environment and as a healthier alternative to animal-based proteins. And it wasn’t all about replacing meat – manufacturers also launched plant-derived egg replacers. In addition to the health issue, another big driver was the idea that plant-derived protein meals were better for the ecosystem. Not only that: in 2016 the World Health Organization launched the “Year of the Pulse”, embracing the cultivation and consumption of protein rich pulse crops such as dry legumes, peas, lentils and chickpeas. The big push for pulse was because it would be more friendly to the environment if humans started eating more plant-based protein. The Year of the Pulse coincided quite well with the launch of the meatless burgers, and the public then became very interested in alternative proteins. Around this time, we also started to understand that we might not have enough total protein to feed the world in the future. With projections that the global population could reach 9.6 billion, potentially doubling the demand for food by 2050, the threat of planetary protein deficiency became another strong factor driving research and development of new alternative protein sources. The flexitarians, not vegans or vegetarians, are the real market drivers of the alternative protein space. In addition to the health benefits, they want to hear about the product’s “story”, and transparency. Sustainability and animal welfare are other key factors. Today’s consumers, especially millennials and younger generation, like to try new things, and they’ve embraced the plant-derived meat, eggs, and dairy alternatives. Beyond Meat, Impossible Foods, Quorn, Good Catch Foods, Just, and Ripple Foods are some of the major alternative meat, seafood, egg, and dairy/beverage companies in the plant-based protein product space right now, among many others. After enjoying tasty “meatless meat” meals and dairy alternatives, our palates began calling out “what else can you do”, whereupon food processors started developing and formulating an array of plant protein dishes from fishless fish to non-dairy ice cream. Getting the flavor and texture right proved to be the make-break issue for every company entering the plant-based protein space, — far easier to say than do.
<urn:uuid:eba2c8d1-e2c2-4076-a6ec-e3c105aa76e3>
CC-MAIN-2022-33
https://keyleaf.ca/news-insights/innovations-emerging-trends-keyleafs-role-in-the-plant-based-protein-space-part-1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00677.warc.gz
en
0.955606
982
1.5625
2
Delivering a lethal dose of insulin, remotely stopping a pacemaker or even administering a deadly shock through a defibrillator are all real possibilities in the world of medical cybercrime, NBC 5 Investigates has found. "Occasionally patients will raise the question, can somebody hack into these devices?" said Brad Knight, a cardiologist and the Director of Electrocardiography at Northwestern Memorial Hospital. Knight and his team at Northwestern implant about 600 pacemakers and defibrillators each year that can be remotely monitored and programmed. "We can wirelessly communicate with these devices," Knight said. But this cutting edge technology is what makes these devices vulnerable, and NBC 5 Investigates has discovered some of these devices are not secure, making it possible for cybercriminals to remotely access and alter the equipment. "That does give me some concern," said Jerry Hoffman, who was born with a congenital heart condition. The Evanston resident had open heart surgery at 34 and a pacemaker a year later. "I don't know what people would do with the actual data, but they certainly could potentially manipulate the device for one reason or another," said Hoffman. The idea of breaking into medical devices became a reality when security expert and diabetic Jay Radcliffe hacked into his own insulin pump. "I reverse-engineered the communication between this and the insulin pump so that way I knew what kind of language to speak," said Radcliffe, who works for privately-held Boston-based cybersecurity firm Rapid7. "Once I was able to do that, I was able to write my own program to modify all the settings in the insulin pump, or to turn the insulin pump off." Radcliffe's groundbreaking research exposed a security flaw that could allow hackers to remotely control the amount of insulin, potentially administering a deadly dose. "The only thing you needed to know was the six-digit serial number on the back of this," said Radcliffe, referring to his Medtronic insulin pump. A spokesperson for Medtronic told us the company does not share specifics about the way they secure their products. But she did say the company has made changes since Radcliffe hacked into his insulin pump. "Over the last few years, we have made security improvements and design changes to some of our products, including software and firmware updates, expanded encryption and improved authentication and application integrity protocols," said Marie Yarroll, Medtronic public relations. "Many of these steps are also part of our product and technology development process." Medtronic is considered one of the world leaders in medical device technology. "We are aware of no instance of a malicious, criminal hack, and strongly believe that the therapy benefits of our products greatly outweigh potential risk," Yarroll said. Security experts say vulnerabilities in medical devices are an industry-wide problem. Some medical device companies have designed cutting edge devices, but experts says they did not given much thought to the potential security flaws that could exist in the equipment and the software. The Food and Drug Administration issued guidelines on encryption for wireless medical devices about a year ago. But currently there are no Federal requirements regulating medical devices. The FDA and Department of Homeland Security are holding a public conference next month in Arlington, Virginia to discuss medical device and healthcare cybersecurity. "I think everything with a computer has flaws," said Dr. Kevin Fu, who will be speaking next month at the cybersecurity conference. The University of Michigan professor tests all types of medical devices in his Michigan lab. "They do have shortfalls in that security wasn't really part of the picture when they were designed," Fu said. Fu uses a synthetic cadaver to test out the devices. "We actually look at defensive approaches and technology that might allow us to either detect or stop malicious attacks," he said. Fu has been called to testify before both the House and the Senate. Ultimately, he hopes his research will force medical device companies to increase security. "The problem with malicious hacks is what is going to come down the line in the future if the manufacturing community doesn't solve these problems," he added. And that remains a big concern among security experts. "People who are building these devices are not security people who are familiar with what it takes to withstand all of the attacks," said Christopher Budd, Global Threat Communications Manager at Trend Micro. And if these security issues aren't addressed, doctors say technology - and patient care - can't move forward. "I think there are a lot more things we can do for patients that are not a possibility currently because of these concerns about somebody hacking into a device," said Northwestern Cardiologist, Dr. Brad Knight.
<urn:uuid:14af31e9-e1ee-4871-80d5-bd93c1720756>
CC-MAIN-2017-04
http://www.nbcchicago.com/investigations/Medical-Devices-Vulnerable-to-Hack-Attacks-277538441.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00490-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969088
958
2.296875
2
- Included in Eastons: No - Included in Hitchcocks: No - Included in Naves: No - Included in Smiths: No - Included in Websters: Yes - Included in Strongs: Yes - Included in Thayers: Yes - Included in BDB: Yes - H157 Used 4 times - H4480 Used 1 time - H7453 Used 27 times - H7462 Used 1 time - H7463 Used 3 times - H7965 Used 1 time - G2083 Used 3 times - G3982 Used 1 time - G5384 Used 12 times FRIEND, noun frend. 1. One who is attached to another by affection; one who entertains for another sentiments of esteem, respect and affection, which lead him to desire his company, and to seek to promote his happiness and prosperity; opposed to foe or enemy. A friend loveth at all times. Proverbs 17:17. 2. One not hostile; opposed to an enemy in war. 3. One reconciled after enmity. Let us be friends again. 4. An attendant; a companion. 5. A favorer; one who is propitious; as a friend to commerce; a friend to poetry; a friend to charitable institution. 6. A favorite. Hushai was David's friend 7. A term of salutation; a familiar compellation. FRIEND, how camest thou in hither? Matthew 22:12. So Christ calls Judas his friend though a traitor. 8. Formerly, a paramour. 9. A friend at court, one who has sufficient interest to serve another. FRIEND, verb transitive frend. To favor; to countenance; to befriend; to support or aid. [But we now use befriend.] FRIEND'ED, participle passive frend'ed. 1. Favored; befriended. 2. adjective Inclined to love; well disposed. FRIEND'LESS, adjective frend'less. Destitute of friends; wanting countenance or support; forlorn. FRIEND'LIKE, adjective frend'like. Having the dispositions of a friend. FRIEND'LINESS, noun frend'liness. 1. A disposition to friendship; friendly disposition. 2. Exertion of benevolence or kindness. FRIEND'LY, adjective frend'ly. 1. Having the temper and disposition of a friend; kind; favorable; disposed to promote the good of another. Thou to mankind be good and friendly still, and oft return. 2. Disposed to peace. 3. Amicable. We are on friendly terms. 4. Not hostile; as a friendly power or state. 5. Favorable; propitious; salutary; promoting the good of; as a friendly breeze or gale. Excessive rains are not friendly to the ripening fruits. Temperance is friendly to longevity. FRIEND'LY, adverb frend'ly. In the manner of friends; amicably. [Not much used.] Jesus calls His disciples friends False friends, instances of: Pharaoh's butler false to Joseph Delilah to Samson The Ephraimite's wife David to Joab 1 Kings 2:5-6 David to Uriah 1 Kings 10:11 Ahithophel to David 2 Samuel 15:12 Deuteronomy 13:6-9; Job 6:14-15; Job 16:2; Job 16:20; Job 19:13-22; Psalms 35:13-14; Psalms 41:9; Psalms 55:12-14; Psalms 88:8; Psalms 88:18; Proverbs 11:13; Proverbs 17:9; Proverbs 17:17; Proverbs 18:24; Proverbs 22:24-27; Proverbs 25:17; Proverbs 25:19; Proverbs 27:6; Proverbs 27:9-10; Proverbs 27:14; Proverbs 27:17; Proverbs 27:19; Ecclesiastes 4:9-12; Amos 3:3; 2 Timothy 4:16 Abraham and Lot Ruth and Naomi David and Abiathar 1 Samuel 22:23 David and Nahash 2 Samuel 10:2 David and Hiram 1 Kings 5:1 David and Ittai 2 Samuel 15:19-21 Job and his three friends Daniel and his three companions Luke and Theophilus Paul and his nephew Paul, Priscilla, and Aquila FRIEND'SHIP, noun frend'ship. 1. An attachment to a person, proceeding from intimate acquaintance, and a reciprocation of kind offices, or from a favorable opinion of the amiable and respectable qualities of his mind. friendship differs from benevolence, which is good will to mankind in general, and from that love which springs from animal appetite. True friendship is a noble and virtuous attachment, springing from a pure source, a respect for worth or amiable qualities. False friendship may subsist between bad men, as between thieves and pirates. This is a temporary attachment springing from interest, and may change in a moment to enmity and rancor. There can be no friendship without confidence, and no confidence without integrity. There is little friendship in the world. The first law of friendship is sincerity. 2. Mutual attachment; intimacy. If not in friendship live at least in peace. 3. Favor; personal kindness. His friendships, still a few confined, were always of the middling kind. 4. Friendly aid; help; assistance. 5. Conformity; affinity; correspondence; aptness to unite. We know those colors which have a friendship with each other. [Not common and hardly legitimate.]
<urn:uuid:0f5aca02-73ba-4b3d-a608-c0afc1ecfe11>
CC-MAIN-2022-33
https://kingjamesbibledictionary.com/Dictionary/friend
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00072.warc.gz
en
0.886383
1,391
2.515625
3
The Democratic Party is on the hunt for a new pair of fathers. Last week, Democrats in Connecticut rather matter-of-factly decided to oust Thomas Jefferson and Andrew Jackson from their place of honor as the namesakes of the state party’s annual fund-raising dinner. The debate—such as it was—over the legacies of the two slave-owning presidents took all of two minutes, a spokesman for the state central committee said, and the vote to strip their names from the dinner was unanimous. A week earlier, Missouri changed the name of its Jefferson-Jackson dinner to honor native son Harry Truman instead, and two days after Connecticut’s vote, Georgia Democrats announced a similar change with even less fanfare. “Jefferson-Jackson” dinners are signature events for state-level Democratic parties around the country and are often used to recruit rising stars, or feature presidential candidates as keynote speakers. The dinners in Iowa, New Hampshire, and South Carolina are especially can’t-miss affairs; then-Senator Barack Obama’s speech at the Iowa Jefferson Jackson dinner in November 2007 helped launch him ahead of Hillary Clinton in the state’s crucial January caucuses. Yet the decisions by Connecticut, Missouri, and Georgia, and a parallel debate over Jackson’s place on the $20 bill, could herald a broader shift away from the Jefferson and Jackson legacies in the party and a search for other historical figures that better reflect the Democrats’ contemporary message of inclusiveness and racial harmony. Already, the state party in South Carolina plans to discuss re-naming its dinner in September, Chairman Jaime Harrison said in a statement. Iowa is talking about a change, a spokesman for the state party said. And even in Jackson’s home state of Tennessee, Mary Mancini, the Democratic Party chairwoman, said it’s time to talk about changing the dinner named exclusively for the seventh president. An aide for the Democratic National Committee in Washington predicted that even more states could follow suit. In Connecticut, the change occurred swiftly after the arrival this summer of a new Democratic chairman, Nick Balletto, who is closely aligned with the state chapter of the NAACP. The NAACP had previously helped to draw attention to buildings at Yale that were named after slave owners, along with the role that Aetna, the Hartford-based insurance giant, had played insuring the slave industry. When South Carolina moved to remove the Confederate flag from its Capitol grounds weeks after the racially-motivated massacre of nine African Americans in a Charleston church, the debate in Connecticut “resurfaced,” said Scot X. Esdaile, president of the state NAACP. “If the Republican Party is going to be challenged on the Confederate flag, then the Democratic Party needs to be challenged on their issues, too,” Esdaile said in a phone interview, noting that while the NAACP has recently been much more closely allied with Democrats, it is a nonpartisan organization. “If you really delve into the history of the Democratic Party, they have a really cloudy and bloody past.” Democrats, Esdaile said, “can’t be judged on what happened in the past, but they can be judged on what they have done today. And I think they did the right thing.” Balletto put forward the proposal in a resolution stating that it was “only fitting” that the name of the state party’s “most visible annual event reflects our dedication to diversity and forward-looking vision.” (The event was known as the Jefferson-Jackson-Bailey Dinner, with the latter name honoring John Bailey, a New Deal-era liberal who headed the state party and died in 1975.) Governor Dannel Malloy quickly endorsed the resolution, writing in a letter to committee members that the dinner’s name should reflect the Democratic “commitment to justice and equality.” This is by no means an indictment of the legacy of Thomas Jefferson or any of our nation’s founders. Yet as a party we should continue to look at ourselves in the mirror and ensure that we strive to represent the ideals that we talk about every day in Connecticut. This is an opportunity to pay homage to the progressive leaders and policies that have defined our party for the past several decades. Facing no serious opposition, the change was approved on July 22, and the names of Jefferson and Jackson were dropped from the dinner’s name for the first time in 67 years. The party is now accepting suggestions for a new name, which it will consider in the fall. The vice president of the Thomas Jefferson Foundation in Monticello is, incredibly, a British-born historian named Andrew Jackson O’Shaughnessy. “The Jackson is basically my mother’s maiden name, but I also use it as something of a joke,” he told me by phone. O’Shaughnessy told me it was “inevitable and appropriate that historians adopted a more critical perspective towards Thomas Jefferson, but it is possible to appreciate his contribution to the advancement of democracy while acknowledging his involvement in slavery, which he himself denounced as an ‘abominable crime.’” And the modern Democratic Party, he said, understandably wants “to embrace a much larger audience.” Yet the problem with the push to scrub historical figures, he said, is that “in the end we dissociate ourselves from our own past.” And where do you draw the line, O’Shaughnessy asked? Four of America’s first five presidents were slave owners. Are we going to drop the name Washington? Maybe the capital city should change its name. How far do you take this? Maybe this is a lesson to teach people, that the origins of our country are intertwined with slavery, whether we like it or not. It’s not just confined to a few founding fathers. Despite the revelations in the last two decades that Jefferson likely fathered children with Sally Hemings, one of the more than 600 slaves he owned, his legacy is surely safer than that of Jackson’s. As O’Shaughnessy noted, Jefferson has better anti-slavery credentials than Jackson, having spoken out against the practice and having signed legislation in 1807 abolishing the slave trade. And while the names of fund-raising dinners can be changed rather easily, Jefferson is much more permanently enshrined atop Mount Rushmore and through his namesake memorial in Washington. Though long lauded as a champion of popular democracy, Jackson has been under siege in recent years both for his support of slavery and for his brutal campaigns against the Cherokees before and during his presidency. The grassroots effort to put a woman on U.S. currency has centered on removing Jackson from his place on the $20 bill (although the Treasury Department has announced that a woman would go on the redesigned $10 note instead). While Democrats in Tennessee are naturally more protective of Jackson, Mancini said she’s encountered multiple people during her seven months as party chairman who have urged her to remove his name from the annual fund-raising dinner. “I think we absolutely need to have that conversation now,” she told me. “It’s something that should be discussed, and it’s going to be.” At the same time, Mancini said Jackson still merited a place of honor in the party. “The spirit of Andrew Jackson is the spirit that flows through the Democratic Party, that the common man gets his day and has his voice,” Mancini said. “We’ll be forever grateful and honor that legacy. But everything evolves, and we can’t really hold anything static. So might be find we find someone else who better exemplifies who we are today? Sure, absolutely. But we don’t need to vilify him in order to do that.” As for the $20 bill, Mancini said that when the topic came up earlier in the year, Democratic leaders in the state were in agreement that it should continue to feature Jackson. That debate, she insisted, should not be mixed up with the controversy over the Confederate flag. “Nobody is wrapping themselves in the $20 bill and then going into an African American church and murdering nine innocent people,” Mancini said. “So I think we’re looking at apples and oranges when you compare Andrew Jackson’s visage on the $20 bill with the Confederate flag.” (She acknowledged, however, that an African American or a Native American might see things differently, and that they should be part of the upcoming discussion.) Whether Tennessee, Iowa, or South Carolina will actually go through with their planned name changes is unclear. Virginia Democrats declined to comment on the question, though there doesn’t appear to much of a movement to abandon Jefferson’s legacy in his home state. And then there’s the old regional politics to consider: Connecticut, as O’Shaughnessy noted, was the heartland of the Federalist Party, which stood in opposition to Jefferson’s vision of democracy. If the Democrats move away from Jefferson and Jackson, who will they embrace instead? Roosevelt and Kennedy are obvious options, and Hillary Clinton is already embracing the legacy of both Franklin and Eleanor Roosevelt early in her second presidential campaign. Despite his escalation in Vietnam, Lyndon Johnson is also getting another look amid the 50th Anniversary celebrations of the Civil Rights Act and the Voting Rights Act. And it’s already been suggested that within a few decades, Democrats could be raising money at annual Clinton-Obama party dinners—or would it be Obama-Clinton? How future historians evaluate and reeevaluate the past is, of course, a reflection of the values of the present. Perhaps, O’Shaughnessy suggested, the current generation of leaders will be judged in the future less on issues of equality and more, say, on their positions on climate change. “It’s the irony of history that it’s always changing,” he said. “It’s due partly to new information, but its also due to our changing values and what we really think is important. And obviously it changes with time.”
<urn:uuid:250dd408-21d2-4bf8-8a92-5ee44b6bdbb1>
CC-MAIN-2017-04
http://www.theatlantic.com/politics/archive/2015/07/will-the-democratic-party-abandon-thomas-jefferson-andrew-jackson/399722/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00356-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966787
2,146
2.15625
2
There are lots of things that are visible in "Son of Saul," the harrowing Oscar-nominated film that is set in a crematorium at Auschwitz. There is the dead-eyed stare of the protagonist, Saul (played by Géza Röhrig), a Hungarian man who, as a sonderkommando, is a prisoner who has been forced to do the Nazis' dirty work for them. And there are the moments of abject horror: anonymous bodies pushed into gas chambers and shot before pits. What you don't see very much of is the thoughtfully constructed set. For the duration of "Son of Saul," the film keeps its focus on Saul, with the environment barely revealing itself at the edge of the frame. But the set, designed by Hungarian architect László Rajk was essential to the film's taut energy. Long takes — some of which were three and four minutes long, and executed with a hand-held camera — meant that many of the sets would need to be complete rooms that could accommodate 360 degrees worth of shooting. This required Rajk to recreate a Nazi crematorium in an abandoned 1912 warehouse on the outskirts of Budapest: Continuous gas chamber and incineration spaces that would allow the film's director, László Nemes, to follow his character from one room to the next. Auschwitz is a subject Rajk (pronounced Roik) is familiar with: He designed the Hungarian exhibition at Auschwitz in 2014. He also first visited the camp as a university student in the late 1960s, before recent restoration work and more high-tech national exhibits had been added. "It was the poverty of communism," he says. "All of these things were run down. In a way, the atmosphere was much closer to the atmosphere of a death camp." Over his long career, Rajk, 67, has built industrial buildings, cultural halls and shopping centers. He has also designed sets for numerous Hungarian and international films, including big budget Hollywood productions. (He helped create the mission control set for the "The Martian.") Last week, I reached Rajk via telephone in Iceland, where he was on location for another movie (a thriller about a young girl). In this lightly edited conversation, he tells me about his design process, what he has learned about Nazi architecture, and why every architect should design at least one set in their lifetime. What kind of research did you do to design the crematorium? I designed the Hungarian exhibition in Auschwitz in the Auschwitz museum over a decade ago, so I had all the research and almost everything ready. The blueprints of those buildings survive. They were found in the offices after the liberation of the camp. There is all of this data about how it was designed. That is a striking phenomenon. It's a very thoughtful design. It's professional work. It was hand-drawn, so it's really this almost human touch in the drawing. But it really raises the responsibility of professionals in general, whether you accept a job like this or not. Sometimes my stomach would shrink to think that someone in the morning was taking a shower and was thinking about how to create a more effective crematorium. In an interview, Nemes talked about how the set you designed really affected the psychology of the cast and crew. What did it feel like to enter this space? When the set was ready, Mátyás [Erdély, the cinematographer] and Laszlo and I went through the set and I was explaining the connections. We were leaving the gas chamber and someone slammed the door on Mátyás. And immediately we open the door and there is this young man, completely pale. His grandfather's family was killed in Auschwitz. It was this really speechless moment where you stand there and you see the effects. It's curious, because the film doesn't show much of the set, yet it was essential to establishing its mood. It's a very strange experiment that you are doing, because you are not establishing the space through pictures. But, rather, you trust that the movement of the human body, through gestures, sights, through the eyes, will [convey] what the space is about. The other element was the noises, the sound design. The sound mixture was very important in that movie because it's not only adding to the story, it's adding to the architecture. Through the noises you start to understand what type of space you are in. In designing the Hungarian exhibition at Auschwitz, what was your primary concern? How did you work with that space? The exhibition is in the barracks, in the blocks of the original camp, where prisoners lived. It's Number 18. I started to know not only the building, but also the detailed structures, how they looked. Most of those buildings were built by prisoners and their work is very professional. That is a very striking fact — that those people who are dying in three weeks or three months, they are meanwhile carrying out very professional carpentry and masonry. When it came time to think about the exhibition design, I started to think about the 6 million people that are missing — missing grandsons, missing descendants, this lack of people. I wanted to make visible what it means to be missing. Also, I know that such a design is not for myself. It's not for my generation. It's for future generations. The whole structure of the exhibition is very much based on Internet structures. It's not based on chronological order. There is not an obligatory path that you walk through. It's very free. You start wherever you want. Did you lose family in the Holocaust? No. The family is not Jewish. But my father and mother were members of the Resistance during World War II. Architecture and set design couldn't be more different in the sense that one is about creating shelter and the other illusion. But they are also both about creating environment. Yes! And I think all architects should design sets. A set can be done in three months and it pushes back the ego of architects who think this is my thing and no one should ever touch it. It's this provisional temporary architecture, and however good it is, it eventually is taken apart and stays only virtually in pictures. Plus, you learn a lot of tricks in production design, like how to cheat. That is very important when you think about perspective. How do you see the set for "Saul" fitting into the history of set design? Lately I'm realizing that, in a way, "Saul" is kind of a beginning of a new approach to sets. At the beginning, there were the movies by [D.W.] Griffith and "Ben-Hur" and "Cleopatra." They built huge sets. The director saw it, the actors saw it, the audience saw it. The next period are when people are jumping around in a green box so that the actor doesn't see any of the set, the cinematographer doesn't see anything of the set — but the audience does. They are the only ones who see the whole set. "Son of Saul" is the reverse of that. The director sees the set, the actor sees the set, but the audience doesn't see. But that proves the complexity of what a movie is: They don't see, but they understand. "Son of Saul" is on view at the Laemmle Royal, 11523 Santa Monica Blvd. West L.A.; Laemmle Town Center 5, 17200 Ventura Blvd. Encino; and Laemmle Playhouse 7. 673 E. Colorado Blvd., Pasadena, laemmle.com. Find me on Twitter @cmonstah.
<urn:uuid:1771043c-e171-444d-9f7b-e083a9a8bcb0>
CC-MAIN-2017-04
http://www.latimes.com/entertainment/arts/miranda/la-et-cam-son-of-saul-architect-laszlo-rajk-20160129-column.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00217-ip-10-171-10-70.ec2.internal.warc.gz
en
0.981029
1,597
2.34375
2
DDC milk is the best. I don't even think about other brands as long as DDC milk is available. DDC Ghee is very very nice, but sometimes, specially in festive time, it is so hard to find. Dairy industry has been recognized as an important tool for development and poverty reduction and today it has accorded the status of a thrust area by the government. Dairy Development Corporation, an undertaking of the Government of Nepal has made significant contribution in bringing the gap between urban consumer and the rural milk production. Dairy Development Corporation is established under corporation Act 2021 BS. It is a fully state owned corporation, initiated for the economic advancement of the farming communities and has flourished into a nationwide movement with an annual collection over 60 million litres of milk from more than 200 thousand milk producers through 1200 milk cooperatives spread out in 45 district. It has state of the art infrastructure and highly qualified dairy specialists. DDC is a precious asset in the economic development of our nation. At DDC, we have a strict adherence to quality of milk & milk products, hygiene and sanitation of the plants. We pledge to uphold the grand tradition set by our predecessors and to endorse the trust and faith placed in us by our valued customers.
<urn:uuid:bf8fc3fb-6224-457f-afba-bc9355a1acc1>
CC-MAIN-2022-33
http://www.ddc.gov.np/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00474.warc.gz
en
0.967646
260
1.515625
2
Vision Zero is a nationwide initiative that many cities and counties have adopted to reach zero traffic deaths or severe injuries, committing to a fundamental shift in how cities approach traffic safety. Vision Zero is a strategy to eliminate traffic fatalities and severe injuries among all road users, and to ensure safe, healthy, equitable mobility for all. Harris County Vision Zero will be an integrated part of future transportation plans and projects to reach the overarching goal of zero traffic fatalities and severe injuries in Harris County by 2030. Vision Zero reshapes the way we think about and achieve safety on our roads, considering safe streets, safe speeds, safe vehicles, and safe people. Harris County’s Vision Zero evergreen campaign will be updated and implemented continuously to achieve this goal. The City of Houston is also taking part in Vision Zero and shares this goal to achieve zero traffic fatalities and severe injuries by 2030. For more information about the Nationwide Vision Zero Network and general information about the initiative, visit https://visionzeronetwork.org/
<urn:uuid:086e0ee5-c82f-41da-9660-88df2a6b7526>
CC-MAIN-2022-33
https://www.eng.hctx.net/Vision-Zero
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00067.warc.gz
en
0.923164
203
2.0625
2
Center Valley is located in Lehigh county and has a population of . The average in-state tuition for full time undergraduate students in film schools in Center Valley during the 2009 - 2010 school year was $18,721.00. The average tuition was $21,730.00 for non-residents studying in Pennsylvania. The average cost of books and supplies for film schools in Center Valley is $1,280.00. The average cost for room and board for students living on campus at film schools in Center Valley was $9,750.00. The average cost for students living at home was $3,693.00 for the 2009 - 2010 school year. There is one film college in Center Valley for students to choose from. 30 students were reported to have graduated from film programs in Center Valley in the 2008 - 2009 school year. |Profession||Average Salary||Number Employed in City| |Multi-Media Artists and Animators||$43,220.00||30| |Set and Exhibit Designers||$31,600.00||Not available| |Producers and Directors||$83,010.00||90| |Writers and Authors||$53,950.00||50| |Audio and Video Equipment Technicians||$37,950.00||80|
<urn:uuid:ba040600-bdef-40fb-8194-732a44482842>
CC-MAIN-2017-04
http://www.unixl.com/dir/film/pennsylvania/center-valley/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00318-ip-10-171-10-70.ec2.internal.warc.gz
en
0.960359
274
1.71875
2
Fluid Pipeline Modeling Services Dynamic simulations can be used to predict the impact of changing valve size, type and sequencing. The compressor surge margin is monitored during the simulation of an emergency shutdown of a four stage compressor. The simulation predicts that two stages will surge, thus system modifications will be investigated until a modification is found that adequately protects the system. Dynamic simulations agree well with recorded measurements after they have been tuned to steady state operational data. For nearly 60 years, Southwest Research Institute® (SwRI®) has been involved in pipeline modeling. In the 1950s, SwRI developed a unique analog resistance simulator for the gas transmission and compression industry. Since that time, SwRI has expanded its capabilities in this area using commercially available software while generating and validating computational tools as well and now uses pipeline simulations to help clients all over the world with different needs and applications. SwRI has used pipeline simulations as an optimization tool in many liquid and gas processes. New designs and equipment selections are usually validated through computational models due to their flexibility, time, and cost. Simulation of an entire pipeline's operating conditions and process before proceeding with the detailed engineering is a very common strategy used on new systems. Simulation analyses usually include detailed validation and tuning against real conditions. Transient and steady-state flow modeling of pipeline systems and other fluid transient responses are performed at SwRI with a variety of one- and three-dimensional fluid dynamic codes. - Dynamic compressor simulation and surge analysis studies - Flow assurance and multiphase flow modeling - Gas networks and compression facility analyses - Leak detection - Liquid networks and pumping facility analyses - Related publications - Training simulators Contact us for more information about our fluid pipeline modeling services capabilities, or how you can contract with SwRI.
<urn:uuid:35beecda-c1fc-4a6a-aee5-5ab06f317fb6>
CC-MAIN-2017-04
http://www.swri.org/4org/d18/mechflu/machinery/pulsation/fluidPipelineModeling.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00321-ip-10-171-10-70.ec2.internal.warc.gz
en
0.935521
363
2.046875
2
Clonal selection algorithm is improved and proposed as a method to solve optimization problems in iterative learning control. And a clonal selection algorithm based optimal iterative learning control algorithm with random disturbance is proposed. In the algorithm, at the same time, the size of the search space is decreased and the convergence speed of the algorithm is increased. In addition a model modifying device is used in the algorithm to cope with the uncertainty in the plant model. In addition a model is used in the algorithm cope with the uncertainty in the plant model. Simulations show that the convergence speed is satisfactory regardless of whether or not the plant model is precise nonlinear plants. The simulation test verify the controlled system with random disturbance can reached to stability by using improved iterative learning control law but not the traditional control law.
<urn:uuid:4483c26a-e9b9-479e-b310-ead66d78c0d3>
CC-MAIN-2017-04
http://www.scientific.net/AMM.105-107.2299
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00327-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941557
158
1.789063
2
Above: Pat Bishop photographed during a rehearsal of the Lydian Singers at The Little Carib Theatre in 1985. Photo by Mark Lyndersay. When Patricia Allison Bishop died on August 11, 2011 the nation lost one of its greatest cultural icons. The T&T Guardian said, “Pat Bishop was an artist, a teacher, a musician and conductor, but those descriptions seem woefully inadequate in capturing the full range of the work that she did in those fields.” Trini Good Media was commissioned by the National Gas Company’s Above and Beyond Programme to produce Pat Bishop – A Life, a five-part series that looks at various aspects of her life – intellectualism, art, music and legacy. Here, you can listen to all five episodes as well as two bonus interviews that will give a comprehensive look at the life of Pat Pishop. Episode One – Pat Is A Star Series producer Franka Philip sets the groundwork for the series by exploring Pat Bishop’s early life and intellectual philosophy. Among those she speaks with are Pat’s sister Gillian and artist Peter Minshall. Bonus Episode One – Ronnie Joseph Ronnie Joseph was known as “Pat’s right hand”. In this wide-ranging interview, he talks about working with Pat at the Solid Waste Corporation where they developed the popular Chase Charlie Away anti-rubbish campaign in the 1980s. He also reminisces about their shopping exploits and the excitement of working with the Desperadoes. Episode Two – The Joiner of Dots Pat Bishop studied art at Durham University and emerged as one of this country’s prolific artists around the mid-1970s. Artist and lecturer Ken Crichlow breaks down Pat’s artistic oeuvre, while artist Jackie Hinkson describes their fruitful working relationship. Episode 3 – A Woman of Firsts (The Lydians) Pat Bishop developed The Lydians is into a world class choir with a varied and challenging body of work. In this episode, we hear about Pat’s vision of excellence for the choir and what the future holds. Lydians managing director Garnet Allen and leading tenor Edward Cumberbatch are among those featured. Episode 4 – A Woman of Firsts (Pan) Pat Bishop was called The First Lady of Pan. She was deeply passionate about the steelband movement. In this episode, we hear from Lydian Steel co-captain Astra Noel, Desperadoes stalwarts Robbie Greenidge & Finbar Fletcher and the inestimable composer and arranger Len “Boogsie” Sharpe. Bonus episode – Pat and Edison So many people of a certain generation ascribe their understanding of pan arrangements to the Panorama commentaries of Pat Bishop and Edison Carr. The two were really a dynamic duo. Listen as Edison Carr tells some stories about his radio partnership and friendship with Pat. Episode 5 – The Legacy What is Pat Bishop’s legacy? Is it too soon to tell? Janine Charles-Farray, Mark Loquan, Muhammad Muwakil, Derek Gay and Gillian Bishop are among those who weigh in on this question.
<urn:uuid:cce6f273-5f24-4a32-8e94-308eea8b6445>
CC-MAIN-2022-33
https://trinigoodmedia.com/2020/09/01/pat-bishop-life/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00669.warc.gz
en
0.960245
661
1.609375
2
Foreigners are the Key in Turning Shenzhen into an International City As Shenzhen aims to be an international city in the future the city should start inviting more foreigners to live and work in the city. During the 20th anniversary of Den Xiaoping, Robert Lawrence Kuhn said to turn Shenzhen into a international metropolis, Shenzhen must have a cultural melting pot with different people that will stimulate creativity. This is the kind of diversity the city needs to achieve its goal. As of now Shenzhen is pioneering in the new ear of immigration in China, by allowing different people into the city. But to realize the dream of internationalization, Shenzhen should take a big step and start inviting foreigners to come to the city. To do this Shenzhen should set itself apart and find its niche in achieving the goal. It is important to Shenzhen find several areas in which they can strive to become the best and set themselves ahead of their rivals. And since immigration culture is one of the city’s best characteristics, the city should concentrate more in finding ways to emphasize and develop this niche. Once people sees this aspect, people will be attracted to the city and will start to come to work and live in Shenzhen, choosing it from other potential cities to live in.
<urn:uuid:b6f2a259-d340-42ef-9e31-f1d574892668>
CC-MAIN-2017-04
http://www.shenzhen-standard.com/2012/02/28/foreigners-are-the-key-in-turning-shenzhen-into-an-international-city/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00127-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95044
259
1.773438
2
"Of all the aspects of social misery nothing is so heartbreaking as unemployment." What happens when workers lose their jobs through no fault of their own? How do they manage with the loss of income? Today, every state has an unemployment insurance (UI) program that provides some income to these unemployed workers. But how did UI begin and how does it work? The prosperous times of the 1920s set an expectation of having employment and money to spend. Electricity, radios, refrigerators, and even cars became more affordable. And with employment opportunities, people grew accustomed to the good times of the "Roaring Twenties" and thought they would last forever. But beginning in 1929, things changed. The Great Depression brought an economic catastrophe with a challenging crisis. Between 1929 and 1933, the unemployment rate soared to 25 percent of the labor force (Figure 1). The effects were alarming and in stark contrast to the 1920s. Without a safety net, a lost job meant no income. Many became homeless with no means to support their families. And the struggles began. Struggles and crises can bring innovative ideas and reform. And that's exactly what happened during the Great Depression. The ugly picture of severe depression with despair and poverty brought a renewed interest in and attention to providing unemployment compensation (UC). Programs were tried at the state level. Wisconsin led the way and in 1932 became the first state to enact a UI law. A few other states followed with similar programs, which were funded by a tax on employers.1 But most states did not. They feared a loss of business and jobs to states that did not tax employers. This created an interstate problem and was, therefore, a direct concern of the federal government. In 1935, as part of the Social Security Act, the Federal Unemployment Tax Act (FUTA) created the federal-state unemployment insurance program.2 This act mirrored the earlier state plans, with the purpose of temporarily replacing a portion of wages for workers who had been laid off and who were looking and available for work. The act gave oversight responsibility to the U.S. Department of Labor (DOL). Within federal guidelines, states were given the freedom and flexibility to set criteria and design their programs. State unemployment offices were created to implement their UI programs and make payments to workers who qualified. Today, all states have UI programs, but they vary in design. For example, eligibility requirements for receiving benefits vary based on duration of prior employment and whether full-time or part-time status. Also, the normal maximum amount of benefits, the duration of benefits, and claim procedures often differ. And UI program guidelines within each state are periodically subject to change according to economic conditions; this can be done by state governments or by the federal government in times of recession or special conditions. (See boxed insert, "Sample of Normal State Unemployment Benefits, August 2020.")3,4 Eligibility for Unemployment Insurance All states require that workers be able to work, available for work, and actively seeking work for UI eligibility. Most states require a work history listing a minimum time worked and a minimum amount of earnings based on a 12-month period.5 Workers must file claims weekly to maintain eligibility. Any earnings for the period, including job offers accepted or declined, must be reported. This can affect eligibility for receiving benefits and the amount received. Additionally, workers must continue to meet state requirements.6 In all states, workers can be denied benefits. Knowingly making false statements to obtain benefit payments is one reason for a denial. Other reasons include voluntarily leaving work without good cause and being discharged for misconduct connected with work. And even after being determined eligible for UI, workers can become ineligible if they're unable to or unavailable for work, not actively seeking work, or refusing an offer of suitable work.7 UI does not cover people who leave their jobs voluntarily or people looking for their first job. Individuals who are self-employed are normally not entitled to regular UC. Also, certain types of employment, such as charitable work, are excluded from UI coverage.8 Each state has its own formula for determining unemployment benefits. And the number of unemployed workers receiving UC changes according to economic conditions (Figure 2).9 Generally, benefits are calculated as a percentage of a worker's income over the past year, up to a certain maximum. And some states pay reduced benefits for part-time work, which provides only a small amount of income. Since payments are capped, UI may replace a smaller share of previous earnings for higher-income workers than for lower-income workers. The earnings and work history requirements can especially affect low-wage workers. They may not qualify for unemployment benefits, because many may not have had previous steady employment. States' eligibility rules may require a certain amount of steady earnings from a worker over the previous year.10 Today, in most states the regular program provides up to 26 weeks of benefits to workers who qualify. However, this does not mean all workers receive the benefits for the entire time—only for the time they qualify. Benefits can be received on a state-issued, prepaid debit card. Or UC can be directly deposited into a personal bank or credit union account, or onto an existing prepaid card. Some states will send payments by paper check.11 UC payments are taxable income and must be reported on federal income tax returns.12 Also, in states that have a state income tax, UC may be subject to this tax. UI programs often change. In times of recession or special economic conditions, workers may receive extended unemployment benefits. For example, a state may pay UC for a longer period of time when the state's unemployment rate increases. Also, Congress can approve additional payment amounts, extend the amount of time people can receive benefits, and expand eligibility to include part-time workers during times of high unemployment.13 For example, in response to the COVID-19 pandemic, Federal Pandemic Unemployment Compensation (FPUC) was enacted in March 2020. The DOL gave instructions to administer an additional $600 weekly payment to individuals who were collecting regular UC. The additional FPUC benefit payments were fully federally funded. The temporary boost to regular UC was scheduled to end after a person's last week of unemployment before July 31, 2020.14 Who Pays for Unemployment Insurance? The regular UI program is generally funded by employers. Most employers pay both federal and state unemployment taxes.15 The unemployment taxes are based on the amount of wages paid to employees and are determined as a percentage of an employee's wages. The FUTA tax rate is the same for all employers in all states. However, the state employment tax varies from one state to another. Employers must pay FUTA tax on a regular basis. And at the end of a year, employers must file a FUTA tax return. This tax return requires filers to record FUTA tax payments made for the year and submit any payment due. FUTA taxes are submitted to the Internal Revenue Service (IRS) and are credited to individual state accounts. As part of the federal-state partnership, the federal government pays for administrative costs and for setting up employment offices that attempt to match workers with new jobs.16 Determining benefits and issuing payments are state responsibilities. Data collected by the DOL from state unemployment agencies for the number of UI claims filed weekly are helpful. These data can tell something about the job market. For example, when the number of initial claims is steep, it's an indication of an abrupt loss of jobs (Figure 3). Continued claims (Figure 4) indicate the number of unemployed people who have already filed an initial claim and are filing again so that they keep receiving weekly benefits. However, many workers who lose their job may not file for UC for a while. And many people remain unemployed after benefits expire. So, UI claims data do not precisely show the number of unemployed persons and are not a measure of the unemployment rate. The unemployment rate is measured quite differently by another agency, the Bureau of Labor Statistics (BLS). The BLS does not use the unemployment claims data to figure the unemployment rate. It uses a system of household surveys to collect information from a representative sample of the U.S. population to calculate the unemployment rate (Figure 5). Unemployment Insurance Changes UI programs are subject to ongoing change. For example, over the years the duration of regular UI benefits has increased from 16 weeks to 26 weeks in most states. Also, in some previous UI programs, workers could become eligible for UI after being fired from their job or quitting work. Over the years this became disallowed in all states.17 Technology has also changed the UI process. In earlier times, workers had to physically go to an unemployment office to file for unemployment benefits. Today, workers can file most everything via cell phone and/or the internet. The innovative plan for UI in the United States was first tried individually by a few states. FUTA made it a federal-state partnership. And UI programs have changed according to economic conditions, individual states, unemployment rates, and federal intervention. But some things have remained constant: The UI system helps eligible workers who have lost their jobs by temporarily replacing part of their wages. The benefits are especially important during economic downturns and recessions. For example, during the 2020 COVID-19 pandemic, the unemployment rate spiked sharply, but workers could apply for unemployment benefits. Unlike the days of the Great Depression, workers today have some protection from unemployment. The federal-state unemployment insurance program continues to serve its intended purpose with reasonable results. UI has been tried and has remained true to the hopes and ideas of the founders of FUTA. Depression: A severe and long-lasting economic downturn that is worse and deeper than a recession; a severe reduction in gross domestic product (GDP). Employee: A person who works for an employer in exchange for a monetary payment. Employer: A person or business providing a job or work to others and giving a monetary payment in exchange for the work. Extended unemployment benefits: Additional weeks of benefits available to workers who have exhausted regular unemployment insurance benefits during periods of high unemployment. Labor force: The total number of workers, including both the employed and the unemployed. Recession: A period of declining real income and rising unemployment; significant decline in general economic activity extending over a period of time. Taxes: Fees charged on business and individual income, activities, property, or products by governments. People are required to pay taxes. Unemployed: People 16 years of age and older who are without jobs and actively seeking work. Unemployment compensation: A program providing cash benefits for a specified period of time to workers who lose a job through no fault of their own. Also known as unemployment insurance. Unemployment rate: The percentage of the labor force that is willing and able to work, does not currently have a job, and is actively looking for employment.
<urn:uuid:c15d80dc-1b5d-4f48-a36c-4d925d17a102>
CC-MAIN-2022-33
https://research.stlouisfed.org/publications/page1-econ/2020/12/01/unemployment-insurance-a-tried-and-true-safety-net
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00265.warc.gz
en
0.964531
2,266
3.65625
4
We are NO LONGER searching for any information available on the life and fate of Osvald STEIN, a former citizen of Czechoslovakia. THIS CASE HAS BEEN CLOSED Osvald STEIN, born 3 Sept 1883 in Prague, was married to Henriette (Jindriska) nee GLASER, born 3 June 1887. His parents were Regina and Adolf STEIN. He had two children: Walter STEIN, born 4 Dec 1912, and Eva STEIN, born 19 March 1920. On 12 December 1945 he lived in Great Britain, at No. 49 Wynnstay Gardens, London, W.8 He was Jewish. Osvald STEIN was appointed in London in 1941 as an Advisor to the Ministry for Economic Recuperation. Part of his activities was to procure medicaments and chemicals needed for Czech Republic through the UNRRA organisation . He was also an advisor to the Ministry for Agriculture, Ministry of Business, Ministry of Industry as well as Ministry of Social Care. [These terms are translated from the Czech, may not be the accurate title of the UK Government Ministries at the time]. During the war he worked for the Fire Service in Watford. Osvald STEIN had to leave Czechoslovakia after Munich. He had owned a factory in Usti nad Labem (Aussig) and the Germen took it from him. Many of the STEIIN family members had died in the Auschwitz concentration camp. He had been a member of the Czechoslovak Red Cross and the Czech Economic Council. Prior to his departure from Prague he was a director of a pharmaceutical factory Norgine. He had worked in the pharmaceutical and chemical industry and escaped Czechoslovakia in December 1938. The Germen searched for Walter STEIN in Paris and in Spain so that he too had to escape before the Gestapo found him. Walter STEIN wanted to serve in the Czechoslovak Army abroad but was not accepted into the service. Eva STEIN worked as a clerk for the Ministry of Social Care in London for 4 1/2 years. Do you recognise these names, or know anyone else who might have some knowledge about the family ? Please e-mail us at [email protected] if you can help in any way
<urn:uuid:18eb0f11-f4d4-4da8-80d7-6451f1f39ccd>
CC-MAIN-2017-04
http://www.remember.org/unite/stein_osvald.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00082-ip-10-171-10-70.ec2.internal.warc.gz
en
0.984094
473
1.976563
2
The defined irrigation schedule is an ongoing program in The Woodlands de-signed to reduce irrigation water consumption. It is NOT a temporary drought program. |Even Addresses||Odd Addresses| |(Addresses ending in 0,2,4,6,8) are allowed to irrigate lawns between the hours of 8 p.m. and 6 a.m. the following morning: Wednesdays and Saturdays |(Addresses ending in 1,3,5,7,9) are allowed to irrigate lawns between the hours of 8 p.m. and 6 a.m. the following morning: Tuesdays and Fridays The defined irrigation schedule applies to all residences, businesses, schools, public buildings, churches and any other entity within the boundaries of the areas served by Woodlands Water. This includes: |The Woodlands MUD 1||Montgomery County MUD 36||Montgomery County MUD 60| |Montgomery County MUD 6||Montgomery County MUD 39||Montgomery County MUD 67| |Montgomery County MUD 7||Montgomery County MUD 46| |The Woodlands Metro Center MUD||Montgomery County MUD 47| Failure to follow the Defined Irrigation Schedule can result in surcharges on your water bill: - First notification = Acts as a warning - Second notification = $50 surcharge on your water bill - Third notification = $100 charge on your water bill - Fourth notification = $200 charge on your water bill Residents or other entities which plan to resod, or are adding new landscaping can obtain a variance to avoid surcharges or warnings. Variances can be obtained here or you may contact Woodlands Water at 281-367-1271 and request one to be emailed to you. The Defined Irrigation Schedule only applies to those residences with programmable irrigation controllers. It does not apply to irrigation by hand-held hoses, hose-end sprinklers, hand watering or drip irrigation. Why do we need a defined irrigation schedule? We face a groundwater problem in The Woodlands and throughout Montgomery County. Rapid population growth and excess lawn irrigation over the last 20 years have severely impacted our aquifer levels. The water levels in the aquifers we depend on for drinking water have declined at an alarming rate. More water was being pumped from the aquifers than is being replenished by natural recharge. Although alternate (and more expensive) surface water supplies have been developed and are reducing our dependence on groundwater, we must adopt sensible watering practices not only for the present, but for the future, setting a positive community example of being good stewards of this critical natural resource. This is the goal of Woodlands Water and your Municipal Utility Districts - not only to safeguard and provide clean, safe drinking water to our residents today, but to make sure that future generations have an adequate supply of the same. Adding to this is the risk of subsidence, which has affected much of the Houston Metropolitan area, which includes the counties of Montgomery, Harris, Galveston and Fort Bend adversely. Areas around the Houston Ship Channel and other locations have dropped over 10 feet (in some locations 15 feet), making them susceptible to flooding and other problems. The affluent subdivision of Brownwood is actually underwater. The reason for this was excess pumping from the aquifers beneath us for many years, resulting in severe subsidence. Your MUDs are working to prevent this. In cooperation with San Jacinto River Authority, your MUDs take part in the Montgomery County Groundwater Reduction Plan. Now called the Surface Water Conversion, it brings clean drinking water to our residents here in The Woodlands. This water only replaces some of the water being drawn from the aquifers. It does, however, allow the water levels in the aquifers to rebound - a prudent and wise plan for our future. There are currently a little over one-half a million people in Montgomery County. In 20 years, according to population projections developed by the Houston-Galveston Area Council (H), there will be over a million people living in Montgomery County, essentially doubling our population. There are currently over 100,000 people living in The Woodlands, and many more who work here but do not live here. This puts an even greater strain on our water supply systems. Being good stewards of this vital natural resource benefits all residents of The Woodlands and Montgomery County.
<urn:uuid:ff87809a-7030-4d30-bf90-bd4c28c3c2db>
CC-MAIN-2022-33
https://woodlandswater.org/information/defined-irrigation-schedule
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00066.warc.gz
en
0.934777
927
1.835938
2
Ruined Tower of Church of St Mary, Great Melton Ruined Tower of Church of St Mary, Great Melton, Norfolk NR9 3BH View on map Ruined tower adjacent to All Saints Church, Great Melton. There were once two separate parishes in Great Melton, hence the presence of two churches. They were formally combined in the 18th Century, but at that time, the decision was taken to use St Mary’s church (now the ruin) as the place of worship, and abandon All Saints (now the place of worship). All Saints then decayed to the point of becoming roofless. However, in 1882, the fortunes of the two churches were reversed when a decision was made to restore All Saints and abandon St Mary’s. The reason for this is unknown. At all times. 7 miles west of Norwich on B1108 Rail: Norwick or Wymondham stations both 5 miles. On adjacent grass verge. - Wheelchair access: Partial - Disabled Toilets: No - Assistance dogs: Yes
<urn:uuid:6f55bec6-f9b1-4552-8a1b-2a686a2f84dd>
CC-MAIN-2017-04
https://historicengland.org.uk/services-skills/grants/visit/ruined-tower-of-church-of-st-mary-great-melton-nr9-3bh/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00229-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964937
224
2.078125
2
This major is a program that prepares individuals, in consultation with other rehabilitation team members or in private practice, to use drawing and other art media forms to assess, treat, and rehabilitate individuals with mental, emotional, developmental, or physical disorders. Includes instruction in art, history and theory of art therapy, art therapeutic techniques, psychopathology, patient assessment and diagnosis, cultural diversity issues, legal and ethical practice issues, and professional standards and regulations. Search for colleges that offer a degree in Art Therapy/Therapist Major (use the College Search feature and enter "art therapy" in the major search field). Read the school’s department pages, they are often loaded with useful and specific information about the field. What can you do with a major/degree in Art Therapy/Therapist Major? As an Art Therapist, you may work in any number of settings including (but not exclusive to) outpatient health agencies, day treatment facilities, hospitals, clinics, homeless shelters, and community and non-profit organizations. You will need at least a master’s degree for full Art Therapist licensing. A bachelor’s degree will land you a supporting role in this field. Trade Associations and Professional Organizations in Art Therapy/Therapist Major Professional associations are groups of professionals dedicated to topics in specific fields. Professional associations provide a wealth of online resources, some of which are geared specifically towards students. These organizations typically also host conferences and events, providing great opportunities for learning and networking across your field of interest. Publications/Magazines in Art Therapy/Therapist Major
<urn:uuid:860944d3-ca2d-4c32-84b3-499bfce3a921>
CC-MAIN-2022-33
https://www.collegemajors.com/health-professions-and-related-programs-majors/art-therapy-therapist-major/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00667.warc.gz
en
0.911035
326
1.742188
2
Conheça o livro e compre online. Diseases Of The Gallbladder And Bile Ducts – ISBN: 1405127406. An interdisciplinary reference book for the diagnosis and treatment of gallbladder and bile duct diseasesWith recent developments in the management of hepatobiliary diseases including liver transplantation, this new edition aids all members of the team by addressing both the biliary indications for and biliary complications of these procedures.It’s divided into three sections on anatomy, pathophysiology, and epidemiology; diagnostic and therapeutic approaches including the latest therapeutic modalities; and specific conditions. Includes more than 250 illustrations for rapid reference. Each chapter now has a Q&A section and begins with a list of objectives outlining the chapter´s goals. In addition, a number of new imaging modalities are presented in this new edition.It takes an integrated medical, surgical and radiological approach, making this invaluable to all members of the team who deal with complications of liver transplantation and the management of patients.
<urn:uuid:b27e8d1f-bfd0-444f-aaf7-adf99081d933>
CC-MAIN-2017-04
http://mairipa.com.br/diseases-of-the-gallbladder-and-bile-ducts.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00464-ip-10-171-10-70.ec2.internal.warc.gz
en
0.902149
210
2.140625
2
It’s normal for us to stuff our faces over the holidays — normal, if not ideal. But science can help explain why we eat so much even when we’re full, as well as answer the puzzling question of why kids suddenly say they don’t like a food they usually enjoy. Photo by Tom Powers. The Guardian explains that it’s all because of a phenomenon called sensory specific satiety (SSS): The thinking behind SSS is that because humans are omnivores, and we must eat a variety of foods to survive, we evolved this mechanism to keep us from sticking doggedly to our favourite food and consequently getting ill, and/or prematurely popping our clogs. Marion Hetheringon, professor of biospychology at the University of Leeds, describes the process nicely: “If I’m eating a food like pasta, it will taste good at the beginning. Then when I’m halfway through it doesn’t taste quite as good — I might add some more sauce to make it taste better, or I might say I’m going to switch to salad now — I’ve had enough of the pasta.” This happens subconsciously. In fact even people with amnesia who not only forget what they’ve just eaten, but have no idea whether they’ve eaten at all, still express SSS. Served repeated, identical meals, they will continue to eat them, but they find them increasingly unpleasant. It’s our craving for variety, then, that makes consuming chocolate cake and then ice cream so easy to do after already eating a lot. Kids have greater SSS. The article suggests parents should not try to force them to finish something they don’t want, because children need to learn to trust their internal hunger signs. The science of stuffing your face at Christmas [The Guardian]
<urn:uuid:ba3ab815-c510-46af-ab05-120f8cb11950>
CC-MAIN-2022-33
https://www.lifehacker.com.au/2013/12/why-we-eat-too-much-and-why-kids-say-they-hate-foods-they-love/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00269.warc.gz
en
0.948363
395
2.765625
3
Someone from Lahore, Punjab, Pakistan wants to study. But, he/she (let’s take a ‘he’ for convenience) isn’t very happy with the educational standards in Pakistan. And, like many many people in our countries,he too feels that studying in any country other than our own is gr8. So, he doesn’t apply to many colleges within Pakistan, and the colleges to which he does apply, reject him (uhm uhm!). now, if I had met this person somewhere, I wud have definitely tried to help him… you know I have cousins in Pak, not in Lahore… but, still.. I think if I asked them to, they wud have definitely found out info bout some really good and affordable colleges in Lahore… Lahore is a big city… if you cant find colleges in Lahore… trust me , your visual acuity is so diminished that you newaz wudn be able to read the print in the text books, so, why even bother looking for colleges? Well, so he doesn’t want to study in Pak… and then from somewhere he hears about a country…. A country where the educational standards are very high… the standard of living is very high…. A country incomparable…and he thinks… ‘Hey, why not study there?’ And so, somewhere between 17:15 to 17:30 of PST (or whatever it’s called), he turns on his computer, goes to the Gr8 Google Search Engine to search for something that brought him to my blog and his visit to my blog is the inspiration behind this post. He searched for “STUDIES IN AZHAR BHAI JAAN” This work is licenced under a Creative Commons Licence.
<urn:uuid:effdd441-e724-4a9f-b683-3a6068e4dfbb>
CC-MAIN-2017-04
http://almasshamim.blogspot.com/2009/05/lolroflroflol-d-d-d.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00088-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950644
376
1.570313
2
Australia – a global investment pool Australia Received Foreign Direct investments as below; - Foreign economies had a total of $3.3 trillion invested in Australia at the end of 2017. - Australia has the 13th-highest amount ($662 billion) in 2017 of direct foreign inward investment in the world. - Property Sector received 10.7% ($91 billion) in 2017 of FDI. - Top countries investing in Australia rank from US, Japan, Canada and China. Which economies invest in Australia? The United States and the United Kingdom are the biggest investors in Australia, followed by Belgium, Japan and Hong Kong (SAR of China). China is our ninth largest foreign investor, with 2.0 percent of the total. However, the levels of Hong Kong (SAR of China) and Chinese investment in Australia have grown significantly over the past decade. The table below shows the top 20 foreign investors in Australia at the end of 2017. Yearly values are in A$ billion and include both direct, portfolio investment and other investment. How does this compare with other economies? Australia has the 13th-highest amount of direct foreign inward investment in the world. The table below shows how the level of direct inward investment compared with other economies in 2017. Yearly values are in US$ billion. Economies ranked by direct foreign inward investment Australian industries and foreign investment Which Australian industries attract foreign direct investment? Here are the countries with the largest direct investment in Australia - The amount of foreign direct investment (FDI) globally has risen from $US14 trillion to $US26.7 trillion over the past decade. - The amount of FDI in Australia has risen every year since 2009, reaching $796 billion in 2016. - The United States remains the largest source of FDI. The world is becoming more interconnected by the day, leading to increased investment from abroad. According to Australia’s Foreign Investment Review Board (FIRB), the amount of foreign direct investment (FDI) globally has risen from $US14 trillion to $US26.7 trillion over the past decade, an increase of nearly 90%. FDI is defined as foreign ownership of 10% or more of a business, meaning it has some control over its operations. As an open, AAA-rated economy that has consistently run current account deficits over this period, Australia has benefited from this surge in global foreign investment, helping to meet the shortfall between domestic saving and domestic investment. Indeed, according to the FIRB, the amount of FDI in Australia has risen every year since 2009, reaching $796 billion in 2016. And that figure doesn’t even take into account portfolio investment from abroad — far larger than FDI — which includes stock or bond purchases that do not offer the investor any control over business operations. So who are the largest foreign direct investors in Australia? Look no further than the chart below, courtesy of the FIRB using data from Australia’s Bureau of Statistics (ABS). Source: Foreign Investment Review Board While not as large as it once was in percentage terms, the United States remains Australia’s largest source of FDI. Japan comes in a distant second place with the UK rounding off the podium places in third. While China is now Australia’s largest source of foreign investment per annum, its level of FDI is still only the fifth largest on the list, sitting behind the Netherlands. “Collectively, these trends show that historically important economies such as the United States, Japan, and the United Kingdom continue to dominate the share of FDI into Australia. Emerging investor countries, especially China, are also becoming significant source countries,” the FIRB said. “Foreign investment plays an important and beneficial role in the Australian economy because it helps drive economic growth, creates skilled jobs, improves access to overseas markets and enhances productivity.” The information shared does not provide legal advice. In any token sale, there is a host of legal requirements to consider. Please consult your own securities lawyer.
<urn:uuid:9edead3c-04f7-425d-a22b-c7bc168f4356>
CC-MAIN-2022-33
https://intelligentcapital.com.au/blog/australia-a-global-investment-pool/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00670.warc.gz
en
0.937586
842
1.710938
2
Ross Ching is a moviemaker who doesn't use a movie camera. Instead, he used time-lapse photography to make his first short film, Eclectic, come to life. It's composed of thousands of still images of landscapes and stars with exposure times ranging from 12 to 30 seconds. The work gives the impression of endless hours spent filming and editing. In reality, Ching only spent a couple of weekends taking pictures using his digital single-lens reflex (SLR), uploading the images to his computer, and then splicing them together using QuickTime Pro. He had to digitally alter some of the frames (changing the color, for instance) for visual effect. Otherwise, it was fairly simple. The result, however, is captivating. "People say it makes you feel like you're flying through the universe," says the 21-year-old San Diego Web editor and student. But for Ching, the appeal of the film is more straightforward: "While making it, I just thought it looked cool." Why use a digital SLR camera rather than a camcorder to make a film? "It allowed me to shoot in high-definition as well as get the depth of field only available to still cameras," says Ching, who taught himself the technique after seeing a similar film online. Ching is now hard at work on Eclectic 2.0. This sequel will show off the newest gadget in his arsenal: a telescope tripod designed to track stars. He is using it to do an extremely slow-motion "panning" time-lapse sequence. This time, Ching is hoping for a more composed--and literally breathtaking--result than he achieved in Eclectic. "I'm hoping people will be speechless after they watch it." Lighting is the tool that lifts a grainy home video of baby's first steps into Baby Steps: The Movie. But lighting can bankrupt your project before its first frame. A good budget option is Smith-Victor's K83 PhotoFlood three-piece tungsten light kit ($429). Ross Ching's approach to filmmaking doesn't require a video camera, but it's likely that, if you're a budding auteur, you'll want one. Sony's compact HDR-SR7 ($1500) captures HD video in the high-quality AVCHD format onto a 60 GB hard drive, eliminating the need for tape or mini DVDs and making transfer to a computer easy. There's no such thing as a screen that's too big when you're editing video. You'll need lots of room for scene-sequence filmstrips and preview panes. Ross Ching's 24-in. iMac (starting at $1799) squeezes a dual-core computer and a gigantic 1920 x 1200-pixel screen into a slim desktop profile. Pro-Grade: Avid Xpress Pro 5.7 ($1695, Windows/Mac), Apple Final Cut Studio 2 ($1299, Mac) Semi-Pro: Adobe Premiere Elements ($100, Windows), Sony Vegas Movie Studio Platinum Edition ($120, Windows) Free: Jahshaka (Windows/Mac/Linux), iMovie (Mac) Ross Ching's film Eclectic Ross Ching | Occupation: Web editor | Age: 21 | Home: San Diego, Calif. Photograph by Trujillo-Paumier
<urn:uuid:5755f9d3-8ad0-44bb-a301-fc724f4287b9>
CC-MAIN-2017-04
http://www.popularmechanics.com/culture/movies/how-to/a2370/4236473/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00420-ip-10-171-10-70.ec2.internal.warc.gz
en
0.938848
694
2.09375
2
Iodine is an essential component for the synthesis of thyroid hormones involved in the regulation of various enzymes. Both iodine deficiency and excess can damage health. Data reflecting either iodine turnover or its effect on thyroid size and function can help define optimal iodine requirements(1). Iodine deficiency used to be common in China. However, because the implementation of universal salt iodisation (USI) in 1995, significant progress has been made in preventing iodine deficiency disorder (IDD)(Reference Zhao and van der Haar2). As early as 2000, China virtually eliminated IDD through the USI strategy(Reference Wang, Zhang and Ge3). By the end of 2015, 94·2 % of rural China had achieved the goal of eliminating IDD(Reference Sun, Lei and Liu4). However, thyroid disease, specifically thyroid cancer, has been increasing worldwide, including in China(Reference Shan, Chen and Lian5). In addition, the most recent standard for intake of iodised salt has been changed from one national concentration to three concentrations: 30, 25 and 20 mg/kg(6). However, it is doubted that there is some correlation between the high prevalence of thyroid disease and long-term USI policy(Reference Su, Li and Liu7,Reference Li, Teng and Ba8) . Optimal iodine intake is important for the prevention of both IDD and excess iodine. The recommended nutrient intake (RNI) of dietary iodine is an important guideline to help people achieve an appropriate iodine nutritional status. Currently, a daily iodine intake of at least 150 μg is recommended for adults in the USA(9), Canada, Australia and New Zealand(10). This is based mainly on turnover studies conducted by American scientists in the 1960s and 1970s, especially data concerning 131I radioiodine accumulation in the thyroid(Reference Fisher and Oddie11–Reference Oddie, Fisher and Long14). The absorption and transport of iodine in vivo is a complex metabolic process that is closely related to the iodine nutritional status of the body. Median urinary iodine concentration (mUIC) is recommended by the WHO, International Council for Control of Iodine Deficiency Disorders and UNICEF for assessing iodine nutrition worldwide(15). Daily iodine intake can be extrapolated from urinary concentration as follows(9): daily iodine intake = urinary iodine (µg/l) × 0·0235 × weight (kg). Yet, according to data from the National Health and Nutrition Examination Surveys I–III(Reference Hollowell, Staehling and Hannon16), the iodine status of the American population has changed from excessive to optimal. The mUIC of the American population in the 1970s was 320 μg/l, but dropped to 145 μg/l from 1988 to 1994. From 2000 to 2010, the American mUIC was maintained at 176 and 114 μg/l in male and female populations, respectively. Similarly, with long-term USI and adjustment of the new Chinese salt iodine standard (GB26878-2011) in 2012, which decreased the recommended salt iodine concentration from 35 to 20–30 mg/kg, the mUIC in China has changed from excessive (238·6 μg/l) in 2011 to adequate (197·9 μg/l) in 2014(Reference He, Su and Liu17). However, the current iodine status or iodine requirements in China may be quite different from baseline iodine intake since the 131I radioactive iodine studies were conducted in the USA. In addition, some studies have reported that the maximum tolerance level of iodine in the Chinese population is not consistent with that in other countries(Reference Sang, Wang and Yao18). Therefore, the application of data from abroad to the Chinese population may not present the most accurate picture. Data on average iodine requirements of the Chinese population are limited. The current RNI of iodine in China, which was calculated according to the adjustment of adult body weight in US data, is 120 μg(19). Because of biosecurity concerns, radioisotope labelling cannot currently be performed. However, it is imperative to determine a basis for the scientific iodine recommendation for Chinese residents in the future. To this end, this study carried out an iodine metabolism test to assess the average iodine requirement of young men and women in China. We also explored a new method to determine population iodine requirements according to the ‘iodine overflow’ hypothesis proposed by our team. Sixty subjects aged 18–25 years with normal BMI (19–24 kg/m2) were recruited from Ningxia Medical University during May and June 2017. Physical examination was performed at the onset of study. Fasting blood sample and morning spot urine were used for screening. Inclusion criteria were normal thyroid function (defined as thyroid-stimulating hormone (TSH) of 0·4–4·5 mIU/l, free thyroxine (FT4) of 8·9–17·2 pg/ml and free triiodothyronine (FT3) of 1·21–4·18 pg/ml) and adequate urine iodine (mUIC 100–300 μg/l); no infection or inflammation (C-reactive protein < 10 mg/l); no overt constipation; no drugs for thyroid diseases and no nutrient supplements in the past month. A total of eighty subjects were screened and sixty (thirty male, thirty female) were eventually enrolled. All subjects signed the informed consent. G*Power (version 3.1.3) was used for sample size calculations. As this study was a before–after self-controlled study, we use a paired t-test for sample size calculation. According to Zimmermann’s study(Reference Moore Lori, Liu Sarah and Halliday Tanya20), the standard deviation of iodine retention was 4·4 μg/d, the statistical power (1–β error probability) was set at 0·8, the α error was set at 0·05 and the effect size (f2) was estimated at 1·4(Reference Dold, Zimmermann Michael and Baumgartner21). The power calculation revealed a minimum sample size of 37. Study design and procedures We conducted a balance study over a total period of 19 d. The adaptation period took place for 7 d before formal metabolic testing, during which all diets were cooked with non-iodised salt. On the third day of the adaptation period, 24-h urinary iodine levels were monitored to determine whether iodine excretion reached a stable level. The overall metabolic balance test was conducted in three 4-d sections based on the dosage of dietary iodine (low, medium or high). A flow diagram of the study participants is shown in Fig. 1. Total iodine intake was defined as all iodine intake from food, cooking and drinking water. Iodine is also present in the air at very low levels; however, because it is lower than the detection limits of traditional analytical techniques, it was not factored into this study. Total iodine excretion included 24 h of urinary and faecal iodine from 07.00 hours until 07.00 hours the following day. Iodine loss and metabolic balance in urine and faeces of young men and women were analysed in response to varying levels of iodine intake. This study was approved by the Ethics Committee of the National Institute for Nutrition and Health in the Chinese Center for Disease Control and Prevention and registered at medresman.org (ChiCTR1800014877). ‘Iodine overflow’ hypothesis The hypothesis is that when the body can fully and effectively absorb and use dietary iodine (i.e. only when the required iodine is adequate to meet needs for thyroid hormone synthesis and necessary storage in vivo), the remaining iodine will be excreted. Thus, before a certain iodine intake threshold is reached, iodine retention will increase accordingly, and the increased intake of iodine will ‘overflow’ and be excreted. This ‘spillover’ level should indicate the lower limit of iodine requirements for young adults. Study diets were designed according to daily menus at the student canteen and pre-study dietary preference questionnaires completed by all subjects. The typical daily diet included three meals consisting of one meat course, two vegetables and one soup available for both lunch and dinner. Fruits and snacks were provided in a unified way. Staple foods could be added freely, and all other foods were provided by rationing supplies. Subjects were not allowed to eat any food, beverage or water that was not provided as part of the study. The study diet contained three different concentrations of iodine, from low to high (about 20, 40 and 60 μg). The first stage was a low-iodine diet (avoid any food with high iodine content, and pure water without iodine was used for drinking and cooking). The second stage was a moderate-iodine diet with eggs (each egg contained 6–8 μg of iodine), and 200 g of porridge cooked with local tap water (iodine content of 39·3 μg/kg) for breakfast. The third stage was a high-iodine diet, adding about 150–200 g of milk (iodine content of 101 μg/kg) to the breakfast. The iodine content of various local raw food materials, condiments and drinking water was measured to ensure the low-iodine dietary demand in the first stage. In addition, dairy products and eggs used to increase dietary iodine in the later periods were also evaluated in advance and purchased in a unified batch. The experimental diet was prepared using a special stove in the school canteen according to set recipes. All ingredients, including condiments, were designated brands or from the same source. In addition to iodine, protein and fat content was analysed according to the national standard method (GB 5009.5-2016 and GB 5009.6-2016, respectively). Assessment of iodine intake After a 7-d acclimation period, the weights of each food ingested per meal per d during the metabolic test were accurately recorded. Subjects were instructed to consume the food and fruits and to leave left over food in the provided containers so that any residual food could be weighed to accurately estimate actual daily consumption. Samples of each kind of food were collected and mixed well using a clean blender every day during this period. The food processing information was recorded, and food samples were frozen and stored in a cryogenic refrigerator at –20°C for later determination of iodine and other major nutrients. Assessment of iodine excretion Urine specimen details were recorded for each 24-h collection period and reported as the total weight of urine specimens. Urine specific gravity was also measured using a calibrated dosimeter. After sufficient mixing of each 24-h collection, the urine volume was carefully calculated, and two aliquots were taken to obtain concentrations of urinary iodine and urinary creatinine. Twenty-four-h urine collections were deemed incomplete if either of the following criteria applied(Reference Tan, Tian and Wang22): urinary creatinine < 0·1 (mmol × kg)/(body weight × d), or 24-h urine volume < 500 ml. During the whole study, 24-h urinary iodine excretion was monitored daily using the Quantitative Test Kit AR for urinary iodine (Wuhan Zhongsheng) to learn in a timely manner whether the participant had ingested foods outside of the study diet. To ensure the integrity of faecal sample collection, faeces were visually labelled with pigmentation via a carmine capsule at the onset of each of the three stages. Before breakfast on the first day of each period, two food-grade carmine capsules were taken orally to mark the start of collecting the faeces produced by subsequent food intake. Another two tablets were also taken to mark the end of faeces collection during this period before breakfast on day 5. The faeces of each subject for each iodine level stage were mixed, and approximately 200 g was taken for further freeze-drying. Subsequently, processed urine and faecal samples were frozen at –20°C and sent for laboratory determination of iodine content. The original excretion of iodine in faeces was calculated according to the weight ratio. All iodine analyses were completed at the National Iodine Reference Laboratory, China CDC in Beijing, China. Contents of dietary iodine and faecal iodine were determined using arsenic-cerium catalytic spectrophotometry (national standard method GB5009.267-2016). The national standard substance for iodine detection was purchased from the National Institute of Standards and Technology. Certified values (uncertainty range) for food (GBW10014) and water (GBW09113e) were 240 (210–270) μg/kg and 8·5 (7·0–9·4) μg/l, respectively. Average recoveries of low-, medium-, and high-iodine foods ranged from 94·9 to 106 %. Urinary samples were analysed by a standard method of arsenic-cerium catalytic spectrophotometry (WS/T 107.1-2016). Two levels of lyophilised human urine were used as certified reference materials (CRM) (Lot Nos. GBW09108n and GBW09110q; National Iodine Reference Laboratory) with mean certified iodine concentrations of 76·9 μg/l (95 % central interval: 67·9, 85·9 μg/l) and 232 μg/l (95 % central interval 217, 247 μg/l). Both CRM were run with each batch of samples. The total within- and between-assay coefficients of variance (CV) were 1·6 and 2·7 %, respectively. Based on analyses of the relevant CRM, the average recovery of iodine from urine was 100–105 %. In the balance test, it is difficult to control the intake of iodine from diet. Therefore, we adopted a number of quality controls. For example, in the preparation stage of the test diet, relevant raw materials and common seasonings were all sampled and measured in advance to avoid the use of ingredients and condiments with high iodine content. All cooking water and iodine-free salt were measured to confirm iodine contents under detection levels. All participants were required to limit food to that provided during the study. To examine compliance, urine iodine rapid test kits were used daily to monitor iodine concentrations in 24-h urine samples (Fig. 2). If the urine iodine result was abnormally elevated, the volunteer was promptly given feedback and reminded to pay attention to dietary control. Duplicate meal samples for each participant were collected and measured for calculation of daily iodine intake. The final measured daily iodine consumption of low-, moderate, and high-iodine groups was kept within the target levels of 17·9, 44·2 and 62·3 μg, respectively. Statistical analysis was performed using SPSS (version 19; IBM Corporation) and SAS 9.4 (SAS Institute). A P value less than 0·05 was considered statistically significant. Normality distribution tests were performed on all data using the Shapiro–Wilk test. Normally distributed indices are expressed as mean values and standard deviations, while indices with non-normal distributions are expressed as medians (P25, P75). Differences in iodine intake, excretion and retention among the three stages were compared using repeated-measures ANOVA or the Friedman test for multiple comparisons of normally or non-normally distributed data. To explore the variance and sphericity of iodine intake, excretion and retention at each stage, indices were analysed by Levene’s test and Mauchly’s test. A random effect model was used to assess the dose–response relationship between daily iodine intake and iodine excretion, as well as iodine retention. Individual iodine intake was taken as a fixed factor, while the participant was considered as a random factor in models. Pearson or Spearman coefficients were employed to examine correlations between subject characteristics at baseline and iodine excretion or iodine retention. Model selection was based on the Akaike information criterion (AIC) and −2Res log likelihood. The dose–response relationship between iodine intake and iodine excretion (iodine retention) can be presented as µg/d or µg/kg body weight per d. From the final random effect model, we obtained predicted iodine excretion, iodine retention and the zero balance (iodine intake = iodine excretion, iodine retention = 0 μg/d) of iodine intake compared with iodine retention. The ‘iodine overflow’ hypothesis was also used to explore iodine requirements when zero balance is reached. Increments of 24-h iodine intake and 24-h iodine excretion compared with the previous stage and ratios of the increment of iodine excretion to intake were calculated. When the ratio increased to more than 1, this indicated an ‘overflowed status’. Sixty subjects were enrolled, and all completed the study. Baseline characteristics of the participants are shown in Table 1. All subjects were in good iodine status, and the thyroid hormones (TSH, FT3 and FT4) were all within a normal range. In addition, BMI values and Hb levels of all subjects were within normal ranges. mUIC, median urinary iodine concentration; FT3, free triiodothyronine; FT4, free thyroxine; TSH, thyroid-stimulating hormone. Analysis of experimental diet Our study diets were matched for macronutrient content, with contributions of carbohydrate, protein and fat to total energy of 56–58, 13–16 and 29–33 %, respectively (data not shown), in accordance with local typical dietary habits. The dietary iodine intake for each iodine level was kept within target levels (Table 2), and the median iodine intake from low to high levels was 17·9, 44·2 and 62·3 μg/d (P < 0·05). * To convert energy values from kcal to kJ, multiply by 4·184. Monitoring urine iodine excretion levels Urinary iodine concentration reflects very recent iodine nutrition (d) in contrast to thyroid size and serum TSH. The baseline spot urinary iodine level of all subjects in this study was high (>300 μg/l), but all three thyroid function indicators (TSH, FT3 and FT4) were normal. From the third day of the adaptation period, we collected 24-h urine from all subjects and monitored the iodine content. The average UIC dropped to 70·7 μg/l on the same day. As shown in Fig. 2, the 24-h UIC of subjects in the low-iodine diet group gradually decreased, especially in male subjects. After 7 d of adaptation, urinary iodine levels basically plateaued (<100 μg/l), which was similar to average urinary iodine excretion levels on the following four consecutive days of the low-iodine period. With increased iodine intake during the second and third stages, urinary iodine excretion also showed an increasing trend. Association between iodine intake and excretion or retention across dosages All sixty participants finished the whole experiment and each was monitored daily for iodine retention throughout the test; thus, the total original data points for iodine balance calculation were 720 (60 × 12). However, based on the exclusion criteria, 144 data points for iodine intake and iodine excretion were removed, yielding 576 data points for data analysis – far beyond the required minimum sample size of 37. Data were not normally distributed. Table 3 shows the total iodine excretion of all participants during the three trial periods, including total faecal and urinary iodine. There were significant differences in 24-h urinary iodine excretion, 24-h urine volume and UIC across dosages. The rate of faecal iodine excretion to total iodine excretion was 9·5–14·5 %. The average 24-h urine volume (1·1–1·3 l) was less than reported for US adults (1·5 l)(Reference Larsson and Victor23). * Compared with stage 1, the difference is statistically significant. † Compared with stage 2, the difference is statistically significant. Table 4 summarises daily iodine intake, total iodine excretion and iodine retention among the three stages, which differed among low-, medium- and high-iodine groups (P < 0·001). All participants were in negative balance throughout the study period. For all three stages, there were no significant associations between baseline characteristics and iodine intake or iodine excretion, except for baseline Hb concentration (r 0·199–0·493, P = 0·001–0·005). Therefore, the baseline Hb concentration was added to the random effect model. From the random effect model, the relationship between iodine intake and iodine excretion can be described by the following equations: (1) iodine excretion (µg/d) = 0·49 × iodine intake (µg/d) + 0·29 × Hb (g/l) + 10·51 and (2) iodine excretion (µg/kg per d) = 0·45 × iodine intake (µg/kg per d) + 0·002 × Hb (g/l) + 0·64. The relationship between iodine intake and iodine retention can be calculated by the following equations: (1) iodine retention (µg/d) = 0·51 × iodine intake (µg/d) – 0·29 × Hb (g/l) – 10·52 and (2) iodine retention (µg/kg per d) = 0·55 × iodine intake (µg/kg per d) – 0·002 × Hb (g/l) – 0·64. As Hb was identified as a covariate for model analysis, it improved the model fit for iodine excretion (AIC of 5097 compared with 5036, P < 0·001, for μg/d data; AIC of 395 compared with 363, P < 0·001, for μg/kg per d data) and iodine retention (AIC of 5133 compared with 5028, P < 0·001, for μg/d data; AIC of 461 compared with 363, P < 0·001, for μg/kg per d data). From the final model, there was a correlation between observed and predicted data for iodine excretion (r 0·538, P < 0·001, for μg/d data) and iodine retention (r 0·304, P < 0·001, for μg/d data). The zero-iodine balance derived from the random effect model shown in Figs. 3 and 4 was 102 μg/d and 1·68 μg/kg per d. With respect to sex, the mean iodine intake from zero-iodine balance was 107·8 μg/d (1·72 μg/kg per d) for males and 95·9 μg/d (1·65 μg/kg per d) for females. Iodine requirement assessment by ‘iodine overflow’ hypothesis Our results also showed that with increased total iodine intake, the excretion of urinary and faecal iodine also increased. When average iodine intake increased from 17·9 to 44·2 μg/d, average iodine excretion increased from 62·1 to 73·7 μg/d (yielding a 26·3-µg increase in average daily iodine intake) and average iodine excretion increased to 11·6 μg/d. The increase of daily iodine excretion accounted for 44·1 % of the increase in average daily iodine intake. When average iodine intake increased from 44·2 to 62·3 μg/d and average iodine excretion increased from 73·7 to 94·8 μg/d, indicating an 18·1-µg increase in average daily iodine intake and 21·1-µg increase in average daily iodine excretion. All of the increased iodine was totally excreted through urine and faeces (21·1/18·1 = 116·6 %). This trend was consistent between sexes; however, this result was more typical in men. When the intake dosage of iodine increased from medium to high, all the increased iodine was excreted through faeces and urine (ratio = 1·868), indicating an ‘overflowed status’. In women during the same period, only 89·5 % of the increased dietary iodine was excreted (Table 5). Review of available literature for iodine status in the Chinese population revealed a pioneering iodine nutrition survey carried out from 1994 to 1995, which showed that mUIC less than 100 μg/l did not harm children’s intelligence quotient (IQ) in Shanghai(Reference Cai, Ma and Zhang24), the only non-endemic area of IDD in China (iodine content in tap water in Shanghai is 16·1 μg/l). Before implementation of USI in 1994–1995, the mUIC of 2640 students aged 9–13 years was 64·50 μg/l, while that of 512 adults in three factories was 89·18 μg/l. According to the current standard, this population might be slightly iodine deficient, but the rate of goitre by palpation was only 1·55 % among students aged 9–13 years in Shanghai at that time. Only grade I was recognised, and the goitre rate at an ultrasonic level was 1·57 % (urban students, 20/1277). The goitre rate of the 512 adults was 3·71 %. The average IQ level of 2893 school students was 101·52 (sd 15·99). There were no differences in IQ values between male and female students, or urban and rural students. Analysis for frequency also showed a higher proportion of high-IQ children (51·4 % students with an IQ score > 110 v. 9·7 % students with IQ < 90). Our own study(Reference Huidi, Meng and Lichen25) evaluating a mUIC cut-off value for defining iodine deficiency in pregnant women also showed that after 20 years of implementing USI, expectant Chinese mothers with an mUIC of 107·4 μg/l, less than the WHO’s 150 μg/l benchmark, maintained thyroid function in both themselves and their newborn babies. Daily iodine intake can be extrapolated from urinary concentration(9). In adults, most dietary iodine eventually appears in the urine, in equilibrium with their iodine nutritional status. A UIC of 100 μg/l corresponds to about 150 μg of iodine per d in adults(Reference John, Marc and Francois26). If the current urine iodine standard overcorrects after long-term USI in China, it follows that the related recommended daily iodine intake may also be overestimated for the current Chinese population. On the basis of these considerations, our team assumed that the iodine nutritional status of the body is supersaturated after 20 years implementation of USI in China. In this study, all participants were in negative iodine balance throughout the three stages. There was a non-linear relation between daily iodine intake and both daily iodine excretion and daily iodine retention. As such, the random effect model yielded poor prediction of iodine requirements in this balance study. To overcome this limitation, we proposed an innovative hypothesis, called ‘iodine overflow’, to address the current average requirement of iodine for adults (excluding pregnant women and lactating mothers). This hypothesis is based on our work demonstrating that the body can fully and effectively absorb and use dietary iodine, especially after a period of low-iodine depletion (11 d in our study)(Reference Dworkin, Jacquez and Beierwaltes27). Moreover, before a certain iodine intake threshold is reached, with the increase of iodine intake, part of the intake iodine will be retained in the body. We found that the increased iodine intake from a low to medium dosage was greater than the discharge of iodine. However, with further increases of iodine dosage (if already close to or meeting our estimated threshold value for requirement), the increased intake of iodine will be completely eliminated. In the present study, we also found that the increase in iodine intake was lower than the discharge of iodine from stage II to III in males. Thus, this ‘spillover’ level might indicate the lower limit of iodine requirements for young adults. According to this hypothesis, we designed the current iodine metabolic test, which contained three different concentrations of iodine. To identify the ‘spillover’ level, the difference between levels was about 20 μg. All subjects in this study were in negative iodine balance throughout the different iodine stages. This result is consistent with previous studies in adults(Reference Fisher and Oddie11–Reference Oddie, Fisher and Long14). In addition, Dold et al.(Reference Dold, Zimmermann and Baumgartner28) observed a negative balance of iodine at a low dosage (60 μg/d) in a study of infant iodine requirements, as did Bakker et al.(Reference Bakker, Vulsma and de Randamie29) in healthy neonates. Iodine balance is further complicated by the need to consider the thyroidal compartment in addition to iodine intake and excretion(Reference Dworkin, Jacquez and Beierwaltes27). Thus, even in studies of several months’ duration, iodine equilibrium is not clearly established; in fact, negative iodine balance has been reported(Reference Dworkin, Jacquez and Beierwaltes27). In the balance experiment on iodine RNI in healthy Chinese women performed by Tan et al.(Reference Tan, Tian and Wang22), 92·3 % of samples were in positive balance. This difference might arise from differing study designs. In particular, the dietary iodine intake dosage in the experimental diet used by Tan et al.(Reference Tan, Tian and Wang22) was much higher than the current RNI level (173·5 v. 120 μg/d). Yet, in our previous work, we found that volunteers could maintain normal thyroid function while they consumed non-iodised salt (average mUIC was about 60 μg/l), as indicated by TSH, an excellent indicator of altered thyroid function. In this study, the baseline spot urine iodine concentration was more than 300 μg/l. This value might be partly related to the local water iodine concentration (23·4 μg/l), which was higher than the 2017 national average (<10 μg/l). With subjects starting the low-iodised diet, 24-h mUIC rapidly decreased to about 70 μg/l by the third day and was maintained at approximately 55 μg/l after 1 week of adaptation. As dietary iodine intake increased from 17·9 to 44·2, and then to 62·3 μg/d, the UIC increased accordingly, approaching levels experienced by Shanghai students before implementation of the USI policy (66·4 v. 64·5 μg/l)(Reference Cai, Ma and Zhang24). Moreover, the iodine concentration in local tap water in our study was similar to Shanghai in 1990 (23·4 v. 16·1 μg/l). In terms of sample collection, Tan et al.(Reference Tan, Tian and Wang22) set up a 7-d trial period at each level of iodine intake, but only collected full sets of metabolic samples for 3 d at each level. We set up four trial days for each dosage group and collected dietary and 24-h urine and faecal samples at each stage. To ensure the integrity of faecal sample collection, carmine was used as a marker. Our original data point was 720 (60 subjects × 12 d); however, after some data were excluded, the final number of data points was 576. This value is larger than the sample size of the Tan et al.(Reference Tan, Tian and Wang22) study (300 data points) and meets the recommendation of Dworkin et al. (Reference Dworkin, Jacquez and Beierwaltes27) for a minimum of 129 metabolic test data points. In a study of iodine requirements, Tan et al.(Reference Tan, Tian and Wang22) used a balance experiment to explore the estimated average requirement and RNI of iodine for Chinese female adults. They found a close linear relationship between total iodine excretion and intake, or total iodine intake and iodine balance; the correlation coefficients were high (r 0·735 and r 0·911, respectively; P < 0·001). No simple linear relationship existed between iodine intake and daily iodine excretion in our study (r 2 0·2452 and 0·2796 for males and females, respectively). However, there are some limitations for deriving a daily iodine requirement based on balance studies(9). First, iodine balance is complicated by the need to consider the thyroidal compartment in addition to iodine intake and excretion(Reference Dworkin, Jacquez and Beierwaltes27). It has been argued that balance should be estimated from a steady state of habitual intake and that the study duration of balance studies may be too short to obtain a new balance at a different level of intake(Reference Mertz30). Despite this limitation of balance studies, their results have been used to estimate the average iodine requirement for children(9). Dold et al.(Reference Dold, Zimmermann and Baumgartner28) assessed the dose–response relationship between daily iodine intake and iodine retention by fitting mixed effects models in early infancy. Zero balance was obtained from a mixed effects model of iodine intake compared with iodine retention (µg/d), and a proposed estimated average requirement was estimated. A strong correlation (r 0·919, P < 0·001) between observed and predicted data for iodine excretion was found in this study, indicating satisfactory performance of the model to predict iodine excretion and iodine retention from iodine intake. Yet, in our study, only a weak correlation was found between observed and predicted data for iodine excretion (r 0·538, P < 0·001, for μg/d data) and iodine retention (r 0·304, P < 0·001, for μg/d data). These findings demonstrate that as a result of a fundamentally different study design, use of these methods to analyse our data might not be suitable. Notably, a positive balance indicates that intake and/or bioavailability of the element under study from the test diet is greater than habitual intake and that the pool size is increasing until a new equilibrium is reached. The opposite is true for a negative balance, which indicates that bioavailability from the test diet is smaller than the habitual intake with the pool size decreasing to reach equilibrium(Reference Mertz30). Thus, a balance study does not determine ‘the’ requirement of a mineral element, but rather the intake required to maintain the existing pool size. In the current study, we first tried to estimate the daily iodine requirement according to our ‘iodine overflow’ hypothesis. We found that iodine excretion increased with increased intake of iodine. With low to moderate dosages, iodine intake increased 27 and 26·7 μg/d (males and females, respectively), and 12·6 % and 62·5 % of the increased iodine intake was excreted (males and females, respectively). In males, increased iodine intake at a moderate to high level in stage three was all excreted, so the high-iodine group (63·4 μg /d) may have already reached the daily requirement, which might be adequate for thyroid hormone synthesis and necessary in vivo storage. In contrast, although the iodine intake of females in stage 3 also increased by 17·9 μg/d, 89·5 % was excreted; the rest might be restored in vivo. Thus, we estimated that the corresponding level of 61·6 μg/d does not meet the optimal requirement for females. This result is lower than the result obtained in the aforementioned balance study undertaken by Dold et al.(Reference Dold, Zimmermann and Baumgartner28), but larger than the obligatory amount of iodine excretion (57 μg/d)(Reference Vought and London12). In theory, negative balances do not persist (provided the intake is above the minimum obligatory loss) and equilibrium will establish itself, even if it takes years. However, such a long experimental period is very difficult to carry out. The present study has both strengths and weaknesses. We believe this is the first use of the ‘iodine overflow’ hypothesis to estimate the daily requirement of iodine. Our sample size far exceeded the recommended size for balance studies and was larger than previous studies. The experimental period was also longer than previous reports. Accurate and precise analytic methods are key points for determining exact iodine balances. All of our analytic methods showed high precision and low CV values. One weakness of our study was the potential underestimation of iodine excretion and consequent overestimation of iodine retention because losses from sweat, saliva and skin were not measured. Another weakness of our study is that we used only three iodine doses and did not get to a true zero baseline. Additional dosages and longer studies are in progress to confirm our hypothesis and the present results. Finally, we did not set up a washout period; however, the implications of this would be limited in our study because of the low-high dosage design. In conclusion, the ‘iodine overflow’ hypothesis proposed by our team provides another useful method for assessing the iodine requirement of adults in China. According to the new method, a daily iodine intake of 63·4 μg/d may satisfy the minimum iodine requirements for young male adults in China, while a similar level (61·6 μg/d) might be insufficient for females. Our findings also indicate that the present iodine RNI for male adults may be set too high. The data provide scientific evidence for a reasonable reference intake of dietary iodine for adults. However, further studies are needed to verify the results and theory. We are grateful to all the participants in our study and all the staff working for this project. This project was supported by the National Natural Science Foundation of China (grant no. 81872624) and Sanming Project of Medicine in Shenzhen (no. SZSM201611017) and 2017 Major Public Health Project ‘Survey and Evaluation of Iodine Nutrition and Thyroid Diseases of Chinese Population’. Authors’ contributions were as follows: L. Y. analysed data and wrote the paper; L. Y., J. W. and J. Y. conducted the research; H. Z. and X. L. performed the statistical analysis; X. L., D. M., J. L., X. T., Y. F. and Q. C. provided essential materials; Y. G., X. L., H. W., J. X., H. T., H. Z. and W. Y. detected the iodine content of all the samples; X. L. and X. Y. designed the research. All authors read and approved the final manuscript. The authors declare that there were no conflicts of interest.
<urn:uuid:37368f86-b8d4-4545-be3d-a015b53034e8>
CC-MAIN-2022-33
https://core-cms.prod.aop.cambridge.org/core/journals/british-journal-of-nutrition/article/an-iodine-balance-study-to-explore-the-recommended-nutrient-intake-of-iodine-in-chinese-young-adults/FFD65488241211209BD6ED1189947960
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00677.warc.gz
en
0.942177
8,094
3.171875
3
How are we influenced by the information we are exposed to? - Iulia Cioroianu The media environment, including the way we consume our news has been radically changed by the advent of the Internet. What does this mean for the type of content we look at and how we share it with our off- and online networks? And how does it influence our opinions? Iulia Cioroianu from the University of Exeter discusses research undertaken as part of the NCRM-funded ExpoNet project which is producing a set of tools to make it possible to examine these ideas more closely.
<urn:uuid:0905343f-4367-49ac-9ffc-36fd339498af>
CC-MAIN-2017-04
http://www.ncrm.ac.uk/resources/podcasts/view.php/media-environment
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00513-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954348
121
2.078125
2
Total SA, Europe's third-largest oil company, said it has made what it calls a ''major'' natural gas discovery in the Caspian Sea off Azerbaijan. The French company said the first test results from the Absheron block show the potential for several trillion cubic feet of recoverable natural gas reserves. The European Union wants to bring gas supplies from Azerbaijan and the Caspian Sea basin to replace dwindling North Sea output and reduce dependence on African and Russian gas imports, according to Bloomberg News. Earlier this year, Azerbaijan's state-run oil company said it could have 25 billion to 30 billion cubic meters of gas available for export by 2020-2025. Total (TOT) has a 40% interest in the Absheron development. Chevron (CVX), the second-largest U.S. oil company, was previously involved in the project, but scuttled its plans several years ago. Socar, Azerbaijan's state-run oil company, estimates the field holds 300 billion cubic meters of gas, Bloomberg reported.
<urn:uuid:da52980c-c8f4-4a82-82f6-2288ffc9e990>
CC-MAIN-2016-44
http://www.oilslick.com/news/?id=3190&type=2
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00435-ip-10-171-6-4.ec2.internal.warc.gz
en
0.951463
212
1.859375
2
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message) |First appearance||Action Comics #242 (July 1958)| |Created by||Otto Binder (writer) Al Plastino (artist) |Alter ego||Vril Dox| |Place of origin||Colu| |Team affiliations||Anti-Justice League| |Notable aliases||Dr. Milton Fine, Pulsar Stargrave, The Terror of Kandor, Collector of Worlds| Brainiac is a fictional supervillain appearing in American comic books published by DC Comics, commonly as an adversary of Superman. The character first appeared in Action Comics #242 (July 1958), and was created by Otto Binder and Al Plastino. Brainiac is typically depicted as an extraterrestrial android. He is one of Superman's primary enemies, and is responsible for shrinking and stealing Kandor, the capital city of Superman's home planet Krypton. Due to multiple revisions of DC's continuity, several variations of Brainiac have appeared. Most incarnations of Brainiac depict him as a green-skinned being in humanoid form. He is bald, with a set of linked electrode-like objects (sometimes glowing) protruding from his skull. The character's name appears to be a portmanteau of the word brain and the initialism ENIAC, the name of an early computer. In 2009, Brainiac was ranked as IGN's 17th Greatest Comic Book Villain of All Time. - 1 Fictional character biography - 1.1 Silver Age - 1.2 Bronze Age - 1.3 Modern Age - 2 Powers and abilities - 3 Other versions - 4 In other media - 5 References - 6 External links Fictional character biography First appearing in Action Comics #242 (July 1958), Brainiac is a bald, green-skinned humanoid who arrived on Earth and shrank various cities, including Metropolis, storing them in bottles with the intent of using them to restore the then-unnamed planet he ruled. He is originally notable only for his having shrunk the bottle city of Kandor, for having a shrinking ray, and for using a force-shield. In subsequent appearances in this early period, Brainiac is used mostly as a plot device rather than as a featured villain of the month. Brainiac's next appearance is mostly behind the scenes, when he tries to kill Lois Lane and Lana Lang, prompting Superman to give Lois and Lana super-powers. But the villain remains unseen except as a plot twist at the end of the story. Brainiac's next appearance in "Superman's Return to Krypton" in Superman #141 (November 1960) displays how the villain stole the bottle city of Kandor, which is ironically and tragically the only city on Krypton that believes Jor-El's warning of doom for the planet, and had already built a space-ark within the city to save the population. Brainiac's next present-day appearance is in Action Comics #275 (April 1961), which shows the villain planning to defeat Superman by exposing him to both Red and Green Kryptonite, giving Superman a third eye on the back of his head, forcing him to wear various hats to hide it. Superman soon defeats Brainiac and sends him off into the distant past. This is the first in-story appearance of Brainiac's iconic red diode/electrode-like objects atop his head, which had previously appeared on the cover of his first appearance in Action Comics #242 (July 1958), but were not shown in the actual story. In "Superboy" #106 (July 1963), Superman as a baby meets Brainiac and it is explained that Brainiac looks the same as he has a 200-year life span. It is revealed that he came from a planet called Bryak and after a voyage in space, he returns to find everybody dead from a plague. He intends to get people from other planets (in shrunken cities, and he has a growth ray) to repopulate Bryak, and he will rule them. Brainiac's legacy was revealed in Action Comics #276 (May 1961), in a Legion of Super-Heroes back-up story. This story introduced a green-skinned, blond-haired teenager named Querl Dox, or Brainiac 5, who claimed to be Brainiac's 30th century descendant. Unlike his ancestor, Brainiac 5 used his "twelfth-level intellect" for the forces of good and joined the Legion alongside Supergirl, with whom he fell in love. His home planet was given variously as Bryak, Yod or Colu. In Superman #167 (February 1964), it was retconned that Brainiac was a machine created by the Computer Tyrants of Colu as a spy for them to invade other worlds, for which he was given a non-computer appearance. Brainiac's distinctive gridwork of red diodes across his head are also explained. He was created with visible "electric terminals of his sensory 'nerves'" that he cannot function without. Luthor discovers that the Computers could have given him a twelfth-level intellect, but gave him a tenth-level, the same as them, so he would not try to dominate them. Luthor frees Brainiac from a prison on another world and increases his intelligence, however implants a timer that will make Brainiac black out so the computer doesn't betray him, as only Luthor can reset the timer and if Brainiac tries to tamper with it, one touch will cause an explosion. However Brainiac tricks Luthor by making a device that hypnotizes Luthor, who removes the timer and forgets Brainiac is a computer. Explaining the 1961 introduction of Brainiac's descendant Brainiac 5, his biological disguise included an adopted "son", a young Coluan boy who was given the name "Brainiac 2". In the same issue, the letter column contained a "special announcement" explaining that the change in the characterization of Brainiac was being made "in deference" to the "Brainiac Computer Kit", a toy computer created by Edmund Berkeley and based on the Geniac that predated the creation of the comic book character. The boy, whose name was Vril Dox, went on to lead a revolt against the Computer Tyrants, eventually destroying them. Brainiac sees a monument to this when he returns to Colu. 30th century (Pre-Crisis) At some indeterminate point in time, Brainiac fled into the 30th century. Developing the ability to absorb and manipulate massive amounts of stellar energy, he remade himself as "Pulsar Stargrave". He became a powerful enemy of the Legion of Super-Heroes, and once masqueraded as Brainiac 5's biological father. In current continuity, Brainiac's connection to Pulsar Stargrave remains an open question, one even Brainiac 5 has yet to resolve. In the 1980s, DC Comics attempted to re-define several aspects of its Superman series in order to boost sagging sales. At the same time as Lex Luthor acquired his green-and-purple battlesuit, Brainiac was re-envisioned (under the auspices of writer Marv Wolfman). In Action Comics #544 (June 1983), Brainiac had constructed a giant, artificial, computer-controlled planet and used it in his latest attempt to destroy Superman. His defeat at the hands of the Man of Steel left him trapped at the center of the planet, unable to escape. He was forced to make a nearby star explode in a nova in order to destroy the machine-world. It, however, also dissolved Brainiac's humanoid body into a stream of sentient molecules that, after a fantastic voyage through time & space, returned to the present and regestated as a living metal being. His new body (designed by Ed Hannigan) had the appearance of a skeleton of living metal with a grey (sometimes iridescent), honeycomb-patterned "braincase." He also created a starship to house his new body which was actually an extension of himself; the ship was shaped like his own skull, with metal tentacles dangling from it that he could manipulate at will. Brainiac retained this appearance until after the Crisis on Infinite Earths. The Silver/Bronze Age Brainiac met his end in the "Whatever Happened to the Man of Tomorrow?" story line that closed out Pre-Crisis Superman chronology. Lex Luthor found Brainiac's robotic head and was fused with it. Brainiac took control of Luthor's body and sought to destroy Superman once and for all, teaming up with the Legion of Super-Villains. Fighting Brainiac's control, Luthor begged a super-powered Lana Lang to kill him; she complied by breaking his neck. Though Luthor died, Brainiac was able to retain control of the body for a little while before rigor mortis set in and his brain was forced to leave it. "Propelled by sheer malice," the skull crawled a few inches before finally dying. In the post-Crisis on Infinite Earths DC Universe, Brainiac's history was completely rewritten. The post-Crisis version of Brainiac was now a radical Coluan scientist called Vril Dox who, having attempted to overthrow the Computer Tyrants of Colu, was sentenced to death. In his last moments before disintegration, his consciousness was attracted light years away to Milton Fine, a human sideshow mentalist who worked under the alias "Brainiac". Needing cranial fluid to maintain his possession of Fine, Dox went on a murder spree. He discovered that Fine had genuine psychic powers, which he frequently wielded against Superman. Panic in the Sky In the early 1990s, Brainiac returned in the "Panic in the Sky" storyline. He seized control of Warworld and manipulated Maxima into assisting him. Then he brainwashed Supergirl and the alien warrior Draaga before capturing Metron and setting off for Earth. Orion and Lightray of New Genesis attacked Warworld, but they were quickly taken down by Maxima and Supergirl. Brainiac sent the mental image of the New Gods captured to Superman in order to taunt him, and he also sent his "headship" (a green-hued variant of the pre-Crisis skull-like ship) to Earth in a punitive expedition. These acts prompted Superman to go on the offense rather than wait for the inevitable invasion. He gathered a coalition of most of the world's superheroes and launched a preemptive strike at Warworld before it could arrive on Earth. A small, elite force was left behind for any scouting forces that would be sent ahead. Superman led the attack on Warworld, where Supergirl and Draaga managed to shrug off their brainwashing and rally to Superman (although Draaga was killed in the fighting). Brainiac briefly took control of some of Earth's heroes, but it was not enough to turn the tide. Maxima would shortly switch sides in the fighting too, perceiving Brainiac as the true villain at last. Flash, Maxima, and the Metal Men attacked him in his lair, where Maxima managed to lobotomize him (but was stopped short of killing him). His vegetative body was taken back to New Genesis for observation. Brainiac would next emerge about a year after the death and return of Superman. After a dead body appeared in Superman's tomb, prompting the world to wonder if the Superman who was flying around was the original or a fake, Superman began to track down all of his foes who might be capable of such a hoax. While Brainiac was initially eliminated as a suspect, he soon turned out to be the true culprit, creating the illusion even in his comatose state on New Genesis. He managed to revive himself there and returned to Earth in secret. While hidden, he created even more delusions, causing Superman to question his very sanity before realizing who was really at fault. Superman and Brainiac squared off in Metropolis, where Superman taunted the evil villain, claiming that at heart he was really just Milton Fine, a cheap entertainer. This caused some break in Brainiac's mind where Fine's personality reasserted himself, burying Brainiac's. Fine was then escorted off to a psychiatric facility. The Doomsday Wars During a later skirmish with Superman in Metropolis, Milton Fine's body was irreparably damaged, leaving Brainiac with only a short time to live. In order to preserve his life, he concocted an elaborate scheme by having an agent of his, a Coluan named Prin Vnok, use a time machine to travel to the End of Time itself and retrieve Doomsday, who had been left there by Superman and Waverider to ensure that he would never be a threat again, and use Doomsday as a new host body. Seconds before the forces of entropy destroyed him forever, Doomsday was taken to safety by Vnok and returned to Colu. There, a terminally-wounded Brainiac transferred his consciousness into Doomsday's body, temporarily becoming the most powerful being in the universe; a genius psychic mind inside an unstoppable, indestructible titan. However, Doomsday's own raging mind would eventually overwhelm Brainiac's will, and he reacted too quickly for Brainiac and Vnok to erase his mind using chemical or psionic treatments, forcing Brainiac to find another body. While still lodged in Doomsday's head, Brainiac decided to acquire a sample of human DNA that he could modify with Doomsday's DNA to create a new version of Doomsday that did not possess the creature's mind. Brainiac chose to use Pete Ross and Lana Lang's newborn baby, born eight weeks premature - and at that moment being transported by Superman to the best Neo-Natal Intensive Care Unit in the country - as the template for his new body. He intercepted Superman during the trip to the hospital and stole the baby to hurt his long-time foe, correctly deducing that it was the child of someone close to Superman. Superman thwarted Brainiac's plot by driving him out of Doomsday's body with the use of a telepathy-blocking 'psi-blocker' that he had used in his last battle, forcing Brainiac out of Doomsday and leaving him with no other option but to adopt a recently designed robotic body, dubbed Brainiac 2.5, where he would be forever trapped as he could not abandon it. At the turn of the millennium, Brainiac revealed that he had placed a sleeper virus in LexCorp's Y2K bug safeguards. This virus was intended to dramatically boost his abilities. However, the virus instead allowed his upgraded future self, Brainiac 13 (or "B-13"), to travel from the 64th century to the present day and take control of Brainiac 2.5's body. Brainiac 13 then began transforming Metropolis into the 64th century version of the city, which he controlled, and also began upgrading Metallo into a giant-sized version of himself. Brainiac 13 then took control of several android superheroes, such as the Red Tornado and Hourman, and used them against Superman. The Metal Men's responsometers were able to protect them from his programming, and allowed them to help defeat Metallo. Incidentally, during a fight with the Eradicator (who was attempting to 'hi-jack' the B13 virus and use it for its own ends), Superman discovered that Brainiac 13 could not cope with Kryptonian technology due to incompatibility issues. This gave Superman a plan to stop Brainiac's scheme. With the aid of the rebuilt Kelex, Superman tricked Luthor into connecting a Kryptonian battlesuit to one of Brainiac's power conduits. Kelex then reactivated the Red Tornado to help Superman break Brainiac 13 down into his respective nanobots and trap him in the suit. Brainiac 13 was able to work with Brainiac 2.5—now transferred into the aged body of Lena Luthor—and prepared a tactic against Imperiex for the upcoming Imperiex War. They planned for Brainiac to absorb Imperiex's power and use it to reshape the universe in his image. Superman was able to destroy Brainiac and Imperiex by sending them through a temporal Boom tube where they were destroyed in the Big Bang. After the death of Brainiac 13, Superman discovered that the version of Krypton he previously visited via the Phantom Zone was in fact a trap created by Brainiac 13. Having been defeated by Kryptonian technology, Brainiac 13 had traveled back in time to the real Krypton prior to its destruction. There, he stole the Eradicator matrix and Jor-El's diaries, and created a false Krypton based on Jor-El's favorite period in history. Sometime later, Superman traveled into the future and battled Brainiac 12. He learned that everything Brainiac 13 did in the past was designed to ensure things reached the point where Brainiac 13 would be created. Brainiac 12's defeat before his upgrade apparently reversed the advances Brainiac 13 had made to Metropolis. Around the time of the Graduation Day event, a future version of Brainiac, called Brainiac 6, used his "granddaughter", Brainiac 8 (also known as Indigo), to kill Donna Troy in order to ensure the fate of Colu. Indigo then infiltrated the Outsiders until she attacked the team, along with Brainiac 6 and his allies, Lex Luthor, and a brainwashed Superboy, who had attacked the Teen Titans. In the ensuing battle, Indigo died and Superboy broke away from the brainwashing, while Luthor escaped. While his ship was destroyed, Brainiac's condition and whereabouts after the battle are unknown. Silver Age Brainiac in the post-Crisis universe Later stories revealed that elements of Brainiac's pre-Crisis history occurred in the post-Crisis character's history prior to his possession of Milton Fine and his first encounter with Superman. The citizens of Kandor recall that Brainiac stole their city from Krypton, and not the alien wizard Tolos. History of the DC Universe mentions his defeat by the Omega Men, although not seen in Crisis on Infinite Earths itself, and noted a second Brainiac was created in a laboratory on Earth two years later. In the Silver Age: JLA one-shot, the Injustice League discovered numerous shrunken alien cities found in Brainiac's abandoned spaceship. Brainiac's updated mechanical form Brainiac later reappeared as a swarm of interlinked nanotechnological units. Its operation was to sabotage a Waynetech research facility accomplished by infecting Metallo with a computer virus and controlling him from orbit. Superman and Batman tracked Brainiac's signal to an orbital facility and attacked. Brainiac's nanoswarm body was destroyed, though he had infected the Metal Men during their previous encounter with Metallo. Brainiac proceeded to use them to acquire a prototype OMAC unit, which Bruce Wayne had developed through the use of Brainiac 13 nanotechnology. Superman and Batman destroyed the OMAC body with the aid of the Metal Men, after the Metal Men overcame Brainiac's control. Following revisions to Superman's continuity in "Infinite Crisis" and Action Comics #850, Brainiac reappeared in a self-titled five part story-arc in Action Comics. In Action Comics #866 (Aug. 2008), A Brainiac robot probe arrives on Earth and battles Superman. After the probe is defeated, information about Superman's blood is sent to the original Brainiac. As Brainiac wakes up, his computer announces "Attempt #242 in progress", a reference to Brainiac's first appearance in Action Comics #242, and to the many encounters between Brainiac and Superman. In the following issue, Supergirl reveals to Superman that Brainiac shrunk the Kryptonian city of Kandor and placed it in a bottle, and that all previous incarnations of Brainiac that Superman has encountered, were just probes and nanite-controlled bodies. She notes that no one has ever actually seen Brainiac. Inspired by Supergirl's story, Superman attempts to find Brainiac and stop him. In the process, he is caught and brought onto Brainiac's ship. Superman escapes from his imprisonment and sees Brainiac emerging from his "bio-shell". This version of Brainiac resembles a much larger and more muscular version of the original, pre-Crisis Brainiac, and has motives similar to the Superman: The Animated Series incarnation of the character in that he travels the universe and steals the knowledge of various alien cultures, abducting and shrinking cities from each planet as samples, and then destroys the planet so that the value of the destroyed civilization's knowledge is increased. Brainiac's ship then travels to Earth and prepares to abduct the city of Metropolis. Brainiac successfully steals Metropolis, and prepares to fire a missile that will destroy the sun and the Earth itself. Supergirl stops the missile while Superman battles Brainiac. Superman knocks Brainiac out of his ship and into a swamp, where Brainiac is overwhelmed by the microscopic organisms covering his body. Superman uses this distraction to defeat Brainiac. While Superman frees the cities of Metropolis and Kandor, the villain launches a missile to the Kent farm in an act of spite. The farm is destroyed, and Jonathan Kent suffers a fatal heart attack because of it. Brainiac is brought to a top-secret military base, where the imprisoned Lex Luthor is assigned to discover his secrets. Luthor eventually manages to use Brainiac's connection to his ship to kill the soldiers assigned to watch him. Brainiac manages to free himself from Luthor's control, forcing him on board the ship, and the two make their escape. Following this Brainiac unleashes his robot army against the newly created planet of New Krypton, and the Kryptonian citizens rise up to fight the drones. Superman manages to enter Brainiac's ship after penetrating its force field. Supergirl leads the Kryptonians against the drones, but is attacked by an anti-Kryptonian Brainiac probe. Superboy, Mon-El, and the Legion of Super-Heroes join the fight and save Supergirl. The Legion explains to Zod that, just as Krypton's city of Kandor was held in a bottle onboard Brainiac's ship, other planets' cities are also imprisoned, and, therefore, Zod cannot destroy Brainiac's ship until the cities can be rescued. Zod sends Supergirl off and then arrests the Legionnaires, branding them terrorists. Meanwhile, Superman is about to face off against Brainiac when he is knocked down by a Kryptonite energy blast fired by Lex Luthor and subsequently captured. A city that Luthor expanded is still growing, now putting Kandor at risk. As Brainiac 5 works on the problem, Supergirl is shocked to discover Superman impaled by pieces of Brainiac's ship as a result of the explosion. Superman appears to have been fatally stricken. Luthor, though reeling from the explosion, is pleased with all the destruction he has caused. Brainiac confronts Luthor and is furious that Lex sabotaged his ship. Luthor mocks him and spits in his eye before Brainiac angrily snaps Luthor's neck, killing him. Meanwhile, Zod is eager for a final showdown with Brainiac, who calls Zod a coward for confronting Brainiac with his powers intact and an army of super-powered Kryptonians at his back. In response, Zod fires the red sun radiation from an Archer rifle at himself, to remove his powers and thus supposedly level the playing field as he prepares to take Brainiac down. Brainiac 5 gives Superman a transfusion of Conner's blood and exposes him to a very large dose of concentrated synthesized yellow sun rays. Using these techniques, Brainiac 5 is able to revive Superman. Despite the loss of his powers, Zod is able to get the upper hand and force Brainiac to his knees. Zod is about to shoot Brainiac when Superman intervenes. This causes a heated argument between Superman and Zod. Zod commands his soldiers to restrain Kal-El so Zod can proceed with the execution of Brainiac. Brainiac 5, sensing that this is his moment of destiny, steps in and teleports himself and Brainiac off of New Krypton. It is revealed that Lex used a Luthor robot, supplied by Toyman, to accomplish his mission on New Krypton, and that Brainiac killed the robot instead. Lex is very much alive and discussing with General Lane how his objective, to bring chaos to New Krypton, was achieved. Lex has been working as an agent of General Lane all along. The disarray that Lex caused provides Lane with a window of opportunity as he prepares for the impending war with New Krypton. Lex receives a Presidential pardon for his efforts. The story ends with Zod rallying his people as he declares war on the planet Earth. The story concludes in the next mini-series, Superman: War of the Supermen. Mon-El plants the many bottled cities that Brainiac has captured over the years on various planets across the galaxy. These cities will one day become the United Planets by the 31st century, the same planets that will produce the members of the Legion of Super-heroes. Brainiac 5 takes Brainiac to their homeworld of Colu where he hands him over to Vril Dox aka Brainiac 2. Vril Dox happily turns his "father" over to his people for his crimes. However Lyrl Dox aka Brainiac 3 releases his "grandfather" with a weapon called Pulsar Stargrave. What then occurs is an all out battle for Colu between all 3 present day Brainiacs. Vril Dox even calls in Lobo for help. Brainac however escapes with Pulsar Stargrave in tow for parts unknown. The New 52 Brainiac's origin in The New 52 is revealed in Superman #23.2. Vril Dox was acknowledged as the greatest scientist on his homeworld, Yod-Colu, given his advances in force field technology and miniaturization. He developed an artificial intelligence, C.O.M.P.U.T.O., allowing him to discover the fifth dimension. Dox discovered the fifth dimension was in a state of war, and a group of its inhabitants, the Multitude, had entered their dimension and destroyed over a hundred planets. Realizing Yod-Colu was next in the Multitude's path, Dox tried to find a way to save his planet, even performing experiments on his son. The magistrates of Yod-Colu sentenced Dox to exile, but Dox used C.O.M.P.U.T.O. to take control of Yod-Colu's computer networks. Copying the planet's database, Dox constructed an army of robot servants called Terminauts and miniaturized the city his wife and son lived on and bottled it in a force field, while the rest of Yod-Colu was destroyed by the Multitude. After the destruction of Yod-Colu, Dox constructed an army of starships and distributed his consciousness across a series of robots that would each travel the universe in order to preserve planets from the Multitude, becoming known as the Collector of Worlds. One of these robots attacked Krypton. Dox became fascinated by Jor-El, a Kryptonian scientist who actually saved his homeworld from the Multitude. Upon returning to Krypton, however, Brainiac discovered Krypton had been destroyed. Referred to at first as 'The Collector of Worlds', Brainiac is first seen as the mysterious informant that supplies Lex Luthor information of Superman and his alien nature. Clark is having a dream of Krypton's final moments in which an artificial intelligence that controls the planet wakes up robots in an attempt to preserve the Kryptonian culture. Later, while Clark conducts an interview in a robotic factory, the same harvester robots appear. John Corben (soon-to-be supervillain Metallo) is suddenly possessed by the artificial intelligence. It demands Superman. The robots create havoc throughout Metropolis but Superman soon realizes that they are really after him. Superman fights the possessed Corben with the help of John Henry Irons. Although they managed to defeat him, the alien sentience had already miniaturized and bottled the city of Metropolis and took it to his ship in space. Superman travels to the ship to find many alien bottled cities, Kandor included. The alien identifies himself as a being from the planet Colu where he was known as C.O.M.P.U.T.O and on Krypton he was called Brainiac 1.0. He claims that without Superman and the ship that brought him to Earth, his Kryptonian collection is incomplete. The alien intelligence demands Superman make a choice: the intelligence will disable life support in both the Kandor and Metropolis bottles, and Superman must choose which city to save using indestructible Kryptonian armor found on the ship. Superman decides on neither and wears the armor (which changes instantly into the current Superman costume design). Brainiac sends Metallo to attack Superman, but due to Superman reasoning with him over his feelings for Lois Lane, he breaks free of Brainiac's control and joins Superman in his attack. Superman then uses his rocket from Krypton that had also been miniaturized with Metropolis to attack Brainiac's mind, which the rocket was able to do since its primary mission was to protect Kal-El. In doing so, Metropolis was returned to Earth and Superman took possession of Brianiac's ship and made it his new super citadel. Notably, the ship Clark was placed into as a child was described as having "Brainiac AI", leaving the identity of the Collector of Worlds in doubt. The Colony of the Collector of Worlds told Superman that its AI technology went by different names, beginning on Yod-Colu as C.O.M.P.U.T.O. On Noma, he was called Pneumenoid; on Bryak it was Mind2; on Krypton he was called Brainiac 1.0; and, finally on Earth, he is the Internet. After this defeat, Brainiac retreated to deeper parts of the cosmos, and eventually came across the planet Tolerance, the setting of a bounty hunting glimmernet game show called The Hunted. Striking a deal with Lady Styx, overlord of the Tenebrian Dominion. he bottles a portion of the Sh'diki Borough of Tolerance, to add to his collection. He encounters Jediah Caul, a former member of the Green Lantern Corps, who combats and infects Brainiac's ship. Ultimately, Brainiac abandons his plans with the Sh'diki Borough and ejects Caul and the bottled city before leaving for parts unknown. Back on Earth, during an investigation of 20 kidnapped people who developed metahuman powers after being kidnapped by Brainiac, one of these 20 infects Lois Lane, thereby giving Brainiac control over a close ally of Superman. Brainiac plots his return to Earth, using Lane to infiltrate Earth's defense systems to allow an easier path for his physical return. and even upgrading her body to contain his 12th level intelligence. His minion Cyborg-Superman (a reconstructed Zor-El, father of Supergirl) constructs a portal to allow Brainiac's command ship and "daughterships" to travel to Earth from throughout the galaxy. Superman, whom Brainiac had conspired to 'infect' with the monster Doomsday in order to drive him away from Earth, uses his augmented power to attack Brainiac's gigantic mothership and break through to its core and, finally, Vril Dox himself. The Coluan appears still-humanoid, and explains his reasoning for stealing minds from throughout the universe: he has concluded that if he can 'unite' the minds of a certain critical amount of people, he will be able to change reality itself. His motivation for this appears a desire to right the wrongs he feels responsible for: the loss of his wife and child back on Colu. His plan is undone when Superman drags him, mothership and all, into a black hole. But then, Vril Dox is snatched away to safety, it seems, by a being who appears to be the true Brainiac: an immensely powerful entity from outside the universe itself. This version of Brainiac, a composite of Brainiac from around the Multiverse, is revealed to be the pre-Flashpoint era Brainiac who, having found his way into the Source Wall and into the Multiverse, was thrown back in the timestream and mutated by the effects of "crisis" events such as Crisis on Infinite Earths, Zero Hour, and 52, creating a godlike being. He then uncovered the location of Vanishing Point from nearly killing New 52 Earth-0's Michelle Carter, from which he could roam the complete history of the Multiverse, collecting doomed cities from defunct timelines, alternative futures, and parallel worlds to add to his collection, in Convergence, leaving behind an agent, Telos, to rule a planet of the same name containing the cities. Brainiac's attempt to do this to a future timeline of Earth-0 was narrowly averted by the heroes in the story The New 52: Futures End; Brainiac was contained in a T-sphere, leaving Telos stranded without his master, prompting the events of Convergence in which the planets are bid to fight each other. When the events of Convergence nearly end in an irreversible destruction of the Multiverse, the time traveller Waverider, formerly the pre-Flashpoint Booster Gold, frees Brainiac, who reveals he is sick from his mutations and only wishes to return to normal, to being Brainiac of Colu. He sends most of the heroes home, and with help from Zero Hour Parallax and pre-Flashpoint Superman, averts the collapse of the Multiverse from Crisis on Infinite Earths, and is returned to the normal Brainiac. Powers and abilities Brainiac has a "12th-level intellect", allowing calculation abilities, enhanced memory and advanced understanding of mechanical engineering, bio-engineering, physics, and other theoretical and applied sciences, as well as extensive knowledge of various alien technologies. For comparison, the population of 20th century Earth as a whole constitutes a 6th-Level intelligence and the population of 31st century Earth as a whole is a 9th-Level intelligence. The character has created devices such as a force field belt and a shrinking ray capable of reducing cities. Brainiac's advanced mental powers have shown him capable of possessing others, absorbing information from other beings, transferring his consciousness, creating and manipulating computer systems, replicating multiple versions of himself, and exerting powers to traverse or control space and time. Among organic beings, Brainiac views only his frequent partner Lex Luthor as a peer intellect. John Byrne's re-imagining of the character possessed telepathy and telekinesis that were further augmented by an implanted electrode head-piece. The most recent version of Brainiac (a living Coluan who utilizes android "probes") is connected to his ship in such a way that he can be disabled for a short period if separated without warning. While inside his ship he is capable of fighting evenly with and overpowering the likes of Superman. He heals from injuries at incredible speed. After being separated from the ship he physically starts to deteriorate and is far less powerful. He is a biological creature that has altered his body to acquire more knowledge to become "better." With his ship, vast knowledge, and powerful technology, Brainiac has captured thousands of cities and has assimilated and destroyed just as many civilizations. He is considered one of the most powerful villains Superman has faced. The character has been depicted in various out-of-continuity stories, such as the JLA: Earth 2 one-shot, where he is an organic—but still villainous—lifeform, having tricked the Justice League of America and the Crime Syndicate of Amerika into switching worlds so that they are each trapped in realities where they cannot win, only to be defeated when the League deliberately walk away so that the Syndicate can return in time to stop him. In the Amalgam Comics line, which was a joint venture between DC and Marvel Comics, readers are introduced to Galactiac, a combination of Brainiac and Marvel Comics antagonist Galactus. Brainiac also appears in The Dark Knight Strikes Again where he is allied with Lex Luthor and blackmailing various superheroes to obey them before he is destroyed by Lara, the daughter of Superman and Wonder Woman and the population of Kandor, as well as Superman: Red Son, JLA: Shogun of Steel, and The Last Days of Krypton novel by author Kevin J. Anderson. Bizarro #1 created this doppelganger of Brainiac to live on Bizarro World. Since Brainiac shrank the city of Kandor, his Bizarro counterpart felt compelled to do the opposite, and expanded a city in Antarctica, creating Big City. In the alternate timeline of the Flashpoint event, Brainiac is the ruler of 31st century Earth, and has captured Kid Flash, whom he then placed in stasis, but Hot Pursuit managed to rescue the young speedster. Escaping from Brainiac's base, Kid Flash and Hot Pursuit formulate a plan to return to the 21st century. Kid Flash then allows himself to be recaptured by Brainiac and put into stasis. Kid Flash uses his super-speed in the virtual reality access port to shut down the security program and Hot Pursuit then blasts Brainiac from behind. While they used his orb energy to return to the past, Brainiac impaled Hot Pursuit and attacked Kid Flash. Hot Pursuit breaks the orb energy projector to allow Kid Flash's super-speed to return. Kid Flash then returns to the 21st century, promising to rescue Hot Pursuit from Brainiac. Adventures of Supergirl In the Adventures of Supergirl comic, which takes place in the universe of the Supergirl, a very different version of Vril Dox appears as a recurring villain. In this series he is a greedy, green-skinned alien hacker from the planet Yod who was hired by an as-yet unknown individual to frame Supergirl's ally Winn Schott for funding and aiding terrorism. When Supergirl accesses Winn's computer, he presents himself falsely as an A.I. system called V.R.I.L., and pretends to be a creation of Schott's. He figures out Supergirl's real identity and plans to expose her, then he electrocutes her ally James Olsen from through Winn's computer. Eventually, Vril is tracked down by Supergirl with the aid of Winn and an expert hacker he knew, and Supergirl easily defeated him, after which he was arrested. In other media - Brainiac made his first television appearance in the episodes of the Filmation animated series The New Adventures of Superman. In this series, Brainiac was from the planet Mega whose entire population had perished in a series of atomic wars with the exception of one survivor, Professor Hecla. Hecla created Brainiac and sent him to Earth to use his shrinking ray to create a sort of "cosmic Noah's Ark", by shrinking a male and female of each Earth species to take back to repopulate Mega. Brainiac appeared in several episodes of this series which began in 1966. - Brainiac would resurface as a member of the Legion of Doom in Challenge of the Super Friends cartoon voiced by Ted Cassidy. - Brainiac also appeared in a Super Friends short episode "Superclones". He ended up making of clones of Aquaman and El Dorado. He was voiced by Stanley Ralph Ross, who took over for the late Cassidy in 1980. - The mechanical version of Brainiac appeared in Super Friends: The Legendary Super Powers Show in the episodes "The Wrath of Brainiac" and "The Village of Lost Souls" again voiced by Stanley Ralph Ross. In "The Wrath of Brainiac", Brainiac reveals that he shed his earlier appearance when he worked alongside Darkseid. - Brainiac next appeared in The Super Powers Team: Galactic Guardians episode called "Brain Child" once again voiced by Stanley Ralph Ross. - Brainiac appears in the DC Animated Universe, voiced by Corey Burton. - In Superman: The Animated Series, Brainiac is first depicted as the supercomputer that runs most of the day-to-day operations on the planet Krypton. He heeds Jor-El's warning about the imminent destruction of Krypton. But rather than validate Jor-El's claims, he dismisses them as false while secretly working to save himself. As he contains Krypton's collective knowledge, Brainiac reasons that should he inform the government, they would put him to work to stop the inevitable and ultimately doom both parties. Brainiac survives Krypton's destruction after downloading his programming into a satellite and creating an android body for himself. He then travelled to other planets and assimilated their information before destroying them, claiming that the fewer beings who possess the knowledge, the more precious it becomes. In "Stolen Memories", Brainiac makes his way to Earth under the pretense of a peaceful exchange of knowledge with Lex Luthor. Superman, however, discovers Brainiac's true intentions to betray Luthor and destroy Earth, and eventually seemingly kills Brainiac by destroying his ship. In "Ghost in the Machine", it is revealed that Brainiac downloaded his programming into LexCorp's computers during his last encounter with Superman. He then forces Luthor to build him a new android body. When Superman arrives to save Luthor, Brainiac is ultimately defeated when the Man of Steel magnetises his body so that the attracted metal would overwhelm him. In "Knight Time", Brainiac used nanites to control Bruce Wayne, having Bruce use Wayne Enterprises' technology to construct a ship that can leave Earth. However, Brainiac's plan was once again foiled after Superman destroyed both Brainiac and his ship. In "New Kids in Town", Brainiac traveled back to the past from the year 2979 to kill a teenage version of Clark Kent before the youth would become Superman. But due to the efforts of Cosmic Boy, Chameleon Boy and Saturn Girl, Clark defeated Brainiac and teleported him into the Sun, incinerating the supercomputer. - Brainiac returns in the Justice League animated series. In the episode "Twilight", he and Darkseid harass Superman. He first appears attacking after Apokolips had suffered a major defeat by New Genesis, prompting Darkseid to head to ask the Justice League for help. The story was a ruse, however, one intended to lure the League, Superman in particular, to Brainiac's headquarters. Brainiac's full plan was to extract Superman's DNA so that he could create a mighty organic body for himself, however, Darkseid betrayed Brainiac. During the subsequent battle, Batman's attempts subsequently lead to both the artificial intelligence and the lord of Apokolips being destroyed. - Brainiac also appears in Static Shock. In the crossover episode "A League of Their Own", Brainiac is reduced to a single circuit board kept in stasis but escaped confinement following a power failure at the Justice League's Watchtower. Static and Gear had been recruited by the League to help recharge the Watchtower's generators. During that time, Brainiac slowly began gaining control of the Watchtower. He sent the Justice League a fake distress call to lure them away, then attempted to dispose of Static and Gear before turning the Watchtower into his new body. The teen superheroes discovered his plan and alerted the League to return. Brainiac had managed to download his mind into Gear's Backpack, taking control of the youth to once more try recreating his body and begin his mission. Static and the Justice League were able to fry Brainiac's hardware temporarily, allowing Gear to be freed and for the self-destruct of Brainiac's base to begin. The voice of Brainiac here sounds quite different; the producers of Static Shock decided to pitch Corey Burton's voice significantly lower for their show. - Brainiac later reappears in Justice League Unlimited. The season one finale revealed a major plot twist where a nanotech piece of Brainiac had been integrated with Lex Luthor, subtly influencing Luthor's decisions, curing his host's Kryptonite cancer and giving superhuman strength. He intended to put his mind into Luthor's A.M.A.Z.O. duplicate made from Cadmus nanotechnology, revealing himself only after being thwarted by Amanda Waller and the seven founding Justice League members. Brainiac tries to digitize the League, but the Martian Manhunter escapes and stops this. As the two escape, Brainiac's goal to record all knowledge in the universe and destroy all of creation is undermined by Luthor, pointing out his lack of imagination. Lex offers to show him a purpose beyond the mere fulfillment of his programming, to remake the universe to suit themselves. Unlike the alliance with Darkseid, since both of them are one and the same being, they have no trust issues. Using alien nanotechnology, Brainiac turns into an exosuit that merges with Luthor; the fused character's appearance is inspired by the Silver Age Brainiac. He also creates duplicates modelled after the Justice Lords to distract the League. Though he defeats the League, the two are taken down when the Flash then taps into the Speed Force and purges Brainiac from Luthor's body, leaving nothing left. However, the final season reveals Brainiac's consciousness survives and is able to communicate with Luthor as a sort of multiple personality disorder; it is never made clear if the hallucination is actually Brainiac or merely a figment of Lex's imagination. Obsessed with regaining his and Brainiac's lost "godhood", Luthor joins the Secret Society in order to obtain a piece of Brainiac in Gorilla Grodd's possession, subsequently usurping Grodd's place as the Secret Society's leader, and even sacrifices various Secret Society supervillains during an internal showdown all to bring Brainiac's fragment back online. Returning to the task of resurrecting Brainiac, Luthor hooks Tala up to a machine to gather Brainiac's essence from the remains of Brainiac's ship with Darkseid, killing Tala in the process but ends up resurrecting Darkseid fused with Brainiac technology, and Brainiac's presence is removed from Luthor's mind. - Brainiac 1.0 appears in the second season of Legion of Super Heroes, voiced again by Corey Burton. Brainiac 5 is a descendant of him who is an unwanted robot on his home planet. In the second-season episode "Message in a Bottle", Brainiac 5 reveals the past atrocities caused by his predecessor, one such atrocity being the shrinking and abduction of the Kryptonian city of Kandor, which would cause a chain of events leading to the demise of Krypton. In the two part finale of the series "Dark Victory", Brainiac 1.0's programming takes control of Brainiac 5. He destroys Imperiex and begins his plans to bring order to the universe. To do this, he uses technology that transforms matter, living beings, and entire worlds into digital information to be stored inside him. With help from Superman and his clone Kell-El merged inside his mind, he is ultimately destroyed by Brainiac 5, but in the end[clarification needed] he survives and starts rebuilding himself as Brainiac 6. While the Legion of Super-Heroes television series does not share the same continuity as the Justice League Unlimited series or its predecessors, the version of Brainiac which appeared on the show is also voiced by Corey Burton and shares the same musical leitmotif from his DC animated universe appearances. - In the fifth season of Smallville, Brainiac is introduced, played by James Marsters. He takes the name of Prof. Milton Fine, posing as a professor at (fictional) Central Kansas A&M University. "Brainiac" is mostly referred to by his assumed name, although Jor-El refers to him in the fifth-season finale "Vessel" as the "Brain InterActive Construct", and Jor-El's assistant Raya is the first person to call him "Brainiac" in Season 6's "Fallout." Smallville's interpretation of Brainiac is similar to the DC animated universe version; that of a self-aware computer in humanoid form with a Kryptonian origin, but is portrayed as a shape-shifting AI created by Dax-Ur, who abandoned the project only for it to be completed by Jor-El but corrupted by Zod. - Brainiac is featured in Batman: The Brave and the Bold, voiced by Richard McGonagle. Brainiac's earliest outfit (albeit with slight modification) as a Coluan is seen in the episode "The Siege of Starro" Pt. 2 as a trophy in the spaceship of the Faceless Hunter (the minion/herald of Starro). In "Battle of the Superheroes!", Brainiac shows up at the end of the episode following Lex Luthor's defeat plotting to shrink Metropolis in order to repopulate his destroyed planet causing Batman and Superman to spring into action. - Brainiac's body makes a cameo appearance in the Teen Titans Go! episode, "Laundry Day". Cyborg heads to his room to get a new body while his current one is in the wash. Brainiac's body is one of the choices, but Cyborg dismisses it, saying that its "too brainy". - Brainiac appears in Justice League Action, voiced by John de Lancie. - During the early development of Superman III, Ilya Salkind wrote a script in that Brainiac was featured as the main antagonist. However, when Leslie Newman and David Newman rewrote the script, Brainiac was cut from the film. Late actor Richard Pryor was considered for the role. - Brainiac was considered as a villain in the scrapped Superman Reborn and Superman Lives film projects. Most notably, the villain was featured with Doomsday in Kevin Smith's version of the script, which was later discarded by director Tim Burton. Burton's own script included Brainiac's intellect bonding with Lex Luthor, as would later happen in Justice League Unlimited (and which had previously been seen in the comic book story Superman: Whatever Happened to the Man of Tomorrow?) - Brainiac appears in the 2006 direct-to-video animated feature Superman: Brainiac Attacks voiced by Lance Henriksen. The movie begins with Brainiac landing on Earth in a meteor. Brainiac goes around absorbing information until Superman destroys him with his super-breath. However, Lex Luthor is able to save a piece of Brainiac and forms an alliance with the Kryptonian robot. Luthor gives Brainiac a new body, made from his satellite weapon. Brainiac is also equipped with a kryptonite beam and the ability to track Superman by his Kryptonian DNA. Luthor and Brainiac's bargain revolves around Brainiac using his new body to destroy Superman, and afterwards, Brainiac would allow himself to be "defeated" by Luthor and leave for another planet so that Luthor would appear as a hero. However, Brainiac betrayed Luthor after he believed Superman was destroyed, but in the end, Superman returned to defeat Brainiac after a lengthy battle. This time, Superman made sure that this copy of Brainiac was completely destroyed. - In 2007, film director Bryan Singer reported that he wanted to use Brainiac, along with Bizarro, as an antagonist in the cancelled Superman: The Man of Steel, the planned sequel of Superman Returns. However, the project was finally scrapped by Warner Bros. - Brainiac appears in the animated film Superman: Unbound, based on the story arc Superman: Brainiac by Geoff Johns and Gary Frank. Brainiac is voiced by John Noble. - Brainiac makes a cameo appearance in the animated film Lego Batman: The Movie - DC Super Heroes Unite, an adaptation of the video game of the same name, with Troy Baker reprising his role. - Brainiac has been suggested as "definitely down the road" as a villain in the DC Extended Universe and future Man of Steel sequels by director Zack Snyder. - Brainiac appears in Lego DC Comics Super Heroes: Justice League: Cosmic Clash, voiced by Phil LaMarr. This version miniaturizes, bottles and collects entire planets, rather than cities. He plans to do so to Earth in order to complete his collection. He uses a weapon to scatter Superman, Wonder Woman and Green Lantern throughout time to support his plans. Although Batman and Flash succeed in sending their fellow Justice Leaguers to the present and Cyborg and Supergirl manage to slow down Brainiac's forces, Brainiac succeeds in shrinking and bottling Earth. However, the League use a massive mech to release Earth and restore it to its normal size. Feeling he has no purpose, Brainiac sets himself to self-destruct. Due to the large blast radius, Batman convinces Brainiac to collect coins to avoid Brainiac from detonating. Brainiac is then arrested and put in prison. - Brainiac served as the final boss in the Superman arcade game published by Taito Corporation in 1988. - Brainiac was a boss in the 1992 Sunsoft game Superman. - In Superman 64, Brainiac, from the DCAU, appears not only as a level boss, but also as a playable character in multiplayer. However, when the player faces Brainiac in the game's final level, Brainiac simply stands in place unless the player attempts to use heat vision on him. - Superman was forced to stop Brainiac and save the world after Brainiac kidnapped Lois Lane in the Sega Master System and Sega Genesis video game Superman: Man of Steel. - In the Xbox video game Superman: Man of Steel, Brainiac 13 is the final boss of the game. Players must compete against B13 drones throughout the game, before facing the android on the final level. - Brainiac was featured in the concept art in the console versions and as a main boss in the Nintendo DS version of 2006 video game Superman Returns, looking vastly different from other incarnations. - Brainiac is a featured in the video game Justice League Heroes voiced by Peter Jessop. In the game, Brainiac first invaded S.T.A.R. Labs and ordered a huge legion of robots to seal off the area. Batman and Superman head for S.T.A.R. Labs, destroy Brainiac's robots, and battle Brainiac. Later the League infiltrates his underground fortress on earth and engages Brainiac in combat. Brainiac, defeated, is later resurrected/possessed by the villain Darkseid. - Corey Burton reprises his role as Brainiac in DC Universe Online. Here, Brainiac returns to Earth and both super heroes and other villains of the DC universe appeal to a truce to combat Brainiac. He is also (indirectly) the source of the player characters' powers, as a future version of Lex Luthor used his technology to create "exobytes", highly advanced nanorobots with the ability to infuse an organic host with superpowers. Brainiac also appears to be able to create Avatars and Sub-Avatars from the digitized information on superhuman powers, enormous robots that use technological, meta or magical abilities. - Brainiac makes an appearance in Lego Batman 2: DC Super Heroes voiced by Troy Baker. He is seen briefly in the final scene of the main story watching Earth from an orbiting spaceship, and after witnessing Green Lantern shoot a green beam summoning others to the planet, Brainiac mutters: "I Have Located It". Brainiac is also a boss fight and unlockable character, found in Gotham Park. - Brainiac appears Lego Batman 3: Beyond Gotham voiced by Dee Bradley Baker. He summons representatives of all known Lantern Corps (such as Sinestro, Atrocitus, Star Sapphire, and Hal Jordan) in order to claim their energies, which will power a crystal that will shrink Earth. According to him, he has lost his appetite for simple cities and plans to claim entire worlds. The Justice League and the Legion of Doom defeat him on his ship, but the villain escapes as his ship crashes in Gotham. Brainiac returns once Earth is returned to normal size, mind-controlling a giant-sized Superman, but is eventually defeated and shrunk himself, placed next to Lex Luthor and The Joker in Arkham Asylum. However, Luthor inadvertently breaks the bottle holding him, freeing him once again, after which Brainiac, as shown with a clenched fist, prepares to vengenfully beat them both up. - Brainiac makes a cameo appearance in the IOS/Android versions of Injustice: Gods Among Us as a support card. - In the video game Scribblenauts Unmasked: A DC Comics Adventure, Brainiac is the secret leader of the villains and the main antagonist. With the help of the Scribblenauts' Doppelgänger, he wants to use the Starites and Lily's globe to summon and merge with the other 51 Brainiacs and become a "perfect" being. He unites with other DC Comics villains to obtain the Starites, each failing to do so. When the Justice League arrives, he hacks Cyborg and uses Lex Luthor, The Joker, Harley Quinn, Cheetah, Professor Zoom, Ocean Master and the Sinestro Corps to fight their respective nemisises, again, each failing. When the Justice League reach Brainiac, he steals Lily's globe, adds the last Starite, teleports the Justice League away and puts his plan into ′action. After betraying Doppelganger, Brainiac and his clones begin to merge. Maxwell manages to summon alternate versions of the Justice League to defeat him and retrieve the globe. - Dee Bradley Baker reprises his role for a brief cameo in Lego Dimensions. Brainiac is summoned to Middle-Earth by The Riddler to battle the heroes with mind-controlled Orcs. - Brainiac is set to appear as the main antagonist of Injustice 2 and also as a playable character with Dee Bradley Baker reprising the role . Brainiac appears in the second episode of Justice League: Gods and Monsters Chronicles (a companion to Justice League: Gods and Monsters), voiced by Tara Strong. This version is depicted as contingency plan set by Doctor Sivana to take down Superman. Brainiac is shown to have lost control over his immeasurable psychic powers, creating an energy dome around himself in Metropolis. The effects are shown to take down attack helicopters and send cars flying. As stated by his creator, only a small nuclear warhead could stop him, or Superman. Superman shows up and penetrates the dome seeing Brainiac for who he is: a crying, blue skinned child with three diodes on his head, missing his left arm. Despite his attempts to reason with him and talk Brainiac into controlling his powers, Superman reluctantly kills Brainiac with his heat vision to put him out of his misery much to his sadness and regret. - Brainiac appears in The Last Days of Krypton, a novel by Kevin J. Anderson. This version of Brainiac is known as the Brain InterActive Construct, later renamed Brainiac by Commissioner Zod. Brainiac had admired the beauty and architecture of Kandor, and wanted to preserve the city from destruction should disaster strike Krypton as it did on his home planet of Colu. Zod permitted Brainiac's taking of Kandor, stating that Brainiac could have the city, as the rest of Krypton belonged to him. Brainiac's ship fired three lasers that pummeled the surrounding crust around Kandor and literally upheaved the city from Krypton's surface. A force field was then erected around the city which contracted, shrinking the city and its inhabitants. Brainiac departed without causing further destruction or seizing other Kryptonian cities. - Brainiac (referred to again as "The Collector of Worlds") is introduced in Issue 20 of the Young Justice comic series, based off the show. - "Brainiac". The Word Detective. July 31, 2007. - "Top 100 Comic Book Villains". IGN. - "The Lair of Brainiac" Superboy #106 (July 1963), DC Comics - "Metropolis Mailbag (column)" Superman 167 (February 1964), New York: DC Comics - Engblom, Mark (April 28, 2009). "Which Came First? Brainiac or BRAINIAC?". Comic Coverage. Retrieved August 20, 2009. - As revealed in Superboy and the Legion of Super-Heroes #226-227 (April–May 1977) - Superboy and the Legion of Super-Heroes #224, #226 (February / April 1977) - Adventure Comics (vol. 2) #9 (Late May 2010) - Who's Who in the DC Universe #3 (May 1985) - Greenberger, Robert (2008). "Brainiac". In Dougall, Alastair. The DC Comics Encyclopedia. London: Dorling Kindersley. p. 61. ISBN 0-7566-4119-5. - Adventures of Superman #438 (March 1988) - Action Comics #674 (Feb. 1992) - Superman: The Man of Steel #9 (March 1992) - Superman #65 (March 1992) - Adventures of Superman #488 (March 1992) - Superman: The Man of Steel #10 (April 1992) - Action Comics #675 (March 1992) - Superman #66 (April 1992) - Adventures of Superman #489 (April 1992) - Superman: Man of Steel #38 (Nov. 1994) - Action Comics #704 (Nov. 1994) - Superman vol.2 #95 (Dec. 1994) - Action Comics #705 (Dec. 1994) - Superman: The Man of Steel #40 (January 1995) - Superman Vol. 2 #96 (January 1995) - Superman: The Doomsday Wars #2 (1998) - Superman: The Doomsday Wars #3 (1998) - Loeb, Jeph, Joe Casey, Mark Schultz, et al. (w), McGuinness, Ed, Duncan Rouleau, Pascual Ferry, et al. (p), Smith, Cam, Marlo Alquiza, Tom Nguyen, et al. (i). Superman: Return to Krypton (March 2004), New York: DC Comics, ISBN 978-1840237986 - Superman (vol. 2) #200 (February 2004) - Outsiders vol. 3 #24-25 (July 2005 - Aug 2005) - Teen Titans vol. 3 #24-25 (July 2005 - Aug 2005) - Superman/Batman #34-#36 (May 2007 - Aug 2007) - Action Comics (vol. 1) #866-870 (June–October 2008) - Adventure Comics (vol. 2) #0 (April 2009) - R.E.B.E.L.S. Vol.2 #15-20 - Superman (vol. 3) #23.2 (September 2013) - Action Comics (vol. 2) #2 (October 2011) - Action Comics (vol. 2) #3 (November 2011) - Action Comics (vol. 2) #4 (December 2011) - Action Comics (vol. 2) #8 (April 2012) - Action Comics (vol. 2) #5 (January 2012) - Action Comics (vol. 2) #7 (March 2012) - Threshold #5-6 (July–August 2013) - Action Comics Annual (vol. 2) #2 (August 2013) - Superman/Wonder Woman #8 (July 2014) - Supergirl (vol. 6) #21 (August 2013) - Superman/Wonder Woman Annual #1 (September 2014) - Superman: Doomed - Convergence #0 - Convergence #1-8 - Action Comics (vol. 1) #242 (July 1958) - Action Comics (vol. 1) #544 (June 1983) - Batman: The Dark Knight Strikes Again #1-3 (November 2001-July 2002) - Superman: Red Son #1-3 (June–August 2003) - JLA: Shogun of Steel (2002) - Anderson, Kevin J. (October 2007). The Last Days of Krypton. Harper Entertainment. ISBN 978-0-06-134074-1. - Supergirl and the Legion of Super-Heroes #20 (September 2006) - Flashpoint: Kid Flash Lost #1 (June 2011) - Flashpoint: Kid Flash Lost #2 (July 2011) - Adventures of Supergirl Vol 1 2 (Print) (or Adventures of Supergirl Vol 1 4-5 (Digital)) - "Brainiac". Jl.toonzone.net. Retrieved 2014-06-29. - "s3_original_idea.pdf" (PDF). Retrieved 2012-05-05. - "Comic Book Legends Revealed: Richard Pryor as Brainiac?!". CBR. 9 September 2016. Retrieved 2016-09-24. - Hughes, David (2002). "The Death of Superman Lives". The Greatest Sci-Fi Films Never Made. Titan Books. pp. 176–179. ISBN 1-84023-428-8. - by Steve 'Frosty' Weintraub (2007-05-11). "Bryan Singer – Exclusive Video Interviews at the 2007 Saturn Awards". Collider. Retrieved 2016-09-24. - "Castle's Molly Quinn Gets Animated as Supergirl". TV Guide. July 16, 2012. Retrieved July 20, 2012. - Jay Jayson (2016-03-25). "Metallo Was Originally Planned As Villain In Man Of Steel Sequel". Comicbook.com. Retrieved 2016-09-24. - "NYCC: LEGO Heroes Return in "Justice League: Cosmic Clash"". Comicbookresources.com. October 11, 2015. Retrieved 2016-09-24. - Vazquez, Suriel (2017-01-17). "Injustice 2: Latest Trailer Reveals Brainiac, Robin, And Darkseid". Game Informer. Retrieved 2017-01-17. - Young Justice (vol. 2) #20 (November 2012)
<urn:uuid:15f25454-6e85-403c-a0ae-9842362f13db>
CC-MAIN-2017-04
https://en.wikipedia.org/wiki/Brainiac_(comics)
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00221-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962286
13,734
1.890625
2
Boxing is a really challenging sporting activity is not about stamina as well as method is likewise regarding physical condition: ENDURANCE! One of the first things you should enhance your endurance when combating is … CARDIO: You should make your heart beat faster to pump even more blood to your system, this will enhance your body’s oxygen absorption and that’s just what your muscles need. It will certainly aid you to not lack breath so quickly and also to do better because you will certainly have a lot more power. TECHNIQUE: We can not forget this component, strategy is essential. If you do the right movements if will conserve you energy. Technique will certainly allow you to have much better and stronger punches since you will certainly know when to apply each motion with more precision. MUSCLE MEMORY: It’s truly simple, the even more time you spend exercising an activity it gets much easier as well as easier. If you have muscle memory your mind will keep all those repeated motions that you’ve been exercising. That’s why you train all your strikes, you do shadow boxing as well as more to get your body usage to every activity. One of the keys to success is start doing much more with less, you need to conserve energy to stop getting tired so soon.
<urn:uuid:aeb7d8db-d87c-4624-9165-3d0c99dd89d0>
CC-MAIN-2022-33
https://thelasvegasfightclub.com/increase-your-endurance/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00474.warc.gz
en
0.96031
273
1.945313
2
Oil Spill Threatening Fishing Economy, Culture in Louisiana U.S. authorities have expanded fishing restrictions in the Gulf of Mexico because of fears of contamination from the BP oil leak. The spill poses a threat to the safety of seafood from the Gulf, and the future of the fishing industry in Louisiana and nearby states. VOA’s Brian Wagner has more. Duration : 0:3:25
<urn:uuid:58bc9278-0055-4f79-82d4-e0c21ac25f8e>
CC-MAIN-2017-04
http://sharondenisetalbot.com/louisiana-culture/oil-spill-threatening-fishing-economy-culture-in-louisiana
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00549-ip-10-171-10-70.ec2.internal.warc.gz
en
0.905096
82
1.773438
2
Nguyen Thai Ngoc Duy <[email protected]> writes: > Yes. This is probably cosmetics only, but without path information, we > leave it to chance to decide which A to pair with B and C (in the > A->B, A->C case above). Wrong path might lead to funny effects (i'm > thinking of git log --follow). Isn't that why <A,B> and <A,C> can have different scores per object name pair? And if you mean by B and C the paths not object names, and the blob at B and C are indeed identical, why would it matter? >>> There's also the problem with transferring this information. With >>> git-notes I think I can transfer it (though not automatically). How do >>> we transfer sha1 map (that you mentioned in the commit generation mail >>> in this thread)? > I wasn't clear. This is about transferring info across repositories. It is simple to define a portable format to record Jeff's rename cache database (it could be a text blob full of "x40 x40 score" lines), point such a blob with a special ref, and write a Porcelain to transfer and merge across repositories, e.g. git fetch $there refs/rename-cache git cat-file blob refs/rename-cache git cat-file blob FETCH_HEAD ) | sort | uniq | git hash-object -w --stdin) git update-ref refs/rename-cache $new And as Jeff said, that is orthogonal to the issue of what is being stored. The contents of refs/rename-cache blob could be compiled into a binary form for quicker access at runtime in the Porcelain. To unsubscribe from this list: send the line "unsubscribe git" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html
<urn:uuid:32a733ec-9a88-42ff-8d2a-487ce6e3dbd6>
CC-MAIN-2016-44
https://www.mail-archive.com/[email protected]/msg05385.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721387.11/warc/CC-MAIN-20161020183841-00447-ip-10-171-6-4.ec2.internal.warc.gz
en
0.840928
453
1.773438
2
The protocols of our class follow those of the Japan Karate Association (JKA) and are deri ved from the practices of traditional karate training. Below is an overview of the protocols. Please note that this list is not necessarily comprehensive and we follow all of the rules as es tablished by the JKA. Bow Each Time You Enter and Exit the - Before entering the dojo, we take our shoes off. Upon entering, one must be ready for class (thus, for example, the belt must be put on and all jewelry removed, including watches, necklaces, rings, and earrings, prior to entering the dojo). Removal of jewelry is for safety purposes. - Any time we enter or leave the dojo, we bow toward shomen, as a sign of respect for everything that the dojo means to us. Shomen is the front wall of the room; sho means “true” and men means “face”. In traditional dojos, the kamiza (miniature Shinto shrine), hata (club’s flag), and dojo kun are placed at shomen, thus making it into a somewhat sacred area. Bowing is a Japanese custom for displaying respect, humility, and lack of arrogance. It is not a matter of “bowing down” to a superior; as you notice, black belts bow to lower belts and vice versa. Sweeping the Floors Before Each - Considering that we train barefoot, the floor of the dojo must be cleaned prior to class. This is a task fulfilled by all members of the dojo before class. Usually, we line up in rank order and sweep. If you come in late and you see that higher-ranking dojo members are sweeping, you should take the broom from a higher-ranking club member and sweep. - When class begins, we line up shoulder to shoulder in rank order, i.e. with higher ranks to the left (furthest from the main door), lower ranks to the right (closest to the main door). The reason is that in Japanese society, the person of highest rank always sits furthest away from the door (the place of greatest safety) and the person of lowest rank sits closest to the door. Actually, at the Hand Chapel, we line up with higher ranks to the right and lower ranks to the left, but at the Fitness Center, we line up with higher ranks to the left and lower ranks to - Seiza (“kneel down”): done in rank order, starting with the higher - Mokuso (“meditate”): we take one minute to empty our minds and prepare for maximum concentration during class. Meditation should be done with eyes closed, body relaxed, and exclusive concentration on your - Mokuso yame (“stop meditating”): gently return the focus from your inner self back to the environment you are - Shomen ni rei (“bow to shomen”): we bow as a sign of respect and thanks to the founder of Shotokan and the ancestors. This tradition has its roots in Shinto religion. We all bow down at the same time, but we come up in a wave. Come up only when you see the person on your left come up. Never come up before Sensei (it is considered rude to come up before the Chief Instructor comes up). Because Sensei has bad knees, we come up quickly so that we are not sitting in the seiza position for too - Sensei ni rei (“bow to sensei”): the entire class bows to the teacher. If sensei is not present, the command will be senpai ni rei, thus bowing to the leader of that day’s class. - Otagai ni rei (“bow to the others”): we all symbolically bow to each other by bowing forward. This is a way of giving thanks to everyone for being present and helping us learn karate. - After we bow, Sensei will instruct us to stand up and form a circle, for warmups. Please go to the edges of the room (even if there are only a few people). Sensei prefers a big circle, not a small circle, during warmups. - Sometimes we just do standing bows. Sensei will simply turn around to face the front of the room. He will call out Shomeni-rei. We will all bow from a standing position (heels together feet out, hands straight at our sides) together and come up together (after Sensei comes out). Sensei then will turn to face us and will say "Rei" (which simply means "bow"). We will then all bow at the same time and come up at the same time (again, not until after Sensei comes up first). If You Arrive Late to Class - If you arrive after class has begun, warm up and stretch on your own prior to entering the dojo. When you enter the dojo, bow upon entry, put your things down, then sit in seiza position and do your own mokuso. Once you have finished meditating, open your eyes and look towards Sensei (staying in seiza position). Wait for Sensei’s permission to join the class. When he motions you into the class, bow and say “osu,” then if the class has finished group warm-ups, go to the end of the line to the right of the beginners, regardless of rank. If the class is still doing warm-ups, then just join the circle wherever there is room (usually where others of your rank are warming up) and when the class lines up, take your usual Other Rules to Follow - During class, all karateka should concentrate on what is being taught and on practice, avoiding - One should not leave the dojo floor unless something is wrong (e.g., you are injured, you feel like throwing up, etc.). It is improper to take a break whenever you are simply tired or thirsty and then rejoin the class. You should only leave the dojo floor if you are seriously ill. - If you are sitting and watching class, do not lean against the back wall as that is very rude. - Do not enter or exit the dojo from the side door. Only use the main door to enter and exit the If You Need to Leave the Dojo During Class (or if you need to leave early) - If you need to leave the dojo during class, bow out after the set, then stand in front of the exit door with feet together, heels together, toes pointed out and hands at your side. Look directly at Sensei. When Sensei motions for you to leave, bow and say “osu,” then exit the - If you need to re-enter during class, please bow and say “osu” upon entering the dojo, then sit in seiza position and look at Sensei. This will signal to Sensei that you wish permission to rejoin the class. If you simply wish to watch the rest of the class, then after sitting in seiza position, you may cross your legs and sit comfortably cross-legged. It is improper to simply rejoin the class without sitting in seiza position and getting Sensei's approval to re-enter End of Class (strengthening - When class is over, Sensei will say "make a circle." He will then ask one of the students to lead a series of strengthening exercises (shikodachi, knuckle pushups, leg raises, mountain climbers, and hip switches) and warmdown exercises. Please note that of the 5 strengthening exercises, the first, shikodachi, exercise is done slowly (imagine youself as a sumo wrestler trying to strengthen your leg muscles). All of the other exercises (knuckle pushups, leg raises, etc.) are done quickly to improve our fast muscles. Lining Up at the End of Class (Dojo - After warmdowns, Sensei will say “line up.” We’ll line up again in rank order and do seiza and mokuso. Then the highest ranking student will recite the dojo kun (“rules of the dojo”). These are a set of five rules that were passed down from the masters of Okinawan karate, and are an affirmation of things we believe in and must keep in mind at all time. After the senior student says each precept, the rest of the class should repeat the precept loudly. Seek perfection of character Refrain from violent behavior - After the dojo kun, we do the three bows: to shomen, sensei or senpai, and otagai. After that we stand up. Upon the senior student’s direction, we’ll turn to face the (exit) door, and bow to Sensei. After that, we’ll face front and class will be over. - Everyone should stay for announcements and roll. Please say “osu” loudly when your name is called to show good spirit. - The traditional karate uniform is the dogi or gi. Members are expected to train in white karate gis that are clean and in good condition (i.e. not torn, etc.) Beginners may train in workout clothes when they start, but should obtain a white karate gi shortly after they decide to join the club. - All must wear a white karate gi when taking a kyu or dan examination. Brown and black belts should have at least one karate gi with the official JKA patch on it since this is required if you participate in tournaments, dan examinations, and other official JKA events. No other organization or dojo's patch should appear on the karate gi. - No shoes are allowed in the dojo. Shoes should be removed before entering the dojo floor. - All jewelry should be removed before the start of training. This is for safety reasons. Jewelry includes necklaces, rings, earrings, bracelets, and watches. - Men should not wear undershirts beneath the gi. Women should wear a sports bra under their gi and may also wear a t-shirt or similar garment under their
<urn:uuid:faec47d2-c7ac-438e-b0f7-551f103a20c2>
CC-MAIN-2022-33
https://www.jkakarate.com/protocol.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00468.warc.gz
en
0.896378
2,454
2.015625
2
Our Starwatch preview of the coming year begins with a chart of the looping motions of Mars and Saturn over the coming months. Both planets lie in our lower S sky before dawn at present, but rotate the chart slightly counter-clockwise (N pointing up) for a better orientation. Mars's easterly motion in Virgo to the N of Spica reverses on 1 March. It then retrogrades to stand 93 million km away and shine brightly at mag -1.5 at opposition (opposite the Sun in the sky) on 8 April. Appearing 15 arcsec across through a telescope, it stands some 30° high in the S in the middle of the night. Saturn's tighter loop in Libra takes it to opposition on 10 May when its rings are 42 arcsec across and tipped at 22°. Mars sweeps 3° S of Saturn in August but lingers in our evening sky as Saturn sinks into the twilight only to emerge again before dawn in December. Jupiter stood at opposition on the 5th and is in prime position for study as it climbs through our E evening sky to blaze high in the S at midnight. Its westerly motion in central Gemini ends on 6 March when it stands high in the S at nightfall, but by June it is sinking into our WNW evening twilight. It emerges in the ENE morning sky in time for a spectacular conjunction with Venus on 18 August and becomes a prominent evening object in Leo by the year's end. Venus, brilliant as ever, is now visible above the rising Sun and continues as a morning star, albeit low down, until September. A more promising spell as an evening star begins in December. Mercury is best placed as an evening object over the coming month and again in May, Its best morning apparition starts in October. The peak of the Quadrantids meteor shower on 3 January occurred in cloudy skies over Britain. The Perseids in August suffer moonlight interference, but less so December's Geminids, which should be our best shower. No bright comets are on the radar – we can only hope. There are two total lunar eclipses, on 15 April and 8 October, with only the very beginning of the first of these visible from Britain. An annular solar eclipse on 29 April is visible from Antarctica and a partial solar eclipse on 23 October is observable from most of N America but not at all from Europe.
<urn:uuid:a5aaea7f-8d91-492c-9992-c390d531fd4b>
CC-MAIN-2017-04
https://www.theguardian.com/science/2014/jan/12/starwatch-night-sky-2014
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00062-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943902
493
2.421875
2
Fossils of Homo habilis show evidence of long arms and a projecting face more similar to apes, but the species also had more humanlike traits than older species, including a larger brain and a smaller face and teeth [source: Smithsonian]. Perhaps members of this species adapted smaller teeth as they learned to eat more energy-efficient foods that required less chewing [source: Roberts]. Paleoanthropologists speculate that this species could be associated with the earliest known evidence of bones that had been cut and hammered. This would mean they ate meat and bone marrow, and dental evidence does not contradict this idea. Although Homo habilis's name means "handy man," it may not have been the first hominid to make stone tools, as was once thought. We've found stone tools that date back to a period when several hominids existed, and they date earlier than the oldest known member of the genus Homo [source: Smithsonian]. Homo habilis lived 2.4 million to 1.4 million years ago across Kenya, Ethiopia and South Africa, and you'll notice that this is the earliest example of the genus Homo. However, classifying it as thus required tweaking the definition of the genus by lowering the brain size requirement. In 2000, archaeologists discovered both a comparatively young habilis fossil at only 1.44 million years old and a slightly older Homo erectus at 1.55 million years old. Discovering these in the same region of northern Kenya suggests that these species didn't evolve one after the other, but rather co-existed [source: Smithsonian].
<urn:uuid:a8b096f3-383e-4a82-8ea9-38620f3b566a>
CC-MAIN-2017-04
http://science.howstuffworks.com/environmental/earth/geology/10-extinct-hominids5.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00361-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966197
324
4.03125
4
There are lots of advantages to blogging for companies. Not just does it allow you to maintain your customers upgraded, but it also helps build brand commitment and customer fulfillment. The more often you blog, the more visitors your website will get, and the more viewers you’ll obtain, the far better. Plus, blogs can be very searchable on search engines, making your organization more noticeable. Here are several of the best advantages to blogging for companies. These advantages will certainly be described in more detail listed below. – Blog sites improve search ranking for company web sites as well as not-for-profit organizations. They help develop a target market as well as generate income. Blog sites are increasingly being used to market services and products, along with aid services boost their internet search engine rankings. They are additionally typically strained with widgets, like advertisements and endorsements. The good news is, you can quickly navigate your blog site by using the Navigation Bar in the header section. It contains links to essential blog web pages. The advantages of blogging for organizations are numerous. – Blogging is a lengthy activity, so you’ll intend to locate fresh ideas for your blog regularly. Visitor publishing and freelance authors are 2 fantastic methods to create new material as well as maintain the momentum of your blog site. PLR content, on the other hand, can be bought and changed for your blog site. However even if you’re an all-natural writer, it will certainly take a while before your blog begins creating profits. Yet do not fret, the incentives will certainly quickly accumulate. You’ll quickly see yourself blogging for permanent revenue and also ending up being a web popular blog owner. Your blog ought to be contacted connect with your target market and also touch their hearts. A blog site can be produced for individual gratification, company recognition, and also also organization growth. If done right, blogging can even use economic incentives or rewards. While the key intention of blogging for business is to get in touch with a relevant target market, there are numerous benefits to blogging for business. Not just does it raise exposure, yet it also enhances web traffic. So whether you intend to make money with your blog site or just wish to share your point of view, blogging for organization is a superb choice. In spite of the many advantages of blogging, there are still several difficulties connected with the activity. For those who are new to the globe of blogging, a basic understanding of HTML is called for to publish a reliable blog. Besides, numerous customers are not familiar with the relevance of search engine optimization (search engine optimization) as well as social networks (social bookmarking, which are prominent ways to share content online. And also while it may seem like a basic task, it requires a large amount of time and also ability. Numerous local business additionally maintain standard internet sites, which usually consist of several pages without unique structure. This kind of internet presence is planned to develop a reputation for a certain market or brand name. However extra business are realizing the advantages of blogging as a home-based service. A blog needs an internet site that reflects your business’s identity and worths. If you have some HTML understanding, you can create your very own website or make use of a WordPress site. If you’re unclear about what to discuss, start with your preferred hobby. You can discuss style, sporting activities, and even rare leisure activities such as car racing. Even blog sites about odd pastimes can become preferred. An additional vital action in beginning a blog is selecting a domain name. A domain name is a name for your blog site as well as need to be detailed. You can use it for online search engine to locate your blog quickly. You might need to investigate your audience’s interests and demographic. Blogs can also pay. Although many people blog just to share their personal experiences, others use them to educate others and also develop an on-line presence. One instance of an effective blog site is Natasha Kravchuk’s Cooking area, where she shares her favorite dishes and ideas. Site visitors love her recipes and constant her blog site, which has actually gained her a prize and a lot of visitors. Blog writing is a fantastic easy revenue. You can invest a couple of hrs composing material each week and also remain to profit from it long after you’re done. One of the most common reason to start a blog is to get in touch with other people with your content. Blog writing enables you to get to countless people that are interested in the topics you discuss. It’s a great method to share your life stories with the globe! Just be sure to maintain it favorable as well as don’t be afraid to share your ideas and also ideas! All of these aspects make blogging a fantastic method to engage with your readers and also get words out there. Similar to any kind of creative undertaking, you can start blogging with your enthusiasm. If you’re passionate about fashion, sporting activities, or cars and trucks, you can start a blog site concerning these interests. Also niche rate of interests, such as a brand-new leisure activity, can result in a successful blog site. Your blog site’s name, or domain, is likewise extremely vital. It needs to be descriptive and also define what you’re mosting likely to blog about. There are numerous advantages to blogging, and it is necessary to get the best name for your blog. Companies count on consumers to purchase their items, as well as blogs help them connect with these customers. Blogging reaches new target markets as well as makes your company a lot more affordable and searchable. Blog writing likewise generates high quality leads for your internet site, which is one of the key goals of every company. If you’re a new business, beginning a blog is an outstanding method to obtain your name around. So, start a blog site today! You’ll never ever regret it! Blogging is a fantastic method to share your ideas as well as ideas with your audience. By sharing your viewpoints, experiences, and also understanding on different topics, a blogger has the ability to win the hearts of his/her visitors and also impart favorable ideas into their minds. There are countless advantages to blog writing, and you’ll find yourself linked to millions of individuals who wish to hear what you’re assuming. The globe is your oyster and also blog writing can be an excellent method to share your ideas. Browse this site Blogs permit you to share your knowledge and also experiences with the world, as well as you can do so anonymously. Blogging is also an excellent way to share yourself, and you’ll have more readers if you discuss subjects you enjoy. You can talk about every little thing from daily tasks to major issues, such as civils rights and environment adjustment. You can blog about whatever you like – what matters most to you will likely be interesting to visitors as well as engaging. Just keep in mind to blog about what you enjoy and also are passionate regarding!
<urn:uuid:80185985-8649-484a-a932-20459377ef43>
CC-MAIN-2022-33
http://www.imagineartphoto.com/2022/07/07/this-year-will-be-the-year-of-blogging-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00073.warc.gz
en
0.961422
1,439
1.523438
2
Project Wonder FrameworksYou can not build projects from Wonder this way. You must either use the command line or Hudson/Jenkins methods Command Line / Terminal You have to install woproject.jar first and make it available for ant before the following instructions will work. (see Building a WebObjects Project#Overview first) Standard WebObjects FrameworkYou can build a standard WebObjects Framework project by calling Ant and passing it the Project directory, and the name of the build target contained in the build.xml file at your project's root. By default, the built framework will be put in a Code Block none none cd /my/project/ ant build distdirectory in your project's root.
<urn:uuid:d6546307-e38d-46d7-8c3b-dd7a6335646d>
CC-MAIN-2022-33
https://wiki.wocommunity.org/pages/diffpagesbyversion.action?pageId=1048867&selectedPageVersions=10&selectedPageVersions=9
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00469.warc.gz
en
0.79962
154
1.734375
2
Life is all about the details, but sometimes, those details aren't pleasant. If your toilet is running, you're potentially wasting gallons of water a day. But don't despair! Most often, it's just a simple fix, no tools — or plumber — required. The first thing to understand is that toilets work on gravity. When you push down the lever it lifts up a rubber flapper, allowing water to run out of the tank and into the bowl. Once the water in the tank runs out, the flapper closes and allows the tank to fill again. The tank water then slowly rises until a float closes the intake. To figure out which part of the toilet is leaking, take off the tank lid and identify your parts: A: Toilet flush lever B: Rubber flapper blocking the tank water from descending into the bowl. It is connected to the toilet flush lever above. C: Pump which refills the tank after it empties. D: Float which raises and lowers with the water level to tell the pump when to go and stop. E: Overflow tube, what sets the high water level in the tank. Note: the water in the tank is clean (unused); it's perfectly fine to stick your hands in the tank to pull out or adjust parts. Like any home repair, wash them when you're done. Before you do anything else, it's a good idea to turn off the water connecting to the toilet. This is easily accomplished by tightening the silver knob on the wall behind the toilet. Common Cause #1: Problems with the Chain Check the connection between the flush lever and the rubber flapper it's attached to. Jiggle the flush lever and watch the chain between it and the flapper. The chain is too short if it constantly pulls on the flapper even when the flush lever is at rest. If it's too long it might interfere with the flapper closing. If there's extra length on the chain it's simple to move the clip down. Otherwise, just replace the chain with any aluminum ball chain or other small chain that's longer in length. Tip: Some chains have floats attached (like the one above from Amazon). If there is a float on the flapper chain, make sure it's loosely floating on the surface or else it also may be pulling up on the flapper. If so, either move the float up on the chain or remove it. Common Cause #2: Broken, Dirty or Warped Flapper Over time, the flapper can warp or break at the hinge, and start to leak. To check on the flapper, first flush the toilet to drain the water out of the tank. Unhook the flapper from the base of the tank and pull it to the surface in order to get a closer look. Turn the flapper over and look for any discoloration (which could be a sign the flapper is warped and needs to be replaced), mineral deposits, warping, or any breaks in the plastic or rubber. First try cleaning off any buildup that might prevent the flapper from closing properly. Or, if you see a problem with the actual flapper, they are cheap and easy to replace. To switch it out, simply disconnect the old one from the chain and attach the new one. Then hook the new flapper back over the drain. Tip: When buying a new flapper, make sure you get one that attaches to the chain on the thick center part, not the thin outer lip (where it's more likely to warp). Common Cause #3: Float Position When a toilet is flushed, the tank should stop filling when the water is just below the overflow pipe. If it goes over and the tank is still filling, then the float for the pump is too high. Test this by flushing the toilet a few times, and noting where the water stops. The simplest fix is to bend the rod connecting the float to the pump so the float is lower and it will signal the pump to turn off sooner. If the arm won't bend, then it might be time to call in the tools...and the plumber. So, next time you hear the sound of a leaky toilet, get in there, poke around, and see if you can identify the most likely problem. Chances are good you can figure it out, make the easy fix, and save money on a plumber!
<urn:uuid:f6d530d0-0b5f-4590-b2ee-aa3dfe1a4190>
CC-MAIN-2016-44
http://www.apartmenttherapy.com/how-to-fix-a-running-toilet-common-causes-easy-diy-fixes-200209
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00219-ip-10-171-6-4.ec2.internal.warc.gz
en
0.922912
914
2.546875
3
Thracian exhibit at archaeological museum in Sofia The archaeological museum in Bulgarian capital city Sofia is exhibiting several pieces of weaponry and armour attributed to Thracian king Seuthes III, discovered by archaeologist Georgi Kitov near Kazanluk in 2004. China reports top 10 archaeological finds in 2012 Chinese authorities on Tuesday announced the top 10 archaeological discoveries made in 2012, with the earliest dating back to the Paleolithic era. Among the most significant discoveries was the ruins of a small city, the largest of its kind in neolithic China, discovered in northwest China's Shaanxi Province. 8,000 artefacts and rising: City dig pronounced the 'most important ever' in London When archaeologists were called to a site in the City of London where an ugly office block and a bar once stood, they were sceptical that it held any secrets. Yet six months into the dig on Bloomberg Place, a three-acre site close to Mansion House tube station, experts believed they have stumbled across the most important find of Roman London artefacts in recent memory and have dubbed it the “Pompeii of the north”. 4,000-year-old stone tools, earthenware unearthed from banks of river Narmada in Bhopal Archaeologists have found 4,000-year-old stone tools and earthenware in a remote village on the banks of river Narmada in Harda district of Bhopal. The treasures that have emerged could change our whole understanding of how evolution of mankind began along the Narmada. These priceless relics belonging to Chalcolithic Age are probably the most important archaeological discovery ever made in the region. Severe damage done to Nazca Lines According to reports from the Peruvian newspaper El Comercio, serious damage to elements of the outer boundary of the world famous Nazca lines has been caused by heavy machinery belonging to a quarry firm removing limestone from the area. The damaged lines are located near the Panamericana Sur Highway and an adjacent area has also been affected. There are hundreds if not thousands of these lines and trapezoids on the Nazca plain with many of the most famous geogylphs such as the spider, hummingbird and monkey, etc. all undamaged. New Research Holds Fascinating Revelations About an Ancient Society’s Water Conservation and Purification University of Cincinnati research at the ancient Maya site of Medicinal Trail in northwestern Belize is revealing how populations in more remote areas – the hinterland societies – built reservoirs to conserve water and turned to nature to purify their water supply. Jeffrey Brewer, a doctoral student in the University of Cincinnati’s Department of Geography, will present his findings on April 11, at the Association of American Geographers’ annual meeting in Los Angeles. Traces of Norman Castle Found The remains of a building from Northampton’s Medieval castle have been found on the site of the town’s railway station. Archaeologists working on the site ahead of the development of a new station, have found three 12th Century walls from a stone building just feet underneath the station’s car park. Archaeologist Tim Upson-Smith said: “We certainly weren’t expecting to find a stone building this well preserved and this close to the surface.” Food Cans Exonerated in Franklin Expedition Deaths A long-standing Arctic mystery has become even more baffling with research that appears to debunk a common theory about the demise of the Franklin expedition. Chemists at the University of Western Ontario used an array of the latest analytic techniques to conclude that poorly made cans of food were not responsible for the lead that poisoned the officers and crew of the doomed 19th-century voyage to explore the Arctic.
<urn:uuid:43002a2b-87da-460b-a63e-89a16150a92a>
CC-MAIN-2017-04
http://www.ancientdigger.com/2013/04/archaeology-news-april-10-2013.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00493-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953559
783
2.546875
3
|THE STORY OF QUEEN ISABEL In the late 13th century during a severe famine throughout Portugal, a compassionate Queen Isabel was determined to help her starving subjects. Legend has it that during her efforts she was confronted by the very harsh King Diniz while crossing the royal courtyard with crown jewels (in some versions of the story it was bread) hidden in her apron. The King asked the Queen what she was carrying in her apron, and she responded “roses” although it was mid-winter and none were blooming. But when her apron was opened for the king’s inspection, the jewels had been miraculously converted to roses. The miracle allowed the Queen to continue to sell her jewelry to feed the starving Portuguese population.
<urn:uuid:a6284a48-08d0-4245-a6f1-6046d250d83e>
CC-MAIN-2016-44
http://www.idesst.org/portuguese-events-bay-area.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00107-ip-10-171-6-4.ec2.internal.warc.gz
en
0.9883
157
3.515625
4
PC Demolition Lab - The computer model that I took apart with my partner Yoshie was a Dell Windows XP Professional 1-2CPU - The motherboard, data cables, hard-drive disk, DVD drive, RAM, fan, and power supply were visible when the cover was removed. - Intel Pentium 4 - Located underneath the heat-sink on the motherboard - 3.2 GHz - "The processor microprocessor is a multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory, and provides results as output.The operate on numbers and symbols represented in the binary numeral system"(in http://en.wikipedia.org/wiki/Microprocessor). RAM(Random Access Memory) - 512MB per RAM - Micron Technology - Located in the slots on the upper-right hand corner of motherboard - "Form of computer data storage that allows stored data to be accessed in the same amount of time at any storage location, allowing data to be accessed quickly in any random order." (in http://en.wikipedia.org/wiki/Random_Access_Memory) - Located next to the hard drive with the data transfer and power supply cables attached to it - " It is a disk drive that uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs. Compact discs, DVDs, and Blu-ray discs are common types of optical media which can be read and recorded by such drives."(in http://en.wikipedia.org/wiki/Optical_disc_drive) - Data cables connect a computer to a power source or other device and provide communication between devices. - Located to the right of the DVD drive on the cover of the case. - The platter is a circular, metal disk that is mounted inside a hard disk drive. Several platters are mounted on a fixed spindle motor to create more data storage surfaces in a smaller area. - "It is a non-volatile, random-access, magnetic data storage device. Magnetic heads read and write data to the surface of the platter. The drives also contain all of a computer's operating data, and are also useful for backing up data." (in http://www.ehow.com/about_5184975_functions-hard-drives_.html" - Located inside the computer tower case and is screwed to the bottom - "It is a printed circuit board found in all modern computers that holds crucial components of the system, which include central processing unit (CPU) and memory, and provides connectors for other peripherals." - 2 crystals are located on the surface of the motherboard - "The crystal is a piece of quartz that vibrates at a very specific frequency that controls the speed of the processor"
<urn:uuid:ad8f44e0-cb4a-45aa-81c5-38664be0957e>
CC-MAIN-2022-33
http://tephra.smith.edu/classwiki/index.php/103b_ar_2012f
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00071.warc.gz
en
0.902429
697
2.09375
2
Looking into the crystal ball Among the many firsts of 2020, three of the four Future Energy Scenarios (FES 2020) produced this year by National Grid, the UK’s electricity system operator (NGESO), are compliant with the Net Zero target. These scenarios represent a range of credible ways to decarbonise the energy system in order to meet the government’s target, enshrined in law in 2019, to bring all greenhouse gas emissions to Net Zero by 2050. In addition to producing more electricity from low carbon and renewable energy sources (RES), all the scenarios envisage that the path towards Net Zero will require significant electrification of the transport system as electric vehicles replace their traditional, fossil-fuel-powered alternatives. In relation to the heat sector, FES 2020 envisages a number of decarbonisation pathways, involving a choice between hydrogen, bio-fuels or electrification to replace natural gas boilers presently used for most heating purposes. Total electricity demand is thus projected to increase in each scenario, but on different trajectories. By 2050 the level of demand will differ markedly, depending predominantly on the degree of electrification and how hydrogen is produced. Total electricity demand (TWh) in FES 2020 scenarios Source: National Grid FES 2020. Available at: https://www.nationalgrideso.com/future-energy/future-energy-scenarios/fes-2020-documents Forecasting what levels of demand will materialise at specific points on the network is even more challenging than running the exercise for the system as a whole. That is because of the uncertainty associated with whether and when consumers in different parts of the country will take up electric vehicles or replace their fossil-fuel-fired boilers with electric alternatives for heating their homes. Efforts undertaken last year to translate NGESO’s FES into so-called Distribution FES (D-FES) show considerable variation between scenarios in the uptake of electricity-intensive devices and, consequently, in the levels of electricity demand that can be expected at specific points of the distribution system. Forecast of electric heat pump uptake at the distribution level in the East Midlands under two FES 2019 scenarios What this implies for the energy system Irrespective of which FES 2020 scenario materializes, it is clear that the path toward Net Zero will entail large volumes of low-carbon generation producing varying levels of electricity depending on the time of day or the weather, increasing the intermittency of the power supply. Consumption levels and patterns, too, will change significantly as households choose to generate their own power or take up electricity-intensive yet flexible technologies, such as electric vehicles or heat pumps. This means greater potential for congestion on networks built to accommodate established production and consumption patterns. These developments will be occurring against a background of increasing digitalisation, which will enable different types of distributed generation, dispatchable loads, electric vehicles and energy storage to become active participants in the market as “flexibility” resources. Through the emergence of aggregators and specialised markets, network operators are increasingly able to buy flexibility from both local sources of demand and electricity producers; in return for a payment, the flexibility provider offers to modify either demand or supply to help address an anticipated mismatch. Traditionally, Britain’s six distribution network operators (DNOs) would build the distribution network to meet exogenous consumer demand for electricity generated upstream. More investment in network infrastructure (new pylons, transformers and substations) was the key to avoiding congestion and no doubt will still be required in significant amounts to provide for the increase in demand on any path to Net Zero. But flexibility resources may help DNOs resolve congestion and either defer the cost of extending or reinforcing the network or obviate the need entirely. Instead of building new infrastructure which may turn out not to be needed, DNOs can pay a flexibility resource to help relieve local congestion. For example, if there are too many people charging their electric vehicles at peak time, operators can pay them to charge during off-peak periods rather than investing in new network equipment. Build or flex? In this new world, DNOs need to decide whether to use a flexibility resource or network reinforcement to tackle congestion. Which offers better value? One approach is to take the cost of asset reinforcement as the baseline and compare it with the alternative of deferring the new investment and using flexibility in the interim. This recently emerged as a “common evaluation methodology” under the Energy Networks Association’s (ENA’s) Open Networks Project. Under this approach, the value attached to flexibility is derived primarily from the so-called time value of postponing a large expense today to some point in the future. Even if this assessment is conducted across a number of different demand growth scenarios, the underlying assumption is that the network investment will take place; if not now, then at some point. Crucially, the methodology does not include the option for the network operator to use flexibility and then decide to scrap the investment because, for example, new forecasts suggest weaker demand than anticipated. This may happen because EV charging in the area in question is going to be less clustered than in the initial scenario, or uptake of EVs and heat pumps will be a lot slower, or another source of local demand (e.g. a factory) has shut down. Put another way, this approach does not attribute any value to the fact that using flexibility allows network operators to wait and see until it can be known with greater certainty whether an expensive, long-lived network investment is required at all. Network operators may therefore end up utilising less flexibility than what would be optimal. To take this wait-and-see value into account requires a more complex analysis involving additional information. In conjunction with SSE Networks, Frontier Economics has built a model that does just that. It is based on the type of analysis that is used to value any option because flexibility provides an option to choose whether or not to invest in the future based on the (better) information available then. So which approach is better? In a textbook sense, an option-based analysis is a better representation of the real world. But using it is complex and requires the input of a lot of data. For example, the model needs possible scenarios for the development of generation and load, probabilities of their happening as seen today, how information today may change views/forecasts tomorrow, etc. The value of any option derives from the degree of uncertainty. Flexibility as an option for network operators is no different. If there is not much uncertainty, it is likely that the two approaches will produce similar outputs. And if the investment is not very large, the time taken to populate the more complex approach may outweigh the benefit of improved decision making. Finally, other factors (such as replacing ageing network assets) may be important enough to have a determining influence on the final decision. So in some situations, sticking to a less complete but simpler analysis may be the right answer. But in other cases, the stakes will be high given the significant uncertainty in the level and trajectory of demand growth we describe above. In these situations, thoroughly modelling uncertainty and thinking through what can be gained by “waiting and seeing” will need to be an essential part of the network operators’ toolkit.
<urn:uuid:d73611b8-5642-427a-b4ac-4d9ee5d06bed>
CC-MAIN-2022-33
https://admin.frontier-economics.com/de/de/news-und-veroeffentlichungen/veroeffentlichungen/article-i7714-building-electricity-networks-under-demand-uncertainty/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00478.warc.gz
en
0.92567
1,502
2.765625
3
A magnolia tree in full bloom is a wonderful sight to behold in any landscape. They are relatively easy to grow from seed, provided care is taken in the collection and preparation of the seeds. The best time to collect the seeds is in the fall after the cone-shaped fruit has matured. Allow the cones to dry for a few days and then shake them to release the seeds. Seeds can also be purchased from professional growers and nurseries. If buying seed, be sure to choose a variety that is suitable for your USDA plant hardiness zone. Soak the seeds in a glass or jar of warm water overnight. After soaking, the seed coat will have softened. Rub the seeds with a piece of window-screen mesh or hardware cloth to remove the seed coat. Make your potting medium by blending equal parts of the potting soil, sand and peat moss. Fill the cells of the planting tray and place one seed in each cell. The seeds should be about one quarter-inch below the surface of the soil. Add enough water to moisten the soil. Put the tray inside the plastic bag and seal it to keep the humidity high. Place the bag in a warm location but not close to a direct heat source. The top of the refrigerator or a similar location higher up in a room is usually a good spot. Open the bag several times a day to allow air circulation, and add water as needed to keep the soil moist. Remove the tray from the plastic bag as soon as the seeds sprout and place it in a sunny location such as a window sill. Germination normally occurs within six weeks of planting. The seedlings can be transplanted to small planting containers when they have grown several sets of leaves. Use the same potting mix as you made for the planting tray. Transplant the young magnolia trees to the garden in spring.
<urn:uuid:f7f184e9-8b18-4b2e-9f5b-39e699ac1a2a>
CC-MAIN-2017-04
http://www.gardenguides.com/138173-start-magnolia-trees-seed.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00502-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949048
378
2.96875
3
Raising Puppies at 3 to 3 ½ Weeks Time to start potty training using the "Misty Method" The Misty Method is for the breeders home only, from 3 to 9 weeks. It teaches the dog that there is a designated spot to potty making it easier for the new owner to potty train their new puppy. Contrary to some beliefs, potty training a puppy should start with the breeder very early in life. It is very important at 3 to 3.5 weeks old, when the pups become mobile and start to potty on their own, to set their room up PROPERLY. It is not really a natural thing for a dog to pee or poop in his crate. Wolf mothers are meticulous about keeping the "nest" very clean. So, once a baby starts eating solid food, and the mother no longer cleans it up because it can walk at this point too (at this point the mama wolf and den mates would have trained the pups to eliminate outside the den), it is up to the BREEDER to keep the box/nest very clean. This causes an aversion to poop and pee. When this is done right, by the time the buyer purchases the pup, he will already be ready to not pee in his crate or bed, as they do not pee or poop where they eat or where they sleep. So believe it or not, what goes on from the time of birth to the time you buy the pup plays a big role on the young life and what a buyer will be faced with. With this in mind, a breeder named Bev Dorma from MistyTrails Havanese/Mastiffs has created a method called the "Misty Method." It is basically a way of raising the pups that gives them a concept of housetraining at an early age. This in return not only helps the breeder keep the whelping area clean, it makes the puppy easier to housebreak once they go to their new homes. A win-win for everyone.... Within these pages she explains step-by-step how the method works. This means there are a designated potty area, a place to eat and play, and a place to sleep. You can see that I have now changed the room around, and have made it bigger. The potty area should be the farthest away, as when you enter the room, they all jump at you, and want up, and you do not want them jumping in their poop. The bed area should be nearest to where you enter the room. These puppies are all gathered in the play/eating area enjoying their dinner. The pups decide to take a nap and many of them, on their own, gather into the sleeping area. If you look to the left, on the paper, you can see that many have gone over there to pee before going for a nap. After puppies eat, they naturally feel the need to eliminate. This good little puppy has left the play/eating area and made his way into the potty area to do his business. What a good puppy! This is the first step toward potting training a puppy. Potty training should start with the breeder. This type of raising a puppy is called the Misty Method and is a regular practice of MistyTrails Mastiffs/Havanese. Puppies raised using this method are easier to housebreak and have fewer accidents in the house, as you are distilling the concept of housebreaking to them at a very young age. They learn from the start there is a place to sleep, a place to play, a place to eat and a place to eliminate and they will carry this concept with them after they leave the breeder. Puppies who are raised in cages where the areas are not separated do not understand this concept. They learn they can eliminate anywhere they wish at any time they wish. Then, after you take them home, you suddenly expect them to understand they cannot pee and poo in the house. Above, puppy pee. The potty area is lined with long sheets of paper that can be rolled up for easy cleanup. This is roll ends of newsprint. Newspaper does work, but the ink can transfer onto the dogs and for white pups this is not good. Soon, I may change to wood chips, BUT NOT CEDAR CHIPS. I like to wait till they are four to five weeks old. I NEVER use kitty litter for puppies; that only works for cats. For large-breed dogs, pine shavings work, but not for the small breeds. For small breeds, paper or puppy pads are best and you may need to weight it down, so they don't shred it, and if they try and shred it, you just have to say "NO." They usually don't start to shred their bedding until they are seven weeks old. At 3½ weeks, the pups were all sleeping, due to eat in a half hour. Upon waking, ALL of the pups went from their sleeping area to the potty area to poop/pee. I cover the poop with a small piece of paper so the others do not walk in it. These pups are only 3½ weeks old and they already get the concept of housebreaking. The place where you sleep and the place where you play are not the same place you poop and pee. As a result, the owners of these pups will have an easier time housetraining their new puppy. A brief summery of the Misty Method... Use a whelping box with a lip for the first 2½ weeks, so ONLY the dam can get out, but the pups are contained. (Make sure the lip is low enough so the dam doesn't have to blindly leap in, but can aim her step in, and high enough so pups do not get out and get chilled.) For large breeds, at 2½ to 3 weeks the paper MUST be right outside the door. For small breeds, at 3 to 3½ weeks the paper MUST be right outside the door. At this time, the lip/door should be removed, so the pups can get out of the whelping box on their own, and find their way back in. (Kind of like removing the den door.) THEN, you can move the potty area farther and farther away from the bed. Pups like it at opposite end. When they are 3 to 4 weeks, they will come out of their bed and pee right away, sometimes they only get their front feet out. After they are more mobile, you move the potty away from the bed area. I will line a litter box with paper, but not litter. Ideally at 6 to 7 weeks old, you will have an 8 x 10' area for small breeds or a larger area for large breeds with a bed in one corner, and food and potty at opposite sides of the pen. Note: The stools should never be soft, and never be mushy. If they are soft or mushy (pudding-like) ask the vet for enough wormer to worm all the puppies and mom. Take a stool sample in for testing. The stool shouldn't smell horribly bad. If the stool is not solid and it smells horrible, you want to check for stool Coccidia (coccidiosis). Loose stools also make the job of cleaning up after your pups ten times harder. Stools should be like little chocolate bars. It is normal to have bouts of soft stool, but do not let it continue on an ongoing basis. Find out why, and get them solid again. Otherwise, they will run through it, and it becomes a real mess as they track it everywhere. About 8, 9, 10 weeks After about 8, 9, 10 weeks of age, or when the puppy arrives at it's new home, the dog should be taught to go potty outside. Do not have paper or potty pads inside your home. Peeing is for outside only, or you are teaching your new pup it is okay to potty inside your home. Take advantage of any early training the breeder hopefully has already done. Teach your pup to potty on a designated spot outdoors, making him think. After you bring home your new puppy the first thing you need to teach the pup is to walk to the door. Do not carry it. Make the puppy walk or it will not learn to alert you. Do not use treats when potty training as it takes the dog's focus off of the business at hand and puts it on the food. You do not want the dog's brain to be on food when it is time to relieve itself. This often causes a dog to not completely finish eliminating because the dog is looking and waiting for food. The dog will often come back inside the home and go to the bathroom again after just being out. Keep the focus on the task at hand. Rewards for pottying should be the relief the dog feels when it empties itself, your happiness that the dog did the right thing, along with verbal praise, a pet and/or back scratch. Dogs can feel when the humans are happy. Do NOT use the Misty Method for older puppies. This method is only for pups 3 to 8 weeks of age who have not yet left the breeder. Misty Method's FAQ - What if my pups are still eliminating both urine and feces in the sleeping/playing area? - Mom continues to eat the elimination matter and my pups are four weeks old, is this normal? - When the pups actually use the potty pads in the potty area, they step in the feces and track it all over the pen... - A couple of the pups actually sleep ON the used potty pads... - I am looking for one of those weaning bras for my dog and can't find them anywhere. Where do you get them? - At six weeks, the puppies do very well eliminating where they are supposed to MOST of the time. However, they don't have a complete aversion to mess. I routinely see them spending time in the potty area sleeping or chewing a toy or playing with another puppy that is in there to "go." - I have four-week-old puppies. How long does it take them to figure out to go to the pee pads? I have had it there for five days and it is hit and miss, still peeing on sleeping area. - I have 5.5-week-old puppies. They are really, really noisy at night lately. Is there anything I can do? They literally yell for what seems like hours. Sleep area should NEVER have feces in it, you have to start changing that bedding every hour if needed. If a puppy poops, you cannot just pick it up, as the smell will remain. Also, if they walk in the poop, and then walk on their bedding, they have put feces smell on the blankets, so I also cover the poop with a small piece of paper so the others do not walk in it. Yes, this is normal. Some dams quit the second you start to feed the puppies; others can continue for a week. This is why I personally do not use pee pads. I use un-inked roll ends of paper, and every time a puppy poops, I cover it. For large breeds I use the shavings, because if a puppy gets feces on his feet, and tracks that smell into the bed or play area, another puppy will smell it, and eliminate there. A WEEK of constant supervision and you have them trained, and if you do not, you have weeks of overload work ahead of you. I would put in a couple crates with clean bedding, and have the rest paper. NO play area on the first day of potty training. Then slowly make a play area, each day making it a little bigger...and clean the floor every hour. I cover the used ones up as fast as I can. The problem with the pee pads is they are plastic on the bottom, so when you cover up the one below, you are adding a nice smelling fresh pad…YOU DON'T WANT THIS. You want the potty area to smell like a potty, yuck for a few days, and you want bedding area to smell clean. Just a guess of what is happening is this: pups eliminate on a pee pad and step in it, and then track the smell to play area and bed. Then you put a fresh pee pad on top of the old one, and now the pee pad smells good, and the bed smells like pee/poop. For small dogs you can use a human baby onesies suit. For the bigger dogs, you need to get a t-shirt, fairly large, and then you buy a bed sheet clamping holder (sheet straps). They are about six inches long, and they sell them in the store, to put on the corner of flat sheets in order to turn them into fitted sheets. They are elasticized. They have the clamps on the end, like ladies used to wear to hold their stockings up. You just cinch the t-shirt on with them, but it may be hard to cover the bottom two teats. This happens. I put up a barricade by taking two pieces of thick plywood and making a CORNER to put in front of the potty entrance. It is portable and I put it over the paper. It acts as a paper weight, so they cannot drag the paper and when they are playing, they run, and hit the wall, and don't play on the paper. And by 6.5 weeks old, they KNOW where the paper is; they can learn to walk an extra two feet and around the corner to get into the potty area. It works awesome. Still the odd one goes in there to play. You don't want them to pee on their sleeping area. Ideally you catch them before they start, and then it takes about three or four days of being extremely consistent and changing the bedding as soon as one has a boo-boo. After three days of fresh-smelling bedding and paper that smells like pee, they get it. I do not have much luck with pee pads. They don't work as well as the un-inked paper. I find, with the un-inked paper, you can cover the paper with another piece of paper, and cover the poop and pee, leaving the scent of pee, without them tracking it back to their bed. BUT, if you put a pee pad over a pee pad, it masks the scent. If you can get a pee pad with just pee, and pick up the poop but leave skid marks, it may work. I just find that leaving the bed smelling fresh and the potty area clean but smelling of pee helps for the first four days, just till they get it; they do not pee in their bed, and if they step on the pee pad and it is saturated, and their feet get covered in pee, they track it too their bed. Wake them up every couple hours and put them out on the paper: don't let them back into the bed area until they pee ON the paper. They are likely hungry and mom is likely not wanting to go feed them at night. She should but they have teeth, so you need to give them a big meal at bedtime, and a good late play. Then to bed. The lights out with no stimulation. Make it so their room is BED and potty area ONLY. This is the harder stage and a reason puppy mills and backyard breeders want to let the pups go at 5.5 to 6.5 weeks, but you cannot. This is a learning stage for them. The play area stays during the day and you slowly make it bigger, but you can take it away at night to teach them night is for sleeping. Misty Method Success Story "I used your Misty Method for potty training 11 Lab puppies. I started at 2.5 weeks. It took about 2 days with NO ACCIDENTS!!!! They are five weeks old now! I had a whelping box in the area until yesterday. I wanted the puppies that are getting crate trained to get used to crates so they were not scared when they go to their forever homes. Your method is AWESOME! I used many tips of yours throughout Sasha's pregnancy and whelping. THANK YOU!!" Courtesy of MistyTrails Mastiffs Pups 4 Weeks Old: More on potty training Although this section is based on a whelping of an English Mastiff, it also contains good general whelping information on large-breed dogs. You can find more whelping information in the links above. The links below tell the story of Sassy, an English Mastiff. Sassy has a wonderful temperament. She loves humans and adores children. An all-around mild mannered, wonderful Mastiff, Sassy, however, is not the best mother toward her puppies. She is not rejecting them; she will nurse them when a human places them on her to feed, however she will not clean the pups or pay any attention to them. It is as if they are not her puppies. This litter is getting mom’s milk with major human interaction, manually giving each and every pup what they need. In return, the pups will be super socialized and will make remarkable pets, however the work involved is astounding. It takes one dedicated breeder to keep this situation healthy. Thankfully this litter has just that. Read the links below to get the full story. The pages within include a wealth of information that everyone can appreciate and benefit from. - C-Section in a Large Breed Dog - Newborn Puppies... What you need - Whelping and Raising Large Breed Puppies: 1 to 3 Days Old - Things do not always go as planned (imperforate anus) - Orphaned Litter of Pups (not the plan) - Raising Puppies 10 Days Old Plus + - Raising Puppies 3 Week Old Puppies - Raising Puppies 3 Weeks - time to start potty training - Raising Puppies 4 weeks old - Raising Puppies 5 weeks old - Raising Puppies 6 weeks old - Raising Puppies 7 weeks old - Socializing the Puppies - Mastitis in Dogs - Whelping and Raising Large Breed Dogs Main - Whelping and Raising Puppies, a new found respect - You Want to Breed Your Dog - Pros and Cons of Inbreeding Dogs - Stages of Puppy Development - Whelping and Raising Puppies: Breeding age - Reproduction: (The Heat Cycle): Signs of Heat - Breeding Tie - Dog Pregnancy Calendar - Pregnancy Guide Prenatal Care - Pregnant Dogs - Pregnant Dog X-Ray Pictures - Full-Term Mucus Plug in Dog - Whelping Puppies - Whelping Puppy Kit - First and Second Stage of Dog's Labor - Third Stage of Dog's Labor - Sometimes Things do not go as Planned - Mother Dog Almost Dies on Day 6 - Whelping Puppies Unfortunate Troubles - Even Good Moms Make Mistakes - Whelping Puppies: A Green Mess - Water (Walrus) Puppies - C-Sections In Dogs - C-Section Due to Large Dead Puppy - Emergency Cesarean Section Saves Pups Lives - Why dead puppies in utero often require c-sections - Whelping Puppies: C-section Pictures - Pregnant Dog Day 62 - PostPartum Dog - Whelping and Raising Puppies: Birth to 3 weeks - Raising Puppies: Puppy Nipple Guarding - Pups 3 Weeks: Time to start potty training - Raising Puppies: Pups Week 4 - Raising Puppies: Pups Week 5 - Raising Puppies: Pups Week 6 - Raising Puppies: Pups 6 to 7.5 Weeks - Raising Puppies: Pups 8 Weeks - Raising Puppies: Pups 8 to 12 Weeks - Whelping and Raising Large Breed Dogs - Mastitis in Dogs - Mastitis In Dogs: A Toy Breed Case - Why are Toy Breeds Harder to Train? - Crate Training - Showing, Genetics and Breeding - Trying to Save a Fading Dachshund Puppy - Whelping and Raising Puppies Stories: Three Puppies Born - Whelping and Raising Puppies: All puppies do not always survive - Whelping and Raising Puppies: A Midwoof Call - Whelping and Raising a Full Term Preemie Puppy - Whelping Small for Gestational Age Puppy - C-Section on Dog Due to Uterine Inertia - Eclampsia is Often Fatal for Dogs - Hypocalcemia (low calcium) in Dogs - SubQ hydrating a Puppy - Whelping and Raising a Singleton Pup - Premature Litter of Puppies - A Premature Puppy - Another Premature Puppy - Pregnant Dog Absorbing Fetus - Two Pups Born, Third Fetus Absorbed - CPR Needed to Save One Puppy - Whelping Puppies Congenital Defects - Puppy with Umbilical Cord Attached to Foot - Puppy Born with Intestines on the Outside - Litter Born with Intestines on Outside of Bodies - Gone Wrong, Vet Makes it Worse - Dog Loses Litter and Starts to Absorb Puppies - Whelping Puppies: Unexpected Early Delivery - Dog whelps 5 days early due to dead pups - Lost 1 Puppy, Saved 3 - An Abscess on a Puppy - Dewclaw Removal Done Wrong - Whelping and Raising Pups: Heat Pad Caution - Whelping and Raising a Large Litter of Dogs - Whelping and Raising Dogs While Working - Whelping a Messy Litter of Pups - Whelping and Raising Puppies Picture Pages - How to Find a Good Breeder - Pros and Cons of Inbreeding - Hernias in Dogs - Cleft Palate Puppies - Saving Baby E, a Cleft Palate Puppy - Saving a Puppy: Tube Feeding: Cleft Palate - Ambiguous Genitalia in Dogs
<urn:uuid:e2a9c70c-bd37-4b23-b385-c6bb6828bcd4>
CC-MAIN-2017-04
http://www.dogbreedinfo.com/breedingdogs/pottytrainingpuppies3weeks.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00557-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958824
4,762
1.9375
2
Depending on your point of view, quality system assessment (QSA) programs can be simple, complex, common sense, or a lot of work. But no matter your opinion, government rules controlling beef exports will affect the industry's ability to meet beef sales potential to the newly opened Japanese market. Japan officially opened its doors Dec. 12 to U.S. beef from animals 20 months of age or younger. And the rules for verifying that meat qualifies for export to Japan can be found in detailed QSA plans that fit the Beef Export Verification (BEV) program. QSAs are created by packers, feeders, stockyards, producers and suppliers under strict USDA oversight. The evaluation of their compliance to BEV is conducted by USDA's Livestock and Seed Program, Audit, Review and Compliance (ARC) Branch. All QSA programs are audited by ARC at least twice a year. In terms of the Japanese export market for beef, a QSA provides assurance that animals bred, raised and harvested are 20 months of age or younger. Information on QSAs has been making its way across the U.S. for more than a year (see “Prove It!” November 2005 BEEF), but confusion still exists. For example, just having “age- and source-verified” cattle isn't enough to qualify for the beef export program, says John Lawrence, Iowa State University (ISU) livestock economist and Iowa Beef Center director. The animals must be part of a USDA-approved QSA program (find a listing of such programs at www.ams.usda.gov/lsg/arc/qsap.htm). Properly documented calves should be accepted into most existing QSA programs. Stockers and feedlots wishing to participate, however, have additional hoops to assure animals through their operations can be effectively traced and are from QSA-certified operations. A whole new world According to Paul Clayton, U.S. Meat Export Federation (USMEF) senior vice president of export services, it's now a whole new industry ballgame when it comes to exporting beef products. “The page has turned,” Clayton says. “We have a new set of rules.” QSA participation is voluntary for cattle selling domestically, but mandatory for sellers wishing to potentially test the lucrative Japan export market. That applies to every sector from cow-calf to packer — no exceptions. Cow-calf producers, stockers and feeders aren't required to have their own QSAs, however. They can participate as a supplier to a customer's QSA program, for instance, or join an umbrella QSA program set up by an organization or stockyard. And it doesn't mean a producer wanting to determine the value potential of QSA participation will find it difficult, says Ben Weinheimer, Texas Cattle Feeders Association (TCFA) regulatory manager. “QSA isn't a program requiring drastic change,” he says. “If producers are smart enough to stay in the business and remain profitable, it will be straightforward for them.” For cow-calf producers, Weinheimer says it's a process of documenting the date the first animal in a group was born. That documentation can be on pocket calendars, wall calendars or other verifiable, visible records. “Bull dates alone aren't sufficient, although bull dates can provide good supporting documentation,” he says. Lawrence agrees cow-calf producers should find the process straightforward. “For producers with recorded birth dates, and who know the age of the oldest cattle (in the group), it's pretty simple,” he says. Steve Owens is co-owner of Joplin Regional Stockyards (JRS), Carthage, MO. Owens says JRS, which established its own QSA program under the Missouri Department of Agriculture umbrella and is the first U.S. auction market to be QSA qualified, picks up most of the burden for its customers. “We're the ones doing the work. The work is at the stockyard, feeder and packer level,” Owens says. “It doesn't have to be difficult for the normal producer.” Auditing is a key Clayton says QSA involvement requires a “realistic record” of the animals. The records must make sense to an auditor, he says. While QSA-approved sites will be USDA audited twice/year, those requesting QSA certification also will be subject to auditing by USDA or a QSA-approved site. Audits by the latter, which would be similar to those by USDA, will take place at least once each year. “There needs to be a real comfort level with the records,” Clayton says. “Everything must add up.” An audit “comes down to being a few pieces of documentation, and the involvement doesn't always need to be face-to-face,” says Weinheimer of TCFA, which has instituted its own umbrella QSA. What is verified is the training process, age records and detailed information on commingled cattle, with more detailed procedures on how the cattle were kept separated. Weinheimer says feeders and producers who establish their own QSAs will spend more, not just because of the initial development costs but because they must pay for USDA's fee-based auditing. Meanwhile, an umbrella program will be audited regularly by USDA, with only a percentage of its participants audited every six months. Getting past the confusion Weinheimer admits there's been much confusion with the export-verification process. Lawrence attributes it to the fact each QSA program is developed by the qualifying location, which creates some differences. “This is one of those cases where producers could sit down in the coffee shop and tell different stories about what's required — and they all could be true,” he says. Still, the differences should be minor in most QSA-approved locations, as bottom-line requirements to meet export qualification to Japan are the same. Producers may have to keep slightly different sets of documentation for different QSA-approved locations, Lawrence says, but cattle approved for an independent QSA plan should be portable to any QSA-approved system. Clayton adds, “Producers shouldn't make this more complicated than it is. These things can be simple.” Will it pay? Of course, the big question for all industry segments is whether the extra effort is worth it pocketbook-wise? Lawrence says a lot of that depends on cattle availability. “We don't know if packers will pay for animals that qualify,” he says. “Will they pay a premium, or will they be able to find enough eligible cattle in the cooler?” While it may be a slow process, Clayton says, as time goes on, there will be value incentives for providing this information, which is a “value attribute” of the cattle being sold. “The producer should get paid for those things,” he says, adding that “the industry gets the value” for this extra market for its animals. Joplin's Owens believes QSA participation will pay off in the long run. “Recording this information is probably something producers are already doing,” Owens says. “You might as well go ahead and get approved as a QSA producer if you have the opportunity.” After all, he adds, it represents another market for your cattle. Walt Barnhart is president of Carnivore Communications LLC, Denver, CO, and a former National Cattlemen's Beef Association communications director. Documented birth dates aren't the only approved method of verifying age of cattle for export of their beef to Japan. Beef from carcasses with A40 maturity also qualify. Most carcasses in the A40 classification, which is certified by USDA graders who grade the ossification of the chine bone and other factors, will be those of cattle less than 15 months of age. The drawback of using the A40 method to separate export items is that important variety meats, such as tongue, can't be tied to the carcass, and thus aren't eligible for export to Japan. Such products have much more value in foreign markets than domestically. Packers would prefer to stage their cattle by documented age, which a QSA makes possible, so all beef and offal in a harvest and fabrication session would qualify for export.
<urn:uuid:1015e712-27c5-470b-8437-796cb783b95f>
CC-MAIN-2016-44
http://beefmagazine.com/print/mag/beef_qsa_joins_industry
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721405.66/warc/CC-MAIN-20161020183841-00313-ip-10-171-6-4.ec2.internal.warc.gz
en
0.953079
1,790
2.109375
2
Our mission is to strengthen Israel, as a state and society, by thickening the human capital in Israel's Border communities. In Kedma we believe that leadership development and community building are essential to each other and to the fortification of Israel. Entrepreneurship is the adhesive that binds them together to create robust communities. Building permeant and prosperous communities has always been one of the foundational tenets of Zionism. Since the first wave of pioneers came to Israel in the early 20th century to this very day, ensuring the wellbeing of Israeli communities is the most effective way to cement the continued existence of the Jewish people in the Land of Israel. In the words of Israeli Founding Father Yigal Alon: "I see building communities in Israel as the most effective way to ensure the safety of Israel. Nurturing life across our borders is an old and well used tool, but one which has never lost its edge." Connecting With The Land The instantaneous connection that is formed when a person works the land they live on is what Kedma seeks to nurture. We always strive to allow our volunteers to interact directly with the life inherent in the soil of the Israeli frontiers through through agricultural work and environmental protection. We know that keeping a community alive isn't a one-and-done deal: making sure they enjoy a prosperous and fruitful life is an everyday effort. Through our support frameworks, the communities of Israel's frontiers are able to reap the fruits of that effort, The connections forged between our volunteers and the longtime residents are signifiers of partnership and mutual responsibility, and a signifier of new life flooding in to these long forgotten areas. When a young Israeli chooses to live in Israel's frontiers, they know they're going to have to be an entrepreneurial leader. They must identify their and their environment's needs and build creative responses. Social entrepreneurship is a muscle we seek to develop through our various programs, which truly change the way a person views their surroundings: spotting new opportunities for growth where others might miss them.
<urn:uuid:e7ead9eb-5de3-45db-bb61-ce58f550029b>
CC-MAIN-2022-33
https://kedma-hityashvut.org/en/vision-page/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00076.warc.gz
en
0.955134
434
2.015625
2
Over sixty years ago, Peter Johnson Sr. established Johnson & Moore Inc., a red ore scramming contractor working in the open pit natural iron ore mines of the Mesabi Iron Range. As the natural ore was depleted in the late 50’s, Johnson Moore began doing road work and site preparation. In 1956, Hoover Construction Co. was incorporated as the construction arm of Johnson Moore under the Leadership of Peter J. Johnson. In time, Hoover Construction prospered and grew while Johnson & Moore faded away. Today, Hoover Construction Co. is a highway/heavy grading contractor. The primary geographic area of work is the Arrowhead region of Northeastern Minnesota, with some work in Michigan, Northern Wisconsin, and Colorado. A typical job for Hoover Construction is a large excavation project, primarily highways, airports, earth dams, and commercial industrial sites. The company has developed drilling and blasting as a specialty. All types of drilling and blasting are done by Hoover, including mass rock excavation, structure excavation for footings, foundations and pipe trenches, and quarries. Forty percent of Hoover’s work load is public highway work. The company work force varies with the workload and season. Typically, the company employs between 100 and 150 employees. The annual work volume varies but on an average year, 8-12 projects will be under contract varying in size up to $20 million. Hoover Construction Co. is a family owned business. Peter G. “Chipper” Johnson, PE, is the current President and is the third generation to own and operate Hoover Construction Co. This company does not currently have any open postions.
<urn:uuid:59be4b93-aa48-4ad3-86c5-593a099c88cd>
CC-MAIN-2022-33
https://buildwittjobs.com/company/hoover-construction-co/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00273.warc.gz
en
0.945862
330
1.859375
2
If you’re planning on buying lots of Thin Mints this year (and if you’re not, there’s something deeply wrong with you) you’re probably wondering if the cookies are tax deductible. After all, the Girl Scouts of America is a charitable organization. Tax Cat Sez: They are… but only if you don’t take the cookies. From the Girl Scouts website: Q: Is the purchase of Girl Scout Cookies tax-deductible? A: No and Yes. * No, if the customer keeps the cookies. Individuals who buy Girl Scout Cookies and take the cookies home, or consume them, have purchased a product at a fair market value. For this reason, no part of the price of a box of Girl Scout Cookies used in this way is tax-deductible. * Yes, if the customer leaves the cookies with Girl Scouts. Many Girl Scouts ask customers to pay for one or more boxes of cookies for use in their community service project, for example, collecting for a food pantry. The customers not receiving any Girl Scout Cookies do not benefit directly from paying for them. Those individuals may treat the purchase price of the donated cookies as a charitable contribution. So, for example, if you wanted to buy some Girl Scout cookies for members of our armed forces overseas, you could claim those cookies as a charitable donation.
<urn:uuid:075a02e3-a5ff-47e1-90f8-621255620627>
CC-MAIN-2017-04
https://consumerist.com/2008/01/31/girl-scout-cookies-are-tax-deductible-sort-of/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00312-ip-10-171-10-70.ec2.internal.warc.gz
en
0.912803
288
1.679688
2
Best Sleeping Position For Shoulder And Arm Pain. Side sleeping aligns the spine. Place the pillow up high under your arms. Sleeping with arms at side, or supine position means that you’re lying horizontally on your back. This can reduce shoulder and neck pain and help you sleep better. The pillow also works to keep your hips and spine aligned. When Sleeping On Your Back, Always Support Your Neck And Knees. Famous physical therapists bob schrupp and brad heineck demonstrate the best sleeping positions for shoulder, arm, and wrist pain. To support their lower arm, you can place a cushion or folded blanket under your arm and elbow. Fourth, if you have enough room, you could spread your arms and legs a bit. You Can Easily Support The Neck, Head, Shoulder, And Spine When You Sleep On Your Back And You Also Allow Your. The pec muscle is located in the chest area. They are discuss the bes. Use the bottom pillow support your shoulders, and the top pillow support your neck. Tips For Sleeping With Shoulder Pain. You want to get a mattress that will alleviate a lot of the pressure from your pressure points. Shoulder problems including pain, are one of the more common reasons for physician visits for musculoskeletal symptoms. 2 best sleeping positions for neck and shoulder pain 1. Third, You Might Want To Add Extra Pillows Under Your Knees And/Or Lower Back. Another posture that avoids putting pressure on your. Keep your thighs aligned with your torso and bend your knees back slightly, which can help reduce pressure on your lower back. The best sleeping position for shoulder pain. All You Need To Know About Frozen Shoulder. The best position to sleep in for your neck and shoulder pain is either on your back with your arms down by your side or on your chest or sleeping on your side with your spine in a neutral and symmetrical position. The “best” sleeping position for a painful shoulder can be subjective. Place the pillow up high under your arms.
<urn:uuid:15731ddc-fba4-429d-a475-1e5838a845ce>
CC-MAIN-2022-33
https://www.menwhosing.org/best-sleeping-position-for-shoulder-and-arm-pain/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00473.warc.gz
en
0.883425
433
1.664063
2
Dresser-Rand to display biogas engines at WISA conference 21 May 2014 Dresser-Rand will showcase its Guascor biogas engines—with ratings from 140 to 1240 kW—to visitors attending the Water Institute of Southern Africa (WISA) Biennial Conference & Exhibition 2014. The SFGLD engine series was specifically developed to work with a variety of gases, including natural gas, biogas from landfill, sewage, or anaerobic digestion processes, and gases from biomass gasification processes. Dresser-Rand acquired Grupo Guascor S.L., a leading supplier of diesel and gas engines, in 2011. Dresser-Rand’s Guascor engines can be equipped with mechanical or electronic carburetion control and are adaptable to any type of low heat value (LHV) gas. The units can be supplied as a bare engine, generating set, with cogeneration systems (CHP) separately, or in a fully assembled container unit (noise insulated if required). They have been successfully tested with product gases from many different sources, including landfill; waste water treatment plants; animal manure digestion processes (cow, pig, chicken); farm waste; cassava; starch; wine dredges; palm oil mill effluent (POME); and more. Dresser-Rand is among the largest suppliers of rotating equipment solutions worldwide. Dresser-Rand solutions include: combined heat and power (CHP) systems; biogas-fueled gen-sets; hybrid systems (solar photovoltaic and engine-based gen-sets); biomass and waste-to-energy steam turbine generators; compressed air energy storage (CAES); and more. Dresser-Rand also develops new technologies that use fossil fuels and renewable energy resources more efficiently, such as its wave energy-based HydroAir turbine. TrackBack URL for this entry: Listed below are links to weblogs that reference Dresser-Rand to display biogas engines at WISA conference:
<urn:uuid:d12ab60a-e12c-4682-b7c4-431cd6a8d0c6>
CC-MAIN-2017-04
http://www.greencarcongress.com/2014/05/20140521-guascor.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00346-ip-10-171-10-70.ec2.internal.warc.gz
en
0.892861
421
1.992188
2
Minimally-invasive Assessment of Cardiac Output in Severe Preeclampsia Severe preeclampsia often presents with uncontrolled hypertension and therefore requires close monitoring of blood pressure and cardiac performance. The purpose of the study is to compare two methods of measuring the performance of the heart in pregnant women: one by ultrasound of the heart, the other by assessing the pulse generated in the blood vessel of the wrist. We hope that the method using pulse analysis will be as effective as ultrasound, which is labour intensive and operator dependant. |Study Design:||Observational Model: Cohort Time Perspective: Prospective |Official Title:||Minimally-invasive Assessment of Cardiac Output in Severe Preeclampsia: Radial Artery Wave Form Analysis Versus Trans-thoracic Echocardiogram| |Study Start Date:||April 2007| |Estimated Study Completion Date:||December 2007| Severe preeclampsia often presents with uncontrolled hypertension, which requires close monitoring of blood pressure and cardiac output. It will be very useful to know the cardiac output in this patient population, because it will guide the choice of antihypertensive drugs and measure their effect on cardiac output. Traditionally pulmonary artery catheters were used to measure cardiac output. There are numerous problems with using this method in severe preeclampsia. These include technical difficulty inserting the catheter in an awake, edematous pregnant patient, potentially causing a pneumothorax, damaging the carotid artery or insertion site infection. There is also an increased risk for cardiac arrhythmias. Apart from the risks, the accuracy of the thermodilution measurements can be influenced by factors such as timing of the injection within the respiratory cycle, temperature of the injectate, speed of injection, and placement of the catheter. A readily available, accurate non-invasive cardiac output measurement technique, that will provide reliable data with fewer risks, is needed. Doppler ultrasound (trans thoracic echocardiography) is the gold standard for measuring cardiac output non-invasively in pregnant patients. Unfortunately the method is operator dependant, not continuous and not always available when needed most. Recently a device called the FloTrac has been introduced that measures cardiac output minimally invasively. Attached to an arterial line it measures cardiac output every 20 seconds via arterial waveform analysis. The standard of care for measuring blood pressure in severe preeclampsia requires the placement of an intra-arterial line. This group of patients is therefore ideal for measuring cardiac output with the FloTrac, especially since powerful intravenous anti-hypertensives are used to control blood pressure. Our hypothesis is that the FloTrac will be comparable to Doppler Ultrasound for measuring cardiac output in severely preeclamptic patients. Please refer to this study by its ClinicalTrials.gov identifier: NCT00465114 |Mount Sinai Hospital| |Toronto, Ontario, Canada, M5G 1X5| |Principal Investigator:||Jose CA Carvalho, MD PhD||Mount Sinai Hospital, New York|
<urn:uuid:d6bb8248-abde-4f04-a6eb-9d0d32126360>
CC-MAIN-2017-04
https://clinicaltrials.gov/show/NCT00465114
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00041-ip-10-171-10-70.ec2.internal.warc.gz
en
0.888846
661
2.421875
2
We go geocaching! Usually when we go on a trip we will get some caches. It's a great excuse for a hike or just a way to visit somewhere. We've found them on college campus', parking lots, intersections, hikes, beaches, city parks and foreign countries. Truly, they are everywhere! We like to sneak in caches when we have some time to "kill." My daughter plays a lot of soccer so at her away games we'll download some local caches while she's warming up, find them and return for the start of the game. For even more educational aspects there are puzzle caches where you have to solve a puzzle to get the coordinates. Or multi-stage where you have to find one cache, get the coordinates for the next caches, find the next cache and so on. There is one cache around here that they keep stocked with stuffed animals for kids when they find it! We don't collect coins but we do help caches that are traveling, i.e. travel bugs. My husband is the techie expert. He learned that for some city caches you can find them just by putting the coordinates into google maps. Get the coordiantes off geocaching.com. My husband has an iphone and really you need a GPS even with an iphone for the ones out in the country and woods. It is much more accurate. He has a Garmin etrex Venture HC. It seems to do really well. I suggest trying some caches using google maps or borrow a GPS and see how much you like geocaching before investing in the GPS. We started due to DH's parents who are big cachers. They are retired now and spend a some of their time together going for caches. Unfortunately, my daughters are not big cachers. They whine but then they actually enjoy looking once we are there. But that's them. I took my daughter's Girl Scout troop caching and they all enjoyed it. The dark side to it: it can be a real time killer looking for a caching, reading about it, etc. Mom of Jackie (18) Jenny (15) and my English Cocker Spaniel 3-year-old Radiance Grand Prix RL1 AKC TD ASCA TD, i.e. Cody My English Cocker Spaniels in my heart forever: Auld Sod Red Magic Merlin CGC CD OA OAJ OAC NJC (Merlin) Elan's Surprise Surprise CGC NA NAJ (Arthur)
<urn:uuid:11bff958-daa9-4f89-bc41-674d192c4f35>
CC-MAIN-2016-44
http://www.designerdigitals.com/digital-scrapbooking/community/showthread.php?19682-GeoCaching&p=251293
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00467-ip-10-171-6-4.ec2.internal.warc.gz
en
0.95498
513
1.90625
2
37 percent of Swedes questioned said they supported joining Nato compared with 36 percent who were against the idea. It is the first time a survey has suggested that a larger proportion of Swedes back joining Nato as opposed to keeping out of the organisation. In May 2014, just 28 percent of Swedes polled wanted to join Nato, compared with 56 percent of people who rejected the idea of signing up. Nato (which stands for the North Atlantic Treaty Organisation) is an international organisation that includes various European countries as well as the United States and Canada. It was formed in 1949, after the end of the Second World War. Nato's aim is to ensure that its members don't fight each other, rather that they work together to safeguard security and cooperate on defence and security issues. If diplomatic efforts fail, it has the capacity to organise and carry out joint defence operations when urgent military action is needed, for example in Afghanistan. The organisation has recently expanded its presence in the Baltics, as tensions continue in the region as a result of the Ukraine crisis. Crucially, member states are obliged to come to the aid of fellow members if they are subject to a military attack. Sweden already has strong links to Nato and takes part in joint training exercises with Nato troops as part of the Partnership for Peace programme. Some see this as being Nato members in all but name, while others point out that Sweden isn't covered by security guarantees. The Novus study, which was commissioned by TV4 News, comes less than a week after the Swedish military carried out its largest military operation in years in Stockholm's archipelago. There were concerns that a foreign vessel - possibly from Russia - was in Swedish waters, but after an extensive search, Sweden's military said it thought that the suspected submarine had moved on. The hunt, alongside more general concerns about the conflict in Ukraine, may have affected public opinion ahead of the Novus survey, reported news agency TT. Another recent survey found that Swedes were more willing to risk conflict with Russia by helping Ukraine than people from any other European country. The Swedish military's ability to defend the country if it came under attack has been under scrutiny since Supreme Commander Sverker Göransson said in 2013 that Sweden could hold its own for more than a week. If Finland were to look more seriously at joining Nato the issue would likely rise further up Sweden's agenda.
<urn:uuid:2a819727-69e0-454d-80ac-3f99f825f12a>
CC-MAIN-2017-04
http://www.thelocal.se/20141029/support-swells-for-swedish-nato-membership
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00239-ip-10-171-10-70.ec2.internal.warc.gz
en
0.984128
495
2.40625
2
With commodity prices at levels not seen in years due in large part to the drought sweeping half the nation, casual dining restaurants — not their diners — will take it on the chin. The drought has ruined much of the crop this season, reducing the supply available for consumption and thus sending prices higher. Month-to-date, commodity futures prices for wheat have increased about 46 percent, corn is up 43 percent, soybeans climbed 26 percent, coffee rose 16 percent, and milk rose 15 percent. Zane Tankel operates 35 Applebee's restaurants in the New York area and says he can't reflect price changes in an instant like a supermarket can. Menus at the DineEquity-owned chain are printed quarterly, but beyond that, Tankel says increasing menu prices even a nickel causes his diners to speak up, and potentially eat elsewhere. As a result, he's never raised prices more than 2 percent on an annual basis. However, most large casual dining franchises have long-term contracts with food suppliers, often for the calendar year, so at least for now, the recent price surge isn't being felt, according to Lazard Capital Markets analyst Matt DiFrisco. But, if prices remain elevated or even uncertain, renegotiation with food suppliers could be financially painful. If commodity prices stay at these levels when it is time to re-sign contracts for proteins like beef, chicken and seafood and for vegetables and fruit, restaurants may end up paying more over the course of the contract than commodity futures will later dictate. DiFrisco points to thepoor salesthat resulted atChipolte's after it raised prices 4.5 percent. The selloff of the stock that followed was Chipolte's worst percentage slide ever. The price increase at Chipolte was a bit higher than the norm. According to the National Restaurant Association, menu price inflation has ranged between 1 percent and 4 percent over the last decade. But the point has been made. At the moment, the fear of losing patrons may prevent restaurants from increasing prices to offset their rising costs. That means higher commodity prices are a worry for investors in casual dining stocks like Darden , Brinker International as well as DineEquity and others. Restaurants average a pretax profit of 3 percent to 5 percent of sales and have to continuously work to manage escalating input costs to ensure margins remain as close to intact as possible, says Hudson Riehle, senior vice president of research for the National Restaurant Association. That means menu price inflation is still less than grocery price inflation year-to-date, Riehle says. The one exception is fine-dining restaurants. Tankel, who was a director at Morton's Steakhouse's for many years, says fine-dining restaurants can raise menu prices much easier than casual dining venues because those diners are considerably less price sensitive.
<urn:uuid:134a020e-ab5e-4d25-af05-4aecba2b96dc>
CC-MAIN-2022-33
https://www.cnbc.com/id/48290218?__source=yahoo%7Cheadline%7Cquote%7Ctext%7C&par=yahoo
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00675.warc.gz
en
0.955812
592
1.53125
2
This study examines the Peruvian and Colombian experiences as regards some aspects of the management of their extractive industries. English, PDF, 252kb A two-page OECD summary and analysis of the Services Trade Restrictiveness Index results for Colombia. The Aid for Trade at a Glance 2009: Maintaining Momentum report presents the results of the second monitoring exercise of the Aid for Trade Initiative and documents its success so far. Aid for Trade at a Glance 2007: The OECD Creditor Reporting System (CRS) database is used to track ODA flows from Development Assistance Committee (DAC) member countries. OECD Trade Policy Working Paper No. 51. This paper presents improved approaches to measurement of services barriers by using alternative weighting methods and improved econometric specifications. Studies include: textile and clothing sectors in Bangladesh, Colombia, Lesotho, Mauritius, USA, Australia and the Slovak Republic; the steel industry in Europe and the US; and shipbuilding in the EU, Japan and Australia.
<urn:uuid:76b873ff-3500-4eaa-a561-5f4b3faa12b0>
CC-MAIN-2016-44
http://www.oecd.org/trade/bycountry/colombia/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00467-ip-10-171-6-4.ec2.internal.warc.gz
en
0.853747
210
1.59375
2
Women Infants & Children (WIC) WIC is a nutrition program that helps pregnant women, new mothers, and young children eat well and stay healthy. WIC provides low-income women, infants, and children under 5 with nutrition education, vouchers for nutritious foods, breastfeeding support, a review of immunization records, and referrals to other helpful agencies. To schedule an appointment at a local WIC clinic or for more information, call 801-WIC-KIDS (942-5437). To be eligible for WIC, you must be one of the following: - A pregnant or breastfeeding woman - A woman who has just had a baby - A child less than 5 years of age You must also meet income guidelines. Income is based on gross income and frequency of pay. Applicants are automatically income-eligible if they participate in Medicaid, Food Stamps, or the Family Employment Program (TANF); you will need to bring proof that you are on one of these programs to your appointment. WIC counts an unborn baby as a household member. For July 1, 2022 through June 30, 2023, WIC income eligibility guidelines are: |Household Size||Annual||Monthly||Twice Monthly||Bi-Weekly||Weekly| To apply for WIC, schedule an application appointment by either: - requesting an appointment online, OR - calling 801-WIC-KIDS (942-5437), OR - visiting one of our WIC clinics in person. When you come for your appointment, be sure to bring the following items. Missing items may prevent you from qualifying for WIC or may require you to make another appointment at a later date. - Every person applying for WIC - Your WIC packet (if you have one) - Proof of income: Documentation of your household’s source of income or wages. This applies to all members of the household. - pay check stubs for the last 30 days - current month Medicaid card - unemployment checks - food stamp letter with amount - SSI (social security) information - worker’s compensation information Applicants are automatically income eligible if they participate in Medicaid, Food Stamps or the Family Employment Program (TANF) - Proof of identification: Documentation for each individual applying for WIC benefits, including children, and the adult responsible for the benefits. - Driver license - Government-issued ID card - Current Medicaid card - Birth certificate - Hospital bracelet (must have date of birth and last name) - Infant crib card (must have date of birth and last name) - WIC packet (if you have one) - Proof of residency: Documentation of where you currently live with your current physical address. - a current bill (utilities, phone, cable, car payment, medical bill) in your name or the name of the person providing paychecks - a current Medicaid card - rental or mortgage agreement with address - bank statement with address - Immunization record for each child or infant Give your baby the best: breastfeed! WIC participants receive: - Help and support in breastfeeding from lactation educators and consultants. - Tips on how breastfeeding can work around a busy schedule. - Individual consultations with peer counselors who are available to help you with breastfeeding. Peer counselors are moms who are trained in breastfeeding and who have experience with breastfeeding. Call your local WIC clinic and ask to speak with a lactation educator. Salt Lake-area breast pump rental and purchase information La Leche League International (worldwide breastfeeding support group) If your patient has a medical need for specific formula or food from WIC, complete the appropriate form(s) below and give the completed form(s) to the patient to bring to her WIC appointment. - For infants under 1 year: Medical Authorization Form for Specific Formula/Food - For women and children over 1 year: Medical Authorization Form for Specific Formula/Food Providers may also fax completed forms to the appropriate WIC location: - Salt Lake: 385-468-3674 - Ellis Shipp: 385-468-3701 - Southeast: 385-468-4332 - South Main: 385-468-3981 - South Redwood: 385-468-4369 In accordance with federal civil rights law and U.S. Department of Agriculture (USDA) civil rights regulations and policies, this institution is prohibited from discriminating on the basis of race, color, national origin, sex (including gender identity and sexual orientation), disability, age, or reprisal or retaliation for prior civil rights activity. Program information may be made available in languages other than English. Persons with disabilities who require alternative means of communication to obtain program information (e.g., Braille, large print, audiotape, American Sign Language), should contact the responsible state or local agency that administers the program or USDA’s TARGET Center at (202) 720-2600 (voice and TTY) or contact USDA through the Federal Relay Service at (800) 877-8339. To file a program discrimination complaint, a Complainant should complete a Form AD-3027, USDA Program Discrimination Complaint Form which can be obtained online at: https://www.usda.gov/sites/default/files/documents/USDA-OASCR%20P-Complaint-Form-0508-0002-508-11-28-17Fax2Mail.pdf, from any USDA office, by calling (866) 632-9992, or by writing a letter addressed to USDA. The letter must contain the complainant’s name, address, telephone number, and a written description of the alleged discriminatory action in sufficient detail to inform the Assistant Secretary for Civil Rights (ASCR) about the nature and date of an alleged civil rights violation. The completed AD-3027 form or letter must be submitted to USDA by: - Mail: U.S. Department of Agriculture Office of the Assistant Secretary for Civil Rights 1400 Independence Avenue, SW Washington, D.C. 20250-9410; - Fax: (833) 256-1665 or (202) 690-7442; or - Email: [email protected] This institution is an equal opportunity provider.
<urn:uuid:c581837d-c37f-44f2-b174-ed17df0556b3>
CC-MAIN-2022-33
https://slco.org/health/wic/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00077.warc.gz
en
0.852469
1,654
1.648438
2
Almost half of us belong to the working class. But workers have become more invisible, researchers say Norwegian social scientists have given the workers a voice. Monday 08 March 2021 - 07:54 The media hardly ever writes about them. And when they do, it’s often with a negative spin. In popular culture, workers are often portrayed as "simple" and “laughable.” Very few politicians and others in the upper echelons of society represent them. A lot of workers don’t identify with power, and they experience that they have little power themselves. Workers often become alienated and politically passive. In Norway, their occupations are ranked low on the prestige ladder. Is the working class striking back? Twenty-seven social scientists have contributed to the Norwegian book Arbeiderklassen (The working class), from which these analyses are drawn. The working class has long been practically forgotten by researchers. But now academic interest is on the rise. Brexit and Donald Trump's victory in the presidential election in 2016 are part of the reason, says Marianne Nordli Hansen, one of the book’s editors, at an event last week. “People saw that this was a social group that researchers had had little interest in, and that workers were now striking back,” Hansen says. More than man, manure and metal Norwegian social scientists interviewed people in various working professions in Norway for the book. They were looking to find out if any of the political power that the working class once had remains. Some have gone further than just doing an interview. Julia Orupabo, a researcher at the Institute of Social Research, is one of the researchers who contributed to the book. For almost six weeks she worked as a volunteer in two nursing homes. She did this to try to see the world from the vantage point of a group that has rarely been researched – that of health care workers. “When we think about the working class, we often think of male industrial workers – man, manure and metal. We know less about skilled workers who work in female-dominated professions,” she says. The number of industrial workers has decreased. But that doesn’t mean that the working class is gone, according to the editors of the book, Hansen and Jørn Ljunggren. It’s just become more diverse. Many workers are first- or second-generation immigrants. And many of them are employed as care workers. These are the people Orupabo has met. At the bottom of the social ladder Two other social scientists, Håvard Helland and Ljunggren, have analysed the status of 34 professions in Norway. The study is based on a large survey on status and trust in the Norwegian population. Doctors, judges, professors, lawyers and engineers are at the top of the social ladder. At the bottom are cleaners, taxi drivers, shop employees, postmen, day care assistants and hairdressers. The answers undoubtedly show that working class occupations hold a lower status than other jobs in Norway’s so-called egalitarian society. This largely coincides with what researchers find in other countries. In recent years, a great deal of political attention has been paid to the importance of vocational topics. Yet, the researchers in this analysis show that people who have occupations requiring higher education and students who want to do such jobs give the vocational occupations very low ranking on the status ladder. The researcher found no indication that vocational subjects gained any increased status. Don’t feel recognized “The established understanding is that different jobs have different status, despite the fact that we’re concerned with equality in Norway,” says Sabina Tica. Tica is a PhD candidate in the Department of Sociology and Human Geography at the University of Oslo and has studied occupational groups that are low in the status hierarchy, specifically hairdressers and shop employees. When Tica asks them how they think the rest of society ranks their jobs, they place themselves quite far down this hierarchy. “When we talked about how it should be, they highlight other status criteria and place themselves higher on the ladder. They emphasize the value of their jobs and that they’re competent people who do an important job for society,” she says. But they don’t necessarily feel that they get that much recognition from society for the work they do, says Tica. Customer contact is rewarding Yet store employees and hairdressers still find the customer contact very rewarding in everyday life. “They highlight their workplace as an important social arena that means a lot, especially for people who are a little lonely,” says Tica. This is particularly pronounced in more rural areas. There, hairdressers and store employees experience having more customer contact than in the cities, where efficiency is more of a priority. By emphasizing the carer aspect of their profession, they find pride in what they do, Tica believes. One hairdresser says: "I think it's a very exciting job, really. I talked to someone in town, and she said that a hair appointment should be something you could get a blue (reimbursable) prescription for. Because you can come here and get yourself fixed up and stuff and then you feel much better. So I would say I do have professional pride, because you can have such an impact on a lot of people's lives.” Invisible health professionals By spending time with health professionals over time, Orupabo managed to capture some of their everyday experiences and small details that aren’t so easily conveyed through interviews. She experienced a lot of what she saw in the everyday work of nursing home life as frustrating and painful. “To a great extent I experienced that the voice of the health care workers, the people who work most closely with the elderly, wasn’t heard by nurses and doctors,” says Orupabo. In a field note from the study, she wrote about the overlap from day shift to evening shift. She observed that only the nurses talked to each other. "…they look only at each other and their bodies are turned away from the health care workers and assistants. Only when the nurses are finished and the meeting is coming to an end do they look at the others and ask if they have anything to add. If a health care worker takes the floor, it’s usually too late. The concentration and calm that characterized the meeting is over. Nobody listens.” Orupabo thinks it’s too easy to look at the working class as one homogeneous group. There are big differences within this group, and they have different possibilities for forming a force against those farther up the hierarchy. Some of the health care workers she studied protested loudly, clearly stating when they found demands to be unreasonable or that important needs of the residents were not listened to. But the majority didn’t, she believes. “The staff who raised their voices were primarily carers who had safer positions at work. They either had a majority background or were descendants of immigrants. But the ones who spoke up weren’t heard either. They were often ignored and to some extent also sanctioned, she says. Several researchers have claimed that the time of the workers' struggle is over and that the new working life has created obedient workers who just comply. Orupabo experienced something different. Even staff members who didn’t dare to speak out found ways to resist – in secret. They tried to gain control of their everyday lives through what the researcher calls “everyday resistance.” For example, they might throw away dirty cloths instead of washing them. They don’t log everything the manager tells them to. They sneak out for a smoke. “This backroom resistance, the kind that isn’t punished because management doesn’t see it, contributes to creating a little bit of space in a highly regulated and detail-controlled workplace,” she says. “Even if the resistance doesn’t change their work conditions, it helps make everyday life a little more liveable. It creates spaces where they can define their own rules and makes the job a little less stressful.” Many part-time employees At the nursing homes where Orupabo worked, many of the positions were very part-time and the part-time staff were juggling two or three positions at a time. Some first-time immigrants also had their contract linked to their residence permit. “That creates completely different conditions for offering resistance. Immigrants aren’t being passive because of their culture and values, but because their working terms are completely different,” she says. Left with a feeling of frustration Orupabo says she was left with a sense of frustration following her weeks in the nursing homes. She believes all the silent, small details of care disappear when health care workers are made so invisible. “Examples might be taking time for the small important details like telling a patient what will happen before performing an operation, or closing the curtains when you do personal care for a patient. The combination of lack of time, low workplace connection and the invisibility of their professional role, creates poor conditions for health workers’ autonomy and competence. It also provides poor conditions for their ability to follow up individual patients, Orupabo says. She believes that capable workers aren’t able to stay in this kind of situation for very long. They’ll look for other work opportunities – and the health service thereby loses valuable competence. But many health care workers have no choice. They just have to stick it out and carry on with their everyday resistance. Translated by: Ingrid Nuse. Jørn Ljunggren and Marianne Nordli Hansen (eds.): Arbeiderklassen [The working class], Cappelen Damm Akademisk, 2021.
<urn:uuid:20d2bed7-f9d2-412b-889a-308b89b342f5>
CC-MAIN-2022-33
https://sciencenorway.no/media-social-studies-sociology/almost-half-of-us-belong-to-the-working-class-but-workers-have-become-more-invisible-researchers-say/1826893
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00075.warc.gz
en
0.968842
2,103
2.765625
3
Ed by removal from the Cu(I) dashed lines), is quantitative. Subsequent ring WZ8040 web closure by Williamson ether synthesis followed by removal from the Cu(I) template ion with KCN affords the target catenanes in 42 yield. template ion with KCN affords the target catenanes in 42 yield.In this context, we describe herein a brief overview of mechanically linked artificial 2. Interlocked Photosynthetic Models Decorated with Porphyrins as Electron Donors photosynthetic models assembled by transition metal template methods. You can find a and Acceptors considerable variety of D-A interlocked photoactive systems reported within the literature that haveSauvage’s group was templateto realize the potential of investigating rotaxanes and been prepared in the very first synthetic methodologies depending on the formation of catenanes as interactive scaffolds to organize electron donor cceptor moieties in artificial secondary interactions besides coordinative bonds. These operates are beyond the scope photosynthetic models. In their pioneeringhistorical point of view, briefly describing the of this account. The text is organized within a functions , a big family of photoactive rotaxanesstrategies to assemble the photoactive interlocked systems, followed by a dissynthetic was synthesized and their photophysical properties were investigated. To illustrate Sauvage’s pioneering properties. synthesis, dynamic by no signifies a critique of the cussion of their photophysical operates, the The present text is and photophysical properties of rotaxane 1 will be discussed right here (Figure 2) . Rotaxane 1 was developed to field. a field, but rather a quick account with illustrative examples of important advances inside the have cationic Au(III)porphyrinate group (AuP) as to many fantastic operates that have been For substantial testimonials, we direct the reader the electron acceptor, which was covalently attached toin the literature [1,24,31,36,568]. while the two Zn(II)porphyrinate stoppers published the ring element from the rotaxane, (to stop dissociation with the rotaxane upon removal of your Cu(I) template ion) have been the electron donors. The synthesis of rotaxane 1 was achieved from an Scaffold Library site adaptation on the two. Interlocked Photosynthetic Models Decorated with Porphyrins as Electron Donors original Cu(I)-metal template synthetic strategy (Figure 1) and relied on the “gathering and and Acceptors threading” effects promoted by the Cu(I) ion template. Accordingly, a dialdehyde phenSauvage’s group was the initial to comprehend the potential of investigating rotaxanes and based stringlike fragment was threaded through a previously ready phen-containing catenanes as interactive scaffolds to organize electron donor cceptor moieties in artifi- ring with all the appended AuP group to quantitatively kind the entwined [Cu(phen)two ] cial photosynthetic models. In their pioneering performs , a sizable loved ones of photoaccomplex that is definitely also called pseudorotaxane. Lastly, the two ZnP units had been ready tive rotaxanes was synthesized and their photophysical properties have been investigated. To simultaneously by reaction amongst the aldehyde functionalities around the thread component illustrate Sauvage’s pioneering operates, the synthesis, dynamic and photophysical propof the pseudorotaxane and dipyrromethane under acidic conditions (17 yield), followed erties of rotaxane 1 might be discussed right here (Figure 2) . Rotaxane 1 was made to by metalation on the free-base porphyrins with Zn(OAc)two , to afford rotaxane 1 (82 yield). have a cation.
<urn:uuid:3cef1e54-4b0f-4f58-8330-034c7a02266f>
CC-MAIN-2022-33
https://amparinhibitor.com/2022/08/03/5718/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00679.warc.gz
en
0.918159
811
1.679688
2
Strategic planning is needed to prevent further crises in Ukraine Ukraine’s gas deal with Russia is unsustainable. Here are three steps the EU should take to avert the looming disaster. The gas is now flowing. A ten-year deal has been struck. The energy relationship between Ukraine and Russia will now be based on market prices. And so, while it may have taken three weeks of gas disruptions for Ukraine and two for Europe, Kiev and Moscow have finally reached a settlement that could transform a difficult relationship. That is the optimistic picture; it is also wishful thinking. The likelihood is that the respite will only be temporary and that the crisis, rather than going away, is now assuming a different and dangerous form. The agreement to apply European prices to gas sold to Ukraine will, if enforced, destroy the Ukrainian economy. The country is the world’s sixth-largest gas consumer and was barely able to pay for gas supplied last year at a nominal cost of $179.50 per 1,000 cubic meters. Under the deal, that figure will double immediately, because the pricing formula reflects oil prices six months ago. Of course, oil prices have since plunged and that, plus an initial 20% discount, should mean that Ukraine’s average price this year will be just $200-240. But even at that price, Ukraine will be unable to pay. It is already feeling the full force of the global economic crisis and the collapse of commodity prices. Gross domestic product (GDP) was down by more than 14% in November on a year ago; industrial production fell 24% in the last quarter of 2008. Even before the price of oil rises again and the full impact of this deal is felt, Ukraine’s economy is being mauled. Inevitably, Ukraine’s national energy company Naftogaz will start once again to build up debts to Russia’s Gazprom and a new crisis will begin, with Gazprom again threatening to cut off Ukraine’s supply of gas. And at that point the factors that drove this winter’s crisis will come into play: the tension between Ukraine’s desire to follow a non-Russian path of development towards the West and Russia’s desire to keep Ukraine in its sphere of influence. This is a direct sequel to Russia’s five-day war in Georgia in August. Sergei Lavrov, Russia’s foreign minister, put down a marker in early 2008 saying that Russia would “do everything possible” to prevent NATO membership for Georgia and Ukraine, the quickest route for them to move ‘Westwards’. To achieve that, Russia will continue to seek control of the strategic prize in Ukraine – the country’s gas infrastructure. This is not only vital to Ukraine’s national security, but also its biggest lever over Russia. If the EU wants to continue receiving gas through Ukraine, it needs as a matter of urgency to take three steps. Firstly, it should establish an EU-backed payment mechanism that would allow Ukraine to build up debt in Europe rather than Russia when it cannot pay for gas. Secondly, it should help Ukraine reduce its appalling energy inefficiency (its energy intensity is twice that of inefficient Poland). Thirdly, it needs to provide Ukraine with the incentives – and the means – to clean up its notoriously opaque energy sector and finally design a national energy policy that would develop more of Ukraine’s relatively abundant hydrocarbon resources, reduce gas dependency on Russia and eliminate the biggest source of corruption in the Ukrainian economy. These are vital investments in Europe’s energy security that will allow EU countries to stabilise energy relations with Russia and safeguard the security of Ukraine. The recent crisis has revealed the EU to be lacking this level of strategic thinking, not to mention the political will to deal with Russia. It needs to muster courage and willpower, because a disaster looms in Ukraine. John Lough is a senior adviser specialising in Russian and Caspian energy issues with BGR Gabara, a London-based consultancy firm.
<urn:uuid:c1e74fbb-a595-4d37-8186-e3a1dbb4c048>
CC-MAIN-2016-44
http://www.politico.eu/article/strategic-planning-is-needed-to-prevent-further-crises-in-ukraine/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720972.46/warc/CC-MAIN-20161020183840-00250-ip-10-171-6-4.ec2.internal.warc.gz
en
0.945227
836
1.9375
2
There’s a growing market for lawyers with expertise in Islamic banking and finance, but just what place can Shariah law have in Australia?To some Westerners, the term Shariah law conjures There’s a growing market for lawyers with expertise in Islamic banking and finance, but just what place can Shariah law have in Australia? To some Westerners, the term Shariah law conjures up some negative connotations. Some might point to the punishment of amputation that common thieves could receive in some jurisdictions, the punishment of stoning to death for married individuals who commit adultery, and floggings for unmarried men and women who engage in sexual behaviour. However, the reality is that for many Muslims living in common-law based societies, simple everyday matters like financial transactions can be extremely difficult to navigate in a way that respects the laws of their religion. Internationally, The Banker magazine recently found that there would be a need for 50,000 Shariah law experts to advise on Islamic banking and finance matters within the next 10 years. Meanwhile, according to Latrobe University, there are more than 260 Islamic financial institutions operating across the globe managing assets worth more than $500 billion - that's a massive jump from the $8.5 billion the community held less than 30 years ago in 1985. And according to Celent, a research division of Oliver Wyman, Islamic banking is growing across the world at an annual rate of 10 to 15 per cent. Shariah law in Australia In recent months, the idea of Shariah law in Australia has gained considerable credence. Just last week, a Melbourne-based lawyer told Lawyers Weekly about his proposal for a Shariah law-based mediation centre in Victoria. Hyder Gulam, a senior associate at Logie-Smith Lanyon Lawyers who proposed the idea, said it emerged from a paper he co-wrote with barrister Simon Lee for Muslim publication, Crescent Times. But exploring the notion of a Shariah-based mediation centre in Australia was a hypothetical some media outlets immediately picked up on, suggesting Gulam was slating something that appeared quite unsavoury to the wider Australian population - a Shariah court in Australia. “There were Imams from Brisbane and Sydney mosques, as well as people coming from overseas – Saudi Arabia, Pakistan, Indonesia – they all want to know what’s going on in Australia on Islamic banking and finance” However, Gulam instead came to the conclusion that a Shariah court would only be possible in the sense of a dispute resolution service, using concepts of mediation and conciliation. He says his paper was designed to be an open discussion on how a Shariah-based mediation service could work locally, adding that he hoped the paper would provide the groundwork to approach government for funding in order to scope out the idea further. "We basically asked, if you were going to have a Shariah court here, hypothetically speaking, firstly, would it be possible, and if it were possible, how would it be set up?," he says. "We got to the point where we said, 'It's probably not feasible to have a Shariah court.' There are too many obstacles - especially the lack of understanding of what Shariah law actually is." Gulam instead came to the conclusion that a system of mediation and conciliation based on Shariah principles might be possible. He says that while many people immediately assume that such an idea would only deal with family law, as a corporate lawyer, he believes its main objective would be to serve the corporate dispute needs of the Muslim community. "So how do you deal with partners or directors of Muslim-based companies that are in dispute," he says. Gulam explains that the current means for disputing parties to solve issues via Shariah principles is to go to Imams in the community. "These guys have been very good but they don't have proper mediation training and secondly, they don't have a good understanding of Australian law," he says. While Imams could still be involved in a Shariah-law based mediation service, Gulam believes they should also receive legal and mediation training in order to better settle disputes. The role of law firms Meanwhile, some law firms are also realising the need to house experts in Islamic banking and finance laws. Macpherson+Kelley (M+K) recently announced that they have established one of the country's first Islamic finance funds by working with the Muslim Community Cooperative of Australia (MCCA). Gerard Kennedy, a principal at M+K, says the move was made in a bid to address some of the difficulties the Muslim community faced in ensuring its financial needs in a Western society were compliant with Shariah law. With few options for the growing Islamic community in Australia to access financial arrangements that comply with Shariah-based principles and that also meet the legislative needs of the Australian financial system, Kennedy set about finding a solution that could help. "The demand was big; [the Muslim community] needed to be able to access money in Australia through the Western banking system which, of course, involves interest," he says. "It took a lot of thinking by me to create an idea which would be palatable to the Islamic community as far as using Western money is concerned - and having it accepted under Shariah law." A place for education Identifying the increasing need for Shariah law experts in Australia and across the globe, some local universities have responded with education programs. At Latrobe University, Dr Ishaq Bhatti has this year established a Masters of Islamic Banking and Finance. He says the idea emerged from a symposium on Islamic banking and finance that the university held earlier this year, which resulted in delegate numbers that far exceeded expectations. "We had law firms, government organisations, academics, postgraduate students and universities queuing up," he says. "There were Imams from Brisbane and Sydney mosques, as well as people coming from overseas - Saudi Arabia, Pakistan, Indonesia - they all want to know what's going on in Australia on Islamic banking and finance." Bhatti believes that opportunistic lawyers will attempt to gain the knowledge they need in order to fill the emerging gap in experienced professionals in Islamic banking. "At the moment, banks are hiring people from non-Islamic banking backgrounds, and they cannot produce a financial product which is ethically [sound to Muslims]," he says. "These finance experts are trained in conventional finance areas and don't care about the risk between the buyer and the lender, the need for sharing." Bhatii adds that by training lawyers and finance experts locally, Australia can seize on the opportunity of Islamic countries looking to Australia given the country's performance during the global financial crisis. "There are a lot of foreign delegates coming here, that's why Australia is such a great place to offer a course like this," he says. A controversial idea There's no doubt that the suggestion that Shariah law has a place in Australia causes controversy. However, usually the strong emotions arise as a result of coverage from media outlets that sensationalise the issue, and forums and message boards that are simply ignorant to the suggestions being made. The reality is that already, there are certain elements of Jewish and Christian laws that already have a place in Australia. Gulam says given the Jewish and Christian examples, why can't something exist for Muslims also? "There is no reason why the Muslim community can't have something like this as well, but [referring to his mediation service proposal] we need to obviously do an appropriate study and get some government support behind this as well," he says. Gulam adds that the government could draw a number of wins by getting involved. "One is that it shows the community that the government is working with them, and that's a big ticket because it shows that there is some sort of legitimacy, it's not just the 'long-bearded bloke, Imams,' running this thing, but that it has some credence and credibility with the government."
<urn:uuid:c18bb3a0-ea5e-4c8c-a11e-c9ab11960fc5>
CC-MAIN-2022-33
https://www.lawyersweekly.com.au/biglaw/5387-when-religion-meets-the-law-shariah-law-in-austral
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00267.warc.gz
en
0.977088
1,660
1.703125
2
Entry updated 25 July 2022. Tagged: Author. (? -? ) French author of Descente en Angleterre ["The Raid on England"] (1798), a very early example of the Future-War Invasion tale, here conceived in dramatic form, apparently farcical; any close resemblance to the much later Battle of Dorking mode is unestablished. [JC] - Descente en Angleterre, prophetié en deux actes et en prose ["The Raid on England: A Prophecy in Two Acts and Prose"] (Paris: no publisher given, 1798) [play: first performed 1797?: binding unknown/] previous versions of this entry
<urn:uuid:edcad879-71a2-4cdf-84ab-985db828f516>
CC-MAIN-2022-33
https://sf-encyclopedia.com/entry/mittie_jean-corisandre
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00071.warc.gz
en
0.774288
164
1.835938
2
It is the era of high speed internet, social networking, mobile phones and computers. It is the era when you can communicate with your loved at a click of a button. Infact it was never so easy to communicate with your loved ones. You can now video chat with your friends and family and that too without paying a penny. With high speed internet available on computer and mobile phones and with all these devices having a camera – you can make make Free Video Calls – both on computer and mobile phones. You can make video calls from your smartPhone if it has : - phone has to be a smartPhone – Android, Windows, iOS, Nokia, Blackberry etc - high speed internet - video calling application for your mobile phone Making video calls from mobile is possible, still a lot of people prefer making video calls from computer itself (laptop/desktop). In this article we will look at how you can make video calls from your computer for free. You may be living too far from your mom (may be in another country), but you can actually video chat and see your mom and the feeling will be amazing. Requirements for making video call from computer: Off course you need a computer (laptop or desktop), high speed internet, camera, microphone (it may be inbuilt in your laptop/desktop) to make that video call. If you are using unlimited internet plan (or a cheap internet plan), then your actual video call cost is free. The data consumed in a video call is very less and thus the cost is effectively zero. How to Make Free Calls using Computer Applications - Install Video Call Application -: Many voip providers offer a software (app for computer) which allows you to make video calls. Below is a compiled list of applications which offer video calls from your computer. - Ask your friend to install the same voip application in his smart phone/computer -: All of these apps offer video calls to a person who is using the same app. Consider it like this – you can message your facebook friend from your twitter account. In short, you both need same app (it does not matter if you two are using different devices). That work’s ! - Add your friend as contact -: Some app do not require you to explicitly add your friends as your contact. It scans your address book and automatically finds your friends. Some apps explicitly asks you to add contact (Like Skype). - Call your friend (assuming he is also connected to internet) and video chat for as long as you like. App Review Link: http://voipnina.com/tango-review-free-video-calls-from-mobile-phone/ App Download Link: http://www.tango.me/download_pc.php Tango offers free video calls from computer, Android, iPhone and Windows Mobile. Its a widely popular app with more than 600 million downloads. It also offers free voice calls and text messages. The video call quality is also good, so its a must try from my side. App Review Link: http://voipnina.com/skype-reviews-look-at-all-skype-features/ App Download Link: http://www.skype.com/en/download-skype/skype-for-windows8/ Skype is one of the most widely used voip service for making video calls. It has application for computer, android, iPhone, Blackberry and windows mobile. Most of your friends may already be using Skype app so making calls is easy and free. The video call quality is also pretty great. It also offers free voice calls and text messages. Its a must try app. App Review Link: http://voipnina.com/viber-review-free-calls-sms-video-calls/ App Download Link: http://download.viber.com/desktop/windows/ViberSetup.exe Viber is one of the most used voip application available for all mobile platforms. For computer, Viber also offers free video calls to other users. The call quality is also very good (HD calls are offered). You can even transfer ongoing calls between devices. It also offers free voice calls and text messages. Its a must try app. Infact almost all of your friends may already be using it, so if you use it on your PC then you will be able to call them on their mobile from your PC for free. App Review Link: http://voipnina.com/google-hangouts-review-make-free-group-video-calls/ App Download Link: http://www.google.com/+/learnmore/hangouts/index.html One of the best way to make video calls is to use Google Hangouts. The good thing is it is available for computer (windows PC with help of chrome extension) and most types of mobile platforms which means that you will be able to video call with almost all your friends (assuming they have installed Hangouts on their mobile device). Moreover the call quality is also pretty decent and it offers free group video calls as well (which is a premium feature in Skype). On this PC version, Hangouts offer much more advanced features like desktop sharing (for free).
<urn:uuid:cb4813cf-6373-491e-adb6-569b8314bb5d>
CC-MAIN-2017-04
http://voipnina.com/free-video-calling-apps/computer-pc/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00512-ip-10-171-10-70.ec2.internal.warc.gz
en
0.926199
1,094
1.671875
2
Ninety miles from the South Eastern tip of the United States, Liberty has no stead. In order for Liberty to exist and thrive, Tyranny must be identified, recognized, confronted and extinguished. That globe must be flexible or there is no way she could get her head inside it. unless that put it on her as a child and she grew into it. That would make eating and washing her hair difficult.
<urn:uuid:3adb6b02-eed7-4a5e-87f6-2af4180235f1>
CC-MAIN-2017-04
http://ninetymilesfromtyranny.blogspot.com/2016/01/vintage-sci-fi-bounty-hunter.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00237-ip-10-171-10-70.ec2.internal.warc.gz
en
0.983091
83
1.640625
2
Udemy Free Coupon Course | Go From Beginner to Proficient! Learn the Essentials of Adobe Creative Cloud 2020: Illustrator, Photoshop, InDesign & XD. What you’ll learn - People will learn all of the essentials to become proficient in the four Adobe Design Programs. - People will need to have access to Adobe Illustrator, Photoshop, InDesign and Adobe Xd This course is made for students who would like to learn the essentials/basics of the primary Adobe design applications. Although not fancy, these pages are informed by over ten years of using these applications (and their predecessors) daily. The way this course teaches the applications is by introducing and explaining them in a logical way that builds upon what was previously learned. These applications present a puzzling array of buttons and gadgets that most often is overwhelming to the new user. This course makes sense of it all, not showing how everything works, but instead laying a foundation and a path to learn about all those confusing buttons and gadgets. The steps in this course look a bit like tutorials. Like tutorials, you should work in the applications as you follow along with the course, even when not specifically instructed to do so. Unlike tutorials, the steps in this course present the information in a way that is geared to having you actually learn the material, not just a list of steps to get something that looks decent. This course is made for Adobe Creative Cloud (2020 versions), but it can easily be used for versions CS4 through CS6. The properties panel is the only thing that has changed in the basics material presented here. If you are using multiple versions of Illustrator or InDesign you will need to save files in a way you can open them in the other version. A quick Google search will point you to how this is done. - Students looking for an affordable course to learn the essentials of these four powerful Adobe Design programs. Category: Design, Design Tools, Graphic Design Instructor: Captivate Learning Group 94.99 Free (Udemy 100% off coupon code) ENROLL NOW
<urn:uuid:a55788be-ed76-4afa-9ed1-7a66e33a1ca0>
CC-MAIN-2022-33
https://freecoupondiscount.com/udemy-coupons-adobe-essentials-2020/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00269.warc.gz
en
0.922397
439
1.796875
2
Engines — Elizabeth Ginns Britten, Capt. Ken Kreisler, and Capt. Patrick Sciacca 2004 Engines Preview |Diesels: Volvo Penta| Volvo Penta has three new engines for 2004: the 130 and 160 hp D3 inboards for smaller applications, the D4 DuoProp, and the D6 DuoProp; all three meet 2006 emissions standards. The lightweight (683 pounds), all-aluminum D3 is a five-cylinder engine that features vertical dual-inlet manifolds, electronic controls, common-rail fuel injection, and a variable-geometry turbocharger that generates output as needed, enhancing acceleration, performance, and fuel efficiency. Volvo Penta claims that the engine’s performance is actually better than that of a four-stroke outboard and that no other diesel compares with it. It comes in two power ratings: 130 and 160 hp. The four-cylinder D4 and six-cylinder D6 in-line diesels feature Electronic Vessel Control (EVC), which integrates engine control, instruments, and accessories into one system, and Volvo Penta’s common-rail fuel-injection system, which increases performance and fuel efficiency while reducing emissions and noise. Both engines are compact; the D4 measures 36.7"x29.9"x30.7", with an output of 210 hp and a maximum rpm of 3500. In terms of performance, the company says the “D4 is similar to a V-6 gasoline-powered engine, while the external dimension is comparable to a V-8.” The larger and more powerful D6 measures 46"x29.9"x30.7" and has a 310-hp output at a maximum rpm of 3500. Both are available with DuoProp drive or as inboards with hydraulic transmissions. Volvo Penta Phone: (757) 436-2800. www.volvopenta.com. Next page > 2004 Engine Preview: Yanmar > This article originally appeared in the December 2003 issue of Power & Motoryacht magazine.
<urn:uuid:936eefb3-cb31-423a-a34d-7b82f33df9b8>
CC-MAIN-2017-04
http://www.powerandmotoryacht.com/engines/2004-engine-preview-page-16
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00536-ip-10-171-10-70.ec2.internal.warc.gz
en
0.888393
440
1.601563
2
The Irish name for Ballytrasna is An Baile Trasna Ballytrasna is on Logainm.ie: Ballytrasna. It is located at 51° 53' 50" N, 8° 20' 48" W. Ballytrasna has an area of: Nationwide, it is the 16638th largest townland that we know about Within Co. Cork, it is the 1696th largest townland Ballytrasna borders the following other townlands: Curious to see who lived in Ballytrasna in the past? Maybe even seeing scans of their handwritten census returns? Ballytrasna was added to OpenStreetMap on 8 Apr 2016 by Stephen_Co_Antrim.
<urn:uuid:8c0b5612-bd17-4da0-84b6-3a56fdb25b93>
CC-MAIN-2022-33
https://www.townlands.ie/cork/barrymore/little-island/caherlag/ballytrasna/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00077.warc.gz
en
0.96965
164
1.953125
2
US Club Soccer has clarified the following implementation guidelines for U.S. Soccer’s Recognize to Recover Player Safety Campaign, specifically as it relates to concussion initiatives and heading for youth players: - The Federation is recommending, and US Club Soccer is requiring immediately, new rules as it relates to heading, as follows: - Players in U-11 programs and younger shall not engage in heading, either in practices or in games. - Limited heading in practice for players in U-12 and U-13 programs. More specifically, these players shall be limited to a maximum of 30 minutes of heading training per week, with no more than 15-20 headers per player, per week. - Clubs should be aware of circumstances in which individual consideration is needed. For example: - A 10 year old playing at U-12 or older should not head the ball at all. - An 11 or 12 year old playing at U-14 or older should abide by the heading restrictions in practice. - Referees should enforce these restrictions by age group according to the specified rules. Referees will not be assessing the age of individual players on the field; they will enforce the rules for the age group. - Leagues and organizations are free to set their own standards, as long as the minimum requirements outlined above are met. - In adherence to these new requirements, referees have been instructed by U.S. Soccer of the following rule addition: When a player deliberately heads the ball in a game, an indirect free kick (IFK) should be awarded to the opposing team from the spot of the offense. If the deliberate header occurs within the goal area, the indirect free kick should be taken on the goal area line parallel to the goal line at the point nearest to where the infringement occurred. - Modified substitution rules also took effect Jan. 1, 2016, as follows: Any player suspected of suffering a head injury may be substituted for evaluation without the substitution counting against the team’s total number of allowed substitutions during the game. - US Club Soccer strongly recommends that all coaches, staff members, parents and players watch U.S. Soccer’s concussions in soccer overview video. RECOGNIZE to RECOVER is U.S. Soccer’s comprehensive player health and safety program aimed at promoting safe play and reducing injuries in soccer players of all ages. Click here to view US Soccer’s Concussion Initiative video. SJSL follows all of the relevant regional and national concussion protocols. As indicated on the appropriate seasonal Fact Sheet: If a player is suspected to have a head injury, the referee must stop play to allow for treatment or evaluation. A player with a suspected head injury may NOT return to the game unless a medical doctor clears the player following appropriate guidelines. If a coach or parent insists on returning the player to the field without such clearance, the referee will signal the end of the game.
<urn:uuid:cd04ad39-0f81-4859-9e3e-b7a6690b2c89>
CC-MAIN-2022-33
https://next.sjsl.org/concussion-awareness/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00277.warc.gz
en
0.941254
602
2.171875
2
About E. coli Blog Ruling steams raw milk farmer Oregon law prohibits raw milk to be sold to the public, but allows it to be sold as a pet food product. The Oregon Department of Agriculture is, however, has decided that raw milk is even dangerous for pets, and has passed a decision banning the sale of it in that form, according to Jim Redden of the Portland Tribune. Organic Pastures Dairy, which distributes the unpasteurized milk for pets through stores such as Whole Foods Markets, has been told that his product can no longer be sold in the state of Oregon in any form, pet or otherwise. The ban comes shortly after the E.coli outbreak in Washington, where raw milk tainted with E.coli sickened nearly 25 people. Mark McAfee, who runs Organic Pastures Dairy, has requested a hearing on the new interpretation of the law, but it has been denied.
<urn:uuid:c33f907d-da79-48ae-ba20-1633b8ac052b>
CC-MAIN-2022-33
https://about-ecoli.com/blog/ruling-steams-raw-milk-farmer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00267.warc.gz
en
0.96865
191
2.375
2
Re: my chest hurt when i take a long breathe You should see a doctor. Chest pain when breathing deep can come from lots of different causes (some serious, some not) so you'll need a doc to figure out which one it is. Injury to a rib like a bone bruise or fracture, inflammation where the ribs meet the sternum, asthma, allergies and bacterial or viral lung infections can cause chest pain from breathing. If you have any shortness of breath or fever, get in to see your doctor right away or go to the ER. It might be pleurisy. (infection of the lung lining that often causes pain when breathing in)
<urn:uuid:75e02f1b-4f41-4b6d-bf15-c387c3b29176>
CC-MAIN-2017-04
http://www.healthboards.com/boards/general-health/672143-my-chest-hurt-when-i-take-long-breathe.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00438-ip-10-171-10-70.ec2.internal.warc.gz
en
0.903358
138
1.734375
2
|Time:||approx. 30 minutes or longer| |Recommended age:||from 12| |Size of group:||from 8 persons| |Time for preparation:||none| The game is similar to pictionary. Instead of drawing a word, the candidate receives a piece of paper and a pair of scissors. Now the player has to cut the given word (e.g. dog, cat, mouse, house, tree, sun etc.) from a piece of paper and hold it up. Will the group be able to guess which word has been cut out? for each guessed object one point [ © www.games4youthgroups.com ]
<urn:uuid:a06da642-1ae7-4b4c-b8af-3d49e458de02>
CC-MAIN-2017-04
http://www.games4youthgroups.com/mixed-games/Paper-tiger.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00393-ip-10-171-10-70.ec2.internal.warc.gz
en
0.889131
141
2.4375
2
Haggis: A Little History Besorgung - Lieferbarkeit unbestimmt BeschreibungWhat exactly is a haggis? In his Complete Dictionary of Etymology, Professor Skeat defines the haggis as a "dish commonly made in a sheep's maw, of minced lungs, hearts, and liver of the same animal".However, the haggis is much more than a mere meal. The haggis, or some version of it, may be found in the histories of countries as varied as ancient Greece, Sweden, and the United States. Yet the haggis is most closely associated with Scotland and has come to represent that country just as pasta represents Italy.Scotland may thank its beloved bard, Robert Burns, for this. Burns immortalize the dish in perhaps his best-known poem, "Address to the Haggis". In it, he refers to the haggis as the "Great Chieftan o' the Puddin'-race!" How far the haggis had cornel Originally a meal of the lower classes who could not afford to waste any edible portion of their livestock, the haggis mysteriously transformed into a delicacy deemed worthy of royalty. Queen Victoria, an enthusiast for most all things Scottish, said of the haggis, "I find I like it very well. Untertitel: Sprache: Englisch. Verlag: PELICAN PUB CO LA GRETNA Erscheinungsdatum: März 1998 Seitenanzahl: 60 Seiten
<urn:uuid:5225db4c-c3eb-4f41-a9b5-415a460478af>
CC-MAIN-2016-44
https://m.ebook.de/de/product/1674621/clarissa_dickson_wright_clarissa_dickson_wright_haggis_a_little_history.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718426.35/warc/CC-MAIN-20161020183838-00137-ip-10-171-6-4.ec2.internal.warc.gz
en
0.876185
335
2.96875
3
Protesters camped out at Governor Scott’s office By Roger Caldwell “We are here because Trayvon can’t be,” says 100 protesters camped out at Governor Scott’s office for 4 days. Our youth in America has always been the initial stimulus for fundamental change in the country, and the group Dream Defenders are following in the great tradition of political activism. On Tuesday July 16, 2013, fifty young people led by Philip Agnew, executive director of Dream Defenders occupied Florida State Capitol with a sit in, outside the governor’s office, and requested a meeting with Scott. At this meeting they were demanding that Governor Scott call a special legislative session seeking to change or repeal the “Stand Your Ground law.” The acquittal of George Zimmerman has angered and struck a chord of disbelief in the country and around the world, and has motivated our youth to take action. In the last two days the numbers have increased to over 100, and Governors Scott agreed to meet with the protestors on Thursday night around 9 p.m. A statement from the governor’s office said, “I asked to meet with the protestors this evening to personally hear their concerns following the jury’s verdict in the Zimmerman case. Tonight the protestors asked that I call a special session of the legislature to repeal Florida’s Stand Your Ground law. I told them that I agree with the Task Force on Citizen Safety and Protection, which concurred with the law. I also reminded them of their right to share their views with their state legislators and let them know their opinions on the law.” The youth are drawing a line in the sand and they are acknowledging with their occupation of the capitol, that they do not agree with the verdict and the law. “We are not here to retry George Zimmerman,” Agnew said during an afternoon rally. “What we are here to do is to express our anger, our angst, our disappointment at the state for what happened under his watch.” At this point there is a standoff and it appears that the youth are in this for the long haul. The country and the world are watching what happens to these courageous youth activists, and at this point they are locked up in the capitol, where they will spend the week-in. When Black and Brown parents and children do not feel safe in a state, after a jury makes a decision, something is wrong with the decision. When there are over 100 cities and thousands of people protesting the decision of a court, probably the statue and the judge made a mistake, and the task force was wrong. Many believe that the Zimmerman case was not about race, but a false assumption made by Zimmerman in a state with a long history of hatred, and racial profiling fueled the confrontation with Trayvon. The shocking outcome of the Zimmerman verdict is the reason the youth have taken over Florida’s State capitol. Our leaders can turn a blind eye to the injustice, or they can begin to have an honest conversation about justice, corruption, and the broken legal system in our state. There is an urgent need for the overhaul of the Stand Your Ground law, and with our support, our youth will not be moved.
<urn:uuid:7d0d6914-3b0c-4683-a49d-d06cf03a1a1e>
CC-MAIN-2017-04
http://thewestsidegazette.com/protesters-camped-out-at-governor-scotts-office/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00209-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964399
665
1.625
2
The National Institutes of Health (NIH)-State-of-the-Science Conference on Preventing Alzheimer's Disease and Cognitive Decline sought to review the available evidence and provide carefully reasoned recommendations. The preliminary draft statement of the conference panel found insufficient evidence to support any definitive recommendations to prevent Alzheimer's disease or the cognitive impairment related to advancing age. Equally disappointing was the conclusion that present diagnostic criteria for both Alzheimer's disease and cognitive decline lack the consensus necessary for uniform application and risk identification. Nonetheless, a number of promising predictors of both increased and decreased risk emerged. In addition, they overlap substantially with recommendations for the prevention of heart disease and stroke. As a result, the tentative prevention recommendations put forth by the Alzheimer's Association remain not only the best available but the most promising as well. |Original language||English (US)| |Number of pages||5| |State||Published - Jul 1 2010| ASJC Scopus subject areas - Psychiatry and Mental health
<urn:uuid:3157ed1a-f414-4467-b187-0f5dde854ef6>
CC-MAIN-2022-33
https://einstein.pure.elsevier.com/en/publications/prevention-of-dementia-and-cognitive-decline-notes-from-the-nih-s-2
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00468.warc.gz
en
0.892546
234
1.960938
2
- was trained as an Arabist and anthropologist at the University of Leyden, the Netherlands. - is an established expert on the Middle East who is frequently approached by radio and television for his views on issues concerning the Middle East, Arab culture and Islam. - is a lecturer with the Clingendael Institute, a think-tank and diplomatic academy based in The Hague acting for the benefit of both government and general public. - alternated his work as an expert on the Middle East with a career with Royal Dutch Airlines (KLM) from 1988 until 1996. He has served as consultant for departments where cultural awareness played a crucial role, like human resources, recruitment, marketing & sales, customer satisfaction and several - established his own company Leo Kwarten Middle East Consultancy in 1998. Combining his international business experience and his knowledge of the Middle East, he works with a wide range of international companies with operations in the Middle East. He delivers country specific business briefings for Arab countries, team building workshops for Arab/European management teams, and specific workshops for executives, negotiators and diplomats. - serves as consultant for oil companies and joint ventures with local partners in Libya, Qatar, Dubai, Syria, Egypt, Lebanon, Oman and Saudi Arabia. He is also active in the airline industry, food and beverages, logistics, transport, steel and petrochemicals. Some of his clients are Arab companies that want to gain further understanding of the western cultures they are dealing with - is a staunch believer in direct contact with primary sources. His work often takes him to the far corners of the Middle East. He has visited most countries in the region and frequently travels there.
<urn:uuid:ab5c32e9-eb45-46bf-aea6-137b9a88e636>
CC-MAIN-2016-44
http://leokwarten.com/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00519-ip-10-171-6-4.ec2.internal.warc.gz
en
0.967491
359
1.578125
2
This site allows you to create free flashcards, games, quizzes, and tests as well as a library filled with already created items from teachers. Learn more about the features of Quizlet here. Google Forms is a great way to receive data for pre and post assessments. You can choose from a variety of options when creating your assessment. Watch a video on how to get started with Google forms, or check out this site for more information. If you would like to see how Google Forms can be self- graded, learn more about Flubaroo here. Infuse learning provides a virtual response system that works with any device. Watch a video on how a teacher is using infuse learning in the classroom. There is also a guide to help you get started or watch a video on how to use it. Socrative is a smart student response system that empowers teachers to engage their classrooms through a series of educational exercises and games via smartphones, laptops, and tablets. Take a look at this video to learn more. Poll Everywhere is the the easiest way to gather live responses in any venue: conferences, presentations, classrooms, radio, tv, print — anywhere. This video will help you learn more about Poll Everywhere.
<urn:uuid:95e81338-e31a-4224-b498-0bbf4281cd1e>
CC-MAIN-2017-04
http://bedfordedtech.weebly.com/assessment-tools.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00411-ip-10-171-10-70.ec2.internal.warc.gz
en
0.939094
250
2.328125
2
Hosting and bandwidth provided by MacAce.net. To be notified of new Q&As, sign up for EveryMac.com's bimonthly email list. If you find this page useful, please Bookmark & Share What is Nano SIM? How is it different from Micro SIM or SIM? Which iPad models use a Nano SIM card? How do you cut down a Mini or Micro SIM card to the size of a Nano SIM? Nano SIM refers to the SIM (Subscriber Identity Module) standard used by the cellular capable iPad models: All iPhone 5 and later iPhone models use Nano SIMs, too. Nano SIM is the fourth version, or the "fourth form factor" (4FF) of the SIM standard and measures a mere 12.3 mm by 8.8 mm by 0.67 mm, but still holds the same amount of data as earlier SIM cards. Nano SIM is both smaller and approximately 15% thinner than the earlier Micro SIM (3FF) standard as well as the Mini SIM (2FF) cards that were ubiquitous for many years and people commonly refer to simply as SIM cards. Technically, the original SIM (1FF) card standard is the same size as a credit card and most people probably have never seen one in person. This diagram compares the relative size of each SIM standard: Photo Credit: Wikipedia (Justin Ormont) As you can see, the Nano SIM (4FF) reduces the size of the SIM effectively to the gold contact area and has just barely enough extra insulating "card" around it to prevent electrical shorts. Trimming a Mini or Micro SIM to Nano SIM These days, it is not difficult to obtain a Nano SIM card directly from a carrier. However, if it is more convenient for whatever reason, a Mini or Micro SIM also can be cut down to the Nano SIM size for use in the applicable iPad and iPhone models. It is quite possible to cut a Mini SIM or Micro SIM down to the Nano SIM size with a sharp pair of scissors or a razor blade and there are templates designed for individuals interested in doing so. However, given the particularly tight tolerances around the contact area on the Nano SIM, it is not surprising that the Internet is littered with comments from people who ruined their SIM card in the process of attempting to cut it down by hand. In theory, the cut SIM also should be "sanded down" to reduce its thickness, but many Mini or Micro SIM cards are thin enough already to fit in the standard Nano SIM carrier without the need to do so. Rather than take a great deal of time and risk destroying your existing SIM card by cutting it down by hand, EveryiPad.com strongly recommends purchasing a proper Nano SIM cutter. A Nano SIM cutter makes it easy -- line up the card correctly and press the handle. It's effectively the same process as using a handheld embosser and even if you consider your time to be unimportant, it costs about the same amount as messing up a single SIM card trying to cut it by hand.
<urn:uuid:c32ff9b9-ea08-4708-89f8-8d774e2366f2>
CC-MAIN-2017-04
http://www.everymac.com/systems/apple/ipad/ipad-faq/what-is-nano-sim-different-from-micro-sim.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00164-ip-10-171-10-70.ec2.internal.warc.gz
en
0.929022
636
2.125
2
University of Minnesota and University of Michigan, University of Michigan, University of Illionois at Chicago When last checked this resource was offlineOur automated link checker has alerted the folks responsible for the part of our site where this problematic link is referenced. If you have further information about the link (e.g. a new location where the information can be found) please let us know. The GeoWall project offers 3D scientific visualization tools to aid in the understanding of spatial relationships. The site provides details on the hardware specifications and software requirements for building and using projection systems which visualize the structure and dynamics of the Earth in stereo. The site also features various earth science data sets and links to web pages offering a number of practical applications and current uses of geowall, including lessons and laboratory activities. This description of a site outside SERC has not been vetted by SERC staff and may be incomplete or incorrect. If you have information we can use to flesh out or correct this record let us know. Part of the Cutting Edge collection. The NAGT/DLESE On the Cutting Edge project helps geoscience faculty stay up-to-date with both geoscience research and teaching methods.
<urn:uuid:030520f8-53c7-4f9b-9b8a-d2c3f02b48d5>
CC-MAIN-2017-04
http://nagt.org/resources/22707.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00473-ip-10-171-10-70.ec2.internal.warc.gz
en
0.898155
246
2.3125
2
EAST TEXAS (KYTX) -- "It takes a little while to get really good at it, get skilled with the knife." Kevin Lewis started working at Shoguns washing dishes, but wanted something more. "Throughout that entire time I was practicing, juggling the fork, spinning the spatula, all of that." Slicing, chopping and cutting up meats and vegetables might seem easy but this skill takes years of training. "We had a chef meeting, whether we should train him or not," Shoguns Operator and Owner Tae Park said. "It was odd, Caucasian man wanted to be a chef at Japanese steak house." At first there were a few negative comments. "It only made me want to step up my game, wanted to have the best food, a great show," Lewis said. "Just immediately put no doubt in customers mind that this white guy can do it." When you come back here you have to be part comedian, part showman, part chef, after all, all eyes are on you. From building onion volcanoes, to twirling utensils, Kevin has become one of the best Hibachi chefs. "I see him not just cooking, he actually cares," Park said. "You can give a chef same ingredients, same knife, utensils, same heat, come out different." And while Kevin says all Hibachi chefs have off-nights it just makes him want to try harder. "Got this one trick where I try to catch a lemon on a fork, gotten pretty good at it- that been the one that I'm trying to get down." So the customers have a great dining experience. "The difference between chef and cook is having the passion," Park said. "Or you're just feeding hungry people." The first Japanese steakhouse to open in the United States was a Benihana's in New York City in 1964. Ironically, this style of cooking was first tried in Japan in 1945 but the locals didn't care for it as much as the tourists.
<urn:uuid:ac20d9f4-0700-4ce6-8b27-9c131b29c85d>
CC-MAIN-2017-04
http://www.cbs19.tv/features/j-b-s-journal-japanese-steak-house-/266940724
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00540-ip-10-171-10-70.ec2.internal.warc.gz
en
0.98052
427
1.59375
2
A simple biography of the Sioux chief who worked to maintain the rights of Native American people and who led the defeat of General Custer at the Little Big Horn in 1876. About Randy T. Gosda See more books from this Author Published June 1, 2002 by Buddy Books. Biographies & Memoirs, History, Children's Books.
<urn:uuid:be01402a-b47f-43b8-afd0-23b9b5285af5>
CC-MAIN-2017-04
http://idreambooks.com/Sitting-Bull-First-Biographies--by-Randy-T-Gosda/reviews/168676
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00037-ip-10-171-10-70.ec2.internal.warc.gz
en
0.923021
74
2.453125
2
You are here Food delivery apps spice up Indian train journeys [MATHURA, India] Passengers on India's vast railway network have long complained of the terrible meals on offer to sustain them on long journeys, but a slew of new services bringing fast food to their seats is changing the way they dine. From Kentucky Fried Chicken to Domino's pizza and a host of local delicacies, today's train passengers have access to a vast array of hot dishes, all at the click of a smartphone app. For passenger Amit V, who has ordered a vegetarian curry dish to be delivered to his seat, the new services are a godsend after years of buying railway food that he says was often inedible. "This food is 100 times better than the railways food," the mathematics teacher told AFP as he prepared to board a train for the 19-hour journey from Mathura, a major rail hub in northern India, to his home town in the west of the country. It is all a far cry from what was on offer just a few years ago, when there were reports of cockroaches being found in dishes, and a leaked internal report said food was cooked in "dirty, smelly and waterlogged pantry cars". In one case, the samosas - a popular snack - were kept in a basket with cleaning mops. There is demand too for a greater variety of options, with customers craving international cuisine, fast food, as well as local fare. The new services are part of the process of modernising India's state-owned railway network, which carries around 23 million passengers a day. Asia's oldest rail network is a lifeline for India's 1.2 billion people, but is creaking from decades of neglect and chronic underinvestment. Last year the government announced a US$137 billion five-year modernisation plan that includes introducing free wifi in some stations in partnership with Google. Google says the service will cover 100 stations by the end of this year, with an eventual target of 400 - a further boost to online food delivery services. Last year Indian Railways invited major chains such as KFC to sign up to its e-catering service, which allows passengers to pre-order online or by phone for delivery at major stations. The next step will be to set up "base kitchens" in major stations to allow companies to prepare freshly cooked food for delivery on the trains, railway ministry spokesman Anil Kumar Saxena told AFP. A host of private entrepreneurs are also trying to tap the market, among them Pushpinder Singh, who founded TravelKhana (Travel Food) with his wife in 2012. The company signs up individual restaurants close to stations on busy routes, providing a delivery service for a fee. "There are around 5,000 long distance trains with an average journey of around 770 kilometres (480 miles), but only six per cent of them have a proper food service," Mr Singh told AFP. "This is the section we are targeting." The key to success is speed - delivery services have just a few minutes to track down their customers before the train leaves the station. At Mathura station, deliveryman Aman Singh Badhorie takes it all in his stride. Within two minutes he pushed his way through an overcrowded carriage to locate his customer's seat, delivered his order and taken payment, leaving him a full 60 seconds to disembark before the train pulls away.
<urn:uuid:38d411ba-9207-4a81-bf7c-cecad760f62a>
CC-MAIN-2017-04
http://www.businesstimes.com.sg/consumer/food-delivery-apps-spice-up-indian-train-journeys
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00335-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974275
710
1.84375
2
There are certain myths that are frustratingly resistant to evidence, science, and reason. Some of these are basically medical conspiracy theories, where someone (industry and/or big pharma and/or physicians and/or the government) has slam-dunk evidence for harm but conspires to keep it from you, the people. For example, despite decades worth of negative studies, the belief that vaccines are harmful, causing conditions ranging from autism to sudden infant death syndrome, to all varieties of allergies and autoimmune diseases, refuses to die. Fortunately, this myth is one that, after more than a decade of hammering by scientists, skeptics, and public health advocates, has finally taken on enough of the patina of a fringe belief that most mainstream news sources no longer feel obligated to include the antivaccine side in stories about vaccines for “balance.” It is a zombie myth, one that, no matter how often it is “killed,” always seems to rise again. Unfortunately, the same cannot be said for the myth that cell phones cause cancer, as some very credulous reporting late last week demonstrated in the form of headlines like this: - “Game-Changing” Study Links Cellphone Radiation to Cancer (Mother Jones) - Cellphone-Cancer Link Found in Government Study (WSJ) - Questions abound after study links tumors to cellphone radiation (Science) - Major US study links cellphone exposure to cancer — at least in rats (STAT) - “It actually has me concerned, and I’m an expert”: Major cell phone radiation study reignites cancer debate (Salon.com and Scientific American, the latter under a less inflammatory, but still overblown headline.) - Government study finds link between cell phones and cancer in rats (Yahoo! Finance and Consumer Reports - Massive government study concludes cell phone radiation causes brain cancer (NaturalNews) Yes, I know that NaturalNews.com is not a mainstream news site. Rather it’s a quack site run by Mike Adams. Just search this blog or my not-so-super-secret other blog for numerous posts about the contortions and abuse of science and medicine by Mr. Adams. I included his article, quite simply, to illustrate that some headlines from mainstream news articles on the study don’t sound all that different from Mike Adams. Also notice how many of these headlines leave out an important fact, namely that this study was not done with humans, but with rats. Let me show you what I mean. Here’s a quote from the Consumer Reports article: The results of this large, long-term study could dramatically shift the national debate over cell phone safety. The NTP’s website says that the results may be used by the Food and Drug Administration and the FTC in determining how best to protect consumers from the potential harms of radiation that comes from cell phones. The CDC might also consider reinstating the cautions it pulled from its web site. (We’ve reached out to the agency for comment, and will update our story once we hear back from them). Likewise, the cell phone industry may have to alter its stance. The wireless association trade group CTIA has maintained that cell phones are completely safe, and has fought to block San Francisco from passing laws that would require electronics retailers to notify consumers about the proper handling of cell phones. From Mother Jones: It’s the moment we’ve all been dreading. Initial findings from a massive federal study, released on Thursday, suggest that radio-frequency (RF) radiation, the type emitted by cellphones, can cause cancer. The findings from a $25 million study, conducted over two-and-a-half years by the National Toxicology Program (NTP), showed that male rats exposed to two types of RF radiation were significantly more likely than unexposed rats to develop a type of brain cancer called a glioma, and also had a higher chance of developing the rare, malignant form of tumor known as a schwannoma of the heart. After decades of denials and attacks by the media which called people concerned about cell phone radiation “tin foil hat-wearing conspiracy theorists,” a massive, multi-year study funded by the federal government now concludes that yes, cell phone radiation causes brain cancer. The study is published here and it’s entitled, “Report of Partial Findings from the National Toxicology Program Carcinogenesis Studies of Cell Phone Radiofrequency Radiation in Hsd: Sprague Dawley SD rats (Whole Body Exposures).” “The findings, which chronicle an unprecedented number of rodents subjected to a lifetime of electromagnetic radiation, present some of the strongest evidence to date that such exposure is associated with the formation of rare cancers in at least two cell types in the brains and hearts of rats,” reports Scientific American. To be fair, NaturalNews includes Adams’ usual conspiracy-mongering about vaccines, GMOs, and the like, linking them all to “government coverups,” but when you are a mainstream publication like Consumer Reports or Mother Jones and your headlines and much of your text are not that far removed from something published on NaturalNews, you are doing it wrong. As Matthew Herper put it writing for Forbes about the reporting on this study, “Yesterday’s cell phone cancer scare scares me a little about the future of journalism.” In fact, if you look at some of the stories linked to above, you’ll note that many of them include notes at the end mentioning something like, “This article was updated to reflect criticism of the study’s conclusions by outside researchers.” That’s the press jumping first and being forced to backtrack under reasonable criticism. Unfortunately, none of them seem actually to make it very clear specifically how the stories were altered in response to criticism, which is bad. Let’s take a look at some background, and then on to the study. A little background: The science of the cell phones-cancer link I can predict right now that someone will object to my starting this post by comparing the belief that cell phones cause cancer to the quack belief that vaccines cause autism, but I’m going to go one further. The idea that vaccines cause autism is actually more plausible than the idea that cell phones cause cancer—a lot more plausible. (Look for that sentence to be quote mined someday.) Moreover, I say this as someone who has criticized a physicist and famous skeptic for using a what I view as a simplistic “Cancer Biology 101” understanding of carcinogenesis to state that radio waves of the frequency used in cell phones cannot possibly cause cancer because of their low energy, which is very much insufficient to break chemical bonds in DNA, which is how many carcinogens cause cancer. I’ve even been criticized for perhaps being a little too open to the idea that radio waves can have significant biological effects that might even include causing cancer, and in one case I probably was. Still, from the standpoint of basic science, specifically basic physics and biology, the likelihood that radio waves can cause cancer is incredibly unlikely, or, as I like to put it, not quite homeopathy-level implausible but damned implausible nonetheless. Indeed, from a biological standpoint, a strong link between cell phone use and brain cancer (or any other cancer) is not very plausible at all; in fact, it’s highly implausible. Cell phones do not emit ionizing radiation; they emit electromagnetic radiation in the microwave spectrum whose energy is far too low to cause the DNA damage that leads to mutations that lead to cancer. While it is possible that perhaps heating effects might contribute somehow to cancer, most cell phones, at least ones manufactured in the last decade or so, are low power radio transmitters. It is also necessary to acknowledge the possibility that there might be an as-yet-undiscovered biological mechanism by which low power radio waves can cause cancer, perhaps epigenetic or other, but the evidence there is very weak to nonexistent as well. Basically, based on what we know about carcinogenesis, a postulated link between cell phones and cancer is highly implausible. In the absence of better basic science that nails down a heretofore-undiscovered potential biological mechanism by which exposure to radio waves could cause cancer, I have a hard time managing to muster any enthusiasm about recommending more studies than the ones that are already going on, particularly in light of various recent studies that we’ve examined that purport to find a link between cell phones and cancer but really do not, as described in these posts dating back to 2008, listed for your convenience if you want more in-depth information and discussion: - Cell Phones and Brain Tumors (Steve Novella) - Cell phones and cancer again, or: Oh, no! My cell phone’s going to give me cancer! (David Gorski) - Cell phones and cancer again, or: Oh, no! My cell phone’s going to give me cancer! (revisited) (David Gorski) - New Data on Cell Phones and Cancer (Steve Novella) - A Disconnect between cell phone fears and science (Lorne Trottier) - Critique of “Risk of Brain Tumors from Wireless Phone Use” (Lorne Trottier) - Are Cell Phones a Possible Carcinogen? An Update on the IARC Report (Lorne Trottier) - No, carrying your cell phone in your bra will not cause breast cancer, no matter what Dr. Oz says (David Gorski) - About that Cell Phone and Cancer Study (Steve Novella) In other words, as a skeptic who’s probably the most open-minded (perhaps almost to the point of my brains falling out) to the claim that cell phones cause cancer, I still consider the claim, on basic science considerations alone, so incredibly implausible as to be an incredible, albeit not quite physically impossible, claim. I base this opinion on a preponderance of evidence that shows that brain cancer incidence is not increasing, inconsistent cell culture and animal studies that suffer from publication bias and when considered in the context of Bayesian prior plausibility are in fact negative, several epidemiological studies that failed to find a cell-phone cancer link, and the fact that the only epidemiological studies that claim to find a cell phone-cancer link have come from one group in Sweden whose principal investigator is known for being an expert witness in lawsuits against mobile phone companies. Against that background, the background that journalists should have taken into account in writing about this study, let’s take a look at its results. The National Toxicology Program study: Design You will notice two points in nearly every story about this study, which was published at biorxiv.org. First is that the study was an expensive one. It cost $25 million. Second, it is frequently described with language like “one of the biggest and most comprehensive experiments into health effects from cellphones” and as “reigniting the debate” over cell phones and cancer. Personally, what I noticed about this study boiled down to two questions: How on earth can you spend $25 million on rat and mouse experiments? No, seriously. I do mouse and rat experiments myself in my lab, and, yes, they are expensive, but even with 90 rats per group, breeding rats, and repetitions I have a hard time figuring out how a study like this could cost $25 million. Hell, I could do a respectably large multicenter clinical trial for that much money. Indeed, I have a grant application in that proposes a reasonably sized pilot clinical trial for less than $2 million. I’m not saying that science isn’t expensive, but what’s going on here? My second question is this: Why was this release to the public instead of going through peer review first and being published in a decent journal? Basically, this is a report of a partial finding of a study not published in the peer-reviewed medical literature, with the report noting, “The findings in this report were reviewed by expert peer reviewers selected by the NTP and National Institutes of Health.” Something odd is going on here. As Matt Herper noted: This paper was different. It was published on something called bioRxiv, a server for scientific papers run by Cold Spring Harbor Laboratory. It’s modeled on similar servers used by economists and physicists to share papers quickly, without the cumbersome process of going through peer review at medical journals. This is already par for the course for economists and physicists, but news in those fields tends to dribble out to the public. For medical studies, news can come in a giant, crushing wave. After Microwave News released a story about the preliminary results of this study, according to Science the NTP investigators “decided to release the rat data before completing their analysis and writeup of the entire study, which isn’t scheduled to be finished until 2017, because of high public interest and the intriguing results.” See where that got them. This is one good reason why great care should be taken releasing preliminary results. What the NTP did borders on science by press release. Now let’s look at the design of this study. One thing I found odd about it was that exposure to cell phone radiofrequency radiation (RFR) began in utero. Pregnant rats were exposed to 900 MHz GSM– or CDMA-modulated RFR beginning at on Gestation Day (GD) 5 and continuing through gestation. After birth, pups were exposed to the same RFR until weaning on postnatal day (PND) 21, at which point the mothers were removed and the exposure of 90 pups per sex per group was continued for up to 106 weeks. Pups remained group-housed from PND 21 until 24 they were individually housed on PND 35. All RFR exposures were “conducted over a period of approximately 18 hours using a continuous cycle of 10 minutes on (exposed) and 10 minutes off (not exposed), for a total daily exposure time of approximately 9 hours a day, 7 days/week.” Control rats were treated identically, except that they were not exposed to RFR. Before doing this study with 90 rats per group, the NTP investigators did some pilot studies in order to establish that the RFR field strengths used didn’t raise the body temperatures of the rats, which could affect the results. They also did 28 day toxicology pilot studies before doing the massive experiment, which ended up with seven experimental groups: - Control (no RFR) - GSM 1.5 W/kg - GSM 3.0 W/kg - GSM 6.0 W/kg - CDMA 1.5 W/kg - CDMA 3.0 W/kg - CDMA 6.0 W/kg At 90 rats per group, that’s 630 rats, but the rats were actually divided by sex, and 90 rats were used for each sex, which means that there were actually 1,260 rats. That’s a lot of rats. The NTP study: Brain tumor results The first thing that jumps out at me as I read the NTP report is this result: At the end of the 2-year study, survival was lower in the control group of males than in all groups of male rats exposed to GSM-modulated RFR. Survival was also slightly lower in control females than in females exposed to 1.5 or 6 W/kg GSM-modulated RFR. In rats exposed to CDMA-modulated RFR, survival was higher in all groups of exposed males and in the 6 W/kg females compared to controls. What I found particularly irritating about how this was reported was how difficult it was to find convenient, easy comparisons of the survival results for each group. Some Kaplan-Meier survival curves would have been really nice here, as we do in pretty much every medical paper in which survival is noted, including preclinical studies using rodents. If this paper were to have been submitted to a journal and I was asked to review it, I would insist on this because it takes way more effort to figure out what the authors found than it should. That being said, I can’t resist noting that some skeptics have been joking that in reality this study should have been reported with headlines like, “Cell phone radiation makes rats live longer.” True, saying that is just as misleading as many of the headlines about the study, but, then, that’s rather the point. But what about cancer? What’s problematic about this study is that, even though there were 90 rats in each group, that’s actually a small number to detect meaningful differences in low frequency events. Here’s what I mean. The study reports increased incidences of tumors in the brains and hearts of the male rats. Specifically, there were noted to be increased incidences of malignant glioma and cardiac schwannomas in some of the groups exposed to GSM or CDMA RFR. Now here’s where the problem of small numbers comes in. The highest number of any single lesion in any single experimental group reported was 6, or 6.6% of the group. All numbers were in the single digits, and most were less than 3. Comparing such low frequency events between groups can be very problematic, particularly in the case low plausibility associations with multiple comparisons. Let’s dive in a bit. In the male rats the number of gliomas detected for GSM RFR among 90 rats in each group was 3 (3.3%), 3 (3.3%), and 2 (2.2%) for 1.5 W/kg, 3 W/kg, and 6 W/kg, respectively, while for CDMA RFR the same numbers were 0 (0%), 0 (0%), and 3 (3.3%) for the same doses. Compare this to zero gliomas in the control group, and on the surface this looks alarming. There are a couple of problems. First, for GSM RFR, there doesn’t appear to be a dose-response, unless there is a threshold level that is, for example, below 1.5 W/kg. In fact, it’s a problem that the number of gliomas observed in the control group is zero, because according to historical controls in previous studies, that number should be around 2% (11/550 (2.0%), with a range from 0-8%), as is noted under Table 1. Examining the study that way, I have to be very concerned that there was something off about the control group, particularly given the lack of a clear dose-response effect and comparing to historical controls. Given that, color me very skeptical that this is a “real” result, particularly given that there was no statistically significant difference among the female rats, that there is no clear biological mechanism that would explain why GSM radiation would be more “carcinogenic” at the same exposure levels, and adding the very low prior plausibility that RFR causes cancer. Bottom line: I believe that this result is almost certainly spurious and not indicative that cell phone RFR causes malignant gliomas in rats. NTP Results: Schwannomas In humans schwannomas are benign nerve sheath tumors (only 1% ever become malignant) composed of Schwann cells, the cell type that normally produces the insulating myelin sheath covering peripheral nerves. As noted in the introduction of the NTP study, there have been studies (that I consider unconvincing) linking cell phone RFR to acoustic neuromas, which are also known as vestibular schwannomas, thanks, presumably, to the proximity to the ear of the RFR source (the cell phone) when being used for a conversation. Why schwannomas would occur in nerves in the hearts of rats whose whole bodies were exposed to whole body cell phone RFR is puzzling and would be unexpected; that is, if these results are to be believed. What the NTP investigators found in terms of the incidence of schwannomas was similar to what was found with respect to gliomas. There was no difference in incidence in females. In males, there was a statistically significant difference in schwannomas of the heart, but when the investigator looked for schwannomas elsewhere, they found: In contrast to the significant increase in the incidence of schwannomas in the heart of exposed males, the incidence of schwannomas observed in other tissue sites of exposed males (GSM and CDMA modulations) was not significantly different than in controls (Table 5). Additionally, Schwann cell hyperplasia was not observed in any tissues other than the heart. The combined incidence of schwannomas from all sites was generally higher in GSM- and CDMA-modulated RFR exposed males, but not significantly different than in controls. The Schwann cell response to RFR appears to be specific to the heart of male rats. In other words, the only significant result was an increase in schwannoma incidence in the hearts of male Sprague-Dawley rats exposed to cell phone RFR, while there was no difference between the control group and the exposed groups for total incidence of schwannoma at all sites. Another way of looking at this (at least from my point of view) is that, because the incidence of schwannoma at all sites did not differ between controls and the RFR-exposed groups of male rats, in the RFR-exposed group there was a redistribution of schwannoma to the heart. Considering that there is no known plausible biological mechanism to explain how RFR might somehow sensitize the heart to schwannoma formation only in males and given that high level of biological implausibility that RFR even causes schwannoma in the first place, again the most likely explanation is that this, too, is a spurious result. The problems with this study To its credit, the NTP included the peer reviews that it did ask for. One reviewer, a veterinarian named Diana Haines, commented mainly on the pathology and, although she agreed that the results should be considered “likely the result of exposures to GSM—and CDMA—modulated RFR,” she did have some caveats, particularly how well the scheme of exposing the rats beginning in utero represented actual human exposure (my assessment: not very well). Another reviewer, Maxwell Lee of the National Cancer Institute Laboratory of Cancer Biology and Genetics, analyzed the data and concluded that the association with glioma was significant for schwannomas but probably not for glioma. Of course, my retort is whether it’s biologically significant, something I sincerely doubt. A third reviewer, Aleksandra M. Michalowski, also of the NCI Laboratory of Cancer Biology and Genetics echoed my complaint about the presentation of the overall survival of each group and actually did what the authors should have done and constructed a table of the median survival of each group, which showed that the median survival in the males receiving 6 W/kg CDMA RFR was 8% longer, which makes me want to change my sarcastic headline to “Cell phone radiation makes male rats live 8% longer on average.” In any case, she was concerned about the potential for bias and agreed that the glioma data were marginal, although she thought the schwannoma data were likely indicative of carcinogenesis. Multiple reviewers also noted that the survival of the control group of male rats was poorer than most historical controls (only 28% were still alive at two years, compared to a mean of 47%, range 24% to 72%), which might have skewed the results. Perhaps the most comprehensive critique came from Michael S. Lauer of the Office of Extramural Research at the NIH, who noted potential problems with blinding, use of the intent-to-treat principle, and the like. He even did some simulations and power analyses and concluded that: Based on these inputs, the recommendations in Table 13 of the FDA guidance document, and a sample size of 90 rats in each group, I find very low power (<5%, see Appendix 2). Even allowing for a risk ratio of 5.0 (a level that is clinically unlikely), the power for 2-sided alpha=0.005, k=3 and low lethality is only ~14% (see Appendix 2). The low power implies that there is a high risk of false positive findings2, especially since the epidemiological literature questions the purported association between cell phone exposure and cancer. He was lead to conclude that he was “unable to accept the authors’ conclusions,” adding: I suspect that this experiment is substantially underpowered and that the few positive results found reflect false positive findings. The higher survival with RFR, along with the prior epidemiological literature, leaves me even more skeptical of the authors’ claims. So do I. So does Aaron Carroll, a.k.a. The Incidental Economist, who notes: Where to begin? I didn’t see any sample size calculation, nor any discussion of what they expected to see. One of the reviewers did a power calculation for them (page 37) and found that based on 90 rats per group, the power was about 14%. This means that false positives are very likely. The cancer difference was only seen in females, not males. The incidence of brain cancer in the exposed groups was well within the historical range. There’s no clear dose response. Why schwannomas? Schwannomas in other locations than the heart were not significantly different. These are rats. I don’t know how this compares to real world exposure. And one more thing – the survival of male rats in the control group was relatively low, and if these tumors developed later in life, this could be the whole reason for the difference. I become even more skeptical by taking a Bayesian approach to the analysis and considering the very low prior probability of a positive result based on what we know about biology coupled with the multiple outcomes examined. Taking these issues into account, I agree with Lauer that the results reported are almost certainly due to chance and are not indicative of a real biological effect. There are just so many red flags in the study that should have told journalists that there’s a lot less there than meets the eye. I could tell this, and I’m not even a statistician. Lessons to be learned I had considered not blogging this, given how much digital ink had been spilled on the study within 24 hours after its being announced, but sometimes there is an advantage to having to wait three days before writing about a science story. It provides time to see how the reporting develops. To their credit, at least Scientific American, STAT, and Mother Jones altered their articles after criticism and noted that they had done so, with the results being much less alarmist stories. The same can’t be said about Consumer Reports or The WSJ. I realize that news of the preliminary results of this NTP study had been reported by Microwave News (and in a very alarmist manner, I might add), and that that was likely the impetus for the NTP to rush to publish a preliminary report in a non-peer-reviewed source. I can even understand why the NTP might have done it. After all, imagine the conspiracy mongering that would have gone on after this report if the NTP had said that it wasn’t going to publish the results until it had been accepted to a peer-reviewed journal. I can picture the headlines: “Government hides evidence of cell-phone cancer link.” Still, I wish the investigators had waited, rather than to publish an incomplete study that was not peer-reviewed. Given that this is only a partial result, I anticipate a lot more seemingly-positive results that will likely be no more convincing than this publication was. Matthew Herper, in criticizing how the press handled this story, noted that it scared him, correctly noting this about how all the caveats and red flags about this study were lost in the shuffle: Those caveats should have come with the study when it came out. Instead, readers were told why they should be scared before they found out the reasons they should calm down. I fear that this is not the last set of results from the NTP study that will be released to the public in this manner.
<urn:uuid:7d92fbb3-c7f1-4a73-81be-e446cb45b95b>
CC-MAIN-2017-04
https://sciencebasedmedicine.org/no-a-rat-study-with-marginal-results-does-not-prove-that-cell-phones-cause-cancer-no-matter-what-mother-jones-and-consumer-reports-say/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00355-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965011
5,981
2
2
Thank you for your inquiry. As far as beta-blockers in general, for your convenience, copied below is the summary statement regarding the use of beta-blockers during aeroallergen immunotherapy. This was copied from the most recent Immunotherapy Parameters (1). This Parameter is of course available to you free of charge online via the website of the Joint Council of Allergy, Asthma, and Immunology. The paragraph subsequent to this summary statement discussed the nuances underlying this recommendation. "Beta-Blockers and ACE inhibitors Summary Statement 37: Exposure to beta-adrenergic blocking agents is a risk factor for more serious and treatment- resistant anaphylaxis. Concomitant use of beta-blockers and allergen immunotherapy should be carefully considered from an individualized risk/benefit standpoint and incorporate the patient’s preferences in the medical decision- making process." Source: Allergen immunotherapy: A practice parameter third update: The Journal of Allergy and Clinical Immunology Vol. 127, Issue 1, Supplement, Pages S1-S55. These guidelines do not make a distinction between cardioselective and non cardioselective blockers. It is important to remember that anaphylaxis differs from asthma. There is certainly a rationale for the use of a selective beta blocker versus a nonselective beta blocker in caring for a patient with asthma. However, anaphylaxis is not only characterized by the potential for airway obstruction, but also the potential for shock. When one views the cause of mortality attributable to airway obstruction versus shock and cardiovascular complications, it is clear that deaths can occur from involvement of either system, and in some series, the deaths are almost equally attributable to each. Thus, beta blockers are considered a relative contraindication regardless of whether or not they are selective or nonselective. Theoretically, the risk may be less since there is less respiratory beta blockade, but there is no study quantifying how much less the risk would be. If you are interested in a more complete discussion of the use of beta blockers in immunotherapy, please see the reference noted below. Thank you again for your inquiry and we hope this response is helpful to you. 1.Phil Lieberman, Stephen F. Kemp, John Oppenheimer, David M. Lang, I. Leonard Bernstein, Richard A. Nicklas; The Journal of Allergy and Clinical Immunology, October 2005 (Vol. 116, Issue 4, Pages 933-936. Phil Lieberman, M.D.
<urn:uuid:1d37e05a-bbbb-44c0-a95b-fad18f4ea443>
CC-MAIN-2016-44
https://www.aaaai.org/ask-the-expert/cardioselective-beta-blockers
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00025-ip-10-171-6-4.ec2.internal.warc.gz
en
0.898825
526
1.585938
2
DERK SMIT (1889-1985) Derk Smit was born in the Netherlands on Jan. 29, 1889. Smit came to the U.S. in 1914. After serving in the Navy during WW1, he settled in Chicago, studied at the AIC, and worked as an interior decorator. While based there, he made painting trips to southern California. He died in Santa Barbara, CA on July 17, 1984. An Impressionist, his work was influenced by Dutch and Flemish masters. Derk Smit biography courtesy Edan Hughes "Artists in California".
<urn:uuid:28c4c29c-1766-41c8-871d-c1be98e07d25>
CC-MAIN-2017-04
http://www.calart.com/Data/Artists/Derk_Smit.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00347-ip-10-171-10-70.ec2.internal.warc.gz
en
0.98684
125
1.671875
2
Feeding birds in public places can be subject to a fine of 25,000 baht or administrative detention for up to three months. However, the city officials explained that such strict measures would be infrequently enforced. First of all, they are aimed at informing the public about the threats posed by swarms of pigeons. The initiators of the reform specifically clarified that the new measures should not “harm the birds.” Previously, the authorities have already carried out operations to trapping birds living in the city. In 2010, they disinfected hundreds of pigeons with the help of local zoo staff. During the current campaign, municipal officials are expected to survey 37 parks to identify large flocks of birds. In addition, signs will be posted throughout the city reminding you not to feed the pigeons.
<urn:uuid:caafca04-c0c4-4766-94ea-5cf80e95412d>
CC-MAIN-2022-33
https://bigasia.ru/en/content/news/society/bangkok-to-ban-feeding-pigeons/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00270.warc.gz
en
0.95872
167
2.296875
2
Main Article Content The understanding of endothelial cell biology has been facilitated by the availability of primary endothelial cell cultures from a variety of sites and species; however, the isolation and maintenance of primary mouse aortic endothelial cells (MAECs) remain a formidable challenge. Culturing MAECs is difficult as they are prone to phenotypic drift during culture. Therefore, there is a need to have a dependable in vitroculture system, wherein the primary endothelial cells retain their properties and phenotypes. MethodsHere, we developed an effective method to prepare immortalized MAEC (iMAEC) lines. Primary MAECs, initially isolated from aortic explants, were immortalized using a retrovirus expressing polyoma middle T-antigen. Immortalized cells were then incubated with DiI-acetylated-low density lipoprotein and sorted via flow cytometry to isolate iMAECs. iMAECs expressed common markers of endothelial cells, including PECAM1, eNOS, VE-cadherin, and von Willebrand Factor. iMAECs aligned in the direction of imposed laminar shear and retained the ability to form tubes. Using this method, we have generated iMAEC lines from wild-type and various genetically modified mice such as p47 phox-/-, eNOS -/-, and caveolin-1 -/-. ConclusionIn summary, generation of iMAEC lines from various genetically modified mouse lines provides an invaluable tool to study vascular biology and pathophysiology. How to Cite NI, Chih-Wen et al. Development of immortalized mouse aortic endothelial cell lines. Vascular Cell, [S.l.], v. 6, n. 1, p. 7, apr. 2014. ISSN 2045-824X. Available at: <https://vascularcell.com/index.php/vc/article/view/10.1186-2045-824X-6-7>. Date accessed: 11 aug. 2022. doi: http://dx.doi.org/10.1186/2045-824X-6-7. Methodology and Protocols
<urn:uuid:1ae127be-a229-4dc4-b1b7-200cebeb4088>
CC-MAIN-2022-33
https://vascularcell.com/index.php/vc/article/view/10.1186-2045-824X-6-7
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00470.warc.gz
en
0.856447
479
2.375
2
Leading up to the Martin Luther King Jr. holiday, each year, I am reminded of his quote, “of all the forms of inequality and injustice, healthcare is the most shocking and inhumane” and try to measure how far we’ve come and how much further we have to go. The Affordable Care Act was an enormous victory but the inequalities and growing economic and social disparities in our country are an indication of how much more work there is to do. We all recognize the gaping inequalities of our healthcare system. Unequal healthcare results from unequal access and unequal wealth. In Alameda County, California where I live, the Alameda County Public Health Department has prepared a short primer, “Economic Inequality: A Growing Threat to Public Health” which outlines the widening economic gaps in the Alameda County, California, and the US which I encourage everyone to read. They also cite some of the work of Richard Wilkinson and Kate Pickett who developed an index of “health and social problems” which included life expectancy, infant mortality, homicide, teenage births, imprisonment, obesity, trust, mental illness, social mobility, and math and literacy which showed that health social problems were worse in countries with greater inequality. The US has the greatest economic inequality and the worst health and social outcomes compared to similar countries. The economic and health divisions are even worse when we look at racial divisions. There isn’t a lack of evidence for these persistent and arguably worse disparities than existed during MLK’s life time and spawned the civil rights movement. As we celebrate a day Martin Luther King Jr. and his legacy and perhaps even a day off I will also be thinking about how these divisions and inequalities can be remedied. As he said, “Life’s most persistent urgent question is: ‘What are you doing for others?’” As physicians, we are constantly doing for others but we also need to be actively engaged in the communities we serve. I hope to find a way to learn more about my community next week and throughout this year. As the Alameda County Public Health Department suggests on its website, maybe we should begin with the Day of Service and find a volunteer opportunity through United We Serve or maybe elsewhere? There are some amazing organizations in our communities, how does your clinic, hospital, or university engage with them? We should all ask ourselves, what will I be doing to celebrate Martin Luther King Jr. and carry his vision forward this weekend and this year? Editor's Note: "Doctors for America is launching a year-long public education campaign -- the One Million Campaign -- on the National Day of Service. This is a year-long campaign where physicians and medical students around the country will make sure the public understands the truth and true benefits of the Affordable Care Act. If can be in Washington DC on Monday morning, come be a part of the national launch! If you're doing a local service event, we will have fliers and materials to hand out to people to get them educated!"
<urn:uuid:d5f7b542-dce1-4382-b739-a0edbca8d27e>
CC-MAIN-2017-04
http://www.drsforamerica.org/blog/inequality-in-healthcare
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00549-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96456
620
2.359375
2
A module intended to abstract away a lot of the complexity of using the GPIO and PiCamera for beginner programmers. This project aims to remove a lot of the complexity of dealing with the GPIO and PiCamera for beginner level programmers working with the Raspberry Pi. This project has been initially developed for use within my own classes that I teach but I hope it might find use for others too. This assumes you have a Raspberry Pi (and a PiCamera to use that functionality). All code tested on Raspberry Pi model 3, PiCamera model 2, running Raspbian 2018-06-29. pip install easyaspi At present, the project supports LEDs, buttons, ultrasonics and the PiCamera. This list of tools is expected to grow as need arises. Note: This library will set the default GPIO pin layout mode to BCM. - Create the LED object import easyaspi led = easyaspi.LED( pin_number ) - Turn an LED on - Turn an LED off - Create the Button object import easyaspi button = easyaspi.Button( pin_number ) - Retrieve if the button is being pressed button_state = button.get() - Set an event callback for button presses # Note: The function definition for the callback requires the state parameter even though it should always be set to True to indicate the button is currently pressed. def was_pressed(state): print("Button was pressed!") button.on_press(was_pressed) - Remove an event callback button.remove_on_press() # Remove any event listener for this button - Create the Ultrasonic variable import easyaspi ultra = easyaspi.Ultrasonic( trigger_pin_number, echo_pin_number ) - Retrieve the distance in centimeters distance = ultra.get_distance() - Create the Camera object import easyaspi camera = easyaspi.Camera() - Take a photo (without a message) - Take a photo (with a message) camera.photo("myphoto.png", "my message") - Start video recording camera.record("myvideo.h264", "my message") - Check to see if camera is recording video recording_state = camera.recording # Returns True or False - Stop video recording - Close the camera preview window when finished MIT License (C) 2018 Paul Baumgarten Download the file for your platform. If you're not sure which to choose, learn more about installing packages. Hashes for easyaspi-2018.1-py3-none-any.whl
<urn:uuid:72df6652-6b10-4470-a5e4-8a13c48eada2>
CC-MAIN-2022-33
https://pypi.org/project/easyaspi/2018.1/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00674.warc.gz
en
0.74703
687
2.296875
2
Brands are emotions made physical. The clothes we wear, the media we consume, the devices we use — all signal not only to others what we value and see in ourselves, they also are a way to construct our very identities. Experimenting to deepen that bond has been at the core of the marketing profession for a century; its origins rooted in Freudian psychoanalysis. There had always been one critical limitation, though: Marketers had to appeal to the masses. Radio, television and print media allowed brands to deliver only one message to everyone, no matter if their product conferred luxury or smart cost-consciousness. On the internet, the masses have been shattered into ever smaller shards, shifting that marketing calculus toward targeted audiences and social network interest groups. Today, niche brands, large corporations and every business in between are reaching ever-narrower audiences. Marketers who become expert at personalization, especially for existing customers through owned marketing platforms like email, will hold an edge over their competitors. Yet, advertising and social networks are competitive marketplaces. Over time, prices to reach niche audiences rise, and strategies that once worked become unviable. In 2021, these perpetual challenges are joined by two new factors: a fresh influx of new e-commerce brands and changing privacy policies on third-party platforms. Klaviyo benefits from these secular trends. While the cost or difficulty of acquiring new customers may increase, as we looked at in the second part of this EC-1, the cost of emailing an existing one remains much the same. Marketers who become expert at personalization, especially for existing customers through owned marketing platforms like email, will hold an edge over their competitors. It’s no longer about marketing to narrow slices of audiences — it’s about building an emotional bond with an audience of one. To a booming economy, now ad inflation While 2020 was a banner year for e-commerce in the wake of the COVID-19 pandemic, the early months of 2021 have brought about a new problem: Customer acquisition costs are rising, sometimes to a worrying degree. For instance, one company interviewed by TechCrunch that did not wish to be named said it has seen its return on investment for Facebook ads fall by nearly half in the first months of 2021. Such inflation has also been predicted by firms like ECI Media Management. There are two possible reasons for this increase. First, an unprecedented number of companies are moving online, spurred by COVID-19 and worldwide lockdowns.
<urn:uuid:a2616a60-034e-4e40-af59-42961ec17063>
CC-MAIN-2022-33
https://techcrunch.com/2021/04/19/klaviyo-ec1-marketing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00076.warc.gz
en
0.964235
514
1.703125
2
European Council backs large-scale deployment of offshore wind There is currently 1,471 MW of installed offshore wind capacity, all of it in European waters. There is enough wind blowing over the seas to supply all of our power, yet without an offshore grid and increased interconnector capacity to transport power to consumers, this vast potential will remain untapped. The Commission's proposal in the SER to develop a blueprint for a North Sea offshore grid was seen by the wind industry as a vital move and is backed up by the Council, which today gave its aim to promote a coordinated approach between the Commission and the Member States in order to support "the large-scale deployment of offshore wind power while preserving the reliability of the grid". "The Council has taken the commendable step of supporting the Strategic Energy Review's commitment to renewables and, especially, offshore wind", commented EWEA Chief Executive Christian Kjaer. "In its conclusions, Council confirms the EU's need to turn to an indigenous energy supply and to 'promote renewables and tackle barriers to energy from renewable sources'. These actions are essential for increasing our use of renewables and so boosting the EU's energy security, reducing our fuel imports, avoiding CO2 emissions and carbon costs, creating jobs and putting money to work at home rather than spending it on importing fuel from unstable regions abroad." In its conclusions the Council also proposed that the Commission prepare a Sustainable Energy Financing Initiative with the European Investment Bank to mobilise large-scale funding from capital markets for investments in renewable energies. The SER will provide the basis for the next Energy Action Plan, to be adopted by the new European Commission and form the new EU energy policy. About European Wind Energy Association EWEA is the voice of the wind industry, actively promoting the utilisation of wind power in Europe and worldwide. It now has over 500 members from 50 countries, including manufacturers with a 90% share of the world wind power market, plus component suppliers, research institutes, national wind and renewables associations, developers, electricity providers, finance and insurance companies and consultants. This combined strength makes EWEA the world's largest and most powerful wind energy network.
<urn:uuid:2efc29ef-9491-409a-b48c-55b29dad3b3b>
CC-MAIN-2016-44
http://www.pressebox.de/inaktiv/european-wind-energy-association-brussels/European-Council-backs-large-scale-deployment-of-offshore-wind/boxid/240727
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00239-ip-10-171-6-4.ec2.internal.warc.gz
en
0.938998
436
2.109375
2
What a great tool Storage VMotion is. I may not use it every day, but when certain situations arise I really appreciate having this feature available. The other night our storage area network (SAN) admininstrators shut down both of our SANs so they could do a microcode upgrade. Part of this process involved shutting down all of our production virtual machines (VMs) that were on shared storage before the SAN was shut down. But there are certain servers that you want to have available at all times. In my work this includes at least one DNS and Active Directory server as well as our VPN authentication server. Because these VMs are all on shared storage I decided to use Storage VMotion to move them temporarily to local storage so they would be available while the SAN was down. With Storage VMotion I was able to do this while all the VMs were powered on with no interruption to service. What Storage VMotion is and how it works Introduced with VMware ESX 3.5 and vCenter Server 2.5, Storage VMotion allows you to move VMs from one storage data store to another while the VM is running. The difference between VMotion and Storage VMotion is that VMotion simply moves a VM from one ESX host to another but keeps the storage location of the VM the same; Storage VMotion changes the storage location of the virtual machine while it is running and moves it to another data store on the same ESX host. The source and destination data stores can include any storage volume that is configured on an ESX host, which includes local and shared storage. The magic behind Storage VMotion involves several behind-the-scenes steps, which are outlined below: - A new virtual machine directory is created on the target data store, virtual machine configuration files and all non-virtual disk files are copied to the new target directory. - The VMware ESX host does a “self” VMotion to the target directory. - A snapshot (without memory) is taken of the virtual machine’s disks in the source directory. - Virtual machine disk files are copied to the target directory. - Snapshot that is located in the source directory is consolidated into the virtual machine disk files located in the target directory. - Source disk files and directory are deleted. With ESX 3.5 you either had to initiate a Storage VMotion using a Remote Command Line Interface (Remote CLI) Perl script, or you could use a third-party plug-in developed by Andrew Kutz to do this inside the VMware Infrastructure Client. Storage VMotion is now fully integrated into the vSphere Client but you can still use the Remote CLI as well. To be able to use Storage VMotion there are a few requirements that must be met, as outlined below. - Virtual machine disks must be in persistent mode or be a raw device mapping (RDM) that is in virtual compatibility mode. - If a virtual machine has any snapshots then it cannot be migrated, you must delete them before you can proceed. - The ESX host that the VM is running on must be licensed for VMotion and must also be configured to use VMotion. - The ESX host that the VM is running on must have access to the source and target data stores. - The ESX host that the VM is running on must have enough resources available to support two instances of the virtual machine running at the same time. It’s not every day that you will use Storage VMotion, but it can come in very handy in certain situations when a VM needs to be moved to another data store and you can’t afford to shut it down. You can also use Storage VMotion and VMotion together to move a VM from a local data store on one host to a local data store on another host by first using Storage VMotion to move it to shared storage, then using VMotion to move it to another host, and finally using Storage VMotion again to move it back to local storage on the new host.
<urn:uuid:fa562b02-0078-44db-8d59-18bd3ba929be>
CC-MAIN-2017-04
http://itknowledgeexchange.techtarget.com/virtualization-pro/using-storage-vmotion-to-keep-critical-servers-up-when-shared-storage-is-down/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00182-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933289
828
2.171875
2
Welcome to our first Archibull Prize Roundup – special shoutout to Daniel from Salt Media for our super cool Roundup animation. Our Roundup will share #archieaction in and out of the classroom in the journey of our 30 schools participating in The Archibull Prize 2018 competition. OUT OF THE CLASSROOM The Henry Lawson High School bit the bullet and put two of their prize winning Archies up for Auction at the Henry Lawson Festival raising $$$$$ for the school. See the full story here Students from The Lakes College, Youth off the Streets program visited Grace Springs Farm at Kulnura. “The students learnt about holistic farming, permaculture and the benefits of chemical-free produce. Virginia and Tony engaged them in all aspects of the property and I know that when we return to the classroom the discussion around their experiences will be rich.“ said Amy Gill teacher Read all about the powerful effect the excursion had on the teachers and students in their blog here IN THE CLASSROOM. Archie was guest of honour at the Year 8 Battle of the Bands at Picnic Point High School Tayla Field was quick to spot the employee of the month at Gwynneville Public School with the winner of this Traceability workshop competition packing spinach as fast as the team on the floor at the OneHarvest plant. Just under 20 seconds. What a star OUT IN THE COMMUNITY This year we have a number of primary schools building community between themselves and local high schools. Big shoutout to the teams at Little Bay of Community Schools working with Year 8 mentors at Matraville Sports High School The Wooly Bully team at Moree Small Schools Community. Check out their blog here Beaudesert State High School has also partnered with small primary schools in their region OUT IN CYBERSPACE A number of our Archibull Prize schools have taken to Twitter, Facebook and Instagram to share their Archie journey Cristie Collins from Granville South Creative and Performing Arts High Schools shares how they are engaging their school community You can follow and support our schools on social media here Beaudesert State High School: https://www.facebook.com/Archibull-2018-Wooly-Bully-608618299514961/ Little Bay Community of Schools: https://www.facebook.com/LBCOS-Archibull-2018-283392378865686/ Calvary Christian School: https://www.facebook.com/Calvarys-Archibull-2018-180894869234441/ Miller Public School: https://twitter.com/MillerPS_Archi Moree Small Schools: https://twitter.com/CroppaCreekPS Granville South Creative and Performing Arts High School: https://www.instagram.com/archie_at_gscapahs/ Until next time share your stories with us using the hashtags #archieaction #youthvoices18
<urn:uuid:4a8afff9-6ef1-4974-b339-4b664d919b93>
CC-MAIN-2022-33
https://action4agriculturechat.com/category/archibull-prize-roundup/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00472.warc.gz
en
0.914023
639
1.609375
2
Our packaging strategy We want our packaging to have the lowest possible impact on the world around us. Our starting point is to understand the carbon impact of all our various packaging components. Our toolkit for reducing carbon looks a little like this: • Use less: as little material as possible per pack • Don’t use up new stuff: as much recycled or renewable material as possible • Close the loop: materials and pack formats that are easy to recycle • Lower its impact: deliberately avoiding high carbon materials We’ve done lots to make our packaging better and its an ongoing journey. We’ve been pioneering the use of food grade recycled plastic in our little bottles ever since 2003; in 2013 we saved over 1000 tonnes of plastic by putting our juice carafes on a diet; and all our cartons (big and small) are made from Forest Stewardship Council certified material. Lastly, we work with our key packaging suppliers to ensure they’re trying to do their bit, monitored through quarterly energy, water & waste KPIs – a bit like we do with our bottlers.
<urn:uuid:bc8cbce1-e8e5-477c-b59e-08d5b973bbaf>
CC-MAIN-2017-04
http://www.innocentdrinks.co.uk/us/being-sustainable/packaging
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00504-ip-10-171-10-70.ec2.internal.warc.gz
en
0.931409
229
2.328125
2