content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
New this year, authors of OOPSLA papers were invited to submit supporting materials to the Artifact Evaluation process. The goal of the Artifact Evaluation process is to empower others to build upon the contributions of a paper. Papers that went through the Artifact Evaluation process received a seal of approval.
Onward!
Onward! is a multidisciplinary conference focused on everything to do with programming and software: including processes, methods, languages, communities, and applications. Onward! is more radical, more visionary, and more open than other conferences to not yet well-proven but well-argued ideas. >>>
SLE
The International Conference on Software Language Engineering (SLE) is devoted to topics related to artificial languages in software engineering. SLE’s mission is to encourage and organize communication among communities that have traditionally looked at software languages from different and yet complementary perspectives. Of particular relevance to SLE are technologies, methods, experiments, and case studies on software languages from researchers and practitioners who use modeling, grammar, or ontology-based approaches. >>>
GPCE
Generative and component approaches and domain-specific abstractions are revolutionizing software development just as automation and componentization revolutionized manufacturing. Raising the level of abstraction in software specification has been a fundamental goal of the computing community for decades. Key technologies for automating program development are Generative Programming for program synthesis, Domain-Specific Languages for compact problem-oriented programming notations, and technologies aiming at modularity, correctness, reuse, and evolution. >>>
DLS
Panels and debates
SPLASH will host a panel on Technical Debt chaired by Steven Fraser with panelists from Microsoft, Cisco, JP Morgan, SEI and CAST. The term “Technical Debt” was coined by Ward Cunningham in a 1992 OOPSLA experience report. The technical debt describes the trade-offs between delivering the most appropriate - albeit likely immature - product, in the shortest time possible. A debate will pit Shriram Krishnamurthi against James Noble on the issue of the rightful place of software in software conferences. Should software conferences insist on reproducibility of research results? And if so, at what price? >>>
Workshops
Following its long-standing tradition, SPLASH hosts a variety of high-quality workshops, allowing their participants to meet and discuss research questions with peers, to mature new and exciting ideas, and to build up communities and start new collaborations. SPLASH workshops complement the main tracks of the conference and provide meetings in a smaller and more specialized setting. Workshops cultivate new ideas and concepts for the future, optionally recorded in formal proceedings.
Wavefront
Wavefront is a forum for presenting and discussing new and innovative tools, technologies, and practices for use in today’s software community. Wavefront is about how industry applies the lessons learned from the software development community in deploying today’s software and systems, and how the community can learn from what is happening in the trenches of software engineering. >>>
Wavefront Experience Reports are all about how we create practical software systems that solve real-world problems. Wavefront experience reports are meant to be strongly aligned with the focus of the Wavefront program, but in the experience papers, we are looking for discussions about the use of those technologies as opposed to their creation. How have they made you more (or less) successful? What do you do differently now? >>>
Tutorials & Tech Talks
The SPLASH tutorial program complements research talks with 80-minute tech talks and 1/2-day in-depth tutorials taught by experts that provide participants with in-depth or hands-on background in the area of focus. The tutorials and tech-talks are open to all attendees. >>>
SPLASH-I
SPLASH-I is a new series of industrial research talks that address topics relevant to the SPLASH community. Speakers are world-class experts in their field, selected and invited by the organizers. The SPLASH-I talks series is held in parallel with the OOPSLA main track. Talks are open to all attendees. >>>
SPLASH-E
SPLASH-E revives the long tradition at OOPSLA and SPLASH of bringing educators, practitioners, and researchers together to improve the teaching of programming and software development. >>>
Posters
The poster session provides an excellent forum for authors to present their recent or ongoing projects in an interactive setting, and receive feedback from the community. >>>
Doctoral Symposium
The SPLASH Doctoral Symposium provides students with useful guidance for completing their dissertation research and beginning their research careers. >>>
Demonstrations
Live demonstrations show the impact of software innovation. The Demonstrations track is an excellent vehicle for sharing your latest work with an experienced and technically savvy audience. Demonstrations are not product sales pitches, but rather an opportunity to highlight, explain, and present interesting technical aspects. >>>
ACM Student Research Competition
The student research competition is an internationally-recognized venue that enables undergraduate and graduate students to experience the research world and share their research results. The competition has separate categories for undergraduate and graduate students and awards prizes to the top three students in each. >>>
Student Volunteers
The SPLASH Student Volunteer program provides an opportunity for students from around the world to associate with some of the leading personalities in industry and research in the following areas: programming languages, object-oriented technology and software development. >>>
Social Events
SPLASH includes a number of social events, a reception will be held in the hotel on Sunday for GPCE, SLE and the workshop attendees, the SPLASH banquet is on Wednesday evening at the Indiana Roof Ballroom, and SPLASH, as usual will end on a sweet note with the Ice Cream Social on Thursday in the conference hotel. | https://2013.splashcon.org/ |
Designing the layout for a cemetery is a long process that should not be attempted without consulting an experienced landscaper with specific experience in cemeteries. Schematics should be created and looked over to ensure optimal use of all space provided and to ensure safety and security for all cemetery patrons. There are four ways in which a cemetery is subdivided: lot, section, tier and grave.
Separate the entire plot of land for the cemetery into sections. Sections, as defined by the International Cemetery, Cremation and Funeral Association (ICCFA) are “separate tracts divided by driveways.” Each section should be 200 to 300 feet wide if it is surrounded by driveways on all sides and 100 to 150 feet wide if it is bordered by only one driveway. Sections are to be at least three times longer than they are wide.
Divide each section into a lot. Lots are 18 to 20 feet long and nine to 11 feet wide. This, by ICCFA standards, provides four to eight graves within a lot. There is to be a two-foot border around all lots, to be filled with trees and shrubbery. There needs to be four-foot-wide walkways at the end of each lot.
Segment each lot into grave sights. Graves, according to ICCFA, are to be eight feet by 2.5 feet. Each lot is sectioned into tiers, which are the rows of graves. Tiers are numbered from South to North with the following format: Tier 1 North, Tier 2 North, etc.
Each grave will have a marker as follows: Lot, Section, TierNorth, Grave_.
Related Articles
How to Make a Cardboard Rainbow
How to Map German Surnames
What Are the Duties of a Church Trustee ...
How to Arrange Long Tables for a Party
How to Send Pictures to Inmates
How to Locate a Family Relative in New ...
How to Look Up the Roll Numbers for ...
How to Apply for a Commercial Loan for ...
How to Locate Persons in Australia
How to Become Member of the Navajo ...
How to Get a Postal Address in Hong Kong
How to Hire a Minister for a Funeral
How to Trace Your Family Tree for Free
The Standard Size for Wedding ...
How to Convert Gsm to Ounces
How to Find a Roll Number on the Dawes ...
How to List Family Names on a Gravestone
How to Write a Church Constitution and ...
Rules for a Social Club
How to Number Wedding Tables
References
Writer Bio
Robert Kohnke has been an avid writer since 1995. Kohnke is well-versed in gardening and botany, electronic/computer repair and maintenance, and technical support. He graduated with an Associate of Arts in agricultural business from Cosumnes River College, where he is continuing his education in computer technology and computer information science. | https://oureverydaylife.com/how-to-number-plots-on-a-cemetery-plat-13645562.html |
By Dipo Olowookere
Some 600 million children – or 1 in 4 children worldwide – will be living in areas with extremely limited water resources by 2040, a report by the UNICEF on World Water Day has revealed.
The report, Thirsting for a Future: Water and children in a changing climate, looks at the threats to children’s lives and wellbeing caused by depleted sources of safe water and the ways climate change will intensify these risks in coming years.
“Water is elemental; without it, nothing can grow. But around the world, millions of children lack access to safe water — endangering their lives, undermining their health, and jeopardizing their futures. This crisis will only grow unless we take collective action now,” said UNICEF Executive Director Anthony Lake.
According to the report, 36 countries are currently facing extremely high levels of water stress, which occurs when demand for water far exceeds the renewable supply available. Warmer temperatures, rising sea levels, increased floods, droughts and melting ice affect the quality and availability of water as well as sanitation systems.
Population growth, increased water consumption, and higher demand for water largely due to industrialization and urbanization are draining water resources worldwide. Conflicts in many parts of the world also threaten children’s access to safe water.
All of these factors force children to use unsafe water, which exposes them to potentially deadly diseases like cholera and diarrhoea. Many children in drought-affected areas spend hours every day collecting water, missing out on a chance to go to school. Girls are especially vulnerable to attack during these times.
South Africa too, despite recent rains in many parts of the country, regularly faces water shortages. According to statistics provided by the national Department of Health and UNICEF, unsafe or lack of water supply, sanitation services and hygiene is ranked 11th on the list of risk factors causing death in South Africa. In addition, approximately 11 per cent of South African households still lack adequate sanitation and at least 26 per cent of households within formal areas are equipped with sub-standard sanitation services. Diarrhoeal diseases account for 3.4 per cent of total deaths and are the 8th largest cause of death in South Africa.
Globally, the poorest and most vulnerable children will be most impacted by an increase in water stress, the report says, as millions of them already live in areas with low access to safe water and sanitation.
The report also notes that up to 663 million people globally do not have access to adequate water sources and 946 million people practice open defecation; over 800 children under the age of five die every day from diarrhoea linked to inadequate water, sanitation and hygiene; globally, women and girls spend 200 million hours collecting water every day.
The impact of climate change on water sources is not inevitable, UNICEF says. The report concludes with a series of recommendations that can help curb the impact of climate change on the lives of children.
Such measures include for governments to plan for changes in water availability and demand in the coming years; Above all, it means prioritizing the most vulnerable children’s access to safe water above other water needs to maximize social and health outcomes; climate risks should be integrated into all water and sanitation-related policies and services, and investments should to target high-risk populations; businesses need to work with communities to prevent contamination and depletion of safe water sources; communities themselves should explore ways to diversify water sources and to increase their capacity to store water safely.
“In a changing climate, we must change the way we work to reach those who are most vulnerable. One of the most effective ways we can do that is safeguarding their access to safe water,” Lake said.
more recommended stories
-
Red Star Express Opens Office in Benin Republic
By Modupe Gbadeyanka As part of.
-
NCDMB, Dangote Refinery Partner on Local Content Implementation
By Modupe Gbadeyanka Nigerian Content Development.
-
Conoil Excites Shareholders With Positive Q3 Results
By Modupe Gbadeyanka To the astonishment.
-
N495b T-bills Mature as Analysts Predict Rise in PMA Rates
By Modupe Gbadeyanka On Thursday, treasury. | https://www.businesspost.ng/2017/03/23/600m-children-risk-water-shortage-2040-unicef/ |
Hi Robin,
I recruit new hires for my company, as we do not have a human resources department. Our process is very straightforward - we begin with initial phone screenings or on-campus interviews when visiting colleges. If we choose to move forward with a candidate, we invite them to our office where they participate in a round-robin style interview where they meet a handful of associates and managers in our organization. Usually, if that goes well, they quickly meet with the owner of our company.
Here's where I struggle: I find that I myself, as well as my colleagues, have become conditioned not to move candidates forward unless they meet certain criteria that we know the owner looks for. This is usually a very narrow criteria - she subconsciously favors candidates of a certain socio-economic status, appearance, age, and often race. We're can be chastised if we introduce the owner to candidates who "would never fit in here." I want to encourage diversity in our workplace - I think we would greatly benefit from it. But how do I approach this situation myself, as well as respond to nay-saying colleagues who say "there's no point in introducing them to her."
Answer:
Thanks for your question, and for wanting to do more. It raises the issues of diversity and inclusion, and the risk of trying to obtain diversity without inclusion, which typically does not have a good outcome.
The fundamental question appears to be whether the owner of the company is open to recognizing how her biases are affecting hiring and the talent pipeline. There are several ways that you could raise this with her, if you’re willing, addressing the business case.
One way is to ask her question focusing on “fit”: What does she mean by fit? Which employees have been “bad fits” and why? See whether the owner will engage with you about what she’s looking for with “fit” and you can share with her the research that indicates what companies and employees do well when employees’ values and the company’s values are aligned. Here’s an article that might be helpful to you, and perhaps you can share with the owner.
Another way to address this with the owner is to focus on the advantages of having a diverse workforce. You can ask her thoughts about the advantages of having a diverse workforce and, assuming she isn’t aware of it, then present her with information about the advantages and ask for her response to that information. She may dismiss the information as not pertinent to her company, but you might consider pushing her a bit—inquiring why it isn’t relevant, whether it would hurt the company’s competitiveness.
You can gently try to raise the question of bias directly. (I say gently because I don’t know how she’d react to your addressing it directly and clearly and I assume you don’t want to get fired.) How you’ve noticed a pattern and wonder whether she’s noticed it too: Diverse applicants who make it to the final stage are typically rejected by her. Ask her whether she’s noticed that? If she has, asked her what that’s about; if she hasn’t, ask what she makes of it? (Come to that meeting with statistics about it so it’s harder for her to dismiss the issue.)
Even if you are successful in getting her to approve diverse applicants who make it to the final stage, if she is doing so under duress, the work environment will likely not be inclusive toward the new hire, particularly if that person is the only diverse hire. In that case, there would be diversity without inclusion, which creates multiple problems. Ideally, the question is how to get the owner to transform into a champion for diversity and inclusion.
I do not have the expertise to address any question of discriminatory hiring practices and potential legal risks; that may be another avenue to discuss with her once you have consulted either an HR professional or employment lawyer about that issue.
Good luck.
Disclaimer: This question and response is provided for informational purposes only, and you should not act or refrain from acting on the basis of this content. It is strongly recommended that you immediately seek legal or other professional advice if you believe you are experiencing a problem requiring professional assistance. Robin Rosenberg and Live in Their World, Inc. disclaim all liability for actions you take or fail to take based on Dear Robin content.
If you have a specific type of situation you’d want us to publish, send in your questions to [email protected]. Your submission may be published in an upcoming column, but rest assured, we will not publish your name, location, employer or any other personally identifiable information. | https://www.liveintheirworld.com/post/copy-of-addressing-racial-hyper-sensitivity |
Seasonal Affective Disorder
According to the Mayo Clinic, “seasonal affective disorder (SAD) is a type of depression that’s related to changes in seasons — SAD begins and ends at about the same times every year”. In order to be officially diagnosed with seasonal affective disorder, an individual must meet the criteria for major depression aligned with specific seasons for a minimum of two years. For most people, seasonal affective disorder symptoms begin to surface in the fall, continue into the winter months and subside somewhat during the spring and summer months. However, some people experience symptoms in spring and summer and find relief in the winter months. This is far less common than winter-onset seasonal affective disorder, and is not as well understood by researchers.
Seasonal affective disorder affects an estimated 10 million Americans to varying degrees of severity. Factors including gender, age, family history, previously diagnosed depression or bipolar disorder and geographic location can all impact how individuals experience seasonal affective disorder. Women are four times more likely to be diagnosed with seasonal affective disorder than men, but men often report experiencing more intense symptoms. Most cases of seasonal affective disorder are seen in individuals between the ages of 18 and 30, and are less common in older demographics. People who have a family history of psychiatric disorders typically report symptoms of seasonal affective disorder at higher rates than those who do not.
The cause of seasonal affective disorder is not yet fully understood, however; there are factors that can increase your likelihood of experiencing it. Research shows that your circadian rhythm, or biological clock, can be disrupted by reduced levels of sunlight and contribute to winter-onset seasonal affective disorder. This causes a drop in serotonin, a neurotransmitter which affects mood. The change in season can also trigger a shift in melatonin levels which impacts sleeping patterns and your mood.
Symptoms of this disorder can include irritability, low energy, sudden weight gain, depression, insomnia, changes in appetite and increased levels of anxiety. While many of these symptoms are not a cause for alarm, if they are observed for multiple days or cause you to lose interest in activities that you typically enjoy, it may be time to seek professional guidance. Otherwise seasonal affective disorder can contribute to social withdrawal, problems in work or school, substance abuse and thoughts about self-harm. Phototherapy (light therapy) counseling, vitamin D supplements and, in some cases, other forms of medication, can be used to alleviate patients’ symptoms.
Overall, it is important to be aware of your mood shifts as well as other changes in your mental and physical well-being as the seasons change and to make it a priority to seek help if needed. Seasonal affective disorder can become more severe if left untreated for an extended period of time. Taking care of your well-being can take time, but paying attention to trends in your mood can prevent more serious complications from coming up down the road which may have larger impacts on your life. | https://inpathybulletin.com/seasonal-affective-disorder/ |
• -Monitor factory Supply Plan/production/capacity/delivery and assess risk of delivery with BI tools to expedite decision making.
• -Drive the issue identification, solution and communication on delayed shipment
• -Train factories on polices, best practice and ensure SOP compliance.
• -Lead OTP tracking for Sample/Inline/SLT/Promo and delivery MI data validation
• -Collaborate on order prioritization to improve PIFOT and coverage
• -Collaborate in material commitment, long lead time materials to secure OTP. | https://www.malakye.com/job/2516/91487/nike-inc/analyst-delivery-excellence |
To say that Jared Steffensen’s body of work is eye-catching is an understatement. Watching him turn the art form of “organic displacement” into a creative statement—whether it be a support beam transformed into a dying tree, a pair of fancy shoes with a garden growing over them or even the words “Go Team” formed out of red beer cups in the middle of the woods—Steffensen is ahead of many in this particular field.
Where many would credit a major artistic influence, Steffensen credits skateboarding as an early inspiration for becoming an artist, along with 1980s Saturday-morning cartoons and their ability to induce a suspension of disbelief. In his teens, Steffensen and his family visited European museums while living in Germany. He encountered contemporary art for the first time at The Pompideu Center in Paris. He recalled a giant Swiss army knife piece that “blew my mind” at one of its exhibits. With support from a junior high school teacher and his parents, Steffensen was encouraged to pursue art.
His formal education began at the University of Utah, where he earned a bachelor of fine arts degree in intermedia sculpture in 2002. After the U, Steffensen set his sights on the University of Texas for his MFA, drawn in not only by the city itself after visiting the campus, but by artist Mel Zeigler. The approach to public art by Zeigler and his late partner, Kate Erickson—as well as his thoughts about people and places—excited and resonated with Steffensen, along with some of the ideas that he worked on at the U.
Steffensen received his MFA in studio art in 2006, along the way creating several exhibitions in Dallas and Austin, Texas, that garnered attention. Most notable were works where he brought nature indoors, and, at times, took the domesticated outside, as with a fully functional “Exit” sign in the middle of a park, a man-made tree on wheels with a rope to pull it, or a forest setting inside a small room.
After his time in Texas, Steffensen received an offer to work with an artistic cabinetmaker in Providence, R.I., a job that influenced later artwork involving more miniature and elaborate sculptures. He took it as an opportunity to learn a new skill, but after a year, both Jared and his wife, Candace, considered moving back to Austin. It was at this point he received an e-mail from his former Utah professor Kaiti Slater, inquiring if he’d be interested in teaching some classes as an adjunct.
“Teaching was always in the back of my mind,” says Steffensen about the job and his return to Utah. “I sent my résumé in and they liked me enough to extend an offer. I feel very fortunate for the opportunity.
Upon returning, Steffensen required studio space to continue his own work, eventually finding a spot in the A Wing of Brad Slaugh’s Poor Yorick Studios. He built his latest creations in privacy, only showcasing them on a few occasions in Salt Lake City and Austin, or displaying his current projects during Poor Yorick’s open-house shows. Some of the work that’s come out of that studio includes his landscaped constructions, such as “Nestled,” a pair of mountain ranges created out of wooden frames and colored triangular pieces. Four years later, he’s still working out of his space, now sharing it with fellow media artist Michael Handley.
While continuing to be a local influence, Steffensen has also taken his work to display across the country and in Mexico, as well as shipping some selections to the De WitteDame in Eindhoven, Netherlands. | https://www.cityweekly.net/utah/jared-steffensen-lofty-peaks-and-wide-streets/Content?oid=2154134 |
Hidden loneliness: exploring the isolation caused by violence against women and girls
When you think of loneliness, what’s the image that comes to mind? Perhaps a solitary elderly person, nursing a cup of tea in the living room. A young child at school, hiding away from bullies in the playground. Or possibly a refugee who has lost their family, standing in a sea of unfamiliar faces, forced into an unknown new world alone.
But how often do you picture a woman or girl who has experienced gender-based violence (GBV)? At first glance, this group might not seem to have much in common with the elderly or those we commonly assume to feel ‘alone’. Yet there’s increasing anecdotal evidence demonstrating links between violence against women and girls (VAWG) and experiences of loneliness and social isolation.
Trigger warning: this piece contains discussion of gender-based violence, including sexual violence, and the impacts this can have.
Violence Against Women and Girls (VAWG) is defined by the UN as 'any act of gender-based violence that results in, or is likely to result in, physical, sexual or psychological harm or suffering to women…’
Examples range from domestic abuse and rape, to sexual harrassment, intimidation and stalking. Globally, 1 in 3 women will experience sexual assault in their lifetime. In the UK alone, 1 in 4 women will experience domestic violence and 1 in 5 will experience sexual assault. Economic violence is also recognised as a form of GBV, including acts such as the restriction of financial resources, or other types of coercive control. Any act of violence against a woman or girl violates their human rights, as enshrined in the Convention on the Elimination of All Forms of Violence Against Women.
Whilst specific data connecting VAWG to experiences of loneliness doesn’t exist, it’s possible to infer links between the two
For example, in the case of domestic abuse, social isolation is a specific tactic used by an abuser to gain control over their victim. An abuser may use emotional manipulation to distance the victim from their friends or family, sowing disconnection that prevents the victim from being able to seek help and others from noticing that something isn’t right.
The Covid-19 pandemic has brought the issues of VAWG and loneliness into sharp relief
In particular, a recent policy briefing by UN Women sheds light on the “shadow pandemic” of violence against women and girls. Since the start of the pandemic, countries with ‘stay at home’ measures have seen a marked increase in reports of violence against women. In the UK, there was a 25% rise in phone calls to the National Domestic Abuse Helpline during the first week of lockdown in March. A survey by Women’s Aid also found that 67% of women currently experiencing domestic violence said it had worsened during the pandemic, with one respondent saying: “I’m lonely, feel isolated, like a sitting duck.”
At The Jo Cox Foundation, we co-founded the Connection Coalition at the start of the pandemic
This Coalition is designed to support its civil society, voluntary and corporate members to best support the emotional and social wellbeing needs of the nation, with a particular focus on loneliness and social isolation. Our members have consistently told us that their communities face barriers to overcoming loneliness and social isolation such as a lack of digital access and literacy, caring responsibilities, financial barriers, or cultural stigma. It’s likely that these factors will significantly impact women and girls in need of support at a time when social distancing measures may have isolated them from their previous support networks.
In assessing the impact of Covid-19 on mental health, Connection Coalition co-founder Mind found that women were more likely to report a decline in their mental health
Research by University College London similarly found that young women were most likely to have experienced high levels of loneliness, anxiety and depression during the first lockdown. Whilst there are many reasons why women may be suffering more, the correlative increase in violence is potentially a causal factor in many cases. In terms of services, women from Black, Asian and Minority Ethnic backgrounds, or those with disabilities, might face even further loneliness and social isolation when seeking support. This is owing to a lack of representation and informed mental health services specifically designed to address intersecting issues of gender, race and ability.
Exposure to violence and trauma, particularly at a young age, can sadly have lasting impacts on how an individual connects with others
Relationships later in life may be significantly impeded by a survivor’s lack of trust or feelings of fear towards other people. The fact that Covid-19 now means most social engagements have to be held outside is also concerning: many survivors, who previously found support in safe indoor spaces, may feel unable to face dark winter evenings outdoors. This could lead to increased social withdrawal and even greater feelings of loneliness at a time when support is needed most.
There are also long-term health implications
As Noreena Hertz identifies in The Lonely Century, “...the chemical presence of loneliness in the body...is essentially identical to the ‘fight or flight’ reaction we have when we feel under attack.”(p.17). Hertz goes on to cite that bodies experiencing loneliness are 32% more likely to suffer a stroke, have a 64% higher risk of developing clinical dementia, and are 30% more likely to die prematurely. For women experiencing both loneliness and PTSD, leading to even greater stress responses in the body, these odds may be even higher.
But there are many things that can prevent this from happening:
- Increase research and resourcing: we need more evidence to fully understand the relationship between VAWG and loneliness and social isolation and inform policy recommendations. Greater resourcing for specialist women’s support services adopting intersectional approaches can also directly support women who are suffering.
- Practise gender-sensitive community care: for those working at the community level, learning more about VAWG can help inform your organisation’s approach to tackling loneliness and social isolation and enable more women and girls to access support.
- Tackle the root causes of VAWG: it is essential that we keep challenging the systemic causes of VAWG to alleviate devastating impacts such as loneliness and social isolation. At The Jo Cox Foundation, we will continue to work with Connection Coalition members to tackle loneliness and social isolation in informed ways. We will also continue our work to tackle systemic causes of VAWG that contribute to loneliness. This includes our work to tackle abuse and intimidation in public life, as well as work alongside Stella Creasy MP and others to Make Misogyny a Hate Crime. | https://www.jocoxfoundation.org/loneliness_vawg |
This activity provides students an interactive demonstration of the electron transport chain and chemiosmosis during aerobic respiration. Students use simple, everyday objects as hydrogen ions and electrons and play the roles of the various proteins embedded in the inner mitochondrial membrane to show how this specific process in cellular respiration produces ATP. The activity works best as a supplement after you have already discussed the electron transport chain in lecture but can be used prior to instruction to help students visualize the processes that occur. This demonstration was designed for general college biology for majors at a community college, but it could be used in any introductory college-level or advanced placement biology course.
- Cellular respiration
- chemiosmosis
- electron transport chain
- metabolism
- ATP
- NADH
- oxidation
- reduction
- mitochondrion
- general biology
- © 2014 by National Association of Biology Teachers. All rights reserved. Request permission to photocopy or reproduce article content at the University of California Press’s Rights and Permissions Web site at http://www.ucpressjournals.com/reprintinfo.asp. | https://abt.ucpress.edu/content/76/7/456 |
Argonne National Laboratory in partnership with the US Department of Homeland Security (DHS) has developed a methodology to systematically evaluate the protection posture and vulnerability of critical infrastructure and key resources (CIKR). This vulnerability methodology is part of a larger effort by DHS called the Enhanced Critical Infrastructure Protection Programme, which seeks to mitigate vulnerabilities, enhance relationships, and improve information sharing between public and private entities. This methodology was constructed to be used in all CIKR sectors and to provide useful results to owners and operators of US facilities. The vulnerability index is also being used to assist DHS in analysing sector and subsector vulnerabilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator also receives an analysis of the data collected for a specific asset, which gives an indication of the asset’s strengths and weaknesses with regard to security. | https://plosjournal.deepdyve.com/lp/inderscience-publishers/protective-measures-and-vulnerability-indices-for-the-enhanced-1ijOmOdURd |
Despite a common belief, very little is known about the structure of water and interfacial interactions. Interfacial water that is adsorbed on the surface of the hydrophilic materials is formed by both water-surface and water-water interactions. It has been discovered that the interfacial water differs from the water in bulk and can exclude solutes and microspheres, and hence it is termed an exclusion zone (EZ). EZ water is known to have a higher refractive index, viscosity, and light adsorption at 270 nm. Charge separation is also caused by water-surface interactions. For example, the water EZ near Nafion™ membranes has an electrical potential of −200 mV.
Studies showed that electromagnetic energy can affect interfacial water. Infrared (IR) energy can cause expansion of the size of the EZ leading to charge separation. This study was conducted by researchers of the University of Washington with IR light of varying intensities and wavelengths to see if they can accelerate the process and bring protons into bulk water. The scientists attempted to shed light on the complex nature of aqueous interfaces.
Experimental analysis
Materials used:
Deionized (DI) water with the resistivity of 18.2 MΩ × cm was purified with a Barnstead D3750 Nanopure Diamond water system. Other materials were a Nafion™ N117 membrane, a potassium phosphate buffer, a pH dye and carboxylate microspheres (1 µm diameter in a 2.5% suspension)
Sample preparation:
Carboxylate microsphere suspensions with a microsphere-to-water volume ratio of 1:300 and pH-sensitive dye with the dye-to-water volume ratio of 1:20 for better visualization were added.
Due to carbon dioxide absorption the water had a slightly acidic pH of 6.35 and was neutralized. To stabilize the pH, a 1 molar potassium phosphate buffer of pH 7.0 made from equal volumes of 1 molar K2HPO4 and KH2PO4 solutions and added at a final concentration of 1 mM.
A Nafion™ membrane of 3 × 20 mm size was pre-soaked in 1 liter of DI water for 24 hours before use.
Control and irradiation experiments:
A thick plastic block chamber was injected with the 1 mL water the containing buffer solution, pH dye, and microspheres. The chamber consisted of a glass slide and a groove in the central vertical plane of the chamber was used to hold the Nafion™ membrane. This setup was placed on the stage of an inverted microscope for observation over 10 min.
For irradiation experiments, mid-infrared (MIR) LED wavelengths at 3.0 μm, and three near-infrared (NIR) LEDs of different wavelengths were used. It was placed 2 mm above the water level in the chamber. The light was kept as continuous as possible with constant emission power. It shone for 5 mins onto the water surface. The temperature of the water samples was obtained using infrared cameras.
Results
Water zones differ from bulk water
Interfacial water excluded dye and microspheres by forming EZ water next to Nafion™. A red zone with of pH 4 was formed beyond the EZ water called proton zone (PZ). The researchers concluded that the protons accumulated there due to growing interfacial water. With the time of contact between Nafion™ and water progressing, the EZ size was doubled as did the PZ. The microspheres drifted away from Nafion™ with time.
Stability of EZ size and PZ size
It was evident from the observation that EZ water was not caused by the substance flowing out of Nafion™. It is believed that the ice-like structure of interfacial water cause EZ and PZ water. This network of hexagonal structure, several hundred microns. Electrostatic attractions exist between the EZ water layers.
Effect of IR radiation on EZ water and PZ water
The proton concentration in PZ water increased with IR intensity along with the size of EZ and PZ. Higher IR intensities weaken the OH bonds aiding those molecules to participate in EZ expansion. IR radiation also caused thermodiffusion with carboxylate microspheres moving away from the IR light spot with increasing intensity.
Effect of NIR on EZ and PZ waters
The study of the effect of NIR on interfacial water can help to better understand light therapy. Red wavelengths and NIR wavelengths are considered suitable due to their ability to deeply penetrate tissue. Light therapy aids in the synthesis of adenosine tri-phosphate (ATP), the universal biological energy currency. This could have medical benefits. Interfacial water could act as a photoreceptor in light therapy, as cells contain macromolecules and organelles. The use of NIR to establish a proton gradient requires further investigation.
Conclusions
The research showed that the EZ and PZ zones in interfacial water stabilize after five minutes and that infrared radiation can considerably increase the size of these zones with intensity. This is possibly due to the special nature of water present on hydrophilic material surfaces.
It is also evident that IR radiation can help in building up microsphere-free zones − a phenomenon that in turn creates proton-rich zones. This is also responsible for charge separation in interfacial water. In summary, some of the mysteries regarding the complexity of interfacial water, EZ, and PZ water zones have been clarified but much remains to be studied.
Outlook
As always, further research to understand the nature of EZ and PZ of water is required. For example the viability and the possibility of the use of NIR for light therapy using interfacial water as a photoreceptor should to be studied. This applications has the potential to make a positive impact on medical applications. | https://frontis-energy.com/tag/interfacial-water/ |
Checking date:
04/06/2021
Versión en español
Course: 2021/2022
Logic
(15970)
Study:
Dual Bachelor in Computer Science and Engineering, and Business Administration (233)
Coordinating teacher:
QUINTANA MONTERO, DAVID
Department assigned to the subject:
Department of Computer Science and Engineering
Type:
Basic Core
ECTS Credits:
6.0 ECTS
Course:
1º
Semester:
2º
Branch of knowledge:
Engineering and Architecture
Requirements (Subjects that are assumed to be known)
There are no course dependencies
Objectives
Learning outcomes: R1. Knowledge and Understanding: knowledge and understanding of the mathematics and other basic sciences underlying Computer Science and Engineering, and specific knowledge of Computer Science, Computer Engineering, and Information Systems. R3, Engineering Design: ability to develop and design complex products, processes, and systems to meet established requirements, that can include an awareness of non-technical ¿ societal, health and safety, environmental, economic and industrial¿ considerations; to select and apply relevant design methodologies. R4. Investigations: ability to use the appropriate methods to pursue detailed investigations and research of technical issues in Computer Science and Engineering. R5. Engineering Practice: Bachelor Degree graduates will be able to demonstrate understanding and knowledge to solve problems, carry out investigations, design devices or processes within the field of Computer Science and Engineering according to cost, quality, security, efficiency, respect for the environment and ethical considerations. These abilities include the knowledge, use and limitations of computer systems, process engineering, computer architectures, computational models, equipment, practical work, technical bibliography, and information sources. Generic and transversal competences: CGB3: Ability to understand the basics of logic and its application to solve engineering problems
Skills and learning outcomes
Link to document
Description of contents: programme
1- Introduction to formal systems Calculus. Definition Consideration on calculi 2- Representation and syntax in propositional calculus Introduction to propositional calculus Syntax 3- Proof theory in propositional calculus. Kleene¿s algebra Introduction to Kleene's algebra Proof and deduction Proof with assumptions 4- Representation and syntax in predicate logic Introduction to predicate calculus Syntax 5- Proof theory in predicate calculus. Kleene¿s algebra Introduction to Kleene¿s algebra Proof and deduction 6- Semantic theory for propositional and predicate calculi Semantic theory for propositional calculus Semantic theory for predicate calculus (I) 7- Resolution method Prenex normal form Skolem normal form Resolution method 8- Computational logic and applications Horn clause and chaining methods Introduction to Prolog
Learning activities and methodology
* Theory sessions: 1 ECTS. Sessions used to introduce the key concepts. Students will receive class notes and references to pursue independent work. * Exercise sessions: 1 ECTS. Guided work sessions devoted mainly to solve Logic exercises related to the theoretical contents. * Independent practical work: 2,5 ECTS. Independent work to be carried out either individually or in small groups focused on thematic sets of exercises provided by the professors. * Continuous assessment tests: 1 ECTS. There are two midterms that evaluate progress during the term. * Office hours: time outside of class scheduled by professors to meet with students either individually or in groups. * Final exam: 0,5 ECTS. Global evaluation of the knowledge and skills developed over the term.
Assessment System
The grading system has a component of continuous-assessment that will allow the students to secure a portion of their final mark. This will be assessed with two tests, with the same weight, that will represent 60% of the final grade. The practical exercises will be assessed via submission of solution proposals and the mentioned tests. The these solutions will not be graded, but complete submission will be mandatory to secure the full mark of the two tests. There will be a final exam with a weight of 40%.
% end-of-term-examination 40
% of continuous assessment (assigments, laboratory, practicals...) 60
Calendar of Continuous assessment
Basic Bibliography
Cuena, J. Lógica Informática. Alianza Informática. 1996
Additional Bibliography
Alfredo Deaño. Lógica Computacional. Alianza. 1978
D. van Dalen. Logic and Structure. Springer. 2004
M. Huth and M. Ryan. Logic in Computer Science: Modelling and Reasoning about Systems. Cambridge University Press. 2004
The course syllabus may change due academic events or other reasons. | https://aplicaciones.uc3m.es/cpa/generaFicha?est=233&plan=437&asig=15970&idioma=2 |
The IfcBeamStandardCase is a standard case element to exchange parametric definitions of the beam shape.
The example includes the local placement, the body shape representation, the material profile set assignment, the beam occurrence and beam type definitions. The focus points are the use of cardinal points to align the beam profile to the axis, the use of parametric profile definitions and the assignment of material information to the profile.
|
|
The example in Figure 493 declares two parametric beam types, one with an I-Shape profile and the other with a T-Shape profile. Each type has nine occurrences, using various cardinal points to align the profiles.
|
|
Figure 493 — Beam occurrences
|
|
The beam 'A-9' in Figure 494 is an occurrence of the 'IPE220' type having an I-Shape profile, placed along an axis using the upper-right cardinal point.
The cardinal point of the beam 'A-9' is set to the upper-right, indicating that the 'Body' representation should be generated with the upper-right of the profile aligned along the curve of the 'Axis representation.
|
|
Figure 494 — Beam profile and cardinal point usage
|
|
The 'IPE220' beam type in Figure 495 is represented by IfcBeamType. As a parametric definition, this beam type does not have any geometric representation, rather it has a material profile set association indicating a cross-section which may be applied to paths defined at occurrences.
|
|
Figure 495 — Beam type graph
|
|
Each beam occurrence as in Figure 496 is represented by IfcBeamStandardCase. The IfcMaterialProfileSetUsage entity indicates the alignment of the material profile set according to cardinal point. The IfcMaterialProfileSet indicates a single material profile. The IfcMaterialProfile indicates an I-Shape cross-section of steel. The IfcIShapeProfileDef indicates shape parameters of the I-Shape profile. The IfcMaterial indicates the steel material, which could be further elaborated with structural properties, surface styles, and fill area styles. | http://www.buildingsmart-tech.org/ifc/examples/building-element-standard-case/beam-standard-case.htm |
- The /r/ phoneme may be realised as either an alveolar trill (r), a uvular trill (ʀ), a voiced uvular fricative (ʁ), or a voiceless uvular fricative (χ).
The lack of a corresponding aspirated series in the dental stops is believed to have resulted from an earlier shift where the dental aspirate *tʰ became a dental lateral *ɬ̪ʰ, which later simplified to the /ʃ/ of today. A similar process is believed to have happened with the voiced counterpart, ultimately merging with /z/.
Vowels
|Front||Central||Back|
|Closed||i||u|
|Mid||e||o|
|Open||a|
All vowels come in both long and short variants. Long vowels are written with a circumflex (â, ê, î, ô, û). The length distinction is phonemic, e.g. indicative azbâzún (‘I write’) versus optative azbazún (‘That I may write’).
In some parts of the language there appears to be an opposition between front and back vowels. This “weak” vowel harmony is most prominent in the case-inflection of nouns. Surprisingly, the central open vowel /a/ often agrees with the back vowels.
Morphology
Verbal morphology
Verbs are inflected for tense (present, past, future), mood (indicative, optative, imperative), and voice (active, passive). Generally, verbal roots are of the fashion CVC- which are then built on to form the relevant mood-inflected stem either by a process of vowel lengthening or by aspiration of the final consonant. These are the conjugated finitely by affixing voice, person and tense markers.
Finite verbs
Firstly, to construct the verb, the appropriate stem has to be derived from the root. The indicative stem is formed by lengthening the root vowel (CVC- → CVːC-) whereas the optative mood is formed by aspirating the final consonant (CVC- → CVCʰ-). After this step has been performed, if the verb is desired to be passive, an a- will be prefixed. Finally, the relevant person prefixes are added together with the appropriate tense suffix.
The person prefixes are the same across all categories save the imperative and are given in this table.
person singular plural 1 az- karaz- 2 uz- karuz- 3 iz- (m.) / izil- (f.) kariz-
The tense suffixes are invariable. For the present (pres) add -ún, the future (fut) -án, and for the past (past) -át.
The imperative mood is marked by prefixing tar- for the second person singular and kar- for the plural to the optative mood stem. No tense markers are added.
Thus, a fully inflected or finite verb may look like this:
- azabakhún ‘I wish to be seen’ from √bak-
- tarmah ‘Know!’ from √mah-
Infinitive verbs
The infinitive or non-finite verbs are characterised by not being inflected for either person or tense. Some of them however, do change to indicate things such as mood and voice. One analysis separates these infinitive verbs based on whether they show mood and voice or not. Another, does it on their morphological shape; the results however, are the same. They will be described using the morphological approach here, wherein they are divided into a simple and a complex group.
Simple
The simple infinitives are as one might suspect, very simple in their form. They are identical to the voice-inflected stems, i.e., they look exactly the same as finite verbs stripped of their person and tense markers. Thus from the simple root √bak- we can extract the infinitives bāk ‘to see’, bakh ‘wish to see’, abāk ‘to be seen’, and so on.
Complex
The complex infinitives are a jumbled group which all have in common their formation from the naked verb root. Luckily, their formation is readily memorable.
The verbal noun (vnoun) is formed by adding -ín to the root. It denotes the action pure and simple and does not engage in verb syntax. As it readily exposes the root, it is also used as the lemma form for all regular verbs and together with the optative present first person for the irregular ones.
- bakín ‘the act of seeing’
The infinitive of purpose (prps) is formed by adding -áyim to the root. This form is used in conjunction with verbs of motion to indicate purpose.
- zirakáyim azfârún êbuyâkhrôm ‘I travel to the fortress to explore’
The verbal participle (ptcp), a kind of adverbial, denotes an ongoing action of the verb. It is formed by suffixing -šku.
- azalušku (‘away-dwindling’) from √LUH- (‘diminish’).
Nominal morphology
Nouns
Nouns are marked for both case and number. The inflections always fully harmonise with the final vowel in the word stem with the exception of the possessive case, which only does so partially. There is an opposition between front (e, i) and back vowels (a, o, u) which is reflected in the final vowel of the polysyllabic suffixes (a/u vs. i). All but the final vowel harmonises with the vowel of the last syllable in a word. A word with a nominative ending in -â will in the accusative plural have -amaz. Likewise, a word ending in -ô will have -omaz as its accusative plural.
|Noun declension|
|case||singular||plural|
|Nom.||-Ø||-Vz|
|Acc.||-Vm||-VmVz|
|Poss.||-Vlun||-Vlunaz|
|Cons.||-VzVl||-VkVzVl|
|ânaya silver|
|case||singular||plural|
|Nom.||ânaya||ânayaz|
|Acc.||ânayam||ânayamaz|
|Poss.||ânayalun||ânayalunaz|
|Cons.||ânayazul||ânayakazul|
|êkêš vessel|
|case||singular||plural|
|Nom.||êkêš||êkêšez|
|Acc.||êkêšem||êkêšemiz|
|Poss.||êkêšelun||êkêšelunaz|
|Cons.||êkêšezil||êkêšekezil|
Adjectives and adverbs
Adjectives and adverbs (adpar) are identical in form with the exception of a few suppletive pairs. This means that ašûbu (‘new’) can be used both with a noun: ašûbu zaphrâ (‘new flower’) and in a verb phrase: ašûbu izil-râkát amunam (‘she recently found a bracelet’). They belong to one of the simplest parts of the morphology as they do not inflect for case or number. They are always found before their heads (adj + noun).
One of the simplest ways of reinforcing an adjective is by reduplicating the first syllable. Thus, ašûbu becomes ašašûbu (‘new-new’). This is a defining feature of the spoken language and occurs only rarely in the written where the augmentative infix usually is preferred.
Determiners
Definiteness
There is only one definite article nâr which is invariable for number and case. There is no indefinite article.
- nâr zaphrâ ašišidu (‘the flower is sort of snowy’)
It can be combined with several adpositions, similar to languages like Portuguese, albeit with the definite article coming first in the construction.
- nâra (‘to the’ or ‘from the’) from combining with aya (‘to’) or with az (‘from’).
- nârda (‘down to the’) from adding dala
- nârba (‘out from the’) from adding bakha
Demonstratives
Khaz makes a two-way distinction (proximal versus distal) among its demonstratives.
|Proximal (Close)||Distal (Far)|
|ina||ana|
Personal pronouns
The personal pronouns in Khaz are a simple matter. Mostly, they behave like nouns and inflect similarly, with the one major difference being that both the nominative singular and all plural forms inflect using an alternative stem. The third person pronoun also include a distinction for masculine and feminine that parallels the one found in the verbal pronoun prefixes.
|Person||First||Second|
|Case ↓ | Number →||Singular||Plural||Singular||Plural|
|Nominative||ašaz||ašnum||ušaz||ušnum|
|Accusative||azum||ašnum||uzum||ušnum|
|Possessive||azûl||aškakûl||uzûl||uškakûl|
|Number||Singular||Plural|
|Case ↓ | Gender →||Masculine||Feminine||Masculine||Feminine|
|Nominative||išaz||išal||išnum|
|Accusative||izum||izilum||išnum|
|Possessive||iškûl||izilûl||iškakûl|
Derivational morphology
Verbal derivation
The verb system has a rich system of derivational affixes that may be used to expand on the meaning of the basic monosyllabic root.
The ka-prefix is the first and most commonly encountered verbal affix, where basic verbs go from CVC- → kaCVC-. It carries a basic meaning of intensity and is also used for emphasis.
- izlâbát (‘he has fallen’) versus izkalâbát (‘he has truly fallen’).
The ya-prefix is used to form causative verbs out of intransitive verbs.
- izil-yakhûzát izúm (‘she made him cry out’) versus izil-khûzát (‘she cried out’).
The ta-infix forms the iterative. It is placed before the last consonant in the stem.
- azrâtabún (‘I rewrite’) versus azrâbún (‘I write’).
Nominal derivation
Deverbalisation
The verb root can also serve as the basis for constructing new adjectives and nouns.
The verbal adjective, which denotes a result or state by the verb, is formed by doubling the final root consonant and adding the circumfix a-...-î.
- amahhî (‘knowing’) from √MAH- (‘know’).
The agent noun, that is someone who carries out the action, is formed by adding the circumfix ya-...-a to the verb root.
- yabika (‘builder’) from √BIK- (‘build’).
To form a result noun, the verb root takes the suffix -šdi
- râšdi (‘knowledge’) from √RAK- (‘find’).
Denominalisation
Nouns can become adjectives by adding the suffix -du.
- ašaddu (‘stony’) from ašakh (‘stone’).
Previously, there was a separate suffix -nâ, however it is no longer productive.
- enukâšnâ (‘forcefully’) from enukâš (‘impact’)
Deadjectivalisation
Adjectives may cease to be adjectives and become nouns by being nominalised with a variety suffixes.
The singulative suffix -(z)ôn creates nouns characterised by the adjective.
- ašûbuzôn (‘the new one’) from the adjective ašûbu.
The abstract suffix -(a)dda creates nouns that mean ‘the quality of the adjective’.
- sûkhnâdda (‘oldness’) from the adjective sûkhnâ (‘old’).
Compounds
Augmentatives and diminutives
Many of these have been strongly lexicalised with a meaning that is not always transparent. It is prudent to memorise all pairs of words and not rely on the meaning always being clear.
Nominal augmentatives are formed with the infix -nV-, where V stands for a short echo vowel. Generally, it is spliced in before the last syllable, as in the following examples.
- êbuyâkhrô (‘fortress’) and êbuyânakhrô (‘castle’, ‘great fortress’)
- arûza (‘mound’) and arûnuza (‘hill’).
Nominal diminutives are formed by suffixing -mô. Occasionally the stem is clipped, as in the second example.
- têph (‘drop’) and têphmô (‘droplet’), as found in the flower name ašitêphmô (‘snowdroplet’).
- efâyamri (‘sea voyage’) and efâyamô (‘short naval excursion’)
These can further be combined with the other augmentative and diminutive affixes. E.g., tefâyamô (‘a short naval excursion that is great in its size’)
Syntax
Phrase order
The normal word order is subject-verb-object (SVO). It can however be disrupted for stylistic purpose into several other orders.
|ukaba||a-labb-î||yarôkhaza||iz-a-yâr-át||nâr-a||azûrem|
|and_so||adlz-adlz\low-circ||wizard||3sg.m-mediopass-come.ind-pst||def-all||island:acc.sg|
“And so the Wizard humbled came to the island”
Focalisation
Verb focus
VSO order is used to emphasise the verb phrase.
|gar-šku||gôr-amahhî-zôn||nâr||arûtulbhi-maz|
|war-ptcp||king-knowing-nmlz||def.art||traitor-acc;pl|
“It was warring he was, Gôr-Amahhîzôn against the traitors.”
Object focus
To emphasise an object, the object is broken out of the sentence and referred to with ina. The word order of the clause changes to demonstrative-subject-verb.
|aškabhal||ina||az-bâr-án|
|apple||prox.dem||1sg-eat-ind.act-fut|
“An apple, that's what I'll eat”
Noun phrase
The noun phrase begins with the definite article nâr (if present), then follows the adjective. These always precede the noun, whereas the numeral, the genitive and the relative clause always follow it.
|nâr||amahhî||yabika||aš||bâlulun||ašakham||bâšku|
|the||wise||builder||one||lord's||stone||seeing|
“the lord's single wise builder, seeing the stone”
Verb phrase
Compound verbs
Compound verbs of the structure V+V are used regularly in Khaz. They are formed by using the verbal participle (ptcp) of the primary verb followed by a light verb which carries all the relevant inflections.
|išaz||khaz-šku||iz-kîbh-ún|
|3sg.m.nom||speak-ptcp||3sg.m-want.ind.act-pres|
- “he is trying to talk”
Verb framing
Khaz is a verb-framing language and often uses a compounding verbal structure to describe manner of motion for verbs. | http://linguifex.com/wiki/Khaz |
In recent years, crises have become more commonplace, largely due to extreme weather conditions brought about by climate change.
With communities increasingly vulnerable, public administrators have a vital role to play in identifying and responding to threats rapidly.
The infographic below details some of the most common types of modern-day crises and provides an insight into the role of public administrators in crisis management.
As the effects of climate change become increasingly apparent, public administrators in the US are dealing with a growing number of crises.
In 2016, there were 42 major disaster declarations and 7 states of emergency compared to 36 major disaster declarations and 1 state emergency in 1994.
Unpredictable, extreme weather events have contributed to an increased risk of flooding, hurricanes and tornadoes.
To manage crises, public administrators must have procedures in place, which allow them to work through phases, including prevention, preparedness, response and recovery and reconstruction.
The priority is to protect human lives and to minimize the risk of damage by investing in preventative measures, such as physical flood barriers and enforcing advanced building codes.
The next step is to ensure people are ready for what is coming their way. Measures that may be introduced include providing evacuation warnings, preparing shelters and making sure backup power supplies are available.
To respond to disasters, those at risk should be evacuated, critical infrastructure should be repaired as quickly as possible and urgent services restored and supported.
Finally, to aid recovery, administrators can provide support in terms of construction teams and financial assistance for those affected.
The infographic contains a series of case studies, which underline the importance of a cohesive, quick response from public administrators.
As technology evolves, tools like satellite data and early earthquake warning systems will prove increasingly beneficial. | https://suefoster.info/a-guide-to-public-administration-and-modern-crisis-management |
Report: Google to phase out Windows, cites security issues
Google is phasing out Microsoft Windows, citing the Aurora attacks, which targeted a flawed version of Microsoft Internet Explorer, according to a report in The Financial Times.
Months after the Aurora attacks in which attackers successfully penetrated Google systems by targeting a vulnerable version of Microsoft Internet Explorer, Google is phasing out the Windows operating system in favor of Mac and Linux machines.
- Josh Corman, Research Director, Enterprise Security Practice The 451 Group
According to a report in The Financial Times on Monday, Google is suspending internal use of Windows as part of an ongoing "security effort." Citing several Google employees, the paper reported that new hires at the search engine giant are limited to choosing Mac OS X or Linux computers. The paper said Google would not comment on its current policy.
Google and more than two dozen other enterprises were targeted in a wave of corporate attacks in January. Called Operation Aurora, the attackers used social engineering tactics and a flaw in Internet Explorer 6 to gain access to Google's corporate network and employee email accounts. Microsoft released an emergency update, repairing the vulnerable browser and blocking the attacks.
The move also comes ahead of the official launch of Google's lightweight Chromium OS, which is expected to be used in laptops, netbooks and mobile devices. When Google announced the new OS last July, the company touted its security features. Similar to the Chrome browser, Chrome OS will use the same sandboxed rendering engine, with much of the data storage located online. The sandbox approach isolates application processes from other operating system processes. All applications running in Chromium OS will be Web-based and can be subjected to the application sandboxing feature.
"The entire experience takes place within the browser and there are no conventional desktop applications. This means users do not have to deal with installing, managing and updating programs," according to Google's official announcement of the Chromium open source project.
Google security news:
Will Google Chrome enhance overall browser security? Expert John Strand reviews Google Chrome's browser security features and what the new tool will mean for enterprise IT teams.
Some security experts doubt that Google would pull the plug on Windows entirely. Josh Corman, research director at The 451 Group said a perfectly secure OS is virtually unachievable. Even hardened Linux systems are so limited that they are unusable, he said.
"An operating system platform choice is a business decision not a security decision in most companies," Corman said. "That's a complex decision in which security may be a factor, but not the factor. "
It doesn't matter whether a company moves off one operating system in favor of another, Corman said. If an attacker wants to get into Google or any other enterprise, they will find a way.
"It would be mistake to say one OS is more secure than another," Corman said.
The Chrome browser is also automatically updated, a feature that is anticipated in the new Google OS. Security experts said the automated updates reduce user interaction and enable faster patch deployments. Both Microsoft and Apple issue automated updates for Windows and Mac OS X, but prompt the user to confirm the update.
Microsoft Windows and its Internet Explorer browser has been a favorite targeted of attackers, due to its vast market penetration. Microsoft recommends that enterprises upgrade end users to newer versions of its browser, but most firms have been slow to upgrade. Internet Explorer 7 and 8 include advanced security features that detect phishing attacks, isolate some browser ActiveX controls and limit processes running in memory, blocking many sophisticated attacks. Microsoft's latest OS, Windows 7, builds on the security features in Windows Vista and reduces user fatigue, a common issue cited in Vista. It simplifies the use of data encryption and adds a layer of authentication for administrative processes.
Security experts say Google Chrome's initial security advantage will be its low market share, making it a less lucrative targeted for attackers. Once the OS gains momentum, attackers could target other processes, including third-party browser components the security of which are fundamentally out of Google's control. In a recent review of Google Chrome's security features, SearchSecurity.com's Michael Cobb noted where Chrome may show some weaknesses.
"Google Chrome must support plug-ins, such as Flash Player and Silverlight, but these plug-ins are not designed to run in a sandbox. They require direct access to the operating system and peripherals, such as the user's webcam and microphone. This means Chrome can't currently run them in a sandbox," Cobb said. | https://searchsecurity.techtarget.com/news/1513726/Report-Google-to-phase-out-Windows-cites-security-issues |
Whenever you begin the process of building something, your first step is to create a solid foundation. This is the goal of the Level One curriculum. Here you will be introduced to the first of three empty hand forms, known as Siu Lim Tau or “the Little Idea.” You will also learn the basic structures that form the “hands” of Wing Chun, explore core concepts and principles, and practice the initial set of trapping and reflex development drills.
It is important to follow the progression exactly as presented. The Wing Chun grandmasters carefully designed this hierarchy of training material to build skill, structure, strength and sensitivity in a very specific and incremental way. Every skill that you develop now becomes the foundation for other skills as you progress. Skipping or rushing through a training set will only introduce a weakness that will become apparent later on.
Empty Your Cup
There is the famous story of the college professor who travelled to meet a great Zen master. The master invited him in and set out cups and a pot of tea. The professor first asked the master to instruct him in all of the ways of Zen, but then began to recount all of his past experiences, degrees, books he had read and other masters he had interviewed. As the Zen master listened politely to the professor, he began to pour the tea. As the professor’s tea cup filled, the master continued to pour until tea overflowed and poured out over the tabletop.
“Stop!” the professor cried. “The cup is full. It cannot hold any more!” The Zen master nodded in agreement. “How can I share with you, if you are already full?” the master replied. “If you truly wish to learn, you must first empty your cup.”
The point of this story is simple: don’t make assumptions based on any other martial art that you have trained in, any other books you have read or any movies that you’ve seen. Wing Chun Kung Fu can be very different from most of the other popular martial arts, so don’t try to view it through the lens of past experience.
Trust but Verify
This doesn’t, however, mean not to think critically. As part of your self-evaluation, you will need to be able to test each concept and technique to verify both that the principle behind the technique is valid, and that you are performing it correctly. A companion element is trust. The testing and verification should be done within the context of the drill. By changing the “rules” of the drill, it is possible to invalidate just about any technique. For now, stick to the drills as presented, trust that other variations will be covered in the future, and verify that you can reliably perform the technique when needed.
All of these ideas can be summed up simply:
Keep an open mind, just not so open that your brains fall out.
LEVEL ONE REQUIREMENTS:
Attendance: Minimum of 40 Classes/Training Sessions
Form
Physical Requirements
- 10 Sets of 10-Count Knuckle Push-ups
- 25 Sets of One Legged Battle Punches
Footwork
- The Wing Chun Formal Salute
- “Yee” Jee Kim Yeung Ma
- Jut Sun Ma
Drills
- Pak Sau
- Tan Sau
- Jop Sau
- Jut Sau
- Huen Sau
- Lop Sau
- Bong Sau
- Bil Sau
- Gan Sau
Gates
Trapping
- Pak Da
- Lop Da
- Pak Sut
- Right Side
- Left Side
- Right to Left
- Left to right
Rounds
- One Three-Minute Gates Round
- Minimum of 150 Punches
- Demonstrate Bil Da, Gan Da and Jut Da
NEXT: The Wing Chun Salute
The Wing Chun salute is used to begin a training session and show respect for the Sifu and your training partners. In the next lesson we explore the meaning behind the salute and walk you through the motions step-by-step. | https://wingchunconcepts.com/wing-chun-concepts-level-one/ |
As physicians, nurses, and other health professionals, we are already seeing the devastating impacts of the climate and ecological crises in our offices, in hospitals, and in communities ravaged by forest fires, crop failure, habitat loss, and water scarcity. In addition to the deadly heat dome, which caused the premature death of at least 595 people in our province, we saw patients with wildfire-related respiratory and cardiovascular distress, and we are seeing patients from all walks of life experiencing signs and symptoms of depression and anxiety related to the climate emergency. And now, of course, we are seeing the health impacts of the recent devastating rains and floods across much of B.C.
Moreover, we recognize that the harms resulting from these changes “disproportionately affect the most vulnerable, including children, older populations, ethnic minorities, poorer communities, and those with underlying health problems,” as well as people in low-income countries and – in B.C. and around the world – Indigenous peoples. Indigenous communities are of particular importance because they are both affected by the damage and destruction wreaked on their ancestral lands, and by the loss of those lands to colonial powers, and yet, as the UN recognizes, they are also important stewards of the land who carry invaluable traditional knowledge.
We have taken the Planetary Health Pledge to protect the health of people, their communities, and the planet. We maintain the utmost respect for human life and the diversity of life on Earth. We are dedicated to the health, longevity, and wellbeing of the people of B.C. and people everywhere and take these warnings seriously. However, we are also heartened by the potential health benefits of the transition to a society in which human well-being, in balance with nature, is the focus.
The heat dome caused the premature death of at least 595 people in our province.
The B.C. government must take equally seriously the threats of climate and ecological changes and the potential health benefits of transitioning to a sustainable, just, and healthy society that is at peace with nature.
- It must declare a Climate and Ecological Emergency and establish a transformative emergency plan that embeds equity, anti-racism, and social justice at its core and recognizes the interconnectedness of the climate, ecological, and social crises.
- That plan must include action on climate change and action to protect and restore nature. More broadly, we call for broad transformative change that puts human well-being in balance with nature at the heart of all policies and ensures a just transition to a healthy, just and sustainable society. Moreover, the plan must be collaboratively developed with B.C.’s First Nations and Indigenous peoples.
Yet on the climate front B.C. is still pushing for new fossil fuel extraction and export, is still providing tax breaks and other forms of support to the fossil fuel industry and has yet to declare a climate emergency.
- We call on the B.C. government to address these deficiencies by undertaking a comprehensive health impact assessment for all forms of energy created or used in B.C., so that B.C. can create energy policy based on a full understanding of the impacts of different energy systems on well-being, both locally and globally.
- Other key steps are to end fossil fuel subsidies; stop all new fossil fuel infrastructure projects and rapidly phase out fossil fuel production and exports; set legally binding emissions targets based on evolving climate science, and invest in a regenerative zero emissions economy.
But this is not just about action on the climate emergency, important as that is. As the UN Environment Program (UNEP) recognized in February, the world faces at the same time a crisis of biodiversity loss, a crisis of pollution, and other human-driven ecological crises. For the sake of humanity, doctors are asking for governments to do as the UNEP says, and make peace with nature.
- Thus we call on the B.C. government to protect terrestrial and marine ecosystems, including in particular old-growth forests; return to its commitment to bring in a Species at Risk Act and/or bring in an overarching biodiversity law to prioritize ecosystem health and biodiversity conservation across all sectors, and recognize the right to a healthy environment and the rights of nature.
Beyond even that, we need to create broad transformative change focused on human well-being in balance with nature.
- Important steps include bringing in an alternative to GDP that truly reflects social and ecological well-being and progress; bringing in a Well-being Budget, as the government in Aotearoa/New Zealand has done, and creating a Commissioner for Future Generations and a Well-being of Future Generations Act, as Wales has done.
A transition to a new green economy will need to incorporate a broad reimagining of cities, transportation systems, food production and distribution, financial markets, health-care, and educational systems.
- We must invest in organic, local, and regenerative agricultural systems, prioritize public transit and active transportation, accelerate the transition to zero-emissions vehicles, and require all new buildings to be zero-emissions by 2025, with a plan to support rapid retrofitting of all existing buildings.
Finally, we recognize the potential for the transition to a green economy to create inequitable health impacts upon fossil fuel workers, resource-dependent communities, and Indigenous communities that are impacted by fossil fuel production.
- Accordingly, a just transition must be designed in partnership with those most affected, to ensure they are protected.
Some useful links and resources
- A brief Agenda for Action.
- Doctors for Planetary Health – West Coast
- Code Red BC
- Canadian Association of Physicians for the Environment (CAPE)
- Canadian Association of Nurses for the Environment (CANE)
- Canadian Coalition for Green Health Care
- Lancet Planetary Health
- Planetary Health Pledge
- Editorial published in September 2021 in more than 200 leading medical journals – “Call for emergency action to limit global temperature increases, restore biodiversity, and protect health”
- WHO’s COP26 Health Programme
- COP26 Special Report on Climate Change and Health
- 2021 Global Conference on Health and Climate Change at COP26
- United Nations Environment Programme (2021). Making Peace with Nature: A scientific blueprint to tackle the climate, biodiversity and pollution emergencies. UNEP. Nairobi. | https://healthydebate.ca/2021/11/topic/agenda-action-planetary-health/ |
The standards for bioequivalence in Canada are built upon internationally recognized standards and the criteria are amongst the highest in the world. Health Canada scientists ensure that the standards for bioequivalence are adhered to and kept up to date as they work closely with an expert panel of scientists, physicians, and pharmacists from across the country.
Bioavailability is a measure of the rate and extent to which the therapeutically active ingredient in a drug product is absorbed into the body. Bioavailability is assessed using two main variables: blood concentration over time; and, the maximum concentration of the active ingredient in the blood stream.
If two different drug products provide the same bioavailability, then they are bioequivalent. If a generic drug is bioequivalent to the brand-name version, there is no meaningful difference between them in terms of the drug’s safety and the way in which the drug works in the body. A bioequivalent generic drug is as safe and as effective as the brand-name version.
In a typical bioequivalence study, there are between 32 and 72 people tested. These individuals are separated into 2 groups and the study includes two periods.
In the first stage, Group 1 is given a generic drug and Group 2 is given the brand-name version of the drug. The extent of drug absorption based on the blood concentration of the drug over time, the maximum observed concentration of the drug and the time it takes to reach that maximum concentration are measured to assess the bioavailability of the drug in both groups of peoples.
At the second stage of the bioequivalence study, the group that received the generic drug in stage one is now given the brand-name drug, and the group that was given the brand-name drug is given the generic drug. The bioavailability of the drug in these two groups is assessed and measured in the same way as stage one. The bioavailability of the brand-name drug is then compared to that of the generic drug in each individual participating in the study. When these comparisons demonstrate a similar extent of absorption and a similar maximum drug concentration, bioequivalence is proven and the generic drug is confirmed to be as safe and effective as the brand-name version.
Scientifically Acceptable Variability – Every individual’s absorption and the maximum concentration achieved are unique; no one absorbs at the same rate as another person, and no single individual will absorb the exact same amount of the active ingredient at various times after drug administration, therefore health authorities have developed something called an “acceptable range of variability.” When testing a drug across a large number of people to determine a drug’s safety and effectiveness, variability must be part of the analysis because even though the drug is the same, everyone’s response will not be the same. This “acceptable range of variability” exists when testing a brand-name drug as well as when testing generic drugs. | https://canadiangenerics.ca/get-the-facts/bioequivalence/ |
Black, Latinx, and Indigenous adolescents experience more suspensions, expulsions, and school-based arrests than White students. However, minoritized students do not engage in problematic or disruptive behaviors more frequently but rather at equal or lower rates than their White counterparts. One factor that may contribute to this discipline gap is race essentialism, which is the belief that there are deep-rooted, unalterable traits and abilities unique to each racial group. Race essentialism, which has been linked to stereotyping, prejudice, intergroup trust and closeness, and cognitive flexibility, has not been studied in a school discipline context. Demonstrating associations between race essentialism and teachers’ beliefs and practices, such as discipline, empathy, and growth mindset, as well as their beliefs about working with minoritized students, may bridge the two fields of research. Therefore, the primary goals of the proposed study were to 1) examine the psychometric properties of a measure of race essentialism previously used in other contexts, and 2) using a vignette, investigate whether endorsement of racial essentialist views was related to preservice and practicing teachers’ beliefs and attitudes regarding equitable teaching and discipline practices. The third aim was to explore whether the manipulation of preservice teachers’ beliefs about race was associated with perceptions of diverse students and their discipline practices. Generally, the results provided evidence that race essentialism is related to educators’ perceptions of minoritized students’ misbehavior and their beliefs about these students more broadly. | https://epublications.marquette.edu/dissertations_mu/1205/ |
Informal communication is a form of communication that does not involve a set of pre-determined rules or procedures. It is typically characterized by its spontaneity and its ability to facilitate the exchange of ideas and thoughts. In many cases, informal communication is more effective than formal communication, as it allows for a greater degree of flexibility and creativity. Additionally, informal communication can help to build relationships and trust within an organization.
Informal communication is a process that is often taken for granted in the workplace. It is the means by which employees share information and ideas with one another in a way that is quick, easy, and efficient. Many times, it is the informal communication process that allows for the development of trust and relationships among coworkers.
There are a number of ways to build informal communication in the workplace. One way is to create an environment that is conducive to open communication. This can be done by establishing a culture of trust in which employees feel comfortable sharing information and ideas with one another. It is also important to encourage employees to get to know each other on a personal level. This can be done by organizing team-building activities, or by simply taking the time to chat with coworkers about their lives outside of work.
Another way to build informal communication is to make use of technology. A variety of tools, such as instant messaging, chat rooms, and social networking sites, can be used to facilitate communication among employees. These tools can be especially useful for employees who are located in different parts of the country or the world.
In the end, the most important thing is to make sure that employees have the opportunity to communicate with each other. This can be done in a variety of ways, and it is up to the employer to find the approach that works best for his or her organization.
Informal communication is an essential part of human resources management for several reasons. First, informal communication allows for the exchange of timely and relevant information between managers and employees. This type of communication can help to create a more open and responsive organization, which can be crucial for making quick decisions in a fast-paced business environment. Additionally, informal communication can help to build strong relationships between employees and managers, which can lead to a more productive and positive work environment. Finally, informal communication can help to keep employees informed about the company's goals and objectives, which can help to motivate them and align their work with the organization's overall strategy.
Informal communication is an important part of human resources in any company. However, it is especially important in companies that are growing rapidly or have a high turnover rate. In these companies, it is often difficult to keep track of all the new employees, and informal communication can help to make sure everyone is aware of the company's policies and procedures. In addition, informal communication can help to build team spirit and create a sense of camaraderie among employees. | https://www.quitgenius.com/hr-glossary/informal-communication |
There is a pressing need to reshape the world energy economy and shift to a sustainable, zero-carbon economy within the next 20-30 years. This sets huge scientific challenges but also offers enormous opportunities. To achieve a zero-carbon future we need both incremental improvements of existing technologies, but also new science and new materials to make use of the significant headroom that remains for improving the performance, cost, reliability, and sustainability of our energy technologies.
The Optoelectronics Group of the Cavendish Laboratory brings together several research groups interested in the fundamental materials and device physics of novel classes of organic semiconductors, hybrid organic-inorganic perovskite semiconductors as well as other functional materials, that could help addressing these challenges. These materials typically contain weakly van-der Waals bonded molecular units, that can be tuned by chemical design and give rise to unique physical properties and phenomena, including molecular quantum effects as well as strong coupling between electronic excitations and vibrational dynamics. Our focus is on understanding these phenomena in their full depth using a broad range of experimental approaches supported by theoretical simulations and to exploit them for applications in large-area electronics, optoelectronics, bioelectronics and renewable energy technologies.
More detailed information about specific research interests can be found on the following sites:
|
|
Photovoltaics: We study the optoelectronic physics of new, soft functional materials, including organic and hybrid organic-inorganic semiconductors and their use in solar cells and novel device concepts for harvesting solar energy.
|Ultrafast optical spectroscopy and microscopy: We develop and use time-resolved optical spectroscopy and microscopy techniques that probe the fundamental electronic and ionic processes in novel energy materials with high spatio-temporal resolution. This provides powerful insight into the operation of a broad range of energy devices, ranging from photovoltanics to batteries.|
|Charge transport and thermoelectric physics of soft functional materials: 2/3 of our primary energy is currently wasted as heat. We research new thermoelectric materials and device concepts for converting waste heat into useful electricity. The unique characteristics of organic and hybrid organic-inorganic semiconductors could enable more efficient thermoelectrics, but the relevant physics needs to be better understood.||Sirringhaus|
|Molecular Nanoscale Mechanics: We investigate the mechanical properties of organic macromolecular systems using nanoscale metrology and atomic force microscopy and realize new micro/nanofabricated resonant mechanical devices that convert mechanical into electrical energy.||Venkateshvaran|
|Energy efficient lighting: Currently 20% of world electricity is used for lighting. There remains significant scope for further enhancing performance and efficiencies of light-emitting diodes and reducing their cost. For this we explore new organic and hybrid organic-inorganic semiconductors.|
We are currently working together on an EPSRC programme grant "VET-SOFT" on understanding vibration-enhanced transport in these functional materials with soft vibrational dynamics. | https://www.oe.phy.cam.ac.uk/research |
CROSS-REFERENCE TO RELATED APPLICATIONS
FIELD OF INVENTION
The present technology is generally directed to processes for repairing wall and surface damage.
BACKGROUND
BRIEF SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
This application claims benefit of priority to U.S. Provisional Patent Ser. No. 62/544,890, filed Aug. 13, 2017, which is incorporated by reference in its entirety.
Many of the wall and surface patch methods used today depend on the applicators skill in applying plaster or other materials to fill the damaged area and/or on their skill in sanding the plastered surface or in creating the appropriate surface texture to provide a repair customized to the damaged area and surrounding surfaces. Alternatively, premade patches that are substantially planar do not fill the space of the damaged area and simply rests above the damage, resulting in an inferior repair that may be conspicuous and poorly matched to the wall or surface and may reduce the structural integrity of the wall or surface. Planar patches tend to be ill suited to damaged areas that are not flat such as damage in decorative plaster shapes or damaged areas that span surfaces with different dimensions. Moreover damage may occur to items made of a multitude of different materials and it may be hard to find a repair kit or materials that are suited to the surface that is damaged. Thus, there exists a need for a system to create a customize patch to fix damaged areas or any shape, size, and/or material that does not require specialized skills to create an inconspicuous and structurally appropriate patch.
Disclosed herein are methods and systems for preparing customized wall and surface repair patches. The methods and systems utilize surface and/or image data to prepare 3D models for repair patches unique to the particular damage by analyzing the surface or image data to generate a 3D model that a user can evaluate or augment before generating instructions for producing the repair patch.
In one implementation, the method for the production of a repair patch comprises receiving, at a backend system, surface data of a damaged surface imaged by an imaging device from a user device; generating, by the backend system, a 3D model of a repair patch from the surface data; and transmitting the 3D model from the backend system to the user device. In some implementations, the method further comprises receiving, at the backend system optional features selected by a user and generating, by the backend system, the 3D model of a repair patch from the surface data and the optional features selected by the user. In some implementations, the method further comprises generating, by the backend system, instructions for producing the repair patch corresponding to the 3D model. In some implementations, the method further comprises producing the repair patch from the instructions. In some implementations, the method further comprises receiving, at the backend system, additional surface data of the damaged surface and/or optional features selected by a user and generating, by the backend system, an updated 3D model of the repair patch. In some implementations, the method further comprises generating, by the backend system, instructions for producing the repair patch corresponding to the updated 3D model.
In another implementation, the method for the production of a repair patch comprises transmitting, from a user device to a backend system, surface data of a damage surface imaged by an imaging device; receiving, from a backend system, a 3D model of a repair patch generated by the backend system from the surface data; and transmitting, from the user device to a display device, the 3D model of the repair patch for evaluation. In some implementations, the method further comprises transmitting, from a user device to a backend system, optional features selected by a user and receiving, from the backend system, the 3D model of a repair patch generated by the backend system from the surface data and the optional features selected by the user. In some implementations, the method further comprises receiving, from the backend system, instructions for producing the repair patch corresponding to the 3D model. In some implementations, the method further comprises producing the repair patch from the instructions. In some implementations, the method further comprises transmitting, from a user device to a backend system, additional surface data of the damaged surface and/or optional features selected by a user and receiving, from the backend system, an updated 3D model of the repair patch. In some implementations, the method further comprises receiving, from the backend system, instructions for producing the repair patch corresponding to the updated 3D model.
In another implementation, the method for the production of a repair patch comprises receiving instructions for producing the repair patch corresponding to a 3D model matched to a damaged surface; and producing the repair patch from the instructions. In some implementations, the instructions are received at a 3D printer. The method may further comprises producing the repair patch by an additive manufacturing technique or a subtractive manufacturing technique. In certain implementations, the method may further comprise receiving delivery instructions from a use and/or delivering the repair patch to the user. In certain implementations, the method further comprises receiving payment from a user.
The methods described herein may be implemented on their own or in concert with any other method described herein. The methods may be performed with any of the systems or components described herein.
The disclosed technology is directed to methods and systems for preparing customized wall and surface repair patches. The methods and systems utilize image data to prepare three-dimensional (3D) models for repair patches that are unique for the particular damage. The models may be further customized by user selected options prior to the manufacture of the repair patches. The present technology allows for customized repair patches that precisely fit or match to damaged areas of any shape, size, or material
Mobile phones, cameras, video recorders, and 3D scanners are useful in the process of creating 3D printed customized repair patches for damaged or broken items. A “repair patch”, which may be prepared according the methods and systems described herein, is intended to mean any replacement component capable of augmenting a surface to be repaired to provide a surface substantially similar in visual appearance and/or continuity to the surface in its prior undamaged state. A “surface to be repaired” or “damaged surface” is intended to mean any surface or object that may be repaired by augmenting the surface by filling a void, such as a scratch, a crack, a dent, an indentation, a hole, or a depression, or by replacing a portion of an object that has been removed or broken off. In some implementations, the surface is a wall, such as a structural wall in a building composed of any suitable building material. Examples of building materials include, but are not limited to, drywall, wood, cladding, siding, brick, cinderblock, stone, or metal. In other implementations, the surface is a surface of an object, such as an ear of a statue that has fallen off, a heel of a shoe that has fallen off, or a piece of ceramic dinnerware that has broken off.
Surface data, such as image data, spatial data, or any other type of data related to the damaged surface or user preference data may be received from suitable imaging devices capable of collecting data related to the damaged surface. The surface data may be analyzed in a number of different ways to determine a 3D model representing a repair patch. A 3D model is intended to mean a 3D virtual representation of the repair patch. Exemplary 3D models include, but are not limited to, a voxelized volume, a polygon mesh (or more simply “mesh”), or any other suitable representation of the volume and surface of an object to define the object's shape. The 3D model may further comprise additional information, including, but not limited to, color information, texture information, material composition, or any other additional information that may be used to produce the repair patch from the 3D model. The 3D model may be generated by analyzing the surface data to, for example, identify the damage to be repaired. The damage to be repaired may be identified in a number of different ways, including identifying the damage to be repaired or its features, differences between a damaged surface and an undamaged surface, determining textures of the surrounding undamaged surface or identical object, and the features of the environment. The 3D model of the patch may be generated and provided to the user via a display device for evaluation. The user can confirm that the model is acceptable or have the model revised. In some implementations, the 3D model may be provided in an augmented reality environment, presenting a 3D virtual representation of the specific repair patch that may be overlaid onto the damaged surface of the object and in the object's environment. The user may select to augment the model—for example by adjusting the color of the model or the texture or finish. The 3D model or instructions for producing a repair patch corresponding to the 3D model may than be supplied to the user, a third party, or to a 3D Printer so that a 3D repair patch may be produced by any additive or subtractive manufacturing technique, i.e., any 3D printing process, via a suitable device.
FIG. 1
10
10
22
12
24
14
26
16
10
28
18
16
30
18
10
16
18
10
16
18
Referring to , a system for preparing a customized wall or surface repair patch includes a user device associated with a user (not shown). The user device is in communication with and imaging device , communication with a display device , and communication with a backend system . The user device may optionally be in communication with a 3D printer . In certain implementations, the backend system is in communication with the 3D printer . The user device and the backend system may both be in communication with the 3D printer . In other implementations either one of the user device or the backend system is in communication with the 3D printer .
10
12
14
16
10
18
10
10
12
14
16
18
10
10
The user device may be any computing device capable coordinating communications between the imaging device , the display device , and the backend system . In some implementations, the user device is capable of communicating with a 3D printer . User devices include computing devices in any form, including but not limited to, mobile computing devices, such as laptops, tablets, smart phones, and wearable computing devices (e.g., headsets and/or watches); stationary computing devices, such as desktops, workstations, servers, blade servers, or mainframes; or other appropriate computers. The user device is in communication with an imaging device , a display device , a backend system , and, optionally, a 3D printer . In some implementations, the user device is also capable of performing one or more operations associated with the methods described herein or comprises one or more applications associated with the methods described herein. Being in communication is intended to mean that the components are able to transmit and/or receive a machine-readable signal. The machine-readable signal may be transmitted and/or received wirelessly. In other implementations the machine-readable signal may be transmitted and/or received via wired connections. The user device may communicate with any component via a network. This includes various types of networks, such as a local area network (LAN), wide area network (WAN), and/or the Internet.
10
12
14
16
18
Network may represent a long range network (e.g., Internet or WAN), in some implementations, or a shorter range network, such as a local area network (LAN). In some implementations, the network uses standard communications technologies and/or protocols. Thus, the network can include links using technologies, such as Ethernet, Wireless Fidelity (WiFi) (e.g., 802.11), worldwide interoperability for microwave access (WiMAX), 3G, 4G, Long Term Evolution (LTE), digital subscriber line (DSL), asynchronous transfer mode (ATM), InfiniBand, PCI Express Advanced Switching, etc. Similarly, the networking protocols used on the network can include multiprotocol label switching (MPLS), the transmission control protocol/Internet protocol (TCP/IP), the User Datagram Protocol (UDP), the hypertext transport protocol (HTTP), the simple mail transfer protocol (SMTP), the file transfer protocol (FTP), etc. The data exchanged over the network can be represented using technologies and/or formats including the hypertext markup language (HTML or HTMLS), the extensible markup language (XML), etc. In addition, all or some of the links can be encrypted using conventional encryption technologies, such as secure sockets layer (SSL), transport layer security (TLS), virtual private networks (VPNs), Internet Protocol security (IPsec), etc. In other examples, the network can use custom and/or dedicated data communications technologies instead of, or in addition to, the ones described above. In some implementations, the user device executes a Wi-Fi application that initiates communications with a recognized access point to establish wireless communication with the imaging device , the display device , the backend system , the 3D printer , or any combination thereof.
12
The imaging device is intended to mean any device capable of imaging a surface and providing requisite surface data for preparing a customized repair patch. The surface data may include, but is not limited to, image data, spatial data, material data, color data, texture data, or any combination thereof. Image data includes, but is not limited to, digital or analog images of the surface to be repaired. In some implementations, the image data includes a multiplicity of digital or analog images, taken simultaneously or sequentially, from different distances, positions, or angles normal to the surface. Spatial data includes, but is not limited to, data representing objects defined a geometric space, such as line length, polygon area, or distance between object. Imaging devices for generating image data include, but are not limited to cameras or video recorders, such as digital cameras or digital video recorders. As used herein cameras or video recorders are intended to include cameras or video recorders having a single lens and single image sensor or a multiplicity of lenses and a corresponding number of image sensors, such as a stereo camera or stereo video recorder. Imaging devices for generating spatial data include, but are not limited, to echolocation devices, such as LIDAR (light detection and ranging) devices, SONAR (sound navigation and ranging) devices, or RADAR (radio detection and ranging) devices. Material data includes, but is not limited to, data representing the material properties of the damaged are, including but not limited to, composition of the damaged surface, hardness of the damaged surface, elasticity of the damaged surface, compression strength of the damaged surface, and/or tensile strength of the damaged surface.
12
12
10
12
10
12
12
In some implementations, the imaging device may also comprise a computing device. In certain implementations, the imaging device is integrated into a single device with the user device . Examples of this sort of implementations includes, but is not limited to, mobile computing devices, such as laptops, tablets, smart phones, and wearable computing devices (e.g., headsets and/or watches). In other implementations, the imaging device and the user device are separate devices. When the imaging device also comprises a computing device, the imaging device may execute one or more applications capable of generating spatial data from image data. Exemplary applications capable of generating spatial data from image data include photogrammetry applications. Photogrammetry applications are intended to mean applications capable of reconstructing a 3D object from two-dimensional (2D) image data, e.g. a multiplicity of digital or analog images taken simultaneously or sequentially from different distances, positions, or angles normal to the surface.
10
14
14
10
14
10
To provide for interaction with a user, the user device may be in communication with a display device for providing the user information regarding a 3D model of the repair patch that the user can evaluate. A display device is intended to mean any device capable of providing visual feedback, auditory feedback, tactile feedback, or any combination thereof to the user. Display devices include, but are not limited to, CRT (cathode ray tube) monitors, LCD (liquid crystal display) monitors, LED (light emitting diode) monitors, touch screens for displaying information to the user, augmented reality devices, heads up displays, or wearable computing devices (e.g., headsets, googles, eyeglasses, gloves, and/or watches). In certain implementations, the display device is integrated into a single device with the user device . Examples of this sort of implementations includes but is not limited to, mobile computing devices, such as laptops, tablets, smart phones, and wearable computing devices (e.g., headsets and/or watches). In other implementations, the display device and the user device are separate devices.
14
14
10
14
10
14
14
In some implementations, the display device may also comprise a computing device. In certain implementations, the display device is integrated into a single device with the user device . Examples of this sort of implementations includes, but is not limited to, mobile computing devices, such as laptops, tablets, smart phones, and wearable computing devices (e.g., headsets and/or watches). In other implementations, the display device and the user device are separate devices. When the display device also comprises a computing device, the display device may execute one or more applications capable of rendering a 3D model from 3D model data and/or instructions. Exemplary applications for rendering a 3D model include, but are not limited to, graphics processing or imaging processing applications.
16
16
10
10
10
10
10
18
The backend system is intended to be a computing device capable of performing one or more operations associated with the methods described herein or one or more applications associated with the methods described herein. The backend system may comprise one of more applications for receiving surface data from the user device , generating a 3D model from the surface data received from the user device , transmitting the 3D generated from the surface data to the user device , receiving a request from the user device for generating instructions for producing a repair patch corresponding to a 3D model, transmitting instructions for producing a repair patch to the user device , transmitting instructions to a 3D printer or any combination thereof. The backend system may be implemented as a computing system that includes a backend component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a frontend component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such backend, middleware, or frontend components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), an inter-network (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks).
16
16
In some implementations, the backend system includes a cloud server or a web server. In such an implementation, the backend system may run a virtualization environment that may create virtual machines. In each virtual machine, there may be an operating system or system-level environment. Each virtual machine may spawn processes, each of which may support at least one application. An execution environment such as a Java Virtual Machine or .NET™ runtime may execute in a virtual machine and manage processes and threads. In implementations utilizing a web server, the web server can run a variety of server or mid-tier applications, which those of skill in the art can select an implement.
18
10
16
The 3D printer is intended to any device capable of producing a 3D object, such as the repair patch, by additive manufacturing or subtractive manufacturing from instructions corresponding to a 3D model for preparing a repair patch. The instructions for producing the repair patch may be received from the user device and/or backend system . In an alternative implementation, the 3D printer comprises a computing device capable of generating instructions for producing the repair patch from the 3D model. The 3D printer may be capable of additive manufacturing or subtractive manufacturing by any suitable process or technique. Additive manufacturing techniques include, without limitation, binder jetting, directed energy deposition, material extrusion, material jetting, powder bed fusion, sheet lamination, or vat photopolymerization. Subtractive manufacturing techniques include, without limitation, controlled cutting, grinding, milling, drilling, or melting of material to achieved a desired 3D product. Various 3D printers are known, and the user can select an appropriate 3D printer for the repair patch to be produced. Optionally, an appropriate 3D printer may be suggested based on evaluation of the 3D model.
FIG. 2
102
104
106
108
is a flowchart of an exemplary method for preparing a repair patch. In certain embodiments, the method comprises imaging a damaged surface with the imaging device , generating a 3D model from the imaging data of the damaged surface , generating instructions for preparing a repair patch corresponding to the 3D model , and producing a repair patch from the instructions .
102
102
12
102
12
102
In some implementations, imaging the surface may comprise photographing a damaged surface a multiplicity of times from different distances, from different positions, from different angles, or any combination thereof to generate image data. The damaged surface may be photographed a multiplicity of times, either sequentially or simultaneously. Photographing is intended to include, but is not limited to, taking making one or more digital images or analogue images of the damage surface or making a digital or analogue video recording of the damaged surface. In other implementations, imaging the surface may comprise determining distances between different points on the damaged surface and/or determining distances between the imaging device and the damaged surface to generate spatial data. In yet other embodiments, imaging the surface may comprises determining the material properties, the texture properties, or the color properties of the damaged surface with the imaging device to generate material data, texture data, or color data. Imaging the surface may also comprise any combination of the forgoing.
104
18
10
14
14
14
Generating a 3D model comprises processing the surface data to prepare the 3D model. Processing operations may be accomplished by the backend system , but may be accomplished by any other computing device, including the user device . After the 3D model has been generated, the 3D model can be provided to the user via the display device in any suitable form for evaluation. If the display device has a augmented reality device, the augmented reality device can be used to evaluate the 3D model in an augmented reality environment. This allows for the display device to present the 3D model in the same environment as the damaged surface and/or overlaid onto the damaged surface. The user can confirm the repair patch model is satisfactory for 3D printing. Alternatively, the user can request an updated 3D model. The updated 3D model may be prepared from additional surface data and/or optional features selected by the user. The user may request any number of updated 3D models until the 3D model is satisfactory for 3D printing.
FIGS. 3A-3F
FIG. 3A
FIG. 3D
FIGS. 3B and 3E
200
202
200
200
208
204
206
210
204
206
212
212
212
214
The 3D model may be generated from surface data and, optionally, one or more optional features selected by the user. When generating a 3D model, the system performs model-specific operations based on the surface data. An exemplary embodiment for generating the 3D model is illustrated in . illustrates a surface having damage , such as a scratch, a crack, a dent, an indentation, a hole, or a depression, in the surface . illustrates the surface in cross-section along line . A damaged area, which be defined by a bounding surface indicated by the hatched line , can compared to a corresponding undamaged surface area, which be defined by a bounding surface indicated by the hatched line . In some implementations, 2D images taken of the surface are projected onto a 3D or polygon mesh or voxelized within the bounding surface. As shown in , the processing application can prepare a virtual overlay of the damaged and undamaged areas by matching the bounding surfaces and and/or the damaged and undamaged surfaces in proximity to the bounding surfaces. This may allow for identifying a volume of difference in the surfaces defined by the meshes or voxelized volumes . The volume of difference may be voxelized and/or the outer surface of the volume of difference may be used defined by a mesh to prepare the 3D model . Although there is the possibility of misalignment when 2D images are used to prepare a mesh, the processing software can execute one or more sets of instructions for identifying misalignment and automatically realigning the images to prepare the mesh.
In another implementation, the user may be prompted to select with gestures or other commands what part of the scanned object is damaged. The software can help to offer suggestions as to the damaged part by creating different zones on the model for areas that are different from other areas when scanned. Once the user identifies the damage, generating the 3D model may be accomplished by flipping or reversing the normals, which generates a model of the damage versus the rest of the object.
In addition to potential misalignment, different 2D images projected onto a mesh may have been captured with slightly different lighting, causing non-matching color. The processing application may scan the borders and overlaps of 2D images and test for non-matching color. Where this is detected, the colors may be blended on the 3D model or the original 2D images changed. The colors detected may be provided back to the user to confirm the desired shade of the patch.
3D scans may be used to capture the shape of an object. In order to make a photorealistic model, the modeler may build a specular map from the data. The specular map may capture the lighting properties of the object, in particular the shininess/reflectiveness of the object. In general, pictures taken of the object can be used to extract material properties of the object for 3D printer material recommendations to the user.
The user may also opt for the incorporation of optional features selected by the user. For example, the user may have opted to add an extended edge to the model, where the top edges of the patch meet with the undamaged areas to hide any damaged seam or space or to hide the adhesive used. An exemplary edge feature comprise a plurality of irregularly spaced protrusions of variable length and variable depth that overlap and form pockets in the perimeter, holes through the perimeter, or both pockets in and holes through the perimeter. Edges of this sort are described in United States Pub. No. 2018/0066442, filed Sep. 1, 2017 entitled “Wall Repair Apparatus” to Amy Louise Frederick, the contents of which are incorporated by reference in its entirety, and may form a deckled edge or rag edge. A “deckled edge” refers to a rough edge having similar appearance and form to the rough, irregular, and uncut edge typically of paper or other fibrous products created by a deckle. A “rag edge” refers to a similarly rough, irregular edge as a deckled edge but prepared from other materials, such as synthetic polymer. The rough, deckled edge or rag edge breaks up the outline of the apparatus while also having pockets and/or holes for paint to enter when applied and allows for the seamless transition from the undamaged wall to the repair patch.
Other exemplary optional features include texture features, material features, or mounting features. A texture feature may be any surface patterning or texture. The texture feature may be selected to matched to a specified surface finish, e.g., the surface finish of an undamaged surface. The texture features can be augmented with a surface overlaid onto the model. A material feature may be any selection of material for the repair patch. In some implementations, the user may be prompted to select a material the user would like to use to create the patch. The use may also be informed of the cost associated with each material option and/or recommended adhesives for a particular material. Another exemplary optional feature is a mounting feature added to the 3D model. This feature may be requested if the user was planning to print the 3D model themselves, rather than have the application send the model for 3D printing.
Generating the 3D model, in some implementations, also includes providing image provenance and/or versioning. Metadata for image provenance may be used to track image ownership. Versioning may be used to track iterations of the model itself. As the 3D model is updated, the 3D model undergoes modifications and corrections that may be tracked by versioning data.
106
Once the user has indicated that the 3D model is satisfactory, the 3D model data may be captured in a one or more files. Exemplary files include containing 3D model data include, without limitation, OBJ, STL, FBX, WebGL, WEB 3D, Callada, 3DS, IGES, STEP, CAD, and VRML/X3D. Instructions for producing the repair patch may be generated from the 3D model data. Generating instructions for producing the repair patch may include any suitable process for preparing instructions for a 3D printer for preparing the repair patch corresponding to the 3D model. Exemplary processes include slicing the 3D model into a series of thin slices and/or generating a G-Code file containing instructions tailored to specific 3D printers.
18
When the repair patch is ready for printing, the patch may printed with any suitable the 3D printer . The appropriate 3D printer may be selected by the user based on any number of considerations, include, but not limited to, size, cost, or the material best suited to the match the material properties of the damaged surface or based on user preference. The repair patch may be printed directly by the user or, a third-party, or the backend system by sending the instructions to a 3D printer.
For wallboard and wood repairs (wood floors, cabinets), an exemplary 3D printer may be the Mcor ARKe industrial 3D printer or any other 3D printer with similar capabilities. The 3D printer uses paper as the material in a process that inkjets color onto paper before selectively binding the sheets to build up a model, layer by layer. The resulting part resembles wood in density but looks like any other full-color print. This printer can make a wall or wood repair that does not require paint or stain because the surface finish of the patch can be printed as part of the patch. This printer accepts multiple file formats for printing: STL, OBJ, VRML, DAE, 3MF. Since wood allows for easy painting and for drilling, one skilled in the art of wall and wood repair would recognize the benefits of this material for fixing wall and wood damage. Additionally, this printer can print color and texture. So a repair can look like, for example, a red colored wall or have, for example, the pattern and color of the specific wood that is damaged, based on the scanned image and 3D model.
For metal repairs, 3D printers exemplary 3D printers include 3D printers capable of Wire+Arc Additive Manufacturing (WAAM). WAAM printers work with a variety of metals: titanium, aluminum, refractory metals such as tungsten and molybdenum, invar, nickel alloys, steel, bronze, copper, and magnesium.
FIG. 4
301
12
12
12
302
12
12
16
303
16
304
16
10
305
10
14
14
is a diagram illustrating example operations performed by the system for the preparation of customized wall and surface repair patches. The vertical y-axis indicates that time is increasing from top to bottom. At time , surface data captured of by the imaging device of the damaged surface and/or a corresponding undamaged surface may be transmitted by the imaging device and received by the user device . The user device may request user input, including, but not limited to, user preferences, option features to be incorporated into a 3D model, or material properties. At time , the surface data captured by the imaging device and any user input is transmitted by the user device and received by the backend system . At time , the backend system executes one or more applications or sets of instructions for generating a 3D model from the surface data and/or the user input. At time , the 3D model is transmitted by the backend system and received by user device . At time , the 3D model is transmitted by the user device and received by the display device . The display device may provide the user information regarding the 3D model for evaluation, including allowing the user to view or manipulate the 3D model.
FIG. 4
320
306
12
12
307
16
308
16
10
309
10
14
14
320
also illustrates optional operations for updating the 3D model performed by the system. The optional update operations, collectively , include the following: The user device may request user input, including, but not limited to, user preferences, option features to be incorporated into a 3D model, or material properties. At time , the surface data captured by the imaging device and any user input is transmitted by the user device and received by the backend system. At time , the backend system executes one or more applications or sets of instructions for generating a 3D model from the surface data and/or the user input. At time , the 3D model is transmitted by the backend system and received by user device . At time , the 3D model is transmitted by the user device and received by the display device . The display device may provide the user information regarding the 3D model for evaluation, including allowing the user to view or manipulate the 3D model. The optional update operations may be performed as many times as necessary until the 3D model is satisfactory for production.
310
10
16
311
16
10
18
16
10
312
10
18
313
16
18
FIG. 4
In implementations where operations for updating the 3D model are not performed or subsequent to user input indicating that the 3D model is satisfactory, the system performs operations for generating instructions for producing a repair patch corresponding to the 3D model. At time , user input indicating that the 3D model is satisfactory for producing the repair patch is transmitted by the user device and received by the backend system . At time , the backend system executes one or more applications or sets of instructions for generating instructions for producing the repair patch corresponding to the 3D model. In implementations where the user device is in communication with the 3D printer , the instructions for producing the repair patch may be transmitted by the backend system to the user device at time , and the instructions may be transmitted by the user device and received by the 3D printer at time so that the repair patch can be produced. In another implementation which is not illustrated in , the instructions for producing the repair patch may be transmitted by the backend system and received by the 3D printer so that the repair patch can be produced.
10
16
In some implementations, the user device executes an application for coordinating communication between the components of the system. The application may expose its functionality to web services for a remote backend system or other entities via an application programming interface (API). Specifically, the API exposes at least three blocks of functionality: security APIs, model manipulation APIs, and rendering APIs.
Security APIs provide authentication for a user seeking access data. Accounts may be registered or deregistered via a registerUser( ) API. Calling this API creates, updates, or deletes data in the account data store. A session may be initiated via the login( ) API and that session terminated via the logout( ) API If the logout( ) API is not called after a predetermined time, the app will terminate the session.
Model manipulation APIs provide functions to add, remove, and update data to models, as well as to receive models. Specifically, the model manipulation APIs include addModelData( ), which allows the uploading of data to a model; and updateModelData( ), which allows the updating of data already in a model. Model data may be retrieved in GL library form via getModelData( ). Received data may include virtual object data such as objects, shades, and textures. Received data may also include product data such as points of interest. Yet other received data may also include potentially third party data.
In the event a client is determined not to support the GL library, the getNoGL( ) function may be called to use non-GL virtual data.
Rendering APIs provide functions to render data to a known quality of service. The nbtStatus( ) method allows a programmer to perform a performance check. (NBT stands for Next Best Thing.) Calling renderNBT( ) renders the next best level of quality available to a backend system.
16
10
As an illustration of the content service cycle for producing a customized repair patch, the user may provide data to the backend system via the user device . The data may be tracked by user device software such as a viewer, or by other tracking software local to user device. The user device may be connected to a web service over a network. The backend system may send any input corresponding to the data needed to create a 3D model to an application. In some implementations, the backend system may run an application that accesses a data store via one or more API calls to see if the user has any models or surface data stored. It the service call is not authenticated, the process may then create a session using Security APIs.
If the web service call is authenticated, then the process may continue by calling one or more APIs to retrieve the 3D model data and/or surface data from a user device. The application may then run queries to retrieve the requested D model data and/or surface data from the data stores. The application may send one or more 3D model or surface data files directly back to the user device using the web service. Another possibility is showing the users the model in the application by utilizing a 3D server such as Autodesk's VRED.
The application serves the retrieved data either to the web service for forwarding to the end user, or potentially directly back to the end user's client side device for rendering via a rendering device.
The user may also execute one or more user applications on the user device. The user application may provide augmentations to be rendered along with the file to the rendering devices or rendering server. The augmentations may include color swatches, visual textures, materials, edges, and additional product information. The augmentation may be provided in the form of an augmentation data file to the rendering devices or to the rendering server. The points of interest may be selectable features that are overlaid onto a 3D product representation. The selectable features may further explain or highlight specific features of the product. For example, when a user selects a particular point of interest, additional details regarding a specific feature may be rendered or displayed as part of the 3D product representation.
The color options (color, exposure, temperature, and so on) may be rendered as a part of the 3D product representation. The color options may serve to provide additional adjustments to the patch repair model. Likewise, the visual textures may be rendered as a part of the 3D model representation. The visual textures may serve to provide additional visual options for the product that may appeal to the user. For example, textures may be aspects of the undamaged areas that are selected and rendered for different aspects of the 3D product representation.
Additional product information may be rendered with the 3D model representation to inform the user. In various embodiments, the additional information that is provided by the application may be customized to the user. For example, the additional product information may include language translation that displays the other language according to the geographical region from which the user is viewing the representation. The geographical region may be determined via a global position system (GPS) locator, an IP address of the rendering devices, language selection by the user, and/or other technologies. The additional product information may also be localized to meet governmental regulations and standards. For example, the additional product information may include health warnings, manufacturing information, usage information, adhesive recommendations, or other appropriate labeling data. Taking the example one step further, a cancer warning may be provided to a user in CA but not in NJ because of differences in each state's regulations on what is a cancer-causing material. Other product information that may be rendered with the 3D model representation may include material reviews, product ratings, and related products.
The application may provide iconography for rendering with the 3D product representation to the rendering devices or to a rendering server. The iconography may be provided based on user activity, and can be provided in the form of an iconography file that can be rendered along with the 3D product representation. The iconography data may be stored in the iconography database. For example, the application may be aware that the user has looked at the 3D patch model several times in the past or has placed the 3D patch in a virtual holding place. Accordingly, the application may provide iconography in the form of a virtual buy button that is to be displayed with the 3D product representation. In some instances, the virtual buy button may be accompanied by a discount offer to further encourage the user to make the purchase.
The application may command shaders on the rendering devices or rendering server to modify presentation of the image data based on environmental input. Shaders may adjust the image data with occlusions, reflections, refractions, and/or other visual effects. Such modification may enable the rendering device or rendering server to present the 3D patch representation, damaged item, and environmental data in an enhanced virtual reality or an augmented reality.
Input devices such as cameras, scanners, and mobile phones may also detect and map the placement of objects in a real environment. The cameras may further detect lighting conditions, light source positions, light level, light temperature, and/or other lighting parameters in the real environment. Based on these inputs, the rendering devices or the rendering server may modify the image data of the product for presentation in an augmented reality that is visible through the real environment or through video recordings of the real environment, or for presentation in a virtual reality that simulates the real environment. For example, occlusion includes hiding certain surfaces of an image from view, reflection is the duplication of at least a portion of image to simulate optical effects, and refraction is the splitting of light into its constituent waves.
The rendering devices or rendering server may use the shaders to render the image data into a 3D patch repair representation, as well as render the augmentations for the 3D patch repair representation. They may render the 3D patch repair representation into a rendered augmented reality environment or a rendered virtual reality environment. In various embodiments, the rendering devices or servers may implement one or more optimizations for the rendering. In some embodiments, the shaders may be configured to skip the rendering of image data for visual surfaces that are blocked by other visual surfaces or objects in the foreground.
If the user input is not recognized by the web service as a query command, the web service may parse a non-query related user command from the user input and process the user command accordingly. For example, if the user command is a command to rotate or manipulate a rendered 3D product representation, the web service will pass the command to the rendering devices or rendering server.
The disclosed processes may facilitate a sales process. The process may comprises receiving instructions for producing a repair patch corresponding to a 3D model matched to a damaged surface. In some implementations, the instructions are received at a 3D print so that the repair may be prepared by any suitable additive or subtractive manufacturing technique. The process may also comprise receiving delivery instructions from a user so that the repair patch can be delivered by any suitable method and/or receiving payment for the production and/or delivery of the repair patch.
10
14
16
10
16
16
16
16
16
16
When a user chooses to produce the repair patch, the user may make a purchase within a user interface via the user device , displayed on the display device , or within the backend system to make an online purchase. Additionally, information relating to manifest, shipping, and delivery may be sent by the user and received by the user device or the backend system . The backend system may also encapsulate logic to track user accounts, to track and fulfill sales, receive payment for the item and for other commercial activities. However, the backend system may, alternatively, utilize one or more additional backend systems, suitably an e-commerce server, one or more of these purposes. To support these activities, the backend system may use APIs or direct calls as appropriate to fulfill the users sales or purchase request. Data related to such transaction instruments may be stored by the backend system in a database or other suitable means. The backed system may optionally use a transaction engine to process the purchase transaction.
16
The backend system may capture delivery instructions provided by the user. Subsequently, the backed system may provide to the user access to the 3D printing instructions so that they may print the patch on a 3D printer. In other implementations, the patches may be produced and delivered to the user or prepared for pick up by the user at a specified location depending on the delivery instructions provided by the user.
A computing device is intended to represent various forms of digital computers, including are not limited to, mobile computing devices, such as laptops, tablets, smart phones, and wearable computing devices (e.g., headsets and/or watches); stationary computing devices, such as desktops, workstations, servers, blade servers, or mainframes; or other appropriate computers. The components described here, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed in this document. Computing devices includes a processor (i.e., processor), memory, a storage device, a high-speed interface/controller connecting to the memory and high-speed expansion ports, and a low speed interface/controller connecting to a low speed bus and storage device. Each of the components are interconnected using various busses and may be mounted on a common motherboard or in other manners as appropriate. The processor can process instructions for execution within the computing device, including instructions stored in the memory or on the storage device to display graphical information for a GUI on an external input/output device, such as a display device coupled to a high speed interface. In other implementations, multiple processors and/or multiple buses may be used, as appropriate, along with multiple memories and types of memory. Also, multiple computing devices may be connected, with each device providing portions of the necessary operations (e.g., as a server bank, a group of blade servers, or a multi-processor system).
The memory stores information non-transitorily within the computing device. The memory may be a computer-readable medium, a volatile memory unit(s), or non-volatile memory unit(s). The non-transitory memory may be physical devices used to store programs (e.g., sequences of instructions) or data (e.g., program state information) on a temporary or permanent basis for use by the computing device. Examples of non-volatile memory include, but are not limited to, flash memory and read-only memory (ROM)/programmable read-only memory (PROM)/erasable programmable read-only memory (EPROM)/electronically erasable programmable read-only memory (EEPROM) (e.g., typically used for firmware, such as boot programs), phase change memory (PCM) as well as disks or tapes. Examples of volatile memory include, but are not limited to, random access memory (RAM), dynamic random access memory (DRAM),or static random access memory (SRAM).
The storage device is capable of providing mass storage for the computing device. In some implementations, the storage device is a computer-readable medium. In various different implementations, the storage device may be a floppy disk device, a hard disk device, an optical disk device, or a tape device, a flash memory or other similar solid state memory device, or an array of devices, including devices in a storage area network or other configurations. In additional implementations, a computer program product is tangibly embodied in an information carrier. The computer program product contains instructions that, when executed, perform one or more methods, such as those described above. The information carrier is a computer- or machine-readable medium, such as the memory, the storage device, or memory on processor.
The high speed controller manages bandwidth-intensive operations for the computing device, while the low speed controller manages lower bandwidth-intensive operations. Such allocation of duties is exemplary only. In some implementations, the high-speed controller is coupled to the memory, the display (e.g., through a graphics processor or accelerator), and to the high-speed expansion ports, which may accept various expansion cards (not shown). In some implementations, the low-speed controller is coupled to the storage device and low-speed expansion port. The low-speed expansion port, which may include various communication ports (e.g., USB, Bluetooth, Ethernet, wireless Ethernet), may be coupled to one or more input/output devices, such as a keyboard, a pointing device, a scanner, or a networking device, such as a switch or router, e.g., through a network adapter.
A computing device may use a variety of different operating systems. In examples where a computing is a mobile device, the computing device may run an operating system including, but not limited to, ANDROID® developed by Google Inc., IOS® developed by Apple Inc., or WINDOWS PHONE® developed by Microsoft Corporation. Accordingly, the operating system running on the computing device may include, but is not limited to, one of ANDROID®, IOS®, or WINDOWS PHONE®. In some examples a user device may run an operating system including, but not limited to, MICROSOFT WINDOWS® by Microsoft Corporation, MAC OS® by Apple, Inc., or Linux. The operating system may execute one or more software applications.
A software application may refer to computer software that, when executed by a computing device, causes the computing device to perform a task. In some examples, the software application may be referred to as an “application”, an “app”, or a “program”. Example software applications include, but are not limited to, web browsing applications, word processing applications, spreadsheet applications, messaging applications, media streaming applications, social networking applications, and games. In some examples, applications are installed on the computing device prior to the user purchasing the computing device. In other examples, the user may download and install applications on the computing device.
Various implementations of the systems and techniques described here can be realized in digital electronic and/or optical circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various implementations can include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software, software applications or code) include machine instructions for a programmable processor, and can be implemented in a high-level procedural and/or object-oriented programming language, and/or in assembly/machine language. As used herein, the terms “machine-readable medium” and “computer-readable medium” refer to any computer program product, non-transitory computer readable medium, apparatus and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term “machine-readable signal,” refers to any signal used to provide machine instructions and/or data to a programmable processor.
Implementations of the subject matter and the functional operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Moreover, subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. The computer readable medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more of them. The terms “data processing apparatus”, “computing device” and “computing processor” encompass all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them. A propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal that is generated to encode information for transmission to suitable receiver apparatus.
A computer program (also known as an application, program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
The processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. However, a computer need not have such devices. Moreover, a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, to name just a few. Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
Unless otherwise specified or indicated by context, the terms “a”, “an”, and “the” mean “one or more.” For example, “a computing device” should be interpreted to mean “one or more computing device.”
As used herein, the terms “include” and “including” have the same meaning as the terms “comprise” and “comprising.” The terms “comprise” and “comprising” should be interpreted as being “open” transitional terms that permit the inclusion of additional components further to those components recited in the claims. The terms “consist” and “consisting of” should be interpreted as being “closed” transitional terms that do not permit the inclusion additional components other than the components recited in the claims. The term “consisting essentially of” should be interpreted to be partially closed and allowing the inclusion only of additional components that do not fundamentally alter the nature of the claimed subject matter.
All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
All references, including publications, patent applications, and patents, cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
Preferred aspects of this invention are described herein, including the best mode known to the inventors for carrying out the invention. Variations of those preferred aspects may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect a person having ordinary skill in the art to employ such variations as appropriate, and the inventors intend for the invention to be practiced otherwise than as specifically described herein. Accordingly, this invention includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the invention unless otherwise indicated herein or otherwise clearly contradicted by context.
BRIEF DESCRIPTION OF THE DRAWINGS
Non-limiting embodiments of the present invention will be described by way of example with reference to the accompanying figures, which are schematic and are not intended to be drawn to scale. In the figures, each identical or nearly identical component illustrated is typically represented by a single numeral. For purposes of clarity, not every component is labeled in every figure, nor is every component of each embodiment of the invention shown where illustration is not necessary to allow those of ordinary skill in the art to understand the invention.
FIG. 1
is a schematic view of an exemplary system for preparing customized wall or repair patches.
FIG. 2
is a flowchart of one exemplary method for preparing customized wall or repair patches.
FIG. 3A
illustrates a view of a damaged surface to be repaired.
FIG. 3B
FIG. 3A
FIG. 3A
illustrates the virtual overlay of the damaged surface of and an undamaged surface of .
FIG. 3C
FIG. 3A
illustrates a 3D model of a repair patch generated from surface data of the damaged surface of .
FIG. 3D
FIG. 3A
208
illustrates the damaged surface to be repaired of along the cross-section .
FIG. 3E
FIG. 3A
FIG. 3A
208
illustrates the virtual overlay of the damaged surface of and an undamaged surface of along the cross-section .
FIG. 3F
FIG. 3A
208
illustrates a 3D model of a repair patch generated from surface data of the damaged surface of . along cross-section .
FIG. 4
is a schematic view of exemplary operations performed from the system for preparing customized wall or surface repair patches. | |
Comprehensive controlled (New York City) and Special (New York State and Connecticut) inspection to ensure that main structural elements have been installed in accordance to all code requirements and industry standards.
Additions, Alterations, Renovations and Restorations
Utilizing the most economical approach our team will provide engineering solutions for any type of alteration, restoration, or restoration. A complete and thorough structural analysis is performed to certify that any alterations satisfy all current building codes.
Local Law 11/98 Facade Inspection, Repair, and Restoration
Registered design professionals inspect, analyze, and verify the structural integrity of facade elements to detect any deterioration or points of failure. Following inspection we will provide comprehensive engineering service recommendations for facade repair work.
Design and Management of New Industrial, Commercial, and Residential Buildings
Our experienced team of structural designers use state of the art technology to analyze existing designs and create new ones in the full spectrum of construction materials, including steel, concrete, wood, and masonry.
Construction Administration
We bridge the gap between contractors and building owners, administering and managing renovation, repairs, alterations, and other construction projects. You can rely on B.G.M. Engineering to ensure that all construction materials and methods conform to specification. | https://www.bgmengineer.com/services2/ |
Computerized dynamic posturography and seasickness susceptibility.
The neural mismatch theory emphasizes the role of conflicting multimodal sensory interactions in producing both motion sickness and the rearrangement process that finally leads to habituation to the adverse motion conditions. If this theory is, indeed, correct, the patterns of the response to the integrated signal from simultaneous multisensory stimulation, characterized by unusual relationships between the senses responsible for spatial orientation, should differ according to motion sickness susceptibility. Computerized dynamic posturography (CDP) provides the opportunity to simultaneously change the interactions between visual, somatosensory, and vestibular inputs, thus giving an indication of the relative importance of these senses in maintaining balance. The objective was to investigate balance strategies in naval crew members with differing susceptibility to sea conditions using CDP. Cross-sectional, parallel-group design. Twenty subjects susceptible to seasickness (SS) and 20 nonsusceptible subjects (NSS), healthy male volunteers aged 18 to 25, were tested using the EquiTest system (NeuroCom, Inc., Clackamas, OR). The SS group exhibited significantly less stability than the NSS group in condition 5 of the sensory organization test (SOT). The ratio of the SOT scores of conditions 5 to 1 (the vestibular organization pattern) was also found to be significantly lower in the SS group. The results suggest that SS might be more dependent on somatosensory and visual inputs and less on vestibular inputs for maintenance of balance compared with NSS. Higher susceptibility to seasickness might reflect abnormal weighting of sensory modalities during the integration process. This would result in disruption of the integration process required to maintain balance and a sense of orientation in space in conditions producing conflicting sensory inputs.
| |
Q:
GRG Nonlinear R
I want to transform my excel solver model into a model in R. I need to find 3 sets of coordinates which minimizes the distance to the 5 other given coordinates. I've made a program which calculates a distance matrix which outputs the minimal distance from each input to the given coordinates. I want to minimize this function by changing the input. Id est, I want to find the coordinates such that the sum of minimal distances are minimized. I tried several methods to do so, see the code below (Yes my distance matrix function might be somewhat cluncky, but this is because I had to reduce the input to 1 variable in order to run some algorithms such as nloprt (would get warnings otherwise). I've also seen some other questions (such as GRG Non-Linear Least Squares (Optimization)) but they did not change/improve the solution.
# First half of p describes x coordinates, second half the y coordinates # yes thats cluncky
p<-c(2,4,6,5,3,2) # initial points
x_given <- c(2,2.5,4,4,5)
y_given <- c(9,5,7,1,2)
f <- function(Coordinates){
# Predining
Term_1 <- NULL
Term_2 <- NULL
x <- NULL
Distance <- NULL
min_prob <- NULL
l <- length(Coordinates)
l2 <- length(x_given)
half_length <- l/2
s <- l2*half_length
Distance_Matrix <- matrix(c(rep(1,s)), nrow=half_length)
# Creating the distance matrix
for (k in 1:half_length){
for (i in 1:l2){
Term_1[i] <- (Coordinates[k]-x_given[i])^2
Term_2[i] <- (Coordinates[k+half_length]-y_given[i])^2
Distance[i] <- sqrt(Term_1[i]+Term_2[i])
Distance_Matrix[k,i] <- Distance[i]
}
}
d <- Distance_Matrix
# Find the minimum in each row, thats what we want to obtain ánd minimize
for (l in 1:nrow(d)){
min_prob[l] <- min(d[l,])
}
som<-sum(min_prob)
return(som)
}
# Minimise
sol<-optim(p,f)
x<-sol$par[1:3]
y<-sol$par[4:6]
plot(x_given,y_given)
points(x,y,pch=19)
The solution however is clearly not that optimal. I've tried to use the nloptr function, but I'm not sure which algorithm to use. Which algorithm can I use or can I use/program another function which solves this problem? Thanks in advance (and sorry for the detailed long question)
A:
Look at the output of optim. It reached the iteration limit and had not yet converged.
> optim(p, f)
$`par`
[1] 2.501441 5.002441 5.003209 5.001237 1.995857 2.000265
$value
[1] 0.009927249
$counts
function gradient
501 NA
$convergence
[1] 1
$message
NULL
Although the result is not that different you will need to increase the number of iterations to get convergence. If that is still unacceptable then try different starting values.
> optim(p, f, control = list(maxit = 1000))
$`par`
[1] 2.502806 4.999866 5.000000 5.003009 1.999112 2.000000
$value
[1] 0.005012449
$counts
function gradient
755 NA
$convergence
[1] 0
$message
NULL
| |
I grew up in Alexandria, VA and received a bachelor's degree in astrophysical sciences from Princeton University in 2010. I will receive a Ph.D. in Astronomy and Astrophysics from Harvard University in May 2015. I am currently 27 years old.
I've been interested in astronomy and space exploration since elementary school and I spent many childhood evenings stargazing. My family was very supportive of my early interest in space and agreed to an impressive number of outings to the National Air and Space Museum. The more I learned about space, the more curious I became about whether there was life elsewhere in our Solar System and whether any other stars harbored habitable planets.
As a Sagan Fellow, I will investigate the properties of planets orbiting small stars known as red dwarfs. Red dwarfs are significantly cooler than the Sun, so the "habitable zone" within which planets could have liquid water on their surfaces is located much closer to the star. Due to the small sizes and close-in habitable zones of red dwarfs, it is much easier to detect a potentially habitable planet orbiting a red dwarf than a Sun-like star. I will conduct follow-up observations of small K2 planet candidates orbiting red dwarfs in order to determine which planet candidates are likely planets and which are false positives. I will then constrain the radii and temperatures of K2 red dwarfs using near-infrared spectra and measure the masses of a subset of small planets by obtaining highly precise radial velocities. Finally, I will investigate how the properties and occurrence of planets orbiting low-mass stars depends on stellar mass and metallicity.
Flexible and Robust Inference of the Exoplanet Population
I grew up in Ontario, Canada and received a Master's degree from Queen's University in Kingston, Ontario. I then moved to New York University where I expect to receive my PhD from the Physics department in Spring 2015. My doctoral research was focused on the application of probabilistic modeling to interesting datasets and questions in astronomy. Recently, I've been studying the existing Kepler dataset at all levels: planet discovery, characterization, and population inference.
I was originally drawn to astronomy by the exciting open questions and the wealth of publicly available datasets. The field of exoplanets, especially at the intersection between observation and theory, is an ideal place to apply novel data analysis techniques with the possibility of exciting scientific discovery.
As a Sagan Fellow, I plan to develop rigorous probabilistic methods and open source tools for studying the population of exoplanets based on the available array of heterogeneous datasets. In particular, I will focus on the physically and dynamically interesting questions of very long period planets and the multiplicity-mutual inclination distribution of planetary systems. The tools I develop will be useful for existing datasets and the forthcoming onslaught of data from surveys like K2 and TESS.
Locating the Young, Isolated Planetary-Mass Objects in the Solar Neighborhood
I grew up in a small town north of Montreal and moved there to study Physics. I became interested in my current research area while I was an undergrad at Université de Montréal and had the chance to complete a summer internship related to the direct imaging of exoplanets and brown dwarf surveys under the direction of René Doyon. My PhD project, which consisted in the search for isolated brown dwarfs in young moving groups under the direction of David lafreniére and René Doyon, represented a great marriage of these two topics. I am now 27 years old and submitting my PhD thesis in April 2015. I will then bring my project to the next level during my Sagan Fellowship at Carnegie Institute for Science, by identifying young brown dwarfs with only a few times the mass of Jupiter and exploring the connection between their atmospheres and those of giant exoplanets.
I will extend the successful survey that I led during my PhD thesis to locate the elusive coldest, isolated planetary-mass members of young moving groups. I will use the suite of high-end instruments at the Las Campanas observatory to characterize these discoveries with a parallax program, optical and near-infrared low- and mid-resolution spectroscopy and high-precision photometric measurements. This research will allow to explore the connection between the atmospheres of brown dwarfs and those of giant exoplanets, and will put strong constraints on the initial mass function down to a few times the mass of Jupiter, hence testing the recent prediction that the spatial density of isolated jupiter-mass objects is twice as large as that of stars.
Spotting Blue Planets Around Spotted Red Stars:
Removing Stellar Activity from Radial Velocities of M Dwarf Stars
I grew up in western North Carolina, and received my bachelor's degree from the University of North Carolina in 2008. In 2013, I received my PhD from the University of Texas at Austin. I am a postdoctoral fellow at Penn State University's Center for Exoplanets and Habitable Worlds, where I am currently helping to build the Habitable Zone Planet Finder (HPF) spectrograph.
As a young child, I watched a documentary on the Voyager mission, and was enchanted by the images of our Solar Systems outer planets. When astronomers discovered the first extrasolar planets a few years later, I decided I had to be part of the search for new worlds.
As a PhD student at Texas, I realized that the planets I am most eager to find - small planets in the habitable zones of nearby M stars - will be hidden by noise from their parent stars. My project aims to improve our understanding of stellar noise in exoplanet searches, and improve methods to correct it. This work will be crucial for the success of the HPF survey of planets around M stars in the solar neighborhood.
Bridging the Theory Gap: Developing a Novel Cloud Model for Exoplanets
I was born in Cincinnati, Ohio, and grew up north of Phoenix, Arizona. I studied physics and mathematics at the University of Arizona, graduating in 2006. Following that, I moved to Seattle for my graduate work in astronomy and astrobiology at the University of Washington, where I received my Ph.D. in 2012. I then completed a two-year appointment as a NASA Postdoctoral Program Fellow at NASA Ames research center. I am 30 years old.
I can distinctly remember the first time I experienced a sense of awe for the cosmos: it was while viewing the comet Hale Bopp from the rim of the Grand Canyon when I was 13 years old. I developed a love of mathematics in high school, and combined my passions for math and astronomy as an undergraduate. While a Ph.D. student in the University of Washington Astrobiology Program, I was able to explore astrophysical and planetary science questions with an eye towards, one day, detecting and characterizing a Pale Blue Dot around a distant star.
As a Sagan Postdoctoral Fellow, I will study cloud processes in planetary atmospheres. Clouds sculpt the spectra of almost all planets, and confound observational studies of many exoplanets. To inform the interpretation of existing and future exoplanet observations, I aim to develop accurate and efficient tools for simulating and understanding cloud formation and dynamics in exoplanet atmospheres.
Searching for Water in Distant Worlds
I grew up in Yarmouth, Nova Scotia, on the east coast of Canada. I pursued undergraduate studies in honors physics-mathematics at the University of Ottawa, and then earned a PhD in physics from MIT in 2012. After defending my thesis, I moved to Caltech as a Hubble Postdoctoral Fellow.
Two memories stand out in my mind as having sparked my interest in astronomy and planetary science at a young age: watching the Perseid meteor shower with my dad from our back deck (there's not much light pollution in Yarmouth), and repeatedly borrowing Isaac Asimov's New Library of the Universe series from the library to pore over the stunning photos of the Solar System giant planets returned by Voyager. I am very grateful to now have the chance to explore the diversity of planets as my profession!
In my research, I study the interior structure, formation, and evolution of exoplanets that are Neptune-size and smaller. It is a matter of ongoing debate whether the abundance of Neptune-size planets discovered by Kepler formed in situ at orbital separations (inside 0.4AU) near where they are currently observed or instead formed beyond the snow line (where water condenses to ice in the protoplanetary disk) before later migrating inward toward the star. As a Sagan Fellow, I will pursue three novel complementary approaches to constrain the bulk water content of distant exoplanets, a powerful tracer of the planets' formation locations. Advancing models of planet interior structure, planet evolution, and population statistics, I will lay the theoretical foundation to extract constraints on planet bulk compositions and formation pathways from atmospheric transmission spectra, exoplanet radio aurora emissions, and the accumulating statistical ensemble of planet mass-radius measurements. | https://nexsci.caltech.edu/sagan/2015postdocRecipients.shtml |
- This event has passed.
Dreaming up North: Children on the Move Across the Americas Panel Discussion
September 9, 2017 @ 1:00 pm - 3:00 pmFREE
As part of its month-long programming initiative focused on Migration, El Museo del Barrio, in collaboration with Colectiva Infancias, and a network of social anthropologists and photographers present a special panel discussion about the migrant child experience. The discussion complements the new exhibition Dreaming up North: Children on the Move Across the Americas, on-view in our Cuéntame Galleries (behind Visitor Services area) throughout the month of September. Panelists include Mexican social anthropologist Valentina Glockner Fagetti; Associate Professor of History, Barnard College, Nara Milanich; Mexican documentary photographer and photojournalist, Cinthya Santos Briones; and assistant professor of Teaching and Learning at The Ohio State University, Sarah Gallo.
Learn more about the exhibition >
FREE ADMISSION.
To RSVP, click here.
—
ABOUT THE PANELISTS:
Valentina Glockner Fagetti
Valentina Glockner Fagetti Is a Mexican social anthropologist specializing in the study of childhood, child labor, child migration, poverty, transnationalism and development issues. She has a wide experience in social research and methodologies based on the use of photography, narrative, play, drawing, and video as alternative means for constructing knowledge and self‐representation. Since 2005, she has conducted fieldwork and research with indigenous, migrant and working children in Mexico, Bolivia, and India. She has been awarded three of the most prestigious national prizes in anthropology in Mexico. In 2008 she published the book De la Montaña a la Frontera: identidad, representaciones sociales y migración de los niños mixtecos de Guerrero, and is currently preparing her second book on child labor and migration in India. Valentina is devoted to academically and theoretically solid research emerging as a result of a face‐to‐face approach with children and their communities. Her research and methodologies are based on the acknowledgment that children’s knowledge and subjectivities are crucial to social research and development projects.
Nara Milanich
Nara Milanich, Associate Professor of History, joined the faculty of Barnard in 2004. Her scholarly interests include modern Latin America, Chile, and the comparative histories of family, gender, childhood, reproduction, law, and social inequality. Professor Milanich teaches courses ranging from the Modern Latin American History survey to a comparative seminar on the “Global Politics of Reproduction.” She works closely with PhD students in Latin American History at Columbia. Professor Milanich has also taught in and directed the Masters in Latin American Studies (MARSLAC) based in the Institute for Latin American Studies.Her research and scholarship have been supported by the Fulbright Commission for Educational Exchange, the Social Science Research Council, the National Endowment for the Humanities, Unesco, and the American Council of Learned Societies.
Cinthya Santos Briones
Cinthya Santos Briones, is a Mexican documentary photographer and photojournalist based in New York City. She studied Anthropology and Ethnohistory. Her interest in documentary photography emerged through her ethnographic work an anthropologist in indigenous communities in Mexico, in which she documented ceremonial and healing rituals, immigration, and transnational lives in New York. Her work has been influenced by the struggle for human rights, focusing on issues of migration, gender, and identity. Her images explore the relationship between space, memory, time and culture. Cinthya is a recent graduate of the Visual Journalism and Documentary Practice Program at the International Center Of Photography in New York City and has received numerous fellowships and awards. Her work has been published in several outlets such as the New York Times and Vogue.
Sarah Gallo
Sarah Gallo is an assistant professor of Teaching and Learning at The Ohio State University. As an anthropologist of education who conducts ethnographic research across immigrant children’s schools, homes, and communities, she critically engages in promoting school-based learning that better recognizes and builds upon young children’s mobile and heterogeneous resources in the United States and Mexico. This includes the traditional and innovative bilingual language and literacy skills that are rarely recognized in their monolingual classrooms and knowledge that they develop related to their immigration experiences. Rather than positioning these educational resources as unwelcome or dangerous for learning, she seeks to bring attention to the ways that we can productively contribute to policies, educational practices, and teacher preparation that recognize bilingualism and immigration experiences—including undocumented status—as axes of difference that must be supported for effective and equitable schooling.
This exhibition and related programming was made possible thanks to the support of the Honorable Ben Kallos, New York City Council District 5. | https://www.elmuseo.org/event/dreaming-up-north-panel/ |
Team South Africa begin gold medal quest in Birmingham on Friday.
By Karien Jonckheere.
In just a matter of days, Team South Africa will begin their quest for Commonwealth glory as the Games kick off with the Opening Ceremony on Thursday, 28 July.
The South African contingent returned from the Gold Coast Commonwealth Games four years ago with a haul of 37 medals, 13 of them gold. But surpassing or even matching that this time around could prove a tough ask.
Traditionally the sports of swimming and athletics have led the way when it comes to podium performances – the two sports accounting for 26 of the medals won at the 2018 Games – 11 of them gold.
That’s likely to be the case in 2022 as well.
South African swimming coach Wayne Riddin is confident of a successful campaign in the pool.
"There will be a number of events we as South Africa should be featuring very well in," he said. "However, one must always remember that before we talk medals, we need to make sure that the swimmers actually get into the finals first."
Riddin said that those swimmers who remained in South Africa to prepare for the Games faced a two-fold challenge in terms of the cold winter weather and load-shedding, which meant that training pools weren't heated to their usual temperature.
Nevertheless, he's confident the swimmers can still deliver.
"We’re obviously looking towards Chad le Clos to continue his successes at the Commonwealth Games in achieving his record goals. Then the next expectation from everybody is to look towards Tatjana Schoenmaker after her successes in Australia [double gold in 2018] as well as her world record performance and gold and silver medals in Tokyo last year," said Riddin.
"Then all eyes will be on Lara van Niekerk who recently won the bronze medal in the 50m breaststroke at the World Championships in Budapest, and Kaylene Corbett who did so well in Tokyo in the 200m breaststroke. There is the outside possibility that there could be a challenge for two medals in each of the women’s breaststroke events [50, 100 and 200m breaststroke].
"Looking towards the other younger up-and-coming swimmers on the team, it will obviously be Matt Sates and Pieter Coetzé. These two will be up against the world’s best from Australia and Britain and will look at making an impact at senior level.
"But swimming has its own way of teaching us lessons and often the unexpected can happen and too many expectations can be dangerous, "he added.
"Other ladies that could step up to the mark will be Emma Chelius with her speed in the 50m freestyle, Aimee Canny especially in the 200m freestyle, Erin Gallagher in the 100m freestyle and butterfly events and Rebecca Meder in the 200 and 400m individual medley.
Riddin added that there are several relay events in which the South African teams could also feature.
TRACK ATHLETES IN THE MIX
As for the track, just three South Africans reached their respective individual event finals (aside from the events that were contested as straight finals) at the recently concluded World Athletics Championships in Eugene, Oregon – Luxolo Adams (eighth in the 200m), Akani Simbine (fifth in the 100m) and Wayde van Niekerk (fifth in the 400m).
Simbine will be heading to Birmingham to defend his 100m title, and while Adams boasts the fastest 200m time in the Commonwealth this year, he has withdrawn from the team with fatigue. Van Niekerk has also chosen to forgo the Games as he continues his journey back from injury.
One man who knows what it takes to excel on the Commonwealth Games stage is 2014 triple jump champion Khotso Mokoena, who is chairman of the SA Sports Confederation and Olympic Committee, Sascoc’s, Athletes Commission.
"Going into the Commonwealth Games this year, I think what is exciting is that we’ve already seen athletes starting to perform at the right time where previously athletes would only perform earlier in the year or later in the year when everything is finished, "said Mokoena.
"Akani Simbine is running very well so I think our athletes are really ready for these Games and I think we are going to produce good results.
"I didn’t expect too much from the Olympic Games in Tokyo after what athletes had been through [with the Covid pandemic]. But I think the confidence is there now going into the Commonwealth Games. I’ve seen and had a chat with some of the athletes and they really want to do well at the Commonwealth Games."
Meanwhile, there are numerous para-athletics events included in the track and field programme in Birmingham and the SA team includes several Paralympic medallists who could well also add to the medal haul. Among them are Jonathan Ntutu, Charl du Toit and Sheryl James.
OTHER MEDAL POSSIBILITIES
Other sports to keep an eye on for medal possibilities are the likes of rugby sevens (the Blitzboks having won gold in 2014), wrestling, judo, and triathlon, while the SA netball team are also gunning for a podium place. Women’s T20 cricket is making its debut at these Games and the South African team will be hoping to bounce back after some disappointing results in their recent series against England.
Another sports code that consistently brings back medals from the Commonwealth Games is lawn bowls. Team SA claimed five medals in 2018 and seven medals four years before that, five of them gold.
One of those gold medallists, Prince Neluonde, is confident the team can make a return to the top of the podium.
"In terms of preparation and training so far, we have been doing very well," said Neuonde. "We have been practising from the beginning of the year by taking part in competitions. We have a very strong squad. I still believe that the South African lawn bowls team can bring back the medals. We always bring medals back from the Commonwealth Games." | https://fullview.co.za/2022-commonwealth-games/item/21099-team-south-africa-begin-gold-medal-quest-in-birmingham-on-friday |
Social Security Retirement Offset in PA Workers’ Comp Act is Not Unconstitutional
Many changes to the Pennsylvania Workers’ Compensation Act, much to the detriment of the injured worker, took place in the sweeping 1996 amendments to the Act. One of the more substantial changes was the amendment to Section 204(a), allowing PA workers’ comp insurance carriers to enjoy an offset, or credit, for such things as severance, unemployment compensation and Social Security retirement (known as “Old Age,” though we certainly won’t use that term) benefits.
Looking specifically at Social Security retirement, Section 204(a) permits the PA workers’ compensation insurance company to take an offset equal to 50% of an injured worker’s Social Security retirement benefit. The Supreme Court of Utah found a similar provision in that State’s workers’ compensation system to be unconstitutional. With that decision in mind, attorneys representing injured workers in PA had high hopes for a similar result from the Pennsylvania Court System.
So far, unfortunately, our hopes have been dashed. The Commonwealth Court of Pennsylvania has decided, in Caputo v. Workers’ Compensation Appeal Board (Commonwealth of Pennsylvania), that the PA workers’ comp system is different than that in Utah, and the offset in Section 204(a) of the PA Workers’ Compensation Act is indeed constitutional. Hope remains the Supreme Court of Pennsylvania will review this issue, but for now the 50% offset in Section 204(a) will remain.
Note, also, that taking Social Security retirement benefits can severely damage a workers’ comp case in PA. Between this significant risk, and the 50% offset, it is advisable for an injured worker to consult with an attorney experienced in the Pennsylvania workers’ comp system before making such a critical decision. | https://www.pennsylvaniaworkerscompensationlawyerblog.com/social_security_retirement_off_2/ |
This video, from History.com's archives, focuses on the older Christmas customs.
European Christmas Customs
http://www.history.com/
SS.6.4 COMPARATIVE WORLD RELIGIONS (ca. 2000 B.C.E – ca. 630 C.E): Major religions and belief systems developed in the Eastern Hemisphere. There were important similarities and differences between these belief systems.
SS.6.4.a Civilizations and complex societies developed belief systems and religions that have similar as well as different characteristics.
SS.6.4.b Belief systems and religions are based on a set of mutually held values.
SS.6.4.b.1 Students will study the belief systems of Judaism, Christianity, Islam, Buddhism, Hinduism, and Confucianism by looking at where the belief system originated, when it originated, founder(s) if any, and the major tenets, practices, and sacred writings or holy texts for each. (Note: Although not within this historic period, students may also study Sikhism and other major belief systems at this point.)
SS.6.4.c.1 Students will be able to identify similarities and differences across belief systems including their effect on social order and gender roles. | https://www.nylearns.org/module/content/search/item/11379/viewdetail.ashx |
The COVID-19 crisis has dramatically exposed the unhealthy and unsustainable relationship among the environment, society and economics. While still confronting disease containment and potential vaccinations, governments are considering reform and economic stimulus measures that are unprecedented in scale. It is imperative that the world not return to business as usual, and that we work to rebuild healthy, sustainable and equitable societies.
As part of the “Green Recovery Dialogues” webinar series on a green and resilient recovery, the OECD, WWF, the EDF, in collaboration with the World Bank, have collaborated to deliver a series of high-level dialogues on health and environment. These conversations aim to explore the challenges and opportunities for integrating health and environment considerations onto the rebuilding process at local, national and global scales, including policies and financial instruments that incentivize healthier and more equitable, low carbon economies.
It has been widely reported that air quality in cities around the world has suddenly improved due to quarantines — but it was only temporary, and the reopening of economies means the return of air pollution from vehicle traffic and commercial and industrial activity. Our goal must be clean air with prosperity.
Air pollution, of course, varies greatly from place to place. Low wealth communities and communities of color experience a greater burden from pollution because they’re more likely to be situated near or downwind of refineries, ports, highways and other sources of unhealthy emissions.
A green recovery would offer economic returns on government investments, generate growth and create jobs. It would also put the world on track to a more healthy and sustainable future, reduce the risks of future pandemics, improve our public health and environmental outcomes and establish us on a much-needed pathway toward a 100% clean future.
The question in front of many governments, businesses and civil society is what policies and investments are needed to ensure a healthy, sustainable recovery that builds resilient, equitable societies. | https://www.ccacoalition.org/zh-hans/node/3485 |
Funding for this research was provided by:
Neuroscience Research and Development Group
Text and Data Mining valid from 2019-03-08
Article History
Received: 13 May 2018
Accepted: 28 February 2019
First Online: 8 March 2019
Ethics approval and consent to participate
: This study was approved by the ethics committee of Siriraj hospital and the Khon Kaen University Institutional Review Board (reference number Si 621/2017 and HE 601309, respectively). The Khon Kaen University Ethics Committee determined that the project could be exempted for review since it was relevant to type of research according to KKU’s announcement no. 1877/2559 that involved survey procedures, interview procedures or observation of public behavior. The requirement for informed consent was, thus, waived at Khon Kaen University. The Siriraj Institutional Review Board considered this study as an expedited category and has approved for the final protocol where participants were informed of the study but written consents were not required at Siriraj hospital.
: Not applicable.
: The authors declare that they have no competing interests.
: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. | https://crossmark.crossref.org/dialog/?doi=10.1186/s12909-019-1510-5 |
Any given series either converges or diverges. But did you realize that there were different kinds of convergence? In this review article, we’ll take a look at the difference between absolute and conditional convergence. Along the way, we’ll see a few examples and discuss important special cases.
Absolute and Conditional Convergence
If a series has a finite sum, then the series converges. Otherwise, the series diverges.
However, we do make a distinction between series that converge very strongly, and those that only just barely converge. It all boils down to the signs of the terms.
- A series Σan converges absolutely if the series of the absolute values of its terms converges. That is, if Σ|an| also converges.
- A series Σan converges conditionally if the series converges but the associated series of absolute values Σ|an| diverges.
Classifying Series
It’s important to realize that both absolute and conditional convergence are still types of convergence. It’s not that a conditionally convergent series sometimes converges and sometimes not. Instead, we’re talking about the behavior of a related series: what happens when we get rid of all the negative signs in the series? If the new series of all positive terms also converges, then the original series converges in the strongest possible sense (absolute convergence).
So, there are only three possibilities:
- A series could converge absolutely.
- It could converge conditionally.
- Or, the series could diverge.
Prototypical Examples
Let’s talk about three basic series to help illustrate the point.
Usually the question of absolute versus conditional convergence pertains to series that have a mixture of positive and negative terms — as in an alternating series. (You can check out this review article for more details about alternating series: AP Calculus BC Review: Alternating Series.)
Example 1 — Absolutely Convergent
First, let’s consider the following series.
This series is both alternating (the signs switch back and forth) and geometric (there is a common ratio). In fact, because the common ratio, r = -1/2, has absolute value less than 1, we know that this series converges.
But is the convergence absolute or conditional?
Consider the related series of absolute values of each term:
Again, we have a geometric series. But this time, the ratio is positive: r = 1/2. Still, |r| < 1, so the series of absolute values of terms converges as well.
Therefore, we have shown that the original series is absolutely convergent.
Caution: The two series (original vs. absolute values) are not usually going to converge to the same value. Indeed, using the formula for the sum of a geometric series, we can find out the sums explicitly:
Example 2 — Conditionally Convergent
Next, consider the alternating harmonic series.
This series does converge. How can we tell? Use the Alternating Series Test.
The absolute value of the general term is equal to 1/n, which decreases and limits on the value 0 (as n → ∞). This implies that the original alternating series is convergent.
But how convergent is it really?
The series of absolute values is famous. It’s called the harmonic series, and we know that it diverges!
Therefore, by definition, the alternating harmonic series is conditionally convergent.
Example 3 — Divergent
Finally, let’s take a look at the series of powers of -1.
This series has no chance of converging at all because the limit of the general term is not zero. In fact, the limit of (-1)n as n → ∞ doesn’t exist at all!
Therefore, this series is divergent. There is no need to check the sum of absolute values at all.
The p-Series Test and Conditional Convergence
There is a very important class of series called the p-series.
By definition, a p-series is a series of the form:
There is an extremely simple test for convergence.
- If p > 1, then the series converges.
- If p ≤ 1, then the series diverges.
For example, the harmonic series, Σ1/n is a p-series with p = 1. According to the chart above, this series must diverge.
On the other hand, the series of reciprocals of squares, Σ1/n2 converges because it’s a p-series with p = 2, and 2 is greater than 1.
Alternating p-Series
But what about the alternating versions of the p-series?
This time, the answer depends on the Alternating Series Test. As long as p > 0, then there will be a positive power of n in the denominator. So we would have 1/np → 0 as n → ∞, which in turn proves that the alternating series converges.
However, the convergence is only conditional if p ≤ 1 because of the p-Series Test. Absolute convergence is guaranteed when p > 1, because then the series of absolute values of terms would converge by the p-Series Test.
To summarize, the convergence properties of the alternating p-series are as follows.
- If p > 1, then the series converges absolutely.
- If 0 < p ≤ 1, then the series converges conditionally.
- If p ≤ 0, then the series diverges.
More About Absolute Convergence
There are two powerful convergence tests that can determine whether a series is absolutely convergent: the Ratio Test and Root Test. However, neither one can tell you about conditional convergence.
In fact, if the series is only conditionally convergent, then both the Ratio and Root Test will turn out to be inconclusive.
For example, let’s try the Ratio Test on the alternating harmonic series.
Because the limit is 1, the Ratio Test cannot determine whether the series converges or diverges.
You can find out more about these two tests here: AP Calculus BC Review: Ratio and Root Tests. | https://magoosh.com/hs/ap-calculus/2017/ap-calculus-bc-review-absolute-conditional-convergence/ |
Capacity Planning Contracts in Stevenage
The table below looks at the statistics for Capacity Planning skills in IT contracts advertised for the Stevenage region. Included is a guide to the average contractor rates offered in IT contracts that have cited Capacity Planning over the 3 months to 31 March 2015 with a comparison to the same period in the previous 2 years.
Note that daily contractor rates and hourly contractor rates are treated separately. When calculating average contractor rates, daily rates are not derived from quoted hourly rates or vice versa.
Contract IT job ads with a match in theProcesses & Methodologies category
25
33
21
As % of all contract IT jobs located in Stevenage
71.43%
67.35%
67.74%
Number of daily rates quoted
8
12
5
Average daily rate
£310
£413
£375
Average daily rate % change year-on-year
-24.84%
+10.00%
90% offered a daily rate of more than
£300
£244
£255
10% offered a daily rate of more than
£500
£550
£450
UK excluding London average daily rate
£396
£375
£363
% change year-on-year
+5.60%
+3.44%
Number of hourly rates quoted
5
8
2
Average hourly rate
£14.85
£9.50
£14.00
Average hourly rate % change year-on-year
+56.31%
-32.14%
UK excluding London average hourly rate
£30.20
£27.50
£32.00
% change year-on-year
+9.81%
-14.06%
Capacity PlanningJobs Demand Trend in Stevenage
This chart provides a 3-month moving total of IT contractor jobs citing Capacity Planning across the Stevenage region as a proportion of the total demand within the Processes & Methodologies category.
Capacity PlanningHourly Rate Trend in Stevenage
This chart provides the 3-month moving average for hourly rates quoted in IT contractor jobs citing Capacity Planning across the Stevenage region.
Capacity PlanningTop 30 Related IT Skills in Stevenage
For the 6 months to 31 March 2015, IT contractor jobs across the Stevenage region citing Capacity Planning also mentioned the following IT skills in order of popularity. The figures indicate the number of jobs and their proportion against the total number of contract IT job ads sampled that cited Capacity Planning.
Capacity PlanningTop Related IT Skills in Stevenage by Category
For the 6 months to 31 March 2015, IT contractor jobs across the Stevenage region citing Capacity Planning also mentioned the following IT skills grouped by category. The figures indicate the number of jobs and their proportion against the total number of contract IT job ads sampled that cited Capacity Planning. Up to 20 skills are shown per category.
| |
Telestia Creator CAD Special Process Performance for Clothing Design
The creative contribution of Telestia Creator CAD software is based on a number of Engineered Design Features, unique on their way of work.
Its mission is to help the Digital Clothing Creative Design Process, by employing a large number of Functions, Working Tips & Processes, that are uniquely necessary to the Creative Garment Design process.
In addition to all the Digital drawing and illustrating tools, it has devised and engineered a large number of Functions that help a Garment Designer work digitally, similarly to working by hand.
It facilitates processes that allow designers work in a special Digital environment at the same time free to apply techniques and principles, that have helped creators transfer their ideas visually, for thousands of years, from the Classical Arts times, throughout the centuries, to the Applied Arts periods of the 19th & 20th centuries.
By supporting the Creative Design Process, it enhances and enriches the potential of the digital facilitation. | http://www.etelestia.com/community/author/anastasia/ |
Archmere Academy’s Office of School Counseling helps students develop a healthy understanding and respect for themselves and others. The School Counseling team seeks to increase students’ problem-solving, decision-making, emotional-management, and academic skills through individual and group counseling sessions, classroom presentations, health coursework, and schoolwide assemblies.
Archmere’s school counselors provide an atmosphere of security, warmth, and encouragement as Archmere students work to reach their fullest potential in the areas of academics, social, and personal character development. The solid foundation they create allows Archmere students to successfully manage their lives as healthy, responsible, productive citizens, who respect themselves and others.
The Office of School Counseling wants students to master the competencies necessary to make informed self-directed, realistic, and responsible decisions to successfully contribute to society.
Services
List of 5 items.
Consulting Psychologist
Dr. Williams is a licensed clinical psychologist who conducts comprehensive psychodiagnostic and psychoeducational evaluations of children, adolescents and college level students, assessing a variety of learning differences (e.g. ADHD, Dyslexia) in private practice. Dr. Williams has collaborated with Archmere Academy for several years, providing these types of evaluations for our students. As a school, we know the value of these evaluations and are happy to partner with Dr. Williams to cover a 25% of the cost of her evaluations of our students.
Dr. Williams received her B.A. from Williams College and her M.A. and Ph.D. in Child/Family Clinical Psychology at the University of Miami. She completed her internship and postdoctoral fellowship at the AI DuPont Hospital for Children. Dr. Williams was previously a tenured professor in the Department of Psychology at the La Salle University in Philadelphia. There she taught courses related to child and adolescent development, psychopathology, and treatment. She also trained and supervised graduate students in the practice of child/family psychology. Dr. Williams has conducted research and authored multiple peer-reviewed papers on child development and mental health service utilization. She has also presented her research at national and international conferences. Dr. Williams is also the consulting psychologist at the Independence School and works in private practice.
Freshman Orientation Program
To welcome the freshmen class into the Archmere community, the School Counseling Office and Admissions designed a comprehensive orientation program. Each freshman is assigned a senior “buddy,” and together they tour campus, including walking through the freshman’s daily class schedule. Freshmen also participate in team-building and small group activities, meet their faculty advisor, and receive their class schedule.
Health Services
There is a full-time registered nurse on staff at Archmere Academy to provide health services for all students from 8:00 a.m. to 3:00 p.m. while school is in session. Parents are expected to inform the nurse of any new or ongoing health problems. If you’re a current parent looking for policies and procedures for illnesses, please refer to the student handbook in MyArchmere.
Individual Counseling
Archmere Academy focuses on the whole student, which includes mental wellness as well as academic wellness. Each student has a designated school counselor who stays with them throughout their time at Archmere. Students meet with their counselor during the first few months of the school year and are strongly encouraged to meet with their school counselor individually regarding any concerns regarding their academic career, as well as any personal crisis they may be having. All conversations are kept within professional and ethical confidence.
Learning Services
All students can receive academic support through Archmere’s full-time learning specialist. Students with or without documented learning differences who need assistance with organization, study skills, and tutoring can meet with the learning specialist. This position also serves as a resource for parents and faculty as well. Working closely with all members of the School Counseling Office, the learning specialist ensures the academic needs of all students are met.
List of 6 members.
Danyele
Dove
Director of Counseling, Diversity, Equity, and Inclusion
302-798-6632 Ext 855
Joanna
Doroh
School Counselor; Health Teacher
302-798-6632 Ext 870
Jonathan
Jezyk
School Counselor; Psychology Teacher
302-798-6632 Ext 716
Francesca
Pileggi
School Counselor & Director of Wellness
302-798-6632 Ext 871
Lauren
Walton
Learning Specialist
302-798-6632 Ext 717
Rebecca
Hendrixson
School Nurse; Health Teacher
302-798-6632 Ext 767
DEI Resources
NAIS REPORT
BIPOC MENTAL HEALTH RESOURCES
INCLUSIVE LANGUAGE TIPS
ALLYSHIP TIPS
Additional Resources
NJ MENTAL HEALTH RESOURCES
DE MENTAL HEALTH RESOURCES
PA MENTAL HEALTH RESOURCES
ACTIVE STUDYING STRATEGIES
3600 Philadelphia Pike
Claymont, DE 19703
Phone:
302-798-6632
Fax: 302-798-7290
Archmere Academy is a private, Catholic, college preparatory co-educational academy,
grades 9-12 founded in 1932 by the Norbertine Fathers. | https://www.archmereacademy.com/student-life/school-counseling |
getting permission to seek factual information about Bob Dylan's recordings.
It read: "After careful consideration, it is our decision that you may examine
our recording logs as well as the files at Columbia Records."
|
Some Months later, I found myself in the Archives of Sony Records in New York City, examining the original tapes (of which some are shown in the booklet for The Bootleg Series), the recording diaries and a lot of material kindly made available to me. The amount of material is so extensive that it will take many hours and several additional visits to New York to go through it all, but even after this first visit, I have been able to establish many interesting and surprising factual details.
In this and subsequent issues of The Telegraph, this information will be presented, concentrating primarily on Bob Dylan's Columbia Studio recordings. The information will be presented chronologically.
First, though, some general information regarding the different sources made available for the study:
Additional session-related papers made available for examination included musicians' contracts, reports made by the producers and other material. This was generally available from January 1, 1965 and onwards.
It is obvious that the material made available for examination is of extreme importance in the efforts to establish the facts about Bob Dylan's many recording sessions. As a result, it has been possible to clarify most of the details. In some instances there are discrepancies in information from the different sources mentioned above, and this can only be clarified by listening through the tapes for those sessions. The following information is therefore not necessarily 100 per cent correct, but until all the tapes have been heard, I'm confident that it's pretty close to being a definitive listing.
The format in which the information is given is strictly adhered to. For each session (defined as an event with a job number in the studio diaries), a headline specifies the location, date and planned time for the session. The names of the producer an engineers are listed. Following this, each take recorded at the session is listed chronologically, numbers from 1 onwards. The songs are listed with their official title, followed by the CO number (only given for the first take of each song if many take are recorded). Then comes the take number and the indication of whether the take is complete (C), with a short false start(b) or a long false start(B).
The take numbers are not always logical. To identify the takes with any degree of certainty, they should be numbers from 1 onwards. But in some instances, there are missing or duplicate take numbers, for instance 1,2,3,6,7,7,11. This is probably because only stated takes (i.e. properly announced takes) are listed, in some cases at least, or because they are listed as they are slated (and the person who slates the take sometimes seems to have a bad memory as to where he's up to). In other cases, when a composition is recorded several times at different sessions, the same CO number is used at all sessions (which is logical because it identifies the composition). Sometimes the take numbers are continuous from one session to the next, but at other times every session starts with take 1.
In the lists given, the take numbers are duplicated precisely from the recording sheets and are therefore not always logical.
In the notes after the song listings, the following information is given: the actual time of the session, if known; the titles of the composition given on the recording sheet if they are not the official titles; the names of backing musicians and an indication of which takes of which tracks were eventually released on the official albums. Release information has been limited to the first release for each take; additional releases on other albums have not been included.
In this first part, the Columbia sessions in New York in the 1960s are listed, starting with Dylan's sideman job for Carolyn Hester in 1961. | http://www.punkhart.com/dylan/sessions-1.html |
Fiddy, Michael A.
Date of Issue2012
Conference Name
Photonic and Phononic Properties of Engineered Nanostructures (2nd : 2012 : San Francisco, US)
School
School of Electrical and Electronic Engineering
Related Organization
Department of Physics and Optical Science, Center for Optoelectronics and Optical Communications, University of North Carolina at Charlotte, USA
Version
Published version
Abstract
In order to better understand how to improve the performance of a superlens, structural and geometrical arrangements of meta-atoms are investigated. Each meta-atom (i.e. the unit element composing a metamaterial) in our study is an asymmetric 3D “S”-shaped resonator. This structure radiates an enhanced scattered field at several possible resonant frequencies, some of which are out of phase with the incident wave. We retrieve the effective parameters of different metamaterials and discuss the role of meta-atom symmetries and dimensions in affecting the effective refractive index of a metamaterial slab. Relative locations and orientations of individual meta-atoms are investigated to provide desired properties with low loss despite the inevitable finite size of each meta-atom. The results presented provide insights for designing superlenses, resonant antennas, and other potential applications.
Subject
DRNTU::Engineering::Electrical and electronic engineering
Type
Conference Paper
Rights
© 2012 Society of Photo-Optical Instrumentation Engineers (SPIE). This paper was published in Proceedings of SPIE - Photonic and Phononic Properties of Engineered Nanostructures II and is made available as an electronic reprint (preprint) with permission of SPIE. The paper can be found at DOI: [http://dx.doi.org/10.1117/12.906331]. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper is prohibited and is subject to penalties under law. | https://dr.ntu.edu.sg/handle/10220/7809 |
Each year gray whales make a long migration along the west coast of North America from the cold waters of the Arctic to the warm waters of the Baja lagoons and back, about 10,000 miles. They travel up to five miles per hour during the southbound migration. That’s the longest migration of any mammal. Why this long journey? The whales spend their summers feeding on rich food on the bottom in the Arctic and then travel to Baja to mate and give birth in several lagoons.
An adult gray whale and its calf approach tourists By José Eugenio Gómez
New Virtual Classroom Resources
Flatworms: The First Hunter
Nature's Innovations: Animals as Engineers
In the Classroom
Alexis (Ali) Osgood, Salinas High SchoolPosted on December 10th, 2021
Getting Messy with Ms. O’Frizzle
“I encourage my students to roll up their shirt sleeves and GET MESSY! Make mistakes. Ask lots of questions. Biology can be dirty business,” said Ali. “If you’re not getting messy you’re just not having fun.”
Learn more about how Ali became Ms. O’Frizzle and one of our most engaging community members on Shape of Life social media.
Featured Scientist
Jeremy GoldbogenPosted on December 10th, 2021
The Real Prince of Whales
Meet Jeremy Goldbogen. He tags whales. Yep, he pretty much has one of the coolest jobs of anyone we know.
Through Jeremy’s research we get to cruise the ocean on the back of whales and experience how they eat krill, make those amazing noises and maneuver with surprising agility. With a device the size of a book, Jeremy speaks volumes about the largest animals ever known to live on earth.
Amanda Kahn Assistant Professor, Moss Landing Marine Laboratories- San Jose State UniversityPosted on October 11th, 2021
Join Amanda as she shares the magnificent world of sponges and how they go to battle with the climate crisis.
News
Whales May Be the Ultimate Ocean EngineersPosted on December 10th, 2021
The baleen whales, like humpback, blue and fin, consume huge quantities of food. And when they poop, they cycle massive amounts of nutrients back into the ecosystem.
A new study found that the large whales eat and poop far more than previously thought: they consume approximately triple the amount of food previously estimated. Scientists have seriously underestimated the role large whales play in ocean health.
Marine Flatworms Colors Send a WarningPosted on November 15th, 2021
Flatworms are some of the most colorful marine creatures. Their spectacular colors and patterns can be eye popping. Scuba divers and tide-poolers love to take pictures of them for good reason; they are dazzling.
These ferocious predators are found in all habitats, feeding on tunicates, small crustaceans, worms, and molluscs. Some species have coloration that mimics other animals or acts like camouflage. But most are very colorful and easy to see. This is an example of warning coloration (called aposematism), advertising that the flatworms are poisonous to eat. Some species contain tetrodotoxin: the same poison found in a number of other poisonous creatures, including puffer fish, some species of frogs and the blue-ringed octopus. | https://www.shapeoflife.org/node/438 |
A set of x26 bold and colourful silkscreen prints, one for each letter of the alphabet, produced by the artist in 1991.
From the familiar Z for Zebra to the esoteric P for Pachyderm these screen prints reflect his humour, nostalgia and eclecticism.
This is a RARE opportunity to purchase one of Sir Peter Blake's first Alphabet Series, Published in 1991 by Waddington Graphics and Coriander Studio, London.
These beautiful Silkscreens are created on wove, signed, titled and numbered in pencil by Sir Peter Blake. | http://farm8.clik.com/cjholding/gallery_741108.html |
This weekend I wrote a simply labyrinth generator for Pathfinder. It is surprisingly easy to get interesting systems. Much easier than trees!
The first and most important decision I made was to use a voxel grid. To create a mesh immediately would cause problems with self intersections. So my idea was to create a volume texture and just set voxels to solid, corridor, stairs, ... After that one could use a standard extraction of implicit surfaces (Marching Cubes or Dual Contouring). I decided to use a specialised generator to hold the amount of triangles low.
Without the special case of stairs the idea is very simple: For each non-solid voxel sample its 6 neighbours. If there is a solid voxel there must be a wall on that side - create a quad.
The generator must fill the voxel grid with meaningful values now. Since I would like to have corridors and rooms and no natural shapes it is sufficient to use very large voxels where one single voxels is already a corridor/room.
Corridors: Just set a line of voxels to "Corridor". A corridor has a random length in [2,10].
Chambers: Create a larger empty volume centered at the entrance.
Stairs: Create two diagonal voxels of type stair. The problem here is the triangulation. There should be a slope between two floors but so far only axis aligned triangles are generated. I introduced a shearing for the stair voxels. So far so good but the resulting corridor will cross solid voxels (see image). That itself is no problem, but if an other structure intersects there this will cause an ugly triangle inside the room. To overcome this a stair structure locks its surrounding as solid.
An much easier approach would be to create vertical corridors and insert stairs as extra objects. It is a design decision that I would like to have these slopes.
The recursive part is doing the following thing: Chose one of the structures probabilistically. If it is "corridors" create 1-3 corridors, otherwise create exactly one of the chosen structure. Continue recursion at each returned attachment point. To stop the recursion a counter is decreased in each step. It does not directly count the recursion depth. Instead it is decreased by the number of created sub-structures. So if there are 3 corridors the counter is decreased faster to stop the recursion earlier. This should stabilize the "size" of the result. For a really stable size-controll-factor it would be necessary to divide the remaining number through the number of sub calls. On that way one could exactly create n structures where n is given in advance.
It should be said that the generator can create labyrinths of where different complexity. In the described approach floors are generated in each voxel grid level. There are many points where the structures intersect vertically. It is possible to jump down into the floor below and there are even circles in 3D where the common rule "always touch the wall with the same hand" does not succeed to leave the labyrinth. To make things easier I create stairs of length two so one voxel level is always skipped. Due to chambers it is still possible that there are vertical intersections but they are rare.
In conclusion it was a very good idea to use voxels in the first place. In feature I might use the component based generator approach for other things. One could even think of something hierarchically. For each substructure one can just ignore everything else and concentrate on a meaningful result.
This entry was posted in Generators, Terrains on 14. October 2013 by Johannes. | http://jojendersie.de/2013/10/ |
Legionnaires’ disease is a severe form of pneumonia. It is caused by Legionella bacteria which are found in damp or wet environments. hey are found in natural water bodies such as rivers, lakes, creeks and hot springs. The bacteria are also found in spas, potting mix, warm water systems and artificial systems that use water for cooling, heating or industrial processes, such as cooling towers.
People get Legionnaires’ disease when they breathe in a mist or vapor containing the bacteria, such as the water droplets sprayed from a hot tub that hasn’t been properly cleaned, according to the CDC. The bacteria don’t spread from person to person, like the flu or a cold.
Most people exposed to legionella don’t become sick. Smokers, the elderly and those with weakened immune systems are more susceptible than others to Legionnaires’ disease, according to the studies. Symptoms include fever, chillls, headaches and muscle pain, which can progress to coughing, chest pain, nausea, vomiting and difficulty breathing
Between 5% and 30% of patients with Legionnaires’ die in U.S.
Causes
The bacteria which cause Legionnaires’ disease – Legionella – exist in rivers, lakes and other places with fresh water – usually in low numbers because the water temperature in such places is too low for the bacteria to multiply rapidly.
Artificial water systems on the other hand, where water temperatures may be higher – between 20-45C (68-113F) – are sometimes ideal environments where the bacterium can multiply rapidly and spread, infecting major parts of the water system.
For the bacteria to reproduce and spread rapidly it needs the right temperature and the right food. Impurities, such as algae, sludge, rust and lime scale are types of food for this sort of bacteria.
So, any hotel, hospital or large building with an air conditioning system that uses water for cooling might sometimes have the ideal environment in which the bacteria can thrive.
Experts say that any type of artificial water system can potentially become contaminated, including fountains, baths, showers, water taps, gardening sprinklers, spas and humidifiers used to display food.
Risk Factors
Not everyone exposed to legionella bacteria becomes sick. People are more likely to develop the infection if they –
- Smoke – Smoking damages the lungs, making you more susceptible to all types of lung infections.
- Have a weakened immune system as a result of HIV/AIDS or certain medications, especially corticosteroids and drugs taken to prevent organ rejection after a transplant.
- Have a chronic lung disease such as emphysema or another serious condition such as diabetes, kidney disease or cancer.
- Are 50 years of age or older.
- Legionnaires’ disease is a sporadic and local problem in hospitals and nursing homes, where germs may spread easily and people are vulnerable to infection.
Symptoms
Legionnaires’ disease can be hard to diagnose because its symptoms are similar to other types of pneumonia and it often looks the same on a chest x-ray. Specific tests are needed to determine if a case of pneumonia is Legionnaires’ disease.
The most common symptoms of Legionnaires’ disease include –
- Cough
- Shortness of breath
- High fever
- Muscle aches
- Headaches
These symptoms usually begin 2 to 10 days after being exposed to the bacteria, but it can take longer so people should watch for symptoms for about 2 weeks after exposure.
Pontiac Fever – Pontiac fever has many of the same symptoms as Legionnaires’ disease, primarily fever and muscle aches, but it is a milder infection. Symptoms begin between a few hours to 3 days after being exposed to the bacteria and usually last less than a week. Pontiac fever is different from Legionnaires’ disease because someone with Pontiac fever does not have pneumonia.
Complications
Legionnaires’ disease can lead to a number of life-threatening complications, including –
- Respiratory failure – This occurs when the lungs are no longer able to provide the body with enough oxygen or can’t remove enough carbon dioxide from the blood.
- Septic shock – This occurs when a severe, sudden drop in blood pressure reduces blood flow to vital organs, especially to the kidneys and brain. The heart tries to compensate by increasing the volume of blood pumped, but the extra workload eventually weakens the heart and reduces blood flow even further.
- Acute kidney failure – This is the sudden loss of the kidneys’ ability to perform their main function — filtering waste material from your blood. When the kidneys fail, dangerous levels of fluid and waste accumulate in the body.
Treatment
Most people who are diagnosed with Legionnaires’ disease will need to be treated with antibiotics such as erythromycin and ciprofloxacin.
Other treatments may include receiving –
- Fluids through a vein (IV)
- Oxygen, which is given through a mask or breathing machine
People with Pontiac fever generally recover spontaneously within 2 to 5 days without treatment.
Alternative Treatment
Carotenoid complex & Beta carotene – Forerunners of vitamin A helps to prevent lung damage.
Vitamin C – Potent antioxidant. Destroys bacteria. Consider intravenous treatment under a physician’s care.
Bioflavonoids – Potent antioxidant. Destroys bacteria. Consider intravenous treatment under a physician’s care.
Coenzyme Q10 – Controls and enhances immune system. Transports oxygen to cells.
L-Carnitine plus L-cysteine – Enhances immune system. Prevents damage to lung tissues.
Lactobacilli – Kills bacteria. Promotes healthy digestion.
Vitamin B complex – A mix of coenzymes. Promotes healthy cell function. Prevents cell damage.
Vitamin A – Enhances immune system. Helps replenish lung tissue and prevent it from becoming damaged. Emulsion form is recommended.
Raw thymus and raw lung glandular – Boosts immune system. Enhances lungs and thymus.
Zinc – Enhances immune system. Zinc gluconate lozenges are recommended.
Vitamin E – Antioxidant. Prevents lung tissue damage. Emulsion form is recommended.
Catnip – Catnip Tea can help to lower the fever.
Echinacea – Echinacea can boost the immune system.
Goldenseal – Goldenseal acts as a natural antibiotic and can encourage healing. | https://coem.com/blog/legionnaires-disease/ |
- Author: Evelyn Morales
During my time at UC CalFresh, I was exposed to a stimulating variety of opportunities. I taught classes ranging from pre-kindergarten to adults, all of which I really enjoyed! I loved watching the kids eager to learn about MyPlate and physical activity and the adults asking questions on how to make their families healthier. I was also extremely impressed by the UC CalFresh staff; their passion for nutrition and health education radiated inside and out of the classrooms.
These pictures are from a few of the classes I taught at Bailey Elementary in Firebaugh. The kindergarteners in the picture above loved learning about fruits and vegetables. I read them a book about buying different fruits and vegetables at the market and then we played the Colors of the Rainbow game where they put their assigned fruit on the rainbow according to its color.
The picture below is from a second grade class at Bailey Elementary. We had a fun, interactive lesson where I taught them about different vegetables and then we played the Mystery Vegetable game after.
I was also able to co-teach and conduct food demonstrations at two classes for the Jobs and Beyond program. These individuals all had families to take care of and were truly invested in the lessons. I was encouraged by how many questions they all had and I was eager to answer them all. We discussed how to save time and money when cooking healthy meals for their families.
The pictures below are from my moringa project. I created two different smoothie recipes that contained moringa, then the staff taste tested and provided feedback on their favorite version. This was a really fun project and forced me to get creative with the recipes. I have never created a recipe from scratch, so this was a great learning opportunity for me!
Overall, I had a very pleasant experience during my two weeks at UC Cooperative Extension with the CalFresh program. This rotation forced me to go outside of my comfort zone, and I ended up enjoying everything I did! These last two weeks have exposed me to the importance of community nutrition and have left me with an eager drive to potentially work in community nutrition once I become a registered dietitian. Thank you to all of the staff who warmly welcomed me into their office and for showing me how health educators can make a huge difference in the community. | https://ucanr.edu/blogs/blogcore/postdetail.cfm?postnum=27027 |
Five years ago, when a player asked whether my storylines were tightly scripted, I took that to mean that players didn't want plots with pre-destined outcomes.
But, since then, I've come to this understanding: That's a load of camel dung.
In general, players are perfectly content with - and actually prefer - rigidly structured storylines under the following conditions:
1) They win in the end, somehow. 2) They don't die or suffer severe injuries as a result of the storyline. 3) They're allowed some measure of flexibility within the rigid plot framework.
For most roleplayers, that's the simple truth. You may find a precious few who love to live on the edge and want a less predictable ending. But, by and large, players who invest any kind of effort into developing their character won't want him killed due to an unexpected twist in the storyline.
At first glance, you may be thinking that this is adding up to a knock against players who want predictability in their plots. At first glance, that's absolutely what I intended. But the more I think about it, the less I really consider it such a bad thing. It's not bad. It's plain old human nature. Real life throws enough curveballs as it is without your favorite diversionary activity doing it too.
Sure, it feels good to say you want an open-ended plot where anything can happen. But for most people, that really means you want room to maneuver within the structure of the plot to ensure that your character survives the experience, with a clear victory if possible.
As I sat down to write this column, I considered that mindset to be loathsome. From a purely improvisational storytelling standpoint, especially if you develop and perform storylines, it's easy to bang that drum decrying a player's desire to protect their character from extensive harm or death. However, from a *player* standpoint, that desire makes sense and it's actually a wonderful quality: They're attached to the character and your game enough that it matters what happens to that character.
Way back when, in my just-a-player days, I got first-hand experience in what was obviously, in hindsight, a carefully scripted storyline on TOS TrekMUSE. The staffers put on an extended plot featuring these deceptively cuddly psionic teddy bears called the Ikarans, who threatened the cosmos, ate brains, seized control of the minds of certain Federation starship commanders and served as a menacing villain that needed wiping out. The Ikarans terrorized the galaxy for months, but all the players recognized that the storyline must end with the defeat of the Ikarans. We drew our roleplaying inspiration within that rigid framework from the crisis at hand and how it affected our comrades. The uncertainty - the plot flexibility - came in the form of how we set up our coalition attack fleet between the Klingons, the Federation and the Romulans, and who ended up going down to the Ikaran homeworld to kill the queen. Kill the queen, and the war ends. My character, Gavalin Brody, a Starfleet captain aboard the USS Excelsior, got to lead the assault on the queen. He got to shoot and kill her. In retrospect, that was terrific payoff for months of waiting, but it still came within a rigid plot framework - and that was *great*! I still got to roleplay the aftermath of being a hero.
At OtherSpace, some of our most successful plots have been rigidly outlined. During Arc III, back in 1999, some players opened a strange alien box and found themselves transported to an alien world where they lived the last days of several children whose family was doomed to join thousands in a mass suicide. The roleplaying bliss didn't come from trying to stop the suicide from happening, but from immersing themselves in the lives of those children before they died. During Arc XIV, earlier this year, the players had to stop a universe-threatening Moebius Effect wave. It was pretty clear that I didn't intend to let the galaxy get torn apart, but when the time came for the conclusion, I sought one volunteer to try and stop the effect with the understanding that the volunteer wouldn't survive. The job would be suicidal. (However, I found a way to let the character survive, providing an unexpected twist within the framework.) That player got to have an impact on how the planned ending unfolded, and made it his own, in much the same way as I embraced the finale of the Ikaran storyline on TOS TrekMUSE.
Some of our real stinkers on OtherSpace, when it comes to plots, have been open-ended, let-the-players-drive-the-train storylines. For example, a bunch of players got caught and stuck in an alien work camp, but refused to RP through it because 1) they didn't want to be imprisoned and 2) they didn't want to risk dying at the hands of the brutal guards. I can't say I blame them, really. Without exception, at least in my experience, such plots always end up requiring an excessive amount of admin-cleanup, in which staffers intervene as referees or non-player characters to wrap up the story and get the players out of the situation so they can move on.
In the end, we must accept that players don't want choices as much as they want excitement without great sacrifice. They don't want flexibility as much as they want maneuverability and relative invulnerability. They don't want surprising plot twists as much as they want to win. The trick is finding the balance of excitement and comfort, while presenting the illusion of a flexible storyline by giving players opportunities to affect some aspects of the twists and turns along the way.
Wes Platt is the creator of OtherSpace: The Interactive SF Saga and Chiaroscuro: The Interactive Fantasy Saga. He's a head-wiz on Star Wars: Reach of the Empire. (All games can be reached through his official site at www.jointhesaga.com.) He also produces Brody's MUD Index (mudindex.jointhesaga.com), a free quarterly periodical in PDF format that offers MUD listing opportunities. His e-mail address is [email protected]. | https://www.topmudsites.com/backstage06.shtml |
The Report was launched by World Energy Council in partnership with Oliver Wyman at a Press Conference on 11 October 2016 at the World Energy Congress in Istanbul. It will also be discussed the following day at a Ministerial Roundtable, moderated by Joan Mac Naughton, the Executive Chair of the World Energy Trilemma.
The World Energy Council’s definition of energy sustainability is based on three core dimensions (1) energy security, (2) energy equity and (3) environmental sustainability. Balancing these three goals constitutes a ‘trilemma’ and is the basis of prosperity and the competitiveness of individual countries.
Regional Overview
The Energy Trilemma Index quantifies the trilemma and comparatively ranks 125 countries’ energy performance. It provides policymakers and energy leaders with comprehensive regional analyses and country profiles with detailed breakdowns of energy trilemma performance and energy sector data, as well as trends and outlook for the country’s energy sector.
The analysis is based on a carefully curated yet comprehensive set of 35 indicators. This year’s index has been compiled using a revised methodology which allows for an even greater degree of sophistication in assessing a country’s energy sector performance.
An analysis of selected key indicators shows that globally, there seems to be a positive trend underway in all three trilemma dimensions: an increase in access to electricity and clean cooking by 5% to 85% and 74% respectively since 2000 point towards progress made in the energy equity dimension. At the same time, the fact that renewables now make up 9.7% of global total primary energy consumption is a positive signal for both the energy security and environmental sustainability dimensions. However, a predicted rise in energy consumption by up to 46% by 2060 will put a strain on all three trilemma dimensions and emphasises the importance of timely action to move towards energy sustainability.
Top Performers
This year Denmark, Switzerland and Sweden top the Index, with Demark also achieving the highest score for energy security. While not in the top 10 overall, Luxembourg maintains its position for most equitable (affordable and accessible) and the Philippines is leading the way on the environmental sustainability dimension. In Latin America, Uruguay ranks the highest, whilst in the Middle East, Israel outperforms its regional peers. In Sub-Saharan Africa, Mauritius performs best, while in Asia, New Zealand remains at the top of the regional leader board.
Regions
The World Energy Council recognises that countries situated in different parts of the world will face significantly different challenges in trying to balance their energy trilemma performance. Therefore, the 2016 Index puts a special emphasis on regional profiles.
- North America is currently focusing on improving and building resilience of its ageing infrastructure.
- Europe, meanwhile, is still working on managing its energy transition to meet both its international and domestic climate change commitments. This will involve sophisticated domestic energy market design, strengthening regional energy markets, and designing an effective carbon price.
- The Latin American and Caribbean countries, going forward, will have to improve resilience of the renewable energy infrastructure by diversifying away from hydroelectric power, which is especially susceptible to extreme weather events.
- Asia, faced with growing energy demand, must also diversify its energy sector and continue to pursue plans to invest in renewable energies and increase energy efficiency to reduce import dependence. Only by doing so can the sustainable growth of its highly energy-intensive emerging economies be facilitated.
- The Countries in the Middle East and North Africa are working on slowly diversifying away from oil and gas, exploiting their great potential for solar power generation, and improving energy efficiency.
- Sub-Saharan Africa’s greatest challenge remains ensuring equity of access. To this effect, maintaining and improving existing infrastructure, as well as working with innovative off-grid technologies is key, along with attracting investment and increasing institutional capacity.
To enhance its utility to energy leaders, this year’s index is accompanied by the launch of a new online tool. The new Trilemma Tool will enable the user to readily access the country as well as regional profiles contained in the report.
What is more, the tool also features an interactive Pathway Calculator, which will enable users to change energy parameters and see how their country’s trilemma performance would evolve. | https://www.wec-italia.org/world-energy-trilemma-index-2016-benchmarking-the-sustainability-of-national-energy-systems/ |
The little pods (Pauropoda) are a class of the arthropods (Arthropoda) and are classified with the millipedes (Myriapoda). Around 540 species of these very small animals with a maximum length of 2 mm are known worldwide.
Way of life of the puntipods
Pauropods are widespread worldwide, with an average of five to ten individuals living in one liter of soil. They prefer to colonize the upper centimeters of loose, humus soil, but occasionally penetrate to a depth of 50 cm. The food spectrum of the pauropods is not yet fully known. So far investigated species feed on fungal threads ( hyphae ). To do this, they bite the ends of these threads with their mandibles and suck out the contents with the help of strong suction muscles on the foregut.
Lesser pigeon hole
Like all members of the Myriapods, the puntipods are characterized above all by a uniform structure of the body segments. The native little pennies have nine or ten segments, each carrying a pair of legs. However, if you look at them from above, you can see fewer than ten back plates, as some segments do not form any of these structures, known as tergites. The tergites of the 2nd to 6th back plates each have a clearly visible sensory organ in the form of a long bristle ( trichobothrium ).
The legs are built uniformly, only the first pair of legs can have fewer limbs or be completely absent. On the legs 2–12 the animals have fold-out sacs ( coxal organs ), on the legs 3–12 additional pen-like structures ( styli ).
The head of the animals is very small, so that the brain protrudes into the first trunk segment. The pinnipedes do not have eyes, but the head is equipped with tactile and chemoreceptors on both sides (pseudoculus). The antennas are made up of a chain of similar antenna links and form a so-called link antenna. This has several minor flagella at its end.
The mandibles of the animals are pointed and consist of only one member. They are used to pierce the mushroom threads. The 1st maxillae are narrow and lie next to a triangular plate that is formed from the associated breast plate ( sternite ). The second maxilla is absent, as in the dwarf pods .
Reproduction and development
The males lay droplets of sperm on a web, which consists of a network with several "support rods". The females ingest the sperm drop from this construction.
The development is only known from the species Pauropus silvaticus . Here, after embryonic development, a nymph hatches with only three pairs of legs, further pairs of legs are created after the moults. As adults, these animals no longer molt.
Systematics of the few feet
The pinnipedes form the dignatha together with the bipedes due to the merging of the basal limbs of the 1st maxilla into a lower lip (gnathochilarium), the loss of the 2nd maxilla or the rudimentary attachment of the same in the embryonic development, the genital openings in the second segment, close to the tracheal openings the legs as well as a young animal with only three pairs of legs.
Together with the dwarf pods , the Dignatha form the Progoneata taxon due to the formation of the intestines and fatty bodies within the yolk and the structure of the mechanoreceptors (trichobothria). This group is usually compared to the centipedes as a sister group.
Internally, the pinnipedes become the original Hexamerocerata (with 12 back plates and tracheal opening on the first pair of legs), which only live in the tropics, as well as the Tetramerocerata (reduced number of back plates, no tracheal system) with some native species. The native species are classified into four families:
swell
Individual evidence
- ↑ Dunger, W. (1993). Pauropoda. In: Gruner, HE (Ed.) Textbook of Special Zoology I.4, Arthropoda (without Insecta). Gustav Fischer, Jena a. a., pp. 1105-1111.
literature
- Wolfgang Dohle : Progoneata , in: W. Westheide, R. Rieger (Ed.): “ Special Zoology Part 1: Protozoa and Invertebrates ”; Gustav Fischer Verlag, Stuttgart, Jena 1996; Pp. 592-600. | https://de.zxc.wiki/wiki/Wenigf%C3%BC%C3%9Fer |
Q:
Difference in Differences estimation in a log linear model
Suppose I try to estimate classical difference in differences model:
$y = \alpha + \beta*T+\gamma*A+\theta*T*A+\epsilon$
where:
$\mathbb{E}[\epsilon|T,A]=0$, $T\in \left\{0,1\right\}$, $A\in \left\{0,1\right\}$
For concreteness let's say that:
$y = $ log of firms;
$T$ is equal to 1 after the reform;
$A$ is equal to 1 for the industries affected by the reform.
Suppose I estimate the following regression separately for $A\in\left\{0,1\right\}$:
$y = \alpha + \beta*T+\epsilon$
The interpretation of estimated coefficient $\hat{\beta}$ would be percentage increase in the number of firms (here I am assuming that $\hat{\beta}$ is small so that Taylor's series approximation used in this approximation is correct) after the reform.
Difference in differences estimate ($\hat{\theta}$) in essence is the difference between these two estimates for control and treatment groups, hence difference in percentages and thus should be interpreted as percentage point difference. Is this correct ? I am asking this because I repeatedly have encountered in papers using log linear models following interpretation "the treatment effect is X% and not X percentage points when the dependant variable is in logs".
A:
The treatment effect in your case is in percent and not in percentage points. To see this, consider the following simple example with two groups and two time periods for before and after the intervention. Let the group means be
y time group lny
110 0 0 4.7004805
111 1 0 4.7095304
110 0 1 4.7004805
115 1 1 4.7449322
where $y$ is the outcome, time indexes the periods (0 before, 1 after treatment), and group indexes the control (0) and treatment (1) group, and $\ln y$ is the log transformed outcome.
Suppose that the outcome trends for the two groups was the same before the treatment, then the difference in differences estimate would be
$$\beta_{y,DiD} = [115 - 110] - [111 - 110] = 4 $$
so the treatment group increased their outcome by 4 units more than the control (which is the same as saying that the treatment group increased their outcome by 4 more units compared to the counterfactual when the treatment had not happened).
When you compare the growth rates in each group, you get a percent increase of $\frac{111-110}{110}\cdot 100 = 0.91$% in the control, and $\frac{115-110}{110}\cdot 100 = 4.54$% in the treatment group. This is approximately the same as taking the differences in the logs between period 1 and 0 in each group (this approximation works well because the differences are not too big). So the difference-in-differences in the growth rates are 4.54% - 0.91% = 3.6%. The DiD estimate using the log transformed outcome is
$$\beta_{\ln y,DiD} = [4.7449322 - 4.7004805] - [4.7095304 - 4.7004805] = 0.0354 $$
and multiplying this by hundred gives you approximately again the difference that we had before. The exact result is given by (exp(.0354018)-1)*100 = 3.6
In the absence of the treatment, the treated group would have had 111 in the second period instead of 115. The percentage change from 111 to 115 is $\frac{115 - 111}{111} \cdot 100 = 3.6$
So the papers that you were reading are right. If you want to estimate a DiD coefficient that estimates a percentage point increase, this works in case of a $y \in [0,100]$, i.e. an outcome on a percent scale. Regressing such an outcome on the time and group indicator, and their interaction will yield a DiD coefficient that shows a percentage point increase for the treatment group. Your other point is correct when you say that regressing
$$y = \alpha + \beta T + \epsilon$$
in each group separately gives the time change for the outcome in each group. When you then compute $\beta_1 - \beta_0$ this will again give you the DiD estimate.
| |
Naval Customs and Traditions and how they are applied to daily life will vary from base to base and ship to ship. These ancient rules, regulations and guidelines influence the daily life of a sailor - with many not even knowing why things are done as they are. The origins of some of the Navy's customs and traditions are lost to time but a few documents survive to give us an idea of the life of our predecessors and why we do, act and talk as we do. The documents below will hopefully help keep the history of these customs and traditions alive for future generations.
A Few Naval Customs, Expressions, Traditions, and Superstitions Second Edition by Cdr W.N.T. Beckett, M.V.O., D.S.C., Royal Navy
Barber Pole (The) - Information Note: 22 Jul 2020 (RUSI(NS))
Battle Honours - Canadian Battle Honours for the RCN
Customs and Traditions for the Canadian Navy - 1981
Customs of the Navy - 1956 by Lt A.D. Taylor, RCN
Manual of Canadian Naval Etiquette by David Lowe
Naval Customs and Social Usage by Cdr F.E. Grubb, RCN
Naval Mess Dinners by Commanders F.M. McKee and A.B. Harris, RCN
Neptune's Notes (Venture Training Manual # 1)
What You Always Wanted To Know About Naval Traditions (but were afraid to ask) by Bob Allan, Capt (N), ret'd (original source link RUSI(NS))
Customs and Traditions of the RCN as explained by
The Royal United Services Institute of Nova Scotia
Below are links to research papers, articles and information notes that have been published by RUSI(NS). They have been included on For Posterity's Sake for their value in explaining some of the various customs and traditions on the RCN from Keel Laying to Paying-off and those sometimes confusing ways the Navy does things in between. | http://www.forposterityssake.ca/RCN-CUSTOMS.htm |
WASHINGTON — WASHINGTON - The White House and senior members of Congress reached a deal yesterday on a long-stalled overhaul of the nation's eavesdropping laws, leaving in place a controversial provision that largely protects telecommunications companies from liability for their roles in past information gathering.
The proposal - the most significant revision of the nation's intelligence laws in 30 years - in many ways mirrors the warrantless wiretapping program President Bush secretly began using shortly after the Sept. 11 terrorist attacks in 2001. But supporters say it also creates a legal framework for spying activities that will include significant oversight from Congress and the federal courts.
The legislation would give broad approval to monitor foreign sources, including those whose conversations extend to the United States. To address the inevitable spying that will occur on Americans in these communications, the legislation includes a number of provisions lawmakers believe will safeguard the privacy and rights of U.S. citizens.
To ensure that eavesdropping is focused on foreigners, for example, the legislation requires that in most cases the American's part of the communication be redacted and the person's identity be concealed before a transcript goes to other intelligence agencies for review.
The House is expected to debate the bill today.
House Majority Leader Steny H. Hoyer, a Maryland Democrat who emerged as a behind-the-scenes deal maker on the legislation, said it "balances the needs of our intelligence community with Americans' civil liberties and provides critical new oversight and accountability requirements."
Civil liberties groups, privacy advocates and some congressional Democrats denounced the compromise because the immunity provision would largely insulate telecommunications companies from nearly 40 pending lawsuits. The new law, they said, would not only let the companies off the hook too easily, it would also set up standards for intelligence collection that could violate constitutional protections.
"Congress is poised to once again pass disastrous surveillance legislation, now upping the ante with a thinly veiled giveaway to some major campaign donors," said Caroline Fredrickson, director of the ACLU's Washington Legislative Office, echoing a common criticism that the bill is a product of lobbying by special interests. "This bill allows for mass and untargeted surveillance of Americans' communications."
But the most pointed criticism continued to center on the immunity the bill provides telecommunications companies from civil liability suits. Those suits could be thrown out if a district court finds "substantial evidence" that companies believed they were following the law when they assisted the government in eavesdropping. In some cases, companies said they received letters asserting presidential authorization for the surveillance.
Although high-ranking members of Congress from both parties praised the deal as the best possible compromise, a number of powerful Democrats remain staunchly opposed to any bill that could upend the lawsuits. Many believe that the suits could disclose valuable details about how the program began.
This "is not a bill I can support," said Senate Judicial Committee Chairman Patrick J. Leahy of Vermont. "I have said since the beginning of this debate that I would oppose a bill that did not provide accountability for this administration's six years of illegal, warrantless wiretapping."
Given the continued debate, the bill's prospects remain unclear. But supporters - including administration officials and members of Congress from both parties - said they were confident it will pass.
"This negotiation took a lot of time," said the House Republican whip, Roy Blunt of Missouri. "Nobody quickly gave any ground. But I think it's fair to say that we gave some; they have some additional oversight procedures that were not part of any earlier legislation. ... The bill will pass. The White House is on board."
The new law would expire in 2012, a provision many lawmakers said would allow another administration to play a role in intelligence policy.
To begin surveillance activities, the director of national intelligence and the attorney general would have to annually submit to the Foreign Intelligence Surveillance Court for review and approval "targeting procedures" that show how the National Security Agency's eavesdropping is only intending to monitor communications between foreigners.
In what supporters described as "rare cases," in which "critical intelligence could be lost," eavesdropping could begin before a court has an opportunity to authorize it. In such cases, officials would have to submit their surveillance plan within a week and the court would rule within a month. The law also would allow intelligence agencies to appeal the decision.
Critics describe this passage as a major loophole that would allow some wiretapping to proceed for as much as two months without a warrant.
"Meaningful judicial oversight would mean that surveillance never begins unless a court has determined that it is lawful," said Greg Nojeim, director of the Project on Freedom, Security and Technology at the Center for Democracy and Technology. "We have gone full circle from a notion that courts authorize surveillance to a court never looking at the procedures before intelligence collection begins. That's not the way to protect Americans' privacy rights."
But the bill's supporters said there were more than enough safeguards in place to protect privacy rights and civil liberties, and in some cases, even more. One such provision extended the protections on Americans abroad, so that a U.S. citizen studying in London would have the same rights as when he or she was at home. | https://www.baltimoresun.com/news/bs-xpm-2008-06-20-0806190276-story.html |
It has only been a couple of weeks since worldwide excitement erupted over the discovery of a new human ancestor, but already South Africa has churned out yet another fascinating fossil find. A new genus and species of coelacanth has been unearthed from the Eastern Cape, representing the earliest specimens to have been found on the continent so far.
If you’re wondering what the heck a coelacanth is and why this is important, allow me to enlighten you. Coelacanths are among the oldest types of fish in the world, considered by some to be “living fossils.” These ancient, primitive fish, which dwell at depths of up to 700 meters (2,300 feet), were believed to have been wiped off the face of the Earth alongside the dinosaurs, some 65 million years ago. But rather unexpectedly, to say the least, a live coelacanth was caught by a fisherman back in 1938, followed by another in 1952.
These prehistoric fish have now been spotted many times, but it’s not just this remarkable disappearing act that has attracted so much scientific interest, and controversy. Among their bizarre concoction of features is a pair of curiously limb-like, or “lobed,” fins that protrude out of the body like legs. Unlike other fish, these move in an alternating pattern and even contain bones that resemble toes. It’s therefore believed by many that animals like these marked a critical point in the transition from sea to land, representing an important link between fish and land-living vertebrates.
It’s thought that coelacanths appeared around 420 million years ago, with several different species from this period (the Devonian) described from incomplete specimens found in various parts of the world, including Europe and Australia, but interestingly not Africa. This new discovery, dating back about 360 million years, is therefore important for our understanding of the early evolution of these bizarre creatures.
Named Serenicthys kowiensis, more than 30 complete specimens of this new species were discovered at Waterloo Farm, a Late Devonian fossil estuary near Grahamstown. Alongside being remarkably well-preserved, all of the specimens are thought to represent juveniles. According to the authors, this suggests that Serenichthys was using the sheltered estuarine environment as a nursery, much like many modern-day fish species. Prior to this find, the earliest example of such a coelacanth nursery came from 300 million-year-old specimens found in America. You can read more about the find in the Zoological Journal of the Linnean Society.
“This glimpse into the early life history of ancient coelacanths raises further questions about the life history of the modern coelacanth, Latimeria, which is known to bear live young, but whether they, too, are clustered in nurseries remains unknown,” lead researcher Professor Michael Coates from the University of Chicago said in a statement from the University of the Witwatersrand.
Interestingly, S. kowiensis was found just 100 kilometers (62 miles) from the area that the first live coelacanth was caught back in 1938. And from the researchers’ analyses, they believe that, of those Devonian coelacanths discovered so far, this particular species displays the most similarities to those found today. | https://www.iflscience.com/plants-and-animals/new-species-and-genus-coelacanth-discovered-30-ancient-specimens/ |
This paper proposes an adaptive segmentation method as a market clearing mechanism for peer-to-peer (P2P) energy trading scheme with large number of market players. In the proposed method, market players participate in the market by announcing their bids. In the first step, players are assigned to different segments based on their features, where the balanced k-means clustering method is implemented to form segments. These segments are formed based on the similarity between players, where the amount of energy for trade and its corresponding price are considered as features of players. In the next step, a distributed method is employed to clear the market in each segment without any need to private information of players. The novelty of this paper relies on developing an adaptive algorithm for dividing large number of market players into multiple segments to enhance scalability of the P2P trading by reducing data exchange and communication overheads. The proposed approach can be used along with any distributed method for market clearing. In this paper, two different structures including community-based market and decentralized bilateral trading market are used to demonstrate the efficacy of the proposed method. Simulation results show the beneficial properties of the proposed segmentation method. | https://research.monash.edu/en/publications/enhancing-scalability-of-peer-to-peer-energy-markets-using-adapti |
Zotero is is a free, easy-to-use tool to help you collect, organize, cite, and share your research sources.
• Collect references automatically; add full-text searchable PDFs to your library, and sync to the cloud
• Find and cite references and create bibliographies with ease
• Collaborate with other researchers by creating group libraries; share files, notes, and bibliographic data
• Zotero excels at projects large and small
• Zotero is open-source software and free for anyone to use
Mendley
Mendeley is a desktop and web program for managing and sharing research papers, discovering research data,collaborating online and reference management application.
• Reference Manager; Generate citations and bibliographies in Microsoft Word, LibreOffice, and LaTeX.
• Read and Annotate; Open PDFs and capture your thoughts through sticky notes and highlights.
• Add and Organize ; Import and organize PDFs from your computer, EndNote™, Papers or Zotero.
• Collaborate; Connect with colleagues and securely share your papers, notes and annotations.
• Backup, Sync and Mobile; Access your papers on the web, iPhone or iPad.
• Network and Discover; Discover papers, people and public groups.
Google Scholar provides a simple way to broadly search for scholarly literature. From one place, you can search across many disciplines and sources: articles, theses, books, abstracts and court opinions, from academic publishers, professional societies, online repositories, universities and other web sites. Getting started on Google scholar library click here
Features of Google Scholar
• Search all scholarly literature from one convenient place
• Explore related works, citations, authors, and publications
• Locate the complete document through your library or on the web
• Keep up with recent developments in any area of research
• Check who’s citing your publications, create a public author profile
Google Scholar Citations
Google Scholar Citations provide a simple way for authors to keep track of citations to their articles. You can check who is citing your publications, graph citations over time, and compute several citation metrics. You can also make your profile public, so that it may appear in Google Scholar results when people search for your name.
Google Scholar Metrics
Google Scholar Metrics provide an easy way for authors to quickly gauge the visibility and influence of recent articles in scholarly publications. Scholar Metrics summarize recent citations to many publications, to help authors as they consider where to publish their new research.
Finding your h-index (Hirsch index) in Google Scholar
What is the h-index?
The h-index is an index that attempts to measure both the productivity and citation impact of the published body of work of a scientist or scholar (an author-level metric). The index is based on the set of the scientist’s most cited papers and the number of citations that they have received in other publications.
Using Google Scholar for the h-index
Benefits
o Covers a wider range of sources, (especially conferences, technical reports and eprints).
o Easier to calculate some of the less common metrics (since it is not linked to proprietary data).
Disadvantages
o Maybe considered less authoritarian resources than Web of Science.
o More difficult to search when there are multiple authors with the same family name & initials-limited options to refine
o There may be duplication of results, so check carefully.
o Coverage is primarily medical, scientific, and technical.
o Coverage is primarily English language.
Google scholar Search Tips
Get the most out of Google Scholar with some helpful tips on searches, email alerts, citation export, and more.
Finding recent papers
Your search results are normally sorted by relevance, not by date. To find newer articles, try the following options in the left sidebar:
1. click “Since Year” to show only recently published papers, sorted by relevance;
2. click “Sort by date” to show just the new additions, sorted by date;
3. Click the envelope icon to have new results periodically delivered by email.
Locating the full text of an article
Abstracts are freely available for most of the articles. Alas, reading the entire article may require a subscription. Here’re a few things to try:
1. click a library link, e.g., “FindIt@Harvard”, to the right of the search result;
2. click a link labeled [PDF] to the right of the search result;
3. click “All versions” under the search result and check out the alternative sources;
4. Click “Related articles” or “Cited by” under the search result to explore similar articles.
If you’re affiliated with a university, but don’t see links such as “FindIt@Harvard”, please check with your local library about the best way to access their online subscriptions. You may need to do search from a computer on campus, or to configure your browser to use a library proxy.
Getting better answers
- If you’re new to the subject, it may be helpful to pick up the terminology from secondary sources. E.g., a Wikipedia article for “overweight” might suggest a Scholar search for “pediatric hyperalimentation”.
- If the search results are too specific for your needs, check out what they’re citing in their “References” sections. Referenced works are often more general in nature.
- Similarly, if the search results are too basic for you, click “Cited by” to see newer papers that referenced them. These newer papers will often be more specific.
- Explore! There’s rarely a single answer to a research question. Click “Related articles” or “Cited by” to see closely related work, or search for author’s name and see what else they have written. | https://www.dkut.ac.ke/index.php/library/research-support |
How are we to judge the truth of a belief?
Context
- Bertran Russel On Truth and Falsehood
as regards knowledge of truths, there is a dualism. We may believe what is false as well as what is true. We know that on very many subjects different people hold different and incompatible opinions: hence some beliefs must be erroneous. Since erroneous beliefs are often held just as strongly as true beliefs, it becomes a difficult question how they are to be distinguished from true beliefs. How are we to know, in a given case, that our belief is not erroneous? This is a question of the very greatest difficulty, to which no completely satisfactory answer is possible. | https://tcwiki.azurewebsites.net/index.php?title=On_Truth_and_Falsehood&oldid=11677 |
The charge the atom would have in a molecule (or an ionic compound) if electrons were completely transferred.
1.Free elements (un-combined state) have an oxidation number of zero.
2.In mono atomic ions, the oxidation number is equal to the charge on the ion.
3.The oxidation number of oxygen is usually –2. In H2O2 and O22- it is –1.
cases, its oxidation number is –1.
6. The sum of the oxidation numbers of all the atoms in a molecule or ion is equal to the charge on the molecule or ion. | https://www.scc-education.com/2016/03/oxidation-numbertypes-of-oxidation.html |
Farm-to-fork strategy: overcome environmental challenges, create economic opportunities
The farm-to-fork strategy, the principle of which has been today jointly approved by the parliamentary Committees on Agriculture (AGRI) and on Environment, Public Health and Food Safety (ENVI), aims to move towards more sustainable and healthier food production and to empower European farmers to play a central role in achieving environmental goals.
Our Executive Vice-President Ulrike Müller endorses this strategy. Regarding the realization of future legislation to give substance to this strategy, we are committed to make sure that this transition towards more sustainable agriculture will be economically viable for all farmers in the EU and will create new economic opportunities in light of the need to take up of new practices and technologies. We support the further development of initiatives to improve sustainability along the entire food chain – from reducing harmful inputs and increasing biodiversity and climate protection in farming, working with food processing and retail to offer healthier food with a better environmental footprint, towards making food information more transparent to allow consumers to make more informed choices. | https://democrats.eu/en/news/farm-to-fork-strategy-overcome-environmental-challenges-create-economic-opportunities |
Dear Secretaries of State,
Ahead of the further easing of lockdown measures due to take place on the 4th July I’m writing to express my concerns about public safety in our open spaces in Brighton and Hove. For good reason, the city is a popular destination for visitors. Its proximity to London, and position on the coast, along with its large number of independent shops and cafes, creates a unique feel which has long made the city a popular place for day-trippers.
Research from Visit England shows that the Palace Pier in Brighton has traditionally been the most visited free tourist attraction outside of London, with annual visitor numbers of just under 5 million; and the city has around 11 million visitors annually.
Whilst I am a huge champion of all that is brilliant in the city, and I understand the many businesses desperate to re-open and resume trading, I am concerned that visitor numbers could have the potential to compromise public safety if the authorities are not provided with greater support to manage the situation.
As we saw in Bournemouth just last week, people are desperate to enjoy time outside with others on the coast, and this can quickly become unmanageable. It is hugely important that people visiting Brighton and Hove are able to do so safely, that public safety isn’t compromised by social distancing not being possible, and that visitor numbers do not undermine the safety and freedoms of local residents.
The situation in Leicester further evidences how fragile things remain. The risks of Brighton and Hove becoming a hotspot are high because of its popularity with visitors. This will not only have a detrimental effect on public health in the city – our unique local economy has not had the level of support it needs from Government and with many traders and businesses near collapse we cannot risk a second wave in Brighton and Hove.
Without effective tracking and tracing or the availability of postcode level data about infections, there is a very real risk of not being able to effectively contain any new outbreaks should they happen. And whilst pubs and other venues are being advised to keep a temporary record of customers and visitors for 21 days, it is simply not feasible for the local authority to undertake this task with the numbers visiting the seafront.
The four E’s approach adopted by Sussex Police - to engage, explain, encourage and enforce - is something that I welcome and support. However, it’s clear from recent correspondence I’ve been receiving from constituents and traders that anti-social behaviour is a significant problem, and that the scale of it is something that cannot be absorbed by Sussex Police alone.
Residents are also concerned about social distancing rules being flouted, and that non-compliance of face masks on public transport cannot realistically be enforced due the frequency of non-adherence to these measures, and due to the authorities having to prioritise resources accordingly.
Brighton and Hove City Council has increased seafront patrols and visibility on Brighton beach, the city’s parks, and central parts of the city, yet things still feel fragile and volatile. Constituents in the shielding category are telling me that they are not able to leave their homes despite measures being eased, as social distancing breaches are commonplace, leaving them feeling vulnerable and at risk away from their homes.
Moreover, local authorities are struggling financially because of the increased financial burden of the health crisis on their budgets, with Brighton and Hove City Council indicating that by the end of June the impact on their budget will be £31 million, far in excess of the emergency response funding it has received to date. Additional support to better manage our outside spaces is absolutely vital.
In order to increase public confidence about the city's ability to effectively cope with visitor numbers, will the Government provide local authorities in coastal areas known to have high visitor numbers additional resources to address the increased pressures they face safely managing popular outside spaces?
In addition to this, will the Government provide enhanced funding for local public health services in coastal destinations with large visitor numbers, so they can increase their local tracking and tracing capacity. Better resourcing is key to being able to contain any local outbreak, especially given the challenge that the large number of seafront gatherings presents for recording data?
Will the Government also commit to providing local authorities with real-time information about Covid-19 positive cases, including postcode data swiftly upon confirmation of confirmed cases? My understanding is that this is not happening, with many local authorities not being able to access vital information such as street or postcode details. It is vital that Directors of Public Health are provided with accurate, and specific, details about positive cases so that a quick local response can be put into action to contain any outbreaks identified.
I acknowledge the extremely difficult challenge involved in balancing the easing lockdown measures with opening up the economy. Protecting public health does still need to underpin decision-making though, and I do not feel that the government has sufficiently addressed the pressures that coastal destinations face, or the additional challenges this presents for local authorities if local outbreaks do occur.
Yours sincerely, | https://www.carolinelucas.com/caroline/parliament/letter/letter-to-health-communities-ministers-about-public-safety-lockdown |
How do we work together to solve problems? How do we support creative, culturally responsive, and critically engaged group discussions? Which skills, behaviors, and habits are most important for developing groups that can work together to address local, regional, or even global problems? How do we work better together to make our communities stronger?
In partnership with a team of educational and community-based partners, the Interactivity Foundation (IF) has created a Collaborative Discussion Toolkit and Certificate Program in Collaborative Discussion.
The Collaborative Discussion Toolkit
The Collaborative Discussion Toolkit is an open access resource designed by educators and community practitioners. It includes 50+ learning activities, each designed to intentionally develop collaborative discussion skills in areas of creativity, criticality, cultural responsiveness, and civic engagement. Each activity follows a similar learning loop: Practice - Reflection - Learning - Practice - Reflection - Learning - Practice - Reflection - Learning.
The learning activities are designed to be incorporated into most classrooms (regardless of discipline) or community workshops. They can be used singularly or as a collection. We encourage folks to peruse the modules, select activities based on desired learning outcomes, and modify the activity to fit the intended audience. These activities are designed to be adapted.
For those who would like to dive deeper into this material and intentionally thread together and layer activities to create a more substantial learning experience, we encourage you to check out our Certificate Program in Collaborative Discussion.
Certificates in Collaborative Discussion
The Interactivity Foundation offers a Certificate in Collaborative Discussion which recognizes a core set of skills necessary for productive group discussion. Students and community members can earn this certificate by participating in a certificate program designed and offered by an IF Collaborative Discussion Coach. These customized certificate programs offer a curated learning experience using activities assembled from the Collaborative Discussion Toolkit. | https://www.collaborativediscussionproject.com/ |
In her January speech on mental health, the Prime Minister announced that the Government would be providing mental health first aid training to all secondary schools, with a commitment to train at least one teacher in every secondary school in mental health first aid by 2019.
The announcement followed that contained within a report published by the Early Intervention Foundation in December last year, which recommended that schools play a role in ‘identifying children and families affected by parental conflict, signposting to other services or supporting children through school counselling initiatives’, and that 'schools and teachers [be] another access point to identify inter‐parental conflict in the home' (EIF, 2016).
In parallel with these developments, the Health Select Committee and the Education Select Committee are running a joint enquiry into the role of educational settings in children’s mental health. The Children and Young People’s Mental Health Coalition’s submission to this enquiry supported the EFI’s recommendation regarding schools having this greater role in identifying children affected by parental conflict, arguing that ‘with appropriate training and support, school staff are very able to recognise and support less severe mental health and emotional wellbeing issues in their pupils; and potentially are in a good position to identify risk factors that might impact on mental health, e.g. parental conflict’.
In her speech, the Prime Minister stated that the Government ‘will pilot new approaches such as offering mental health first aid training for teachers and staff to help them identify and assist children experiencing mental health problems. And we will trial approaches to ensure schools and colleges work closer together with local NHS services to provide dedicated children and young people’s mental health services.’
Tavistock Relationships is in the process of developing a new course for teachers on understanding and working with the impact of inter-parental conflict on young people in schools. This course will aim to assist teachers, educational support staff and counsellors within the school setting, understand the nature of inter-parental conflict and its impact on children and young people.
The course will also be helpful in thinking about techniques and ways of intervening which support staff to manage and contain challenging and problematic behaviour from young people whose exposure to inter-parental conflict at home is being played out in the school environment.
We hope to pilot the course in the summer term, with a view to delivering it in schools from the autumn. | https://tavistockrelationships.ac.uk/news/1058-children-s-mental-health-schools-parenting |
Gatt Is An Example Of A Bilateral Trade Agreement
The SPS agreement allows countries to set their own health standards. The WTO agreement stipulates that regulations must be based on science and calls for a risk-based approach. The SPS agreement encourages governments to harmonize or develop their national rules through international standards, guidelines and recommendations. In particular, the WTO recognises the Codex Alimentarius Commission fao/WHO for food security; The World Organisation for Animal Health (OIE) for animal health; and the International Plant Health Convention (IPPC) on plant health (4) The General Agreement on Tariffs and Trade (GATT), signed on 30 October 1947 by 23 countries, was a legal agreement to minimize barriers to international trade by removing or reducing quotas, tariffs and subsidies, while maintaining important rules. The GATT is expected to stimulate economic recovery after the Second World War through the reconstruction and liberalization of world trade. Consumers in the country also benefit from lower costs. You can get exotic fruits and vegetables that can become too expensive without the agreement. This statement served as the basis for the so-called “Malthouse Compromise” between conservative parties on how to replace the withdrawal agreement. However, this plan was rejected by Parliament. The assertion that Article 24 could be used was also adopted by Boris Johnson during his 2019 campaign as leader of the Conservative Party. The fourth drawback is that of small businesses in a country. A multilateral agreement gives a competitive advantage to large multinationals. They are already familiar with the operation in a global environment.
As a result, small businesses cannot compete. They lay off workers to reduce costs. Others relocate their factories to countries where living standards are lower. If a region depended on this industry, it would have high unemployment rates. This makes multilateral agreements unpopular. Partly because of the growing importance of international trade since at least 1980, the relationship between trade policy and the achievement of other public policy objectives has become an important and controversial issue. More and more citizens have begun to wonder whether trade agreements should include such social or environmental issues. Others argued that trade agreements undermine national rules such as environmental legislation, food safety legislation or consumer legislation. Still others have argued that trade agreements do not adequately regulate the behaviour of global companies. Although relatively few Americans have taken to the streets to protest trade laws, polls show that Americans agree with some of the protesters` main concerns. They want trade agreements to raise environmental and labor standards in countries with which Americans trade. The GATT has introduced the principle of the most favoured nation into members` collective agreements. | https://messing-lampe.de/gatt-is-an-example-of-a-bilateral-trade-agreement/ |
OECD’s work on water started in the mid-1960s, focused on the science of environmental threats and technologies for assessing and monitoring them. Over the last 50 years, the OECD has continued to provide robust analyses and evidence-based policy recommendations to governments, elevating water as a driver for sustainable growth and expanding the scope and breadth of the work to cover water quantity and quality, access to water and sanitation services, water-related risks and disasters – including adaptation to a changing climate, as well as water governance and financing.
When I joined the OECD as Secretary-General in 2006, I endeavoured to further raise the profile of water at the OECD and in the global arena, as a strategic, cross-cutting concern. The intention was to transition from a sectoral to a multidisciplinary issue that drives sustainable and inclusive growth.
That resonated with the fact that in 2015, the global community adopted a Sustainable Development Goal on Clean Water and Sanitation (SDG 6), as part of the 2030 Agenda, thereby comforting OECD’s foundational approach to water economics. The prevailing context today – marked by a pandemic with lasting consequences on the health of our communities and social and economic systems – is a stark reminder of the value of access to safe water for human livelihood.
In 2016, OECD member countries unanimously adopted a Council Recommendation on Water – a legal instrument to which practice accords great moral force as representing the political will of Adherents. The Recommendation is a concise and coherent international standard providing high-level policy guidance on the management of water resources and the delivery of water services.
In order to support the implementation of the Recommendation, this Toolkit collates good practices, policies and governance arrangements from countries that adhere to the Recommendation. I trust that it can inspire all levels of government in their efforts to realise their water-related goals and commitments, achieve SDG 6 and contribute to other global agendas such as the United Nations General Assembly Resolution on the human rights to safe drinking water and sanitation, the Paris Agreement, the Sendai Framework and the New Urban Agenda.
I also invite non-OECD countries to adhere to the OECD Council Recommendation on Water and enrich the experience captured in the toolkit. The OECD stands ready to accompany their transition towards water policies and governance that are fit for future challenges and that will contribute to better lives. | https://www.oecd-ilibrary.org/sites/a6aa4e5e-en/index.html?itemId=/content/component/a6aa4e5e-en |
It has been about two weeks that I had taken off from lifting and any form of working out. I was feeling extremely under the weather; I don’t know if I had a cold or virus, or the weather changes here in New Jersey or just overall not getting enough sleep. I had a hard time having any kind of energy to workout and was feeling really weak and lethargic all the time. If I don’t workout in the morning, before work, I don’t usually have the time after work for a proper workout. You ...
Video: Circuit Training Workout Round 6 Total Body Calorie BlastCategory: Fitness
Today’s video features another full body circuit training workout. I hope you are enjoying these workouts and I would love to hear your feedback if you have been watching. I will continue to do this series since right now I do circuit workouts 3-4 times a week in conjunction with my heavier lifting 4 times a week. Do this for routine 3 full rounds, 2-3 minute rest between rounds but no rest during the circuit from exercise to exercise to help keep the heart rate up. I’ve ...
Video - Circuit Training Round 2 Routine for Abs and Total BodyCategory: Fitness
This is round 2 of my circuit training series that is easily done at home or smaller gyms. No gym machines are required to do this routine. I suggest doing this for four rounds if you do not plan on doing any other training on the day you do this routine. If you do some weight training before then I would say 3 rounds. Good luck!
You will do this for 3-4 rounds and it consists of:
– 5 reps of alternating shoulder raises, T raises and sho ...
Video - Morning Home Gym Circuit Workout Total Body HIITCategory: Fitness
Another day, another circuit workout to share with my readers. I hope that you are able to do some of these routines at home or in your smaller gyms and be able to stick to your goals. I am working in more of these routines so that you can find ways to stay active even if you don’t have access to machines or a big gym. Today was my “rest day” so I didn’t plan to do a ton of training but wanted to focus on some HIIT to get the blood pumping, heart rate up and also focus on ...
Video - Total Body Circuit Workout At Home Exercise IdeasCategory: Fitness
Hello ladies, many of you have been asking me to share more of my workout routines. Many times when I share them I get a lot of emails asking what can be done at home instead. I know that sometimes getting to the gym is not easy for everyone’s busy schedules so I wanted to start to do some videos at the end of my workouts showing you some variations you can do at home for a circuit workout. When I do circuit training I like to do 5-8 exercises in a sequence, without a break, and then repea ...
At home workout ideas and equipment to stay in shapeCategory: Fitness
I haven’t posted a workout or fitness routine in a few weeks, I have been slacking I know. I have been focusing a bit more on running lately and just kind of fell off the wagon (see, we all do it) but in the mean time I have been taking time to do very simple at home workouts that don’t require any machines. All you need is a pair of dumb bells, a mat and maybe a short barbell with plates. Right now I am ramping up to start lifting heavy again, which I do in the fall and winter but fo ...
My journey to giving up dieting and move toward strength trainingCategory: Primary Menu Fitness Life Lessons
Ever since I created my blog almost three years ago, the most popular article is the one related to the 12 week workout plan for strength training for women. I have over 200 comments and questions from women readers and many of the themes are similar. I wanted to take a few of the questions that I see repeated pretty often and answer them in one place to make it a bit easier for those who are just starting out on their strength training journey. Some readers are just starting to lift weights for ...
Build Amazing Shoulder & Arms - Strength Workout Routine for WomenCategory: Fitness
How to build muscle to create sexy, sculpted arms and shoulders
It’s now my third week into my new lifting and strength training routine. I life weights five times a week, do cardio 2 times a week and have one complete rest day on Sundays. My cardio consists of plyometric work and 2 sessions of HIIT (high intensity interval training). For my HIIT I do 30 minutes on a treadmill with :30 walking at 3.0 speed and :30 sprint at 7.5. On Monday I do an Arm ...
Weight training routine: Leg Day and Plyometrics WorkoutCategory: Fitness
Another week and another workout, time to hit legs hard and focus on making some gains
This is my third week into my new lifting program and on this new routine I only train legs one time a week. ONE TIME, I know, for me I’m having a bit of a withdrawal because I was so used to training my lower body at least two times a week, but with the program I am doing now I only work them out on Tuesday. I kind of miss doing legs mo ...
Train Your Arms and Shoulders Ladies - Example Workout RoutineCategory: Fitness
Training you arms and shoulders is extremely important to creating a visually appealing physique. The goal is to sculpt the shoulders and the arms through strength training. It’s important to have strong shoulders and arms to also help with other lifting days. I also think chiseled shoulders on a female is very sexy as well as well defined arms. Today I trained back, shoulders and abdominals at the very end. I also included a few Vine videos below which show you how I do the exercises. | http://www.ladiestylelife.com/tags-at-home-workout.html |
We surveyed area Checkbook and Consumer Reports subscribers for their feedback on veterinarians they have used. We also surveyed a random sampling of other area consumers. On our surveys, we ask consumers to rate their experiences with practices they had most recently used on several aspects of service. Our ratings tables show the percent of each practice’s surveyed customers who provided a rating of “superior” (as opposed to “inferior” or “adequate”) for questions on our survey.
We have included on our ratings tables all of the practices for which we received at least 10 ratings on our customer surveys. If a practice is not listed on our ratings tables, it simply means we did not receive at least 10 ratings for it.
Since many practices were rated by rather small numbers of raters, small differences between two practices in the percentage of raters who gave a particular rating (say, "superior") should be ignored. The table below gives a rough guide to minimum differences you should look for in deciding on one practice over another.
When using these survey data, remember that the questions are to some degree subjective and that the differences among practices might be explained by differences in the personalities, backgrounds, critical standards, and other characteristics of the raters or by biases these raters might have.
Price Comparison Scores
To compute our price comparison scores, we calculated an average price for each veterinary service for all the practices that quoted on that service. Next we compared each practice’s price to the average. One practice might come in at 120 percent of the multi-practice average for a particular job, and another might come in at 90 percent. We took each practice’s percentage score on each service, standardized it, and assigned a weight to each service, based on our judgment. We then averaged the standardized, weighted percentage scores to find how the practice compared to other practices overall. Finally, we multiplied this overall percentage score by a flat dollar amount, say, $100.
The price comparison score, then, is intended to indicate the relative prices we found for the practices, adjusted to the base of this flat dollar amount. These scores are imperfect for various reasons: for instance, the services checked may not be representative; the weighting of various services in the scores may not accurately reflect typical expenditure patterns; and the number of services we checked is small.
Animals Cared For
Information reported on our ratings tables regarding types of animals practices care for came directly from the practices' representatives. Our researchers called each practice to complete a survey over the phone and then followed up with a mailed verification form.
Timeliness of the Data
All of the data must be interpreted in view of timeliness. Our customer survey data are from surveys conducted from January 2010 to June 2022. Survey respondents were asked to report on experiences in the preceding year. The data from our survey of practices were collected from September to November 2021. Our price data were collected from May to September 2021.
For the most part, our tables include practices for which we collected 10 or more ratings on our customer survey during the customer survey period mentioned above, but we do not report data for periods prior to practices' changes of name and ownership. As a result, some large practices are not listed at all. If only name or ownership changed, we do report the data. Changes subsequent to the dates listed above may not be taken into account.
Top Ratings
We give checkmarks to companies that score highest on a scoring system that we devise for each service field. Our scoring systems weight the various data in our tables and text based on our subjective judgment of their importance. Since the scores are based entirely on information presented, you can apply your own subjective judgments, and decide whether you prefer companies we have not given checkmarks. Where we do not have important data on a company, we cannot give our checkmark. | https://www.checkbook.org/twin-cities-area/veterinarians/articles/How-We-Gather-and-How-to-Interpret-Our-Data-2812 |
As Canada’s national public broadcaster, CBC/Radio-Canada occupies an important place in the Canadian broadcasting system and faces a unique set of risks to its plans and operations. Like all broadcasters, the Corporation must adapt to technological changes, shifts in demographics and evolving consumer demands, as well as structural changes in the industry. Given our statutory mandate to serve all Canadians, CBC/Radio-Canada also faces unique public expectations and financial challenges.
It is CBC/Radio-Canada policy to develop, implement and practice effective risk management to ensure risks and opportunities that impact the Corporation’s strategies, objectives and operations are identified, assessed and managed appropriately.
CBC/Radio-Canada’s Risk Management Program is part of an enterprise-wide approach integrated into business processes. Responsibility for risk management is shared among CBC/Radio-Canada’s Board of Directors, the Board’s Audit Committee, the Senior Executive Team and operational units.
|
|
BOARD
The Board oversees our key risks at a governing level, approves major policies, and ensures that the processes and systems required to manage risks are in place.
|
|
AUDIT COMMITTEE
The Audit Committee of the Board discharges its stewardship and oversight responsibilities over risk management by monitoring key risks, discussing their status with management at quarterly Audit Committee meetings and ensuring that management has programs for evaluating the effectiveness of internal controls.
|
|
SENIOR EXECUTIVE TEAM
The Senior Executive Team identifies and manages risks, reports on our key risks to the Audit Committee and the Board, recommends policies, and oversees financial reporting and internal control systems.
|
|
MEDIA AND SUPPORT BUSINESS UNITS
Media and support business units initially identify and assess risks through the annual business plan process, and develop and execute detailed plans to manage risks. Risks are prioritized based on their potential impacts and their likelihood of occurring. | https://site-cbc.radio-canada.ca/site/annual-reports/2016-2017/risk-management-and-governance/risk-management-program-en.html |
International Co-operative Alliance
The International Co-operative Alliance is an independent, non-governmental organization created in 1895 to unite, represent and serve co-operatives worldwide. It provides a global voice and forum for knowledge, expertise and coordinated action for and about cooperatives.
The International Co-operative Alliance is promoting the cooperative identity by developing and propagating a joint cooperative brand (visible below) and .coop domain on the web. This unified identity strengthens ties between the actors of the co-operative movement and strengthens the position of the co-operative business model in different sectors. CMC acts as a representative of the Canadian co-operatives with ICA, and helps to promote adoption of the brand and .coop domain in Canada.
The co-operative brand and .coop domain are symbols of the global co-operative movement and our values; together, they demonstrate our unity and represent the co-operative principles. By aligning with this brand and using the .coop domain thousands of organizations around the world are creating visibility for co-operatives and strengthening our distinct business model.
The development of this identity lies at the centre of the objectives of the ICA's Blueprint for a Co-operative Decade, the main strategy of the organization that aims to make the co-operative a model leading business.
The ICA has also produced a Communications Guide on Co-operative Identity. This document provides a few pages of information facilitating use of the co-operative identity.
| |
Freshwater is a shared resource. Water challenges (i.e., too much, too little, too dirty) are recognized to have global implications. Many sectors rely upon water and, in some cases, the limited availability of water leads to tough decisions. Though inland fish and fisheries play important roles in providing food security, human well-being, and ecosystem productivity, this sector is often underappreciated in water resource planning because valuation is difficult and governance is complex, unclear, or non-existent. Additionally, inland fisheries are an economically small sector and, in most cases, the value of inland fisheries will never be the main driver of decision making.
At the 2015 Global Conference on Inland Fisheries, we convened a Drivers and Synergies panel and working group to discuss competing sectors (e.g., hydropower, transportation, agriculture, mining and oil and gas extraction, forestry, tourism and recreation, and aquaculture) and large-scale drivers which exist predominately outside of the water sectors (e.g., economic growth, diversifying economies, population growth, urbanization, and climate change). Drivers will influence these sectors and tradeoffs will be made. Management of sustainable inland water systems requires making informed choices emphasizing those services that will provide sustainable benefits for humans while maintaining well-functioning ecological systems. | https://pubs.er.usgs.gov/publication/70171067 |
Justice Mark M. Boie has announced his candidacy for a seat at the Fifth District Appellate Court currently held by Justice Melissa Chapman, who will retire effective Oct. 1.
Boie currently serves at the appellate court by assignment. He will run as a Republican in the 2020 primary and general elections.
"Justice Chapman has served the people of Southern Illinois with honor and distinction since 2002 and I wish her all the best in her retirement," Boie stated in an announcement of his candidacy.
Boie
Prior to his May 1 appellate court assignment upon recommendation by Justice Lloyd Karmeier and confirmation of the Illinois Supreme Court, Boie served as resident circuit judge in Union County since 2000.
He said he was running for the Chapman vacancy to make a "long-term commitment to continue that service for the citizens of southern Illinois."
Boie announced his candidacy on Tuesday morning outside the Union County courthouse in Jonesboro.
"I believe I bring a strong work ethic, common sense and over 18 eighteen years of experience as a trial judge to the appellate court," he stated.
"I believe that my extensive experience in all types of cases gives me a distinct advantage when reviewing the various appeals that are brought before the appellate court...I also believe that throughout my career on the trial court the attorneys and litigants that appeared before me left the courtroom, or received a written order, knowing that each side received a fair hearing.
"And, impartiality and fairness to both sides of a case is what all litigants, attorneys and citizens want in their judges and justices. I will continue to bring that unpartiality and fairness, my extensive experience, my Southern Illinois values, along with my oath to support the laws and constitution of the State oflllmois and this great nation, the United States of America, to the Appellate Court. Because of that, I truly believe I will have bi-partison support in my campaign."
Boie has handled thousands of criminal, civil, family and mental health cases, according to his announceent.
He is a member of the Special Supreme Court Advisory Committee for Justice and Mental Health Planning, and is co-chairman of its Compliance- Mental Health and Developmental Disabilities Code Sub-Cominittee. He is also a faculty member of the Judicial Education Conference and is a First Judicial Circuit mentor for new judges. | https://madisonrecord.com/stories/513841261-boie-announces-run-for-fifth-district-appellate-seat-currently-held-by-chapman |
Historical Landmarks are sites, buildings, features, or events that are of statewide significance and have anthropological, cultural, military, political, architectural, economic, scientific or technical, religious, experimental, or other value. Historical Landmarks are eligible for registration if they meet at least one of the following criteria:
1) Is the first, last, only, or most significant of its type in the state or within a large geographic region
2) Is associated with an individual or group having a profound influence on the history of California
3) Is a prototype of, or an outstanding example of, a period, style, architectural movement or construction or is one of the more notable works or the best surviving work in a region of a pioneer architect, designer or master builder
California’s Landmark Program began in the late 1800s with the formation of the Landmarks Club and the California Historical Landmarks League. In 1931, the program became official when legislation charged the Department of Natural Resources—and later the California State Chamber of Commerce—with registering and marking buildings of historical interest or landmarks.
In 1948, Governor Earl Warren created the California Historical Landmarks Advisory Committee to increase the integrity and credibility of the program. Finally, this committee was changed to the California Historical Resources Commission in 1974. Information about registered landmarks numbered 770 onward is kept in the California Register of Historical Resources authoritative guide. Landmarks numbered 669 and below were registered prior to establishing specific standards, and may be added to the California Register when criteria for evaluating the properties are adopted.
Share your experience. Please leave a comment below if you've visited this historical landmark.
Past this point on the old Coloma Road, running between Sutter's Fort and his sawmill on the South Fork of the American River, James W. Marshall rode with the the first gold discovered at Coloma on January 24, 1848. Traveled by thousands to and from the diggings, this road became the route of California's earliest stageline, established in 1849 by James E. Birch.
Coloma Road became one of the primary routes to the gold fields of El Dorado County. The road started at Sutter's Fort (New Helvetia, now present-day Sacramento), then proceeded to Willow Springs near Folsom, on to Mormon Island, Green Valley (near Rescue), Rose Springs, and continued to Coloma. Soon thereafter a connection to Uniontown (present-day Lotus) was built and the general road alignment for Green Valley and Lotus Roads was completed.
The marker is located at 4222 Green Valley Road at the Rescue Junction General Store in Rescue.
El Dorado County
Stretching from oak-studded foothills to the western shore of Lake Tahoe, El Dorado County is probably best known for the 1848 gold discovery at Coloma. “Old Hangtown” sprang up during the Gold Rush and was later renamed Placerville. The county name comes from the mythical land rich in gold sought by Spanish explorers.
El Dorado County was one of the original counties in California. The first county seat was Coloma, and it was superseded by Placerville for this position in 1857. | https://sierranevadageotourism.org/entries/coloma-road-rescue-no-747-california-historical-landmark/9bf07e2f-061e-4f79-8cc1-4548eb70294f |
For centuries, explorers from Europe and North America have been creating collections of newly discovered plants by pressing bright flowers and green tendrils onto herbarium sheets, where the plants are catalogued, kept and studied in collections both large and small. Now an organization known as the Global Plants Initiative is catapulting the accessibility of these botanical collections to a new level with the creation of a massive online database of high-resolution digital scans of botanical specimens. This is an amazing, new way to share high resolution information about plants that has only been available in European and United States institutions until very recently.
The Global Plants Initiative has enlisted the participation of dozens of museums and research organizations around the world. For example, the Andrew W. Mellon Foundation recently sponsored a project to make collections of African plants digitally accessible by offering free digital scanners and training to large herbarium collections around the world. The Smithsonian Tropical Research Institute in Panama serves as a regional digitization center for a Latin American Plants Initiative. For a number of years Tropical Research Institute staff have coordinated the digital scanning of plant specimens at a number of small herbaria in Latin America. Both organizations are participants in the Global Plants Initiative.
This image of a passion-fruit flower is one of tens of thousands of images accessible through the Global Plants Initiative online database.
Anyone can access this new database by entering the Web site: http://plants.jstor.org/, and searching a region, collector, plant or herbarium to generate a list of plants. A viewer tool allows users take a very close look at plant details—star-shaped hairs, translucent dots, stamens loaded with pollen grains—that allow botanists to distinguish one plant from another and designate the different species.
The Global Plants Initiative currently partners with 175 museums, universities and herbaria from 60 countries and is actively working to further extend participation in its online dabase. The database holds almost 1.5 million images, among them 151,000 images of botanical artwork, photographs and reference materials. Nearly 7,500 images of newly scanned specimens arrive each week.
“One of the major problems with comparing data from different places is that the same species may be given one name in Brazil and another in Ecuador. Now, online plant specimens give all botanists access to the same references and should greatly increase the consistency and accuracy of species identifications,” says Helene Muller-Landau, a Smithsonian ecologist .
“The Global Plants Initiative, in conjunction with other new tools like genetic barcoding, will revolutionize plant biology—sharing information with countries where it was collected long ago,” says Tropical Research Institute Director Eldredge Bermingham.
The Global Plants Initiative is holding a participant meeting at from Jan. 11-13 at the Smithsonian Tropical Research Institute in Panama. | https://insider.si.edu/2011/01/online-initiative-makes-massive-database-of-herbarium-specimens-accessible-worldwide/ |
“My work is a window to my life. I paint what I see, know, love and find entertaining. While my work is representational, my challenge is to question what I am actually seeing. I must interpret reality into an organized array of shapes, colors, and marks.
I paint in both watercolor and encaustic. While these two mediums may seem as opposing as water and wax, they oddly share common characteristics. Most notabl, they both encompass fluidity and transparency. While watercolor is a taxing medium, encaustic becomes a formidable adversary with the incorporation of fire.
The content of my work suggest a narrative. I prefer a vague tale, allowing my viewer to engage in a personal interpretation. I utilize this same approach when painting. Audience participation is a requisite to translating my colors, shapes and curious edges into something tangible.”
This is a 14" x 18" oil painting on wood board. It hangs in the children’s department of the hospital. I happened upon t ...
1
Paintings
The Birthday Girl
$ on Inquiry
by
Karen Frey
at
Kaiser Permanente Oakland Medical Center
Oakland, CA
There is a 21”x 29” watercolor painting by Karen Frey that embellishes a wall at Castro Valley Library. The theme of thi ...
1
Paintings
Barbershop
$ on Inquiry
by
Karen Frey
at
Castro Valley Library
Castro Valley, CA
Where can you find Karen Frey's Items? | https://www.wescover.com/creator/karen-frey |
about gardening. Starting a garden provides wealth information about different aspects of gardening, such as: garden layouts, garden designs, garden tools, garden plants, organic gardening, garden seeds, vegetable garden tips and so on.
Decide about what types of plants do you want in your garden –plants to attract butterflies or birds, edible plants, or flowering plants. With a little planning, you can have the garden you desire and enjoy the experience of creating it. | https://biz.prlog.org/Starting-a-Garden/ |
We are looking for Design Intern for 6 months.
Operations
Senior Retail Merchandiser
1) 3-5 years merchandising in home decor, electrical, light related & electronic items.
2) Working closely with buyers and other merchandisers to plan product ranges.
Sales
Project Sales Executive (Business Development)
Identifies business opportunities by identifying prospects and evaluating their position in the industry; researching and analysing sales options.
Sells products by establishing contact and developing relationships with prospects; recommending solutions.
Sales
Retail Sales Executive
We are hiring for Retail Sales Executive position. Smart and go getter person with knack of retail sales. | https://angel.co/company/purple-turtles-lighting-ideas-1/jobs |
**Winner! Golden Globe for Best Motion Picture – Foreign Language.**
Yusuke Kafuku, a stage actor and director, still unable, after two years, to cope with the loss of his beloved wife, accepts to direct Uncle Vanja at a theater festival in Hiroshima. There he meets Misaki, an introverted young woman, appointed to drive his car. In between rides, secrets from the past and heartfelt confessions all will be unveiled. As they spend time together, Kafuku confronts the mystery of his wife that quietly haunts him.
WINNER of Best Screenplay: Cannes Film Festival 2021
WINNER of Best Film & Best Screenplay: APSA 2021
WINNER of Best Film: New York Film Critics Circle 2021
2022 Japanese entry: Academy Awards (Oscars) for Best Foreign Film
5/5 It is an engrossing and exalting experience.
The Guardian
5/5 Hamaguchi has made a profoundly beautiful film about making peace with the role in front of you, and playing it with all your might.
Daily Telegraph (UK)
4/4 Drive My Car devastates and comforts through its vehicular poetry of the sorrow from which we run, the collisions that awaken us, and the healing gained from every bump in the road.
Rogerebert.com
What it is can be summed up in a word that’s often used loosely but fits the case here-a masterpiece, a mysteriously enthralling creation that keeps you guessing about where it’s going, then reveals its essence with astonishing clarity.
Wall Street Journal
…a Gorgeous Tale of Loss and Forgiveness… using Chekhov’s language—it’s a dialogue of regrets and longing, and of the importance of capturing the fleeting joy of life as we’re living it—to find purchase between the boughs.
Time Magazine
Patience is richly rewarded in.. Ryusuke Hamaguchi’s theatre-centered tale, adapted from a story by Haruki Murakami.
New Yorker
Adapted from a short story of the same name by globally feted Japanese author Haruki Murakami, this highbrow road movie is an absorbing, technically assured piece of work with poetic depths and novelistic ambitions.”
Hollywood Reporter
Hamaguchi has crafted a rich, skilfully layered masterwork with flawless performances and a script that is a screenwriter’s holy grail.
The Playlist
Drive My Car is a hell of a ride, the red Saab riding through the landscape like a beating heart, taking viewers along a journey that they won’t soon forget.
Slash Film
I can’t think of any contemporary directors who have this much care and patience in creating illuminating characters like Hamaguchi. | https://www.orpheum.com.au/wp-cinema/movie/ODRIVEMYCAR/DRIVE+MY+CAR+-+GOLDEN+GLOBE+WINNER/ |
Chords In The Key Of D Sharp Minor. It has a jazzy, but agressive sound, and it is combining both minor and major tonality. View our D#m guitar chord charts and voicings in Standard tuning with our free guitar chords and chord charts.If you are looking for the D#m chord in other tunings, be sure to scroll to the bottom of the page. The D sharp diminished chord is produced by taking the 1 (root), b3 and b5 of the D sharp Major scale. These D Dominant 7 Sharp 9 guitar chord variations can be interchanged freely. The D sharp minor chord is enharmonically the same as the E flat minor chord. A. Language and Viewing Preferences Viewing Options. The key of D♯ minor is the relative minor key of F♯ major. Let’s now take a look at common chord progressions in the key of D sharp minor natural. Therefore, D#m is usually played as a bar chord. The following piano key chord chart shows all the triads in D# minor as well as four note extended chords. The simple D# minor chord, which forms the root of the D-sharp minor scale, contains the notes D#, F#, and A#— the first, third, and fifth notes of the key of D-sharp minor. Some Quick D#m Chord … The below diagrams show you how to play the D# / Eb minor chord in various positions on the fretboard with suggested finger positions.. D# / Eb minor chord attributes: Interval positions with respect to the D# major scale, notes in the chord and name variations:. Scale intervals: 1 - b3 - 5 Notes in the chord: D# - F# - A# Various names: D Sharp Minor - D#m - D# Minor - D#min None of the notes in D#m (D#, F#, A#) can be played on the open strings of the guitar. For over 950,000 charts and voicings, grab an account. The D sharp diminished chord (just like all diminished chords ) contains the following intervals (starting from the root note): minor 3rd, minor 3rd, tritone (which leads back to the root note). D Dominant 7 Sharp 9 Chord Charts, Fingering, Voicings. If it sounds good, it is good! On the guitar, using the basic D# chord position shown in the diagram above, these notes arrive in … The chord formula for any minor key is minor, diminished, Major, minor, minor, Major, Major. A. A. Here are 6 voicings of the D7#9 guitar chord, with a chord chart to each voicings' fingering. A. A common way to number these chords is by Roman numerals E flat minor is a more commonly used chord than D sharp minor, but D#m does get used, depending on the key of a given song (for example the key of B). D Sharp Minor Chord Charts for Guitar, Free & Printable. D# Minor Guitar Chord - also known as D#m chord, D#min chord, D#- chord Skip to blind accessible version of D-sharp Minor guitar chord. Minor keys are formed with the same chords as their relative major key, by starting with the 6th (vi) chord of the major key.
Beethoven Piano Sonata N8,
Mochiko Chicken Recipe,
Cucurbita Argyrosperma Recipes,
Fountain Of Youth Water,
Files App For Pc,
Hhkb Pro 3,
Airthereal Ozone Generator Manual,
Aldi Chicken Breast Australia,
Asus Tuf Gaming A15 Fx506ii,
Through Meaning In Malayalam, | https://balancediet.com/v3w8oa8/93032b-d-sharp-minor-guitar-chord |
Q:
Where else do we see James T. Kirk, computer hacker extraordinnaire?
James T. Kirk is infamously known for (among many other things) having hacked his way through the Kobiyashi Maru test. However, I can't think of any other times we've seen him exhibit any extraordinary computing (let alone hacking) skills.
Are there other canonical examples of Kirk himself breaking into computer systems?
A:
Kirk is shown hacking the following computers and cyborgs, typically exploiting bugs in their programming in order to cause them to self-destruct:
Computer Landru (in 1.22, "The Return of the Archons")
Autonomous spaceship Nomad (in 2.08, "The Changeling")
Android Norman (in 2.12, "I, Mudd")
Multitronic computer M-5 (in 2.24, "The Ultimate Computer")
Android Reyna Kapec (in 3.21, "Requiem for Methuselah")
| |
Duck has been roasted in China since the Southern and Northern Dynasties. A variation of roast duck was prepared for the Emperor of China in the Yuan Dynasty.
The dish, originally named “Shaoyazi,” was mentioned in the Complete Recipes for Dishes and Beverages manual in 1330 by Hu Sihui, an inspector of the imperial kitchen.
The Peking Roast Duck that came to be associated with the term was fully developed during the later Ming Dynasty, and by then, Peking Duck was one of the main dishes on imperial court menus.
The first restaurant specialising in Peking Duck, Bianyifang, was established in the Xianyukou, Qianmen area of Beijing in 1416 [Wikipedia]
Beijing’s most famous dish, Peking Duck is traditionally served with Mandarin pancakes. I’ve modified this dish slightly for roasting in La Cajita China.
You can find step-by-step recipes in my cookbook, La Caja China Cooking, as well.
Peking Duck ala La Cajita China
2 – 5 to 6 pound duck
12 cups water
1/4 C powdered ginger
6 scallion, cut into halves
1/2 C honey
1/4 C rice wine vinegar
1/2 C sherry
6 tablespoons cornstarch, dissolved in 6 tablespoons water
Scallions for garnish
Clean ducks. Wipe dry and place each duck on a “beer-can chicken” stand. Set in a cool room in front of a fan for 4 hours to dry. (See note.)
Bring a large pot with water to boil, and add ginger, scallion, honey, vinegar, and sherry.
Boil 10 minutes, then pour in the dissolved cornstarch, stirring constantly.
Place one duck in boiling water, count to five and remove.
Place the second duck in boiling water, count to five and remove. Repeat for 10 minutes.
Place ducks on “beer can” racks again, in front of fan, for 6 hours until thoroughly dry.
Turn every 30 minutes.
“Pre-heat” La Cajita China with 10lbs of charcoal. When all coals are covered in white ash, oil the roasting rack and place ducks, breast side up, on rack.
Place the rack in the roasting pan with 2 inches of water in bottom, and close up the box, and add another 5lbs of charcoal.
You goal temperature inside the box is 350 degrees.
Roast 20 minutes.
Turn ducks, add 5lbs of charcoal, and roast 20 minutes more. Turn breast side up again. Roast 5 minutes more, until crispy and browned to your liking.
Remove ducks from La Cajita China and allow to rest 10-15 minutes.
Use sharp knife to debone. Serve meat and skin immediately on a pre-warmed dish.
The duck is eaten hot with hoisin sauce rolled in Mandarin Crepes. Garnish with diced scallion.
Each duck serves 4 to 6.
Drying: I set my ducks up on “beer-can chicken” stands (instead of hanging them by the necks – the traditional method), in front of a fan, and turned them every 30 minutes. Worked perfectly! | http://burninlovebbq.com/2011/01/21/peking-duck-ala-la-cajita-china/ |
IPKeys Technologies is seeking a Project Scheduler to provide infrastructure and program planning support to the Marine Corps Defense Policy Review Initiative (DPRI) mission at US-HI-Joint Base Pearl Harbor-Hickam. Responsibility of the Integrated Master Scheduler (IMS) is to determine critical Planning and Project Controls Capability Statement milestones and other schedule requirements that include the maintenance and reports that align and link to the strategic goals of program projects. IPKeys currently provides IMS support and provides analysis to determine and identify critical pathways to validate resource requirements and levels of effort to assist our Government leads with cost, schedule and performance.
Consult the Navy and Marines through the analysis of program scheduling to identify risks, alternate plans, and propose change management recommendations between projects concerning the government.
Baseline current project schedule for effective tracking to ease leadership in making informed decisions and allow for an efficient tracking of project tasks
Interface directly with project managers, functional managers, and leaders to develop plans, schedules, and reports on a daily basis enhancing program communication and support
Planning and document schedule management
Identifying, defining, and sequencing activities
Defining and estimating activity durations
Creating dependencies between and among activities and/or whole projects within the overall program
Determining the types of dependencies
Defining critical path of each project and overall program as a whole
Performing resource leveling
Identifying project floats/leads and lags
Analyzing external projects by the Government of Japan and US Government and incorporating them into the schedule
Using methods such as the critical path for network schedules to develop recovery plans, identifying risks, and proposing change management recommendations
Performing formal schedule risk analyses and generating reports
Interfacing directly with project managers, functional managers, and other support personnel to develop detailed plans, schedules, and interrelationships for all program tasks. | https://careers-ipkeys.icims.com/jobs/1613/project-scheduler/job |
5 Questions to Ask Your Doctor or Pharmacist About Your Heart Medications
If you have heart failure, your doctor probably prescribed lifestyle changes, like eating healthier, exercising regularly, quitting smoking and avoiding alcohol. You may have also been prescribed prescription medication.
It is very important that you be involved in your care plan, including staying up-to-date with your medications. Here are some essential questions you should ask your doctor or pharmacist about the medications you are taking.
Why am I taking these medications?
Doctors prescribe medications for a variety of reasons. Some help lower your blood pressure or cholesterol. Others help reduce your risk of another cardiac event. A type of medicine called diuretics helps with excess fluid and swelling.
All of the medications are important to help improve your symptoms, keep you out of the hospital and help you have a higher quality of life.
Ask your doctor what each medication does and if there are side effects. Keep an updated list of all of the medications you take and why you are taking them. Bring this list to every doctor visit, including other specialists.
How often do I take these medications?
Some people only have to take their medications once a day. This makes it simple. But other people have to take multiple prescriptions throughout the day. Some medication, like diuretics, are taken based on symptoms. These situations make taking medicine more complicated.
Make sure you write down exactly when you need to take which medication, so you have a list to refer to if you get confused.
Get yourself organized by using a pillbox that you fill yourself at the beginning of each week. Some pharmacies offer individualized pre-filled pill packs that come labeled with what pills to take when.
If you get overwhelmed, ask your doctor or pharmacist if there is a way to simplify your medications.
What can I expect while taking these medications?
Almost all medications have side effects. If you are taking medications for heart failure, you should review the side effects with your doctor or pharmacist.
With heart failure, you may need to take more than one medication to manage your condition. However, taking several medications at once can increase the chance of side effects and drug interactions.
In addition to knowing the side effects, you should ask what to do if you experience any. Know when to alert your doctor.
What do I do if I miss a dose or run out of medication?
Skipping doses is dangerous. Ask your health care provider what to do if you forget to take a dose.
Make sure you always have enough medicine on hand. Every time you pick up your medicines, check the number of refills you have left. It is on the bottle. Call your doctor right away if the bottle says "No refills" or "Refills: 0." Don't wait until the last minute to refill. Place a refill order when you have about a week's worth of medication left, so you don't run out.
My medications are expensive. What options do I have?
Fortunately, many heart failure medications come in relatively inexpensive generic forms, which have a very low co-pay.
Newer medications tend to be only available as a brand medication, which means they are more expensive.
If you don't have prescription insurance, make sure to use a discount card at the pharmacy and be aware that prices may vary from pharmacy to pharmacy, so you may need to shop around for the best price.
If you cannot afford your medications, talk to your doctor about other options.
In Summary
Heart failure medications are a key part of keeping you feeling well and out of the hospital. Understanding the medications you are on is an important step on your road to best health. If you have any questions, please don't hesitate to ask your doctor or pharmacist. | https://www.umms.org/bwmc/health-services/heart-disease/cardiology/conditions/congestive-heart-failure/support-resources/5-questions-to-ask-about-your-heart-medicine |
One of the key battle grounds at the next General Election is undoubtedly going to be immigration. A topic that is very closely related to EU membership and what can be done to limit the number of people coming to the UK. One side of the argument is that immigrants coming into the UK boost growth and add to the strength of the economy. The other side is that once in the UK, immigrants don’t move into work and end up taking more from the welfare state than they give to it through taxation.
However, the report is not all positive about the effects of immigration. When considering the impact on the economy of migrants from outside of the EEA, the picture is quite different. Over the past 17 years, immigration has cost the UK economy approximately £120bn, through migrant’s greater consumption of public benefits, such as the NHS, compared to their contributions through taxation. The debate is likely to continue and this report will certainly be used by both sides of the argument as evidence that (a) no change in immigration policy is needed and (b) a major change is needed to immigration policy. The following articles consider this report.
Why is immigration such a political topic?
How are UK labour markets be affected by immigration? Use a demand and supply diagram to illustrate the effect.
Based on your answer to question 2, explain why some people are concerned about the impact of immigration on UK jobs.
What is the economic argument in favour of allowing immigration to continue?
What policy changes could be recommended to restrict the levels of immigration from outside the EEA, but to continue to allow immigration from EU countries?
If EU migrants are well educated, does that have a positive or negative impact on UK workers, finances and the economy? | http://pearsonblog.campaignserver.co.uk/tag/immigration/ |
FEEDING GUIDELINES:
Every dog’s fuel and nutritional requirements are influenced by many factors including age, breed, weight, work, (also including temporary conditions like stress, temperature, etc.). A dog should normally be fed one time per day. Under conditions of high-energy output or stress (working dog, puppy, breeding dog) it may be beneficial to feed the dog two times per day. The working dogs digestion and performance could be improved if a portion of the daily feed ration is given in the morning. The remaining portion of the dog’s daily nutritional needs would then be fed in the evening (At least 6 hours after the first feeding of the day).
It is not necessary to do a gradual mix of Redpaw dog food and another brand. We recommend switching feeds directly from one to the other. We suggest that you monitor your dog’s weight and adjust the feeding amount as needed.
A pregnant or nursing female will requite 2-3x the amount listed and is important to break this daily ration into more than one meal.
The addition of cold water to the feed just prior to feeding will increase palatability, provide the dog with fresh water, and aid in digestion and hydration. We recommend that you always provide your dog with free access to clean fresh water.
Recommended Ration For Puppies:
|WEIGHT OF PUPPY||6-11 WEEKS-CUPS/DAY*||3-4 MONTHS-CUPS/DAY*||5-7 MONTHS-CUPS/DAY*||8-12 MONTHS-CUPS/DAY*|
|10-15lbs/4.5-6.8kg||2-2 2/3 cups/210-279g|
|15-20lbs/6.8-9.1kg||2 2/3-3¼ cups/279-342g||2 1/3-3 cups/245-315g||1½-2 cups/158-210g|
|25-30lbs/11.3-13.6kg||3¾-4 1/3 cups/394-455g||3 1/3-3¾ cups/350-394g||2¼-2½ cups/236-263g||1¾-2 cups/184-210g|
|35-40lbs/15.8-18.2kg||4¾-5¼ cups/499-551g||4¼-4 2/3 cups/446-489g||2¾-3 1/8 cups/289-328g||2 1/8-2 1/3; cups/223-245g|
|45-50lbs/20.4-22.7kg||5 2/3-6 cups/594-630g||5-5 1/3 cups/525-560g||3 1/3-3½ cups/350-368g||2½-2¾ cups/263-289g|
|55-60lbs/25-27.2kg||5¾-6 1/8 cups/604-643g||3¾-4 cups/394-420g||2¾-3 1/8 cups/289-328g|
|65-70lbs/29-32kg||4¼-4½ cups/446-473g||3¼-3½ cups/342-368g|
*1 cup = 8 fl. oz. cup. A puppy's nutritional needs vary from breed to breed, and even litter mates will eat different amounts. Because puppies experience growth spurts, pay close attention to your puppy's food consumption and its overall condition. | http://trinatural.com/redpaw-puppy-guidelines.php |
Deep within Leang Tedongnge, a cave tucked away on the Indonesian island of Sulawesi, archaeologists discovered this mulberry-hued painting of a warty pig and two hand silhouettes potentially belonging to the artist, which is now believed to be the oldest figurative work in the world. A study published in Science Advances this week says the impeccably preserved rendering is at least 45,500 years old, which predates previously discovered depictions of mythical creatures in the region. Those prior findings date back about 43,900 years.
Questions remain about the exact age of the work and who made it. Archaeologists from Griffith University, who helmed the mission, utilized uranium-series dating to determine how old the speleothem, or mineral deposits, of the cave is rather than the actual painting. There’s also debate about whether modern humans are responsible for the renderings, a question that’s complicated by the fact that the only skeletal remains that date back at least 45,500 years in Sulawesi belong to early hominins.
Dr. Adam Brumm, who co-authored the study, told The New York Times that researchers expect to discover similar artworks in the region, although the cave paintings are deteriorating at a rapid rate and could fade before they’re ever uncovered. “It is very worrying, and given the current situation the end result is likely to be the eventual destruction of this ice age Indonesian art, perhaps even within our lifetime,” Brumm said.
Share this story
Food History
Archaeologists Have Uncovered an Impeccably Preserved Food Stand in Pompeii
Mallard to go, anyone? Archaeologists have unearthed an ancient thermopolium—aka the Roman equivalent of a street food vendor—at the Regio V site in Pompeii. The well-preserved stand is decorated with multiple frescoes featuring a nereid (nymphs of Greek mythology) riding a sea horse, tall jars with two-handles that commonly were used for storage, and some of the formerly available fare, like mallards and chickens. A rendering of a muscular dog adorns another side of the stand with the insult, “Nicia cineadecacator,” scribed nearby. Various food-based remnants were found, as well, including duck bones, fava beans, wine, and a paella-style dish of pork, goat, bird, fish, and snail, alongside cooking dishes, flasks, and storage vessels.
This thermopolium is thought to be one of about eighty in the Italian city, and excavation on the site began in 2019. When archaeologists discovered that the counter was still in-tact, they extended the project to uncover more of the area. Additional findings now include a small dog’s skeleton and two sets of human bones from people who were trapped when Mount Vesuvius erupted in 79 A.D. Although the remains were disassembled by scavengers who dug up the site in the 17th Century, there’s evidence that one of the individuals was about 50 years and lying down on a bed when the volcano buried the area.
The site is slated to open to the public in the spring of 2021 and is just one of the impressive discoveries in Pompeii during 2020. Watch the video below, which is in Italian, to see the excavation process. (via designboom)
Share this story
Art History
New Photos from the ‘Sistine Chapel of the Ancients’ Reveal Details About Prehistoric Amazonian Life—Like a Fondness for Bungee Jumping
Who knew people have been flinging themselves into open air since ancient times? Earlier this week, we reported on a massive collection of prehistoric art deep in the Colombian Amazon, and new photographs of the findings reveal early humans bungee jumping just like modern adventurers.
Spanning nearly eight miles, the paintings date back about 12,500 years when people first arrived on the continent. Thanks to José Iriarte—who is a professor of archaeology at Exeter University and an expert on the Amazon and pre-Columbian history—we’re able to share up-close images of the terracotta-colored renderings. Scroll down to see a range of extinct animals, oversized armadillos and sloths, and group ceremonies that make up the 100,000-plus individual paintings, which will be part of a documentary titled Jungle Mystery: Lost Kingdoms of the Amazon airing this month.
Update: This article originally framed the prehistoric art as a discovery, which was inaccurate considering Colombians and Indigenous peoples have known about and studied the area for decades. Patricio von Hildebrand, Thomas van der Hammen, and Carlos Castaño-Uribe have made significant contributions, in addition to researchers at the National University of Colombia and the University of Antioquia. We regret the error and erasure.
Share this story
Art History
'Sistine Chapel of the Ancients': A Remote Area of the Amazon Boasts Tens of Thousands of Ice-Age Paintings
New photographs reveal an enormous collection of prehistoric art that spreads across a nearly eight-mile-long cliff within the Amazon rainforest. Now dubbed as the “Sistine Chapel of the ancients,” tens of thousands of paintings depict humans and animals like sloths, horses, and the now-extinct palaeolama and mastodon. The latter creatures haven’t occupied regions in South America for almost 12,000 years, which has provided the British-Colombian archaeology team with a timeline for the artworks’ origins.
The collection has been known to Colombians and Indigenous peoples for decades and now will be presented as part of a Channel 4 documentary titled Jungle Mystery: Lost Kingdoms of the Amazon, which airs this month. Archaeologist Ella Al-Shamahi, who is leading the television series, told The Guardian that the site, which is located in the Serranía de la Lindosa, required a two-hour drive from San José del Guaviare and an additional four-hour trek on foot to reach. “When we entered Farc territory, it was exactly as a few of us have been screaming about for a long time,” Al-Shamahi said. “Exploration is not over. Scientific discovery is not over but the big discoveries now are going to be found in places that are disputed or hostile,” noting that Colombia has been ravaged by civil war for decades.
Because of the breadth of the paintings—some are so high on the cliff that they only can be studied with drones—these researchers believe they will take generations to study. So far, though, they’ve found traces of ochre pigments, in addition to renderings of hallucinogenic plants and depictions of people who appear to be bungee jumping.
Update: This article originally framed the prehistoric art as a discovery, which was inaccurate considering Colombians and Indigenous peoples have known about and studied the area for decades. Patricio von Hildebrand, Thomas van der Hammen, and Carlos Castaño-Uribe have made significant contributions, in addition to researchers at the National University of Colombia and the University of Antioquia. We regret the error and erasure.
Share this story
Design History
Contemporary Elevation Data and Historical Maps Merge in Scott Reinhard's Digital Works
By day, Scott Reinhard designs graphics for The New York Times. Recently, he created a United States map detailing where city-dwellers fled during the pandemic and another showing how the Pantanal wetland in Brazil has transformed into a massive inferno. Incorporating an ever-growing swath of data, his daily tasks are connected to the fluctuations of news cycles.
But in his off-hours, the Brooklyn-based designer takes a broader look at the state of the nation. He merges vintage maps and contemporary elevation data, creating stunning digital works that flatten the differences of time and space into hybrid objects. While his graphics for The Times are rooted in the ever-changing present, his personal work is nestled within historical contexts.
Reinhard’s interest in data and map-generation grew while he was pursuing a master’s degree in graphic design at North Carolina State University, particularly during an introductory course centered around geographic information systems. “I basically became aware of all these cartography tools that I had no idea about. Because I wasn’t coming from that background, I was free to play around… and approach visualizing geographic data in new and interesting ways,” he says.
That experimental period spurred Reinhard’s ideas of fusing historical maps and contemporary land elevations, and he began exploring filtering, a cartographic method that calculates a theoretical sun and provides data about corresponding landscapes. “It’s pretty crude, but it really fascinated me that from a flat, black-and-white image, which is basically what elevation data looks like, you could interpolate this scene,” he shares, noting that he began to work with 3-D renderings around the same time. “That data that’s stored in a paper map can still be activated.”
Since 2019, Reinhard has refined his focus and shifted to larger series. “I’m still interested in these USGS (United States Geological Survey) maps as graphic objects and as really beautiful works of graphic design. What I’ve really been enjoying is to build these out,” he says. The more comprehensive collections have included studies of Alaskan maps from the 1950s, one series focused on the Oregon coast, and another considering south-central Indiana where he was raised.
A macro-view captures the intricacies and histories etched into the landscape of a region, showcasing glacial formations, seismic activity, and how a mountain range emerged during a period of years. “I realized once I started visualizing the landscape that, on a day-to-day standpoint when you look around you, you see elevation changes, but you don’t really see patterns. We’re just a little too small,” he says. Because USGS maps utilize coordinates, they also circumvent more political orientations found in documents outlining territories or other cordoned-off areas, offering an opportunity to correct false narratives that have been perpetuated by cartographic objects in the past. The historical maps hold additional information on trends and periods in design, which manifest in aesthetic choices like style and color.
Reinhard currently is working his way through producing a collection of USGS-recommended maps from the 1950s, a novel project that’s rooted in exploration and curiosity. “All maps are exaggerations, to some extent,” he says. “You can push and pull what the map says and what the map tells you.” Explore Reinhard’s extensive collection of digital works on Instagram and his site, where he also sells an array of prints.
Share this story
Art History
Dive into Van Gogh Worldwide, a Digital Archive of More Than 1,000 Works by the Renowned Dutch Artist
A point of levity during the temporary shutdowns of museums and cultural institutions during the last few months has been the plethora of digital archives making artworks and historical objects available for perusing from the comfort and safety of our couches. A recent addition is Van Gogh Worldwide, a massive collection of the post-impressionist artist’s paintings, sketches, and drawings.
From landscapes to self-portraits to classic still lifes, the archive boasts more than 1,000 artworks, which are sorted by medium, period, and participating institution—those include the Van Gogh Museum, Kröller-Müller Museum, the Rijksmuseum, the Netherlands Institute for Art History, and the Museum Boijmans Van Beuningen. Each digital piece is supported by details about the work, any restorations, and additional images.
In his short lifetime that spanned just 37 years, the prolific Dutch artist created thousands of works, many of which he finished in his final months. His thick brushstrokes are widely recognized today, particularly in masterpieces like “The Starry Night,” although his sketches, drawings, and prints offer a nuanced look at his entire oeuvre. (via My Modern Met)
Share this story
Editor's Picks: History
Highlights below. For the full collection click here. | https://www.thisiscolossal.com/category/history/ |
When introvert meets ENTJ. For some, this incredibly rare type is impossible. However, ENTJ 5w4 does exist.
In this article, we’re going to discuss the ENTJ 5w4 and what you can expect from them.
Who is the ENTJ 5w4?
These are calm and determined people. They defy most of the typical traits of the ENTJs. ENTJs usually identify as type 8 or type 3.
Thus, ENTJ 5w4 is relatively rare. This is further compounded by type 5 being an introverted type. While this is true, it’s not impossible for an extroverted MBTI type to have an introverted enneagram type. A good example of this is the ENTP 5w4.
The presence of type 5 and type 4 changes a lot of traits typical of ENTJs as we shall soon see. This type is more likely to be mistyped as an INTJ or an INTP.
ENTJ 5w4 are more likely to be assertive ENTJs than turbulent ENTJs.
What is the Core Desire of the ENTJ 5w4?
The core desire of the ENTJ 5w4 is to be self-sufficient. However, if they are always healthy, they will look a lot like the ENTJ type 8 with a twist.
They will want or desire power to ensure that they are self-sufficient.
What is the Core Fear of the ENTJ 5w4?
The core fear of the ENTJ 5w4 is to be a burden. To avoid this, they try to make sure they are self-sufficient in every way possible.
How the 5w4 Changes the Natural Tendencies of the ENTJ
1. More Introverted
The first obvious change here is being more introverted. ENTJs are introverted extroverts. This is fully on display with the ENTJ 5w4s. They are even a bit more introverted.
This means that they treasure their alone time. They are often energized when they spend time alone enjoying their hobbies.
Because they are much more introverted than other ENTJs, they are usually mistyped as introverts.
2. More Sensitive
Emotions are not something that ENTJs identify with. They are logical thinkers and usually feel that emotions are pointless. This ENTJ is a bit different.
ENTJ 5w4s are more sensitive. Their introverted feeling function also comes alive here. They are more aware of their own personal values and take them seriously.
So, they might have more emotional reactions than a typical ENTJ.
3. Ti vs Te
The dominant cognitive function of the ENTJ is the extroverted thinking (Te) function. While this is true, this function will mimic the introverted thinking (Ti) function in some ways.
Thus, there’s a sort of struggle or contradiction about how this personality type thinks about the information taken.
Their thought process will look a lot like the INTP.
4. More Creative
Type 4 is extremely creative in an artistic way. Type 5 is more of a problem solver. ENTJs are also creative. However, they are mostly innovators.
When all these traits combine, you get someone who can be extremely talented if they put in the work.
The potential is there. However, turning them into success is a different story altogether.
5. Well-Balanced
As earlier stated, they are more sensitive. Because of this, ENTJ 5w4s are well-balanced. They take both emotional and logical factors into consideration when making decisions.
Thus, their decisions usually seem complete. Other types that are predominantly feelers also feel more at ease with them.
6. Less Intimidating
ENTJs have a reputation for looking tough and intimidating. That is why they are usually type 8s. However, this personality type is different.
While they have a quiet strength about them, they are not as tough or intimidating. Most ENTJ 5w4s will be soft-spoken and pleasant to be around.
It’s not like you’d expect from an ENTJ.
New Weaknesses of the ENTJ 5w4
1. Self-Absorbed
The troubles of type 4 have the potential to affect this personality type. ENTJ 5w4s are more likely to be self-absorbed. When this happens, they can become selfish and focused on their own problems.
They might also be insensitive and less sympathetic. Ironically, they might start to look a bit like the typical ENTJ.
2. Detached
Type 5 often finds themselves detached from their loved ones and family. This is heightened by their need to spend time alone.
ENTJ 5w4s might also have this issue. In worst-case scenarios, they might even lose some of their closest relationships.
This personality type needs to find the balance between detachment and interactions with their loved ones.
3. More Fearful
Type 5 is known to be very fearful. While ENTJs are often seen as fearless or brave, ENTJ 5w4s will be a lot more fearful. Because of this, they might take fewer risks or have fewer confrontations with others.
In worst-case scenarios, this fear might hinder them from reaching their potential.
4. Lower Work Ethic
ENTJs are known to have a fantastic work ethic. They can put in the work needed when the chips are down. They are also backed by their structured life. This helps them to remain efficient at their jobs.
This personality type also has a good work ethic. However, they simply do not have the same level of energy that the typical ENTJ has. This is because their enneagram types have lower energies to exert.
ENTJ 5w4 in the Workplace
ENTJ 5w4s value structure, challenges, and a creative workplace. They also want a career that can take care of all their needs.
ENTJ 5w4s can work in groups or alone. When they are in growth or healthy, they can also lead their groups fearlessly.
Really, each day is a different day for this personality type in the workplace. Somedays, they just don’t want to be bothered. Sometimes, they are cheering everyone to victory.
To get the best out of the ENTJ 5w4, make sure you put them in a role that’s creative and challenging. | https://personalityhunt.com/entj-5w4-the-complete-guide/ |
Field tests of a general ectotherm niche model show how water can limit lizard activity and distribution
Kearney, Michael R., Munns, Suzanne L., Moore, Danae, Malishev, Matthew, and Bull, C. Michael (2018) Field tests of a general ectotherm niche model show how water can limit lizard activity and distribution. Ecological Monographs, 88 (4). pp. 672-693.
|
|
|
PDF (Published Version)
- Published Version
|
Download (9MB) | Preview
Abstract
Mechanistic forecasts of how species will respond to climate change are highly desired but difficult to achieve. Because processes at different scales are explicit in such models, careful assessments of their predictive abilities can provide valuable insights that will be relevant to functionally similar species. However, there are surprisingly few comprehensive field tests of mechanistic niche models in the literature. We applied a general, thermodynamically grounded modeling framework to determine the fundamental niche of an extremely well-studied herbivorous ectotherm, the sleepy lizard Tiliqua rugosa. We then compared the model predictions with detailed long-term field observations that included sub-hourly data on microclimate, activity levels, home ranges, and body temperatures as well as annual to decadal patterns of body condition and growth. Body temperature predictions inferred from gridded climatic data were within 10% of empirically observed values and explained >70% of observed daytime activity patterns across all lizards. However, some periods of activity restriction were explained by predicted desiccation level rather than by temperature, and metabolically driven activity requirements were much lower than potential activity time. Decadal trajectories of field growth and body condition could also be explained to within 10% of observed values, with the variance in trajectories being attributable to whether individuals had access to permanent water. Continent-wide applications of the model partly captured the inland distribution limit, but only after accounting for water limitations. Predicted changes in habitat suitability under six climate change scenarios were generally positive within the species’ current range, but varied strongly with predicted rainfall. Temperature is regarded as the major factor that will restrict the distribution and abundance of lizards and other terrestrial ectotherms under climate change. Yet our findings show how water can be more important than temperature in constraining the activity, habitat requirements, and distribution limits of terrestrial ectotherms. Our results demonstrate the feasibility of first-principles computation of the climatic limits on terrestrial animals from gridded environmental data, providing a coherent picture for how species will respond to climate change at different scales of space and time. | https://researchonline.jcu.edu.au/54909/ |
Novosad O., Kriachok I.A., Ulianchenko K.O., Skripets Т.V., Kadnikova T.
Summary. Introduction. The treatment options and outcomes for multiple myeloma (MM) patients were greatly changed over the last 10 years. Selecting treatment for patients according different age groups requires careful consideration of the balance between maximizing efficacy and ensuring acceptable tolerability. Objectives. The primary endpoint was to analyze and compare event-free (EFS) and overall survival (OS) in newly diagnosed MM patients who received chemotherapy or therapy with IMIDs or proteasome inhibitors. Materials and methods. The data of 100 newly diagnosed patients (median age: 63, range 34–80 years; males: 63, females: 37) who were treated at National Cancer Institute from Jan 2006 to Jan 2018 were analyzed. 19% (19/100) of patients were treated with M2, MP, DAV regimen (group 1), 46% (46/100) with thalidomide-based regimen (group 2) and 35% (35/100) — with proteasome inhibitor-based regimen (group 3). Chromosomal abnormalities [t(4:14), del13, and del17p13] were assessed in 28% patients. PFS and OS were analyzed depend on type of treatment regimen, 2- or 3-components in the treatment regimen, age and chromosomal abnormalities. Results. For 100 patients with MM the overall response rate (ORR) after the 1st line therapy was 70% (CR, VGPR, PR). 39% relapses during the follow-up period in patients after the 1 line therapy (median duration — 10.9 months; range 2–129 months) were recorded: 61.1% vs 47.8% vs 17.1% cases of relapse were diagnosed in group 1 vs group 2 vs group 3, respectively (p<0.05). 3-year EFS for group 1 was 18% vs 30% in group 3 and 20% vs 30% for group 2 vs group 3, respectively (p=0.002 by Cox-test). ROC-analysis confirmed that using of bortezomib-based regimen improve EFS in MM patients without any correlation with age (Se=81%; Sp=54%; AUC=0.7, p=0.0001). EFS was higher in patients younger than 65 years old in comparison with older patients in the group 2 (40% vs 18%, p<0.05). 3-year OS was 65% vs 45% in younger pts vs elderly pts, respectively (<65 y.o. vs > 65 y.o., logrank test, p=0.009). 3-year EFS and OS were similar in the group 3 pts who were <65 and >65 y.o. (logrank test, p=0.4). High level of adverse events, such as thrombosis in group 2 was registered in pts >65 y.o. (20%) vs <65 y.o. (7.7%), (p<0.05). We analyzed that the level of neurotoxicity in the three study groups was a similar (58.6% vs 60% vs 63%). Neurotoxicity complications were similar in different age groups also (58.6% vs 60%). 50% vs 33.8% cases of progression disease were detected in patients who received doublet and triplet regimens, respectively (p<0.05). ROC-analysis confirmed that doublet regimen is associated with more low EFS in elderly (>65 y.o.) MM patients (Se=50%; Sp=100%; AUC=0.7, p=0.04). Patients with del17p13 tended to have a higher rate of relapses, comparing to those who did not have it (p=0.09 by Cox-test). Median EFS in pts with del17p13 presence was lower without any correlation with age (10.9 vs 29.7 months). We did not find any significant association between patients with del13 or t(4:14) and clinical outcome of MM. Conclusions. Bortezomib-based regimens are still in a priority for the first-line treatment in different age groups. Thalidomide might be as an option for younger pts, because thrombosis events are more frequent in elderly pts. To achieve better response in the 1 line therapy it is preferably to use triplet regimens in pts <65 and >65 years old. | https://www.clinicaloncology.com.ua/en/article/25367/zmini-v-paradigmi-likuvannya-mnozhinnoi-miyelomi-2003-2013-vlasni-rezultati-2 |
Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
1 Introduction Setting the Context What Characterizes an Effective Preventive Food Safety System? In his workshop introductory remarks, Ned Groth explained that, while planning this workshop, Forum members developed a set of key cri- teria for an effective preventive food safety strategy or system. A protective food safety system should be: ⢠systematic (i.e., from farm to table); ⢠isk-based (i.e., with set priorities and established risk management r practices); ⢠transparent and participatory; ⢠cost-effective; and ⢠minimally disruptive of trade (which is an obligation of all coun- tries regardless, as per the SPS Agreement). These criteria served as a framework for the dayâs discussion. The first three criteria in particular figured prominently during the course of the workshop, with an emphasis on: â Edward Groth III, PhD, is a Consultant with Groth Consulting Services, Pelham, NY. â The SPS Agreement is the World Trade Organization (WTO) Agreement on the Applica- tion of Sanitary and Phytosanitary Measures, adopted in 1994, which allows members to take appropriate and scientifically based measures to protect public health as long as they do so in a manner that minimally disrupts trade.
MANAGING FOOD SAFETY PRACTICES FROM FARM TO TABLE ⢠he need for more transparent and effective communication among t all stakeholders and the need for all farm-to-table stakeholders to participate in food safety management; ⢠he need to consider the global scope of the farm-to-table food t production process; and ⢠he need for science- and data-based decision making when attempt- t ing to improve the safety and lower the risks of food production. Cost-effectiveness and the obligation to minimally disrupt trade were mentioned during the course of the workshop discussion but were not elaborated on to nearly the extent that the other criteria were. Is Food Safety Solvable? Also in his opening remarks, Groth emphasized that progress can be achieved and that even very difficult food safety problems are solv- able. As an example, he told an anecdotal story about some shipments of shrimp from Southeast Asia being refused entry into the United States and European Union (EU) a number of years ago because of the detection of unacceptable levels of chloramphenicol residue. The refused entries had a devastating effect on shrimp export throughout Southeast Asia. Over the last five years, however, the Vietnamese shrimp industry has made a terrific comeback, despite initial problems in educating the thousands of low-tech and largely illiterate shrimp farmers about what they needed to do to correct the problem. Largely through technical assistance provided from several European countries, the Vietnamese government has developed a surveillance, monitoring and analytical capacity that simply did not exist at any level five years ago. Today, the United States and EU account for almost half of all Vietnamese shrimp exports. A handful of other success stories were told elsewhere during the course of the dayâs discussion. For example, at one point during the dayâs discussion it was noted that many developing countries that one might not necessarily expect to have sophisticated food safety systems in place are nonetheless able to meet the very high EU import standards. It was sug- gested that perhaps this is because of direct working relationships between exporting and importing countries and the agencies therein. Grothâs introductory remarks were followed by Taylorâs keynote ad- dress: Institutional Roles in Risk-Based Management. A key message of â Chloramphenicol is an antibiotic that is typically administered only as a last resort treat- ment for difficult-to-treat bacterial infections in humans. U.S. federal regulations prohibit its use in food-producing animals or animal feed products, however, due to its unpredictable effects in some human patient populations.
INTRODUCTION Taylorâs talk was that food safety is as much an institutional challenge as it is a scientific, business, or regulatory challenge. The âgood newsâ with respect to food safety, Taylor said, is that policy makers are âgetting it.â Food safety is on the radar screen and, in fact, Americans are at a turning point in their history with respect to having the opportunity, means, and political will to improve our food safety system. But institutional roles and responsibilities still need to be clarified, institutional capacity needs to be strengthened (so each institution can meet its responsibilities), barriers to information exchange and collaboration need to be broken down, and new mechanisms for collaboration need to be created. In short, even with the increased policy focus on food safety, far more work needs to be done in order to foster an institutionally integrated, systems-based approach to food safety. Taylorâs emphasis on the institutional nature of the challenge of food safety was a major underlying theme of the remainder of the work- shop presentations and discussions. Organization of the Workshop and This Report The remainder of the workshop was organized around three major sessions: 1. essons learned from recent outbreaks and other past experiences L in a range of foods (i.e., from minimally processed to highly pro- cessed) and under a range of regulatory frameworks (i.e., from reliance on good agricultural practices, or GAPs, to the use of very strict low-acid canned food regulations), as well as lessons learned from scientific research on consumer behavior. In addition to the respective roles of industry and government and the need for more transparency and collaboration between these two sectors in par- ticular, other major topics of discussion during this session included the essential role of science in the development of safe food pro- duction systems and the need to make data-based decisions when designing such systems; the argument that testing and audits are verification, not preventive measures; and how research has shown that consumer education by itself are not a sufficient preventive measure against foodborne illness. 2. The range of strategic approaches to improving food safety that is being considered or has already been implemented. These ap- proaches range from the technological (e.g., advances in molecular detection technologies) to changes in how the public and private sector can or should interact. In addition to the continued discus- sion on the respective roles of industry and government and the need for more collaboration between the two sectors, other major
MANAGING FOOD SAFETY PRACTICES FROM FARM TO TABLE topics of discussion during this session included the global nature of the U.S. food supply and the critically important role of risk- based supply chain management; and the reality that, while new testing technologies are becoming available, again, testing is not preventionâthere is a need to better utilize the technological tools and knowledge already in place. This session ended with what was arguably the most conceptual presentation of the day: Julia Caswellâs âbig pictureâ examination of different publicâprivate sector combinations and strategies used elsewhere and in the U.S. and the need to consider whether this country should adopt a more comprehensive approach to food safety management rather than relying on its current reactive, risk-by-risk approach. 3. Future steps toward improving and ensuring the safety of our food supply. This session involved a four-person panel with represen- tatives from industry (Cargill Inc.), a consumer advocacy group (Center for Science in the Public Interest) and two regulatory agen- cies (Center for Food Safety & Applied Nutrition [CFSAN] and the Food Safety and Inspection Service [FSIS]). Each panelist was asked to provide some perspective on what they had heard during the course of the previous sessions. The issue of the respective roles of industry and government and the need for more privateâpublic sector cooperation and coordination again figured prominently throughout the session. The panelists offered opinions and insights into how this might be achieved, for example whether the forma- tion of a single unified food safety agency could be an option. There were starkly contrasting views on the practicality and po- tential of such an agency, with both regulatory agency representa- tives strongly opposed to the notion and the consumer advocacy representative and some audience members in favor. Both regula- tory agency representatives and the private industry representative briefly described some recent or pending food safety measures being implemented or planned by their respective institutions. An- other major topic of discussion was the challenges that stem from the increasingly global nature of our food supply chain, such as ensuring that agricultural suppliers are adhering to good sanitary practices. â CFSAN is one of six product-oriented centers within the U.S. FDA. In conjunction with FDA field staff, CFSAN is responsible for promoting and protecting public health by ensuring that the U.S. food supply is safe, sanitary, wholesome, and honestly labeled and that cosmetic products are safe and properly labeled. â The FSIS is the public health agency in the USDA responsible for ensuring that the Nationâs commercial supply of meat, poultry, and egg products is safe, wholesome, and correctly labeled and packaged.
INTRODUCTION This workshop report is organized around these three sessions, with Chapters 2, 3, and 4 summarizing the presentations and discussions of the first, second, and third sessions, respectively. A paraphrased summary of Taylorâs keynote presentation follows. Keynote Address: Institutional Roles in Food Safety Risk-Based Management Presenter: Michael Taylor Michael Taylor began by remarking that regulators and industry often think about food safety as a scientific, business, or regulatory challenge. He argued that there is another way to think about food safety: as an in- stitutional challenge. In fact, it is practically unavoidable to look through the institutional lens when deliberating an effective farm-to-table risk-based approach to food safety. Food safety success depends on the behaviors of many different types of institutionsâfor example, how institutions interact with each other and whether and how institutions are incentivized to do certain things. How institutions work well together, or not, and share data, or not, significantly impacts outbreak management success and the timeli- ness, or lack thereof, in resolving food safety problems. The extent to which institutions work well together is particularly im- portant with multi-state outbreaks, where not just the federal government but also the governments of multiple states are responding. Taylor pointed to the Salmonella Saintpaul outbreak, which involved 40-plus states, as an example of the vital role that institutions play in outbreak response situa- tions. Not only are multiple levels of government involved in these types of situations (i.e., federal, state, and local governments), but within each level there are multiple institutions: ⢠t the federal government level, there are the Centers for Disease A Control and Prevention, or CDC (playing the âepi roleâ), and both the FDA and USDA (playing distinct regulatory roles). Together, these agencies play key roles in national coordination, traceback, and risk communication. â This section is a paraphrased summary of Michael Taylorâs keynote address. â Michael Taylor, JD, is a Research Professor at George Washington University, Washington, DC. â The Salmonella Saintpaul outbreak began in April 2008, with the first cases reported to the CDC by the New Mexico Department of Health in May. Within weeks, the outbreak ex- panded to include 43 states, the District of Columbia, and Canada. By the end of August, the outbreak appeared to be over. Jalapeño and Serrano peppers grown in Mexico were identified as the main source of contamination.
MANAGING FOOD SAFETY PRACTICES FROM FARM TO TABLE ⢠t the state and local government level, there are the public health A labs, health departments, and food inspection agencies, all of which not only must interact with each other but also with the various federal institutions. State and local governments typically work on the frontline during outbreak responses and play critical roles in early detection. ⢠dded to these is the obviously central role that the private food A industry plays, including food producers, processers, and retailers. Not only are private companies critical sources of information, they are also responsible for managing the recalls. ⢠inally, there is the public, which includes the press as well as out- F break victims and other citizens. The latter serve as the ultimate measure of the effectiveness of any food safety system or strategy. While certain institutions may seem to have particular primary roles (e.g., the federal government is responsible for national coordination), multiple institutions from these different sectors typically work together on most activities. For example: ⢠hen conducting hazard identification and analysis, while the W responsibility falls first and foremost on private industry, clearly both the federal government regulatory groups (including CDC, FDA, and USDA) and government and academic research groups play important roles as well. ⢠ikewise with developing and implementing interventions: while L this is primarily an industry responsibility, the Agricultural Re- search Service (ARS) and other research organizations are active in this area as well. ⢠etting food safety standards is primarily a government activity, S with the FDA, USDA, and state and local agencies all involved, Codex, the International Organization for Standardization (ISO) and other international standard-setting bodies also play a role. In- creasingly, food companies and retailers are also setting food safety standards through purchase specifications and other means. ⢠inally, while verifying and enforcing compliance has traditionally F been perceived of as a government role, the private sector partici- â Codex is the Codex Alimentarius Commission (CAC), an intergovernmental organization jointly run by the Food and Agricultural Organization (FAO), and the World Health Organiza- tion (WHO). Codex is responsible for compiling the standards, codes of practice, guidelines, and recommendations of the Codex Alimentarius, an international set of food standards often referred to as the âCodex standards.â
INTRODUCTION pates as well (i.e., through commercial purchasers and third party auditors). All of these various mixed responsibilities across all of these areas of food safety and risk management highlight the reality that institutions are highly interdependent in outbreak response and other food safety situa- tions. Effective institutional interaction is critical to their success. This is true no matter what the situation isâwhether it is a traceback, outbreak investigation, or prevention activity. The reality is that there is an enormous number and diversity of institu- tions with widely divergent perspectives and capacities working on the same problems. This poses a tremendous challenge. Precisely because of their divergent perspectives and capacities, most institutions have a tendency to work within a particular set of traditional practices. Taylor referred to a recent examination of the food safety information infrastructure, an effort supported with funding from the Robert Wood Johnson Foundation,10 which concluded (among other findings) that institutions tend to focus only on their particular role in the system and fail to consider how they can work cooperatively and collaboratively with other institutions and address food safety as a systems-level problem. This âstovepipeâ way of working impedes information-sharing and collaboration. Taylor emphasized that much more work is needed to foster an integrated, systems-level approach to food safety. Taylor also emphasized, however, that it is enormously gratifying that âpolicy makers at the legislative level are getting this.â He pointed to sev- eral signs that the issue of food safety is on the public policy radar screen: ⢠DAâs Food Protection Plan and the Bush administrationâs Import F Safety Action Plan, both of which are focused on forging bet- ter interaction between government and industry in order to im- prove risk management of both imported and domestic food safety systems-level problems. ⢠earings for the 110th Congress on the Salmonella Saintpaul out- H break, which Taylor noted were particularly noteworthy with re- spect to how members of both sides of the aisle âreally dug into what was going on at the institutional level in terms of the interac- 10â The project, âExploring Opportunities to Improve the Nationâs Food Safety Information Infrastructure,â was sponsored by the Food Safety Research Consortium (FSRC), a collabora- tion among seven research institutions. The goal of the project was to address issues relating to how food safety data are collected and shared. The FSRC issued a report on the project findings in May 2008.
10 MANAGING FOOD SAFETY PRACTICES FROM FARM TO TABLE tion between federal, state, and local agenciesâ and âembraced the need to address these institutional questions in a serious way.â ⢠ending surveillance and outbreak response legislation, including a P bill (Improving Food-borne Illness Surveillance and Response Act of 2008, introduced by then Senator Barack Obama) that would, among other changes, call for an enormous investment in strength- ening state and local capacities to be integrated into a national food safety system. ⢠ending FDA food safety legislation (i.e., the Durbin bipartisan P FDA Food Safety Modernization Act), which like the surveillance and response bill would address other institutional issues. Taylor remarked that it is terrific that food safety, particularly the insti- tutional issues of food safety, is being seriously considered at the national policy and legislative level. It is incumbent upon the food safety community at large, however, to take advantage of this remarkable and unprecedented interest and figure out how to actually achieve better institutional integra- tion. Taylor identified four key elements of successâsteps that the food safety community must take in order to fulfill the vision of a more inte- grated system: 1. Clearly define responsibilities and roles of all institutions for all situations (e.g., outbreaks, prevention). Taylor noted that while there has been progress with respect to HACCP11 implementation and a better understanding of the relationship between company responsibility for having preventive safety plans in place and gov- ernmentâs oversight responsibility, there are still many other role and responsibility issues to be resolved, particularly within and among different government levels and agencies. 2. Build capacity of institutions to meet their responsibilities. This is particularly important with respect to governmental capacity, especially at the state and local level but also at the federal level. The FDA, for example, is under-resourced and has some serious capacity-building to do. Likewise, the Nationâs âepi functionâ is woefully underfunded at all levelsâfederal, state, and local. 3. Break down barriers to information sharing and other collabora- tive efforts among agencies and organizations. 11â Based on a set of seven key principles, HACCP (pronounced âhassipâ), the Hazard Analysis and Critical Control Point, is a systematic harvest-to-consumption approach to the identification, evaluation, and control of food safety hazards.
INTRODUCTION 11 4. Create new mechanisms of collaboration, both between govern- ment and industry and across government. Right now, the mecha- nisms are not in place that would enable these agencies to work together. In conclusion, Taylor opined that regulators, industry, and consumers are at a turning point in the history of food safety. There have been few times that food safety has been on the radar screen at this political level. While there is rightfully considerable focus on getting the science and policy right, change is not going to happen unless there is also an effort to âget the institutions right.â Taylor expressed hope that this workshop discussion would generate ideas that will help us move forward in that direction. Following Taylorâs presentation, there was a question about the roles and responsibilities of the courts with respect to improving food safety. Taylor responded that the courts do play a role as overseers of the gov- ernment and as administrators of the private liability system, as demon- strated by USDAâs experience with the Salmonella performance standard for ground beef, but it is not a central role compared to the one agencies are expected to play, in our government system in implementing laws passed by Congress. This question was followed by a comment by another workshop par- ticipant who suggested that the Department of Homeland Security (DHS) might also have a role to play in improving the food safety system, given its critical existing role in customs and border protection, its management of the National Biosurveillance Integration System (which could serve as a key component of information sharing) and its provision of emergency preparedness grants, including some specifically for food and agriculture (i.e., through the Federal Emergency Management Agency, or FEMA). Taylor agreed. FINDING SOLUTIONS: CONSIDERING OPTIONS Taylorâs keynote presentation set the tone for the workshop: a focus on the roles and responsibilities of institutions, U.S. government and oth- erwise, and the reality that there is still a great deal of work to be done. As he noted in his keynote presentation, food safety is not a new topic of dis- cussion. It has always been an issue, and the global food supply has always had problems. However, food safety is in the national and international spotlight in a way that is has never been before, making now an opportune time to seize on this attention and make some desperately needed changes. The question is, what changes are needed and how should these changes be implemented? More specifically, workshop participants considered:
12 MANAGING FOOD SAFETY PRACTICES FROM FARM TO TABLE ⢠hat can be learned from the science and history of the very safe W thermally processed canned food industry (as Donald Zink dis- cussed) and other food safety success stories? ⢠qually, if not more important, what can be learned from food E safety failures, such as the recent E. coli O157:H7 outbreak in Natural Selection Foods bagged spinach (which Will Daniels dis- cussed) and the more persistent problem of Listeria contamination in ready-to-eat meat products (which Randy Huffman addressed in his presentation)? ⢠hat are some of the strategic approaches that the FDA, USDA, W industry, and other stakeholders have taken or are currently con- sidering (as most of the workshop participants addressed to some extent but which Robert Brackett, Caroline Smith DeWaal, Rich- ard Raymond, Mike Robach, and Stephen Sundlof considered in detail)? ⢠ow about the consumer populationâwhat role can and should H food consumers play in reducing food safety risks (as Christine Bruhn considered)? ⢠an any of the new advanced detection technologies being devel- C oped help the effort, or is the challenge to better utilize already ex- isting and available technologies (as Russell Flowers considered)? ⢠inally, getting back to the original question that Groth posed in F his opening remarks, what can the U.S. government do to facilitate efforts to improve food safety? More generally, how should the public and private sectors interact? Again, this was a question that many workshop participants and audience members addressed to some extent, either in their presentations or during discussion. Of note, more specifically, Julie Caswell asked: Does the United States need to develop a comprehensive joint public-private approach to- ward food safety management and assurance, rather than operating on a risk-by-risk basis? These were just some of the many specifics considered throughout the day. Of note, the two major U.S. food regulatory agencies, FDA and USDA, are housed separately within the executive branch of the U.S. federal government. The FDA is in the Department of Health and Human Services (HHS), whereas USDA comprises its own separate department. HHS also houses the CDC. Much of the discussion summarized in Chapter 4 revolved around fundamental differences in the regulatory approaches of these two separate regulatory agencies.
INTRODUCTION 13 Improving Food Safety: Differences in Opinion Again, the workshop objective was neither to reach consensus nor articulate any conclusions or recommendations. Rather, the goal was to spotlight concerns, consider options, and engage in dialogue on this timely issue. Indeed, one of the major overarching themes of the workshop pre- sentations and discussion was the wide range of opinions and beliefs about those details. As Christine Bruhn observed in the final discussion of the day, âWe have a commonality, and I think we need to grasp that commonality: and that is the desire to make the food supply safer. Where we differ is in some of the details about how to do it.â This was particularly true with regards to the roles and responsibilities of each of the major stakeholders: 1. Government regulatory agencies (i.e., in the United States, the FDA and USDA) 2. Private industry (i.e., food production companies as well as all companies that contribute to any aspect of the food supply chain) 3. The consumer population 4. Academia (and other research institutions) 5. Inter-governmental organizations (e.g., CAC, WHO, FAO) As an example of the varied opinions and beliefs expressed, one work- shop participant was adamant that there should be more governmental oversight on agricultural farms, while others questioned the usefulness of increased oversight. As another example, several participants were enthu- siastic about the notion, or âvision,â of a single unified food safety agency, while others questioned the feasibility and usefulness of such an agency. Despite the contention, there was nonetheless some agreement on the need for more communication, cooperation, and coordination between govern- mental regulatory agencies and private industry. Yet even then, while com- mending USDA on its communication efforts over the past couple of years, panelist Caroline Smith DeWaal commented that the broader issue is not just the need for more communication between regulators and industry but the need for regulatory agencies to communicate more effectively with all stakeholders, including consumers. | https://www.nap.edu/read/12594/chapter/3 |
Selective contribution of each hamstring muscle to anterior cruciate ligament protection and tibiofemoral joint stability in leg-extension exercise: a simulation study.
A biomechanical model was developed to simulate the selective effect of the co-contraction force provided by each hamstring muscle on the shear and compressive tibiofemoral joint reaction forces, during open kinetic-chain knee-extension exercises. This model accounts for instantaneous values of knee flexion angle [Formula: see text], angular velocity and acceleration, and for changes in magnitude, orientation, and application point of external resistance. The tibiofemoral shear force (TFSF) largely determines the tensile force on anterior cruciate ligament (ACL) and posterior cruciate ligament (PCL). Biceps femoris is the most effective hamstring muscle in decreasing the ACL-loading TFSF developed by quadriceps contractions for [Formula: see text]. In this range, the semimembranosus generates the dominant tibiofemoral compressive force, which enhances joint stability, opposes anterior/posterior tibial translations, and protects cruciate ligaments. The semitendinosus force provides the greatest decreasing gradient of ACL-loading TFSF for [Formula: see text], and the greatest increasing gradient of tibiofemoral compressive force for [Formula: see text]. However, semitendinosus efficacy is strongly limited by its small physiological section. Hamstring muscles behave as a unique muscle in enhancing the PCL-loading TFSF produced by quadriceps contractions for [Formula: see text]. The levels of hamstrings co-activation that suppress the ACL-loading TFSF considerably shift when the knee angular acceleration is changed while maintaining the same level of knee extensor torque by a concurrent adjustment in the magnitude of external resistance. The knowledge of the specific role and the optimal activation level of each hamstring muscle in ACL protection and tibiofemoral stability are fundamental for planning safe and effective rehabilitative knee-extension exercises.
| |
This effect can be achieved by providing: views to the outside, interior gardens or aquariums, or art with a nature theme.
In contrast with traditional environmental health approaches that focus primarily on toxic substances in air, water, and soil, this more recent approach conceptualizes the environment more broadly to encompass a range of human-made physical and social features that are affected by public policy Frumkin, Residential segregation by income and race have also been linked to drug use Cooper et al.
Important areas for future cross-national research on environmental factors and health include 1 characterizing levels and distributions of environmental risk factors using comparable measures across countries; 2 documenting inequalities in the distribution of these environmental factors; 3 identifying the extent to which these environmental factors affect health and the extent to which their effects are modulated by individual- community- or country-level factors; 4 examining directly the contribution of environmental factors to health differences between the United States and other high-income countries; and 5 studying national, regional, and local country policies that may curb levels of adverse environmental exposures, reduce the extent to which they are inequitably distributed, or buffer their effects.
Several factors may explain the strong spatial patterns that are observed within countries. Other important differences in work-related policies include employment protection and unemployment benefits, as well as family and sickness leave see Chapter 8.
Stress is an important medical consideration, and creating an environment that reduces stress is a key piece of improving health outcomes.
Mandrake, from De Materia Medica. As neuroscientist Candice Pert puts it, "What you are thinking at any moment is changing your biochemistry. Studies that use measures of area socioeconomic characteristics as proxies for environmental features have generally reported similar associations of area features with health in both the United States and other countries van Lenthe et al.
Given the established correlation between neighborhood, race, and socioeconomic composition and various health-related neighborhood resources in the United States, this greater segregation could also result in greater exposure of some population sectors to harmful environments Lovasi et al.
Sue's pediatrician diagnosed her with irritable bowel syndrome and offered her some medication to relax her gut. Inhale normally and naturally.
One theory for the tendency of some immigrant groups to have better health outcomes than might be expected on the basis of their incomes and education see Chapter 6 is the social support immigrants often provide one another Matthews et al. As noted above, residential segregation by income in the United States is associated with violence and related outcomes Sampson et al. | https://zynumyrito.carriagehouseautoresto.com/does-the-environment-influence-society-or431718877qf.html |
SYNOPSISfl-record [ options ] file class.method
DESCRIPTIONA funkload test can be turned into a load test, just by invoking the bench runner fl-run-bench.
OPTIONS
- --version
- show program's version number and exit
- --help, -h
- show this help message and exit
- --url=MAIN_URL, -uMAIN_URL
- Base URL to bench.
- --cycles=BENCH_CYCLES, -cBENCH_CYCLES
- Cycles to bench, this is a list of number of virtual concurrent users, to run a bench with 3 cycles with 5, 10 and 20 users use: -c 2:10:20
- --duration=BENCH_DURATION, -DBENCH_DURATION
- Duration of a cycle in seconds.
- --sleep-time-min=BENCH_SLEEP_TIME_MIN, -mBENCH_SLEEP_TIME_MIN
- Minimum sleep time between request.
- --sleep-time-max=BENCH_SLEEP_TIME_MAX, -MBENCH_SLEEP_TIME_MAX
- Maximum sleep time between request.
- --startup-delay=BENCH_STARTUP_DELAY, -sBENCH_STARTUP_DELAY
- Startup delay between thread.
- --no-color
- Monochrome output.
- --accept-invalid-links
- Do not fail if css/image links are not reachable.
- --simple-fetch
- Don't load additional links like css or images when fetching an html page.
- --label=LABEL, -l LABEL
-
Add a label to this bench run for easier identification (it will be appended to the directory name for reports generated from it).
AUTHORFunkload was written by Benoit Delbosc.
This manual page was written by Jose Parrella <[email protected]>, for the Debian project (but may be used by others). | https://manpages.org/fl-record |
Seismic station A19K, it's called, and it's now at the edge of an abandoned airstrip far above the Arctic Circle. The nearest population center is 127 miles northeast in Utqiaġvik (formerly known as Barrow), the northernmost city in the United States. What a way to celebrate Earth Science Week, Oct. 8-14, 2017.
The seismic station is part of EarthScope, a project funded by the National Science Foundation (NSF). It's one of hundreds of stations collectively called the Transportable Array. As its name suggests, the array can and does move from place to place.
Station A19K is the last installation in a 280-station Alaska seismic network that continuously records ground motion from local, regional and global earthquakes and broadcasts its data in real time.
The Transportable Array also covers the lower 48 states coast to coast with a grid of stations at nearly 1,700 sites.
EarthScope scientists are exploring the structure and evolution of the North American continent, and the processes controlling its earthquakes and volcanic eruptions. The Transportable Array is constructed, operated and maintained by the Incorporated Research Institutions for Seismology (IRIS) through cooperative agreements with NSF.
The long-planned, current two-year deployment of the Transportable Array in Alaska will help researchers understand earthquakes in Alaska; map faults and assess seismic hazards throughout the state; and image the crust and deep-Earth structure beneath Alaska.
"The successful construction of the seismic array in a challenging environment like Alaska is a major achievement with significant scientific and societal benefits," said Maggie Benoit, program director in NSF's Division of Earth Sciences, which funds EarthScope. "The Transportable Array is enabling scientists to image the interior of the Earth to depths of several hundred miles. While it's operating, it will enhance observation and warning capabilities for natural hazards such as earthquakes, tsunamis and volcanic eruptions."
Alaska is the most seismically active state in the U.S., with more than 25,000 earthquakes each year. Yet it has relatively few stations to monitor seismic activity. These stations are mostly located in the populated southern part of the state.
Alaska has been the final goal of the Transportable Array since its stations started to be installed across the lower 48 states in 2004.
"We saved the best, and hardest, for last," said Bob Woodward, director of the USArray, the seismic component of EarthScope. "Operating in the lower 48 allowed us to learn how to scale up our operations before moving to an environment where the logistics and terrain are much more challenging."
Stations in the lower 48 were installed using trucks to travel to the sites (primarily farmland) and backhoes to create vaults for the sensors and other equipment.
Because the vast majority of Alaska is inaccessible by roads, a major change in strategy was needed.
Helicopter operations were essential for installing seismic equipment across large swaths of the state that have never hosted seismometers.
Using helicopters, field teams deployed stations across the most remote regions of Alaska. A lightweight drill was designed to make and encase a 10-foot borehole in rock, permafrost and other ground types.
A newly available posthole seismometer was placed directly into each hole, then connected to a sturdy hut containing the electronics, batteries and solar panels needed to keep the station powered, operating and transmitting data.
"We're using one of the largest observing tools in science in an unexplored region with clear earthquake hazards that we hope to understand better," said Bob Busby, manager of the Transportable Array.
Signals from the seismic sensors are sent to the Array Network Facility in San Diego in real time as soon as a station is built, and all data are made freely available to the public.
The benefits in Alaska are immediate. Geologists at the Alaska Earthquake Center, for example, are incorporating the information into their earthquake detection and location programs.
The Alaska stations have also hosted additional scientific sensors. Meteorological sensors are mounted on 130 of the most remote stations. Wind, temperature, humidity and precipitation data are streamed from the stations and incorporated into weather forecasting. Soil temperature probes have also been installed at about 80 of these northern sites as part of a permafrost study.
Benefits of the Alaska Transportable Array stations are not just for Alaskans, scientists say. The research "will improve our understanding of the Earth, and of earthquakes, from one of the most active natural earthquake 'laboratories' on the planet," said Woodward.
"The Transportable Array is letting us look, with amazing clarity, at the interior of Earth. Physics is well-known for huge experiments that far exceed the scale of experiments in other fields. But the Transportable Array, which spans a continent, is an experiment of unprecedented scale."
Its success is due largely to the efforts of a small number of employees who have coordinated shipping schedules and land-use permits, and spent the past three summers working in poor weather conditions and dodging wildfires across Alaska and western Canada, according to Woodward.
At times, conditions were harsh. Many stations have been gnawed by curious bears, some have faced winds of more than 120 miles-per-hour, and one was reduced to cinders in the 2015 Sockeye fire (it was rebuilt the same year). But the stations are durable and performing well, Woodward said.
Operators and researchers are investigating ways of extending the life of the stations, which are planned to remain in Alaska through 2019.
Scientists affiliated with the EarthScope project in the lower 48 states transferred 158 Transportable Array stations to the Central and Eastern United States Network (CEUSN), a longer-term seismic station sub-array. Researchers hope that a similar plan may develop in Alaska.
For more information, please see the EarthScope website. | https://www.eurekalert.org/pub_releases/2017-10/nsf-eta101117.php |
This book explores a central question of moral philosophy, addressing whether we are morally responsible for certain kinds of actions, intentional omissions, and the consequences deriving therefrom. Haji distinguishes between moral responsibility and a more restrictive category, moral appraisability. To say that a person is appraisable for an action is to say that he or she is deserving either of praise or blame for that action. One of Haji's principal aims is to uncover conditions sufficient for appraisability of actions. He begins with a number of puzzles that serve to structure and organize the issues, each one of which motivates a condition required for appraisability. The core of Haji's analysis involves his examination of three primary types of conditions. According to a control condition, a person must control the action in an appropriate way in order to be appraisable. An autonomy condition permits moral appraisability for an action only if it ultimately derives from a person's authentic evaluative scheme. On Haji's epistemic requirement, moral praiseworthiness or blameworthiness demands belief on the part of the agent in the rightness or wrongness of an action. Haji concludes this portion of his argument by incorporating these conditions into a general principle which outlines sufficient conditions for appraisability. Haji offers a fascinating discussion of the implications of his analysis. He demonstrates that his appraisability concept is applicable to a variety of non-moral kinds of appraisal, such as those involving legal, prudential and etiquette considerations. He looks at crosscultural attributions of blameworthiness and argues that such attributions are frequently mistaken. He considers the case of addicts and suggests that they may not be morally responsible for actions their addictions are said to cause. He even takes up the intriguing question of whether we can be blamed for the thoughts of our dream selves. Engaging with a central metaphysical question in his conclusion, Haji argues that the conditions of moral responsibility he defends are neither undermined by determinism nor threatened by certain varieties of incompatibilism. Addressing a range of little-discussed topics and forging crucial connections between moral theory and moral responsibility, Moral Appraisability is vital reading for students and scholars of moral philosophy, metaphysics, and the philosophy of law. | https://www.questia.com/library/65743729/moral-appraisability-puzzles-proposals-and-perplexities |
On Tuesday, CEO Marissa Mayer gave an answer: Entertain.
"When you look at, 'What is Yahoo's core verb?' Some companies aim to connect. Some companies aim to organize," Yahoo CEO Marissa Mayer said during a "fireside" style chat with Salesforce CEO Marc Benioff at the Dreamforce conference here. "Us, it's been around entertaining."
It's still not a cut and dry answer, but it at least illuminates what Mayer has been doing at the company thus far. It also jibes with recent announcements that suggest the company has doubled down on content. Yahoo brought on veteran New York Times technology columnist David Pogue to lead consumer tech coverage. And there have been reports that the company has been in talks with Katie Couric and Ryan Seacrest.
Of course, entertainment isn't just media. Benioff asked Mayer about the importance of design at the company, and Mayer said it relates back to the mission to entertain. "When you have billions of users coming to the Web site each month, you really have to have thought through the experience," she said.
Still, contrary to other companies like Apple -- where Steve Jobs said the chief designer had the most operational power at the company besides him -- Mayer thinks design shouldn't be deified. "I'd argue it's important not to lead with design, but for design to be part of the product," she said. Then she told a story about a friend at a failed pre-bubble tech company that designed products that were "usable, but not useful." To wit, Mayer said earlier in the conversation that the position of senior vice president of design in her executive team has not yet been hired.
Mayer also touched on a number of other aspects of Yahoo's business and culture: In an attempt to walk the walk of "mobile first," she's beefed up the number of people working on mobile products from about 40 to 60 to almost 400. She also instituted a policy called "PB&J," or "process, bureaucracy and jams," as a system for working through conflicts and problems.
Mayer has been the subject of much attention since she took Yahoo's top job in July 2012. Her efforts at turning around the troubled company have had their share of fits and starts. Among them have been controversies over getting rid of the company's work from home policy and a bell curve employee rating system.
Yahoo on Tuesday also announced that it would increase its shares buyback authorization by $5 billion and said that it plans to offer $1 billion in convertible notes. The company said part of the proceeds will go to things like possible acquisitions or strategic investments. Indeed, under her watch, Yahoo has already acquired some 20 startups, including blogging platform Tumblr for $1.1 billion.
Yahoo also hasn't been immune to the scrutiny facing giant tech companies in the wake of detailed leaks of government surveillance by former National Security Agency contractor Edward Snowden. Last month, the Washington Post reported that the NSA and its British counterpart the GCHQ had been infiltrating links to Yahoo and Google data centers. In response, Mayer wrote in a blog post Monday that the company was taking steps to encrypt the flow of information between data centers. | https://www.cnet.com/news/marissa-mayer-says-yahoo-is-about-entertaining/ |
Bethany is changing the world through family. We began our work by serving one child more than 75 years ago. Today, Bethany is an international Christian nonprofit partnering with communities in more than 30 states and in several countries around the world. We strengthen and preserve families, support displaced people fleeing danger, and find safe, loving families for children who need them. Bethany is at the forefront of creating and implementing solutions to meet the growing needs of vulnerable children and families in the U.S. and around the world.
The Woman's Advocacy Case Manager is primarily responsible for providing support to women and their families. This individual will also be responsible for strengthening the client's capacity to engage in health practices and to maintain stable homes through a family centered approach that includes the woman's significant other and her children. The Woman's Advocacy Case Manager is expected to maintain the appropriate caseload in accordance with program and contractual expectations.
ESSENTIAL JOB RESPONSIBILITIES:
Provide comprehensive case management services and life skills education to include conflict resolution, family planning, career planning, self-sufficiency, education, health maintenance, environmental health, role modeling, child development, and goal setting for clients referred by community resources;
Develop a comprehensive service plan with a consumer and family-centered focus with strategies for recovery;
Develop a full-cycle birthing plan to include linkage and prenatal follow-through coordination; Locate and develop positive working relationships with local OB/GYNs or prenatal clinics, while also ensuring that the woman is fully participating in prenatal care;
Develop a parenting plan or "Plan of Safe Care" that prepares collaboration with Child Protective Services (CPS) at time of birth and addresses the mother, infant, and family needs;
Develop and maintain early intervention, WIC, and other community resources;
Cultivate information sharing between all providers related to the woman's progress and challenges;
Coordinate the necessary interventions and services provided by multiple agencies;
Provide home visitation services and maintain regular contact with the woman and baby;
Facilitate parenting education using Trust-Based Relational Intervention (TBRI) during home visits;
Complete paperwork within appropriate time frames;
Coordinate with Perinatal Cooperatives/Risk Reduction Specialists in educating medical community partners on stigma around pregnant women with Substance Use Disorders (SUD);
Effectively prepare a woman for birthing including the potential for child welfare involvement in the event of Neonatal Abstinence Syndrome (NAS), as well as accessing a pediatrician familiar with this prenatal exposure;
Prepare woman for living and care arrangements for infant;
Effectively advocate on behalf of the family;
Maintain on-going contact with service providers that includes progress reports, status updates, and any other critical information, while participating in multidisciplinary meetings as needed;
Coordinate team meetings that bring all formal systems together on behalf of the woman from pregnancy through 1-year post delivery, as needed;
Attend and participate in meetings to include but not limited to SUD/Child Welfare consortia, and Perinatal Addictions meetings as needed;
Provide the appropriate care and community referrals, as needed;
Stay abreast of all agency, federal, and state regulatory requirements related to social services;
Complete other duties as assigned.
Qualifications:
Bachelor's level degree in Social Science, Human Services, Behavioral Science, Psychology, Education, or related field of study from an accredited college;
Master's level degree in Social Science, Human Services, Behavioral Science, Psychology, Education, or related field of study from an accredited college, preferred;
At least three (3) years' experience working with high need families involved with substance use and mental health disorders;
Demonstrated evidence of working with populations with substance use and co-occurring mental health disorders or evidence of addiction coursework;
Possess knowledge of systems that provide services for women and their families to include but not limited to maternal health, early childhood intervention, child welfare, or other related services;
Demonstrated knowledge of the Trust-Based Relational Intervention (TBRI) approach and interventions;
Excellent verbal and written communication skills;
Demonstrated excellent assessment and crisis intervention skills;
Ability to work independently and exercise a high level of confidentiality;
Must be willing and able to work outside of normal business hours to include some evenings and weekends;
Computer and typing skills sufficient to perform essential job functions;
Active motor vehicle license and a reliable automobile with adequate insurance coverage;
Pass a criminal history screen, including state and local child protection agency registries;
Subscription to and integration of the agency Statement of Faith, Mission Statement, and Cultural Diversity Commitment.
We value and embrace the principles of diversity, equity, and inclusion; our culture is strengthened and our workplace is more dynamic. We are a global organization with multicultural staff, clients and stakeholders, so we strive to create a workplace that reflects the communities we serve and where everyone feels empowered to bring their full, authentic selves to work. More work remains, but we are deeply committed to honestly acknowledging and addressing the impacts of race and racism throughout the organization. This work can be uncomfortable and even painful, but we believe that the greatest challenges bear the greatest rewards. | https://jobs.livecareer.com/l/womans-advocacy-case-manager-bethany-christian-services-d2852b83248b151cfd378064cb474900?sid=acea861b-9b1d-4be3-beb8-169e9ea46fbd&q=Implementation+Manager&l=Mount+Joy%2C+Pennsylvania&fid=&score=&resumenm=&isresumesearch=false&resumeguid=&bgclr=4 |
Meggitt is a global engineering group specializing in extreme environment products and smart sub-systems for aerospace, defense and energy markets. We employ over 12,000 people across manufacturing facilities in Asia, Europe, North America, with regional bases in India and the Middle East.
Job Designation
The Cost Accounting Manager leads the cost accounting function; supports the business financial reporting focusing on Company standard cost and inventory valuation across multiple sites. Partners with other management in implementing the company’s policies and full cost transparency. Ensures financial business processes are in compliance with Generally Accepted Accounting Principles (GAAP) and/or International Financial Reporting Standards (IFRS).
Job Core Responsibilities
• Partners with other management to ensure the maximization of the company’s financial performance
• Develops and implements the strategic plan and manages the financial reporting, budgets and internal processes
• Establish and maintain accurate material, labor and overhead standard costs.
• Leads the Cost Accounting section as defined by business needs, multiple locations
• Manages staff selection, performance, development and training processes to ensure team competencies and capabilities to reach the business goals and expectations
• Advises management in interpreting and utilizing managerial accounting information
• Directs the preparation of the budget, financial forecasts with accuracy and report variances
• Develops business processes and accounting policies to maintain and strengthen internal controls
• Support the annual physical inventories at various plant locations and their reconciliations
• Establish cost controlling process to ensure full cost transparency and tracking against financial targets.
• Take decisions and proactive actions to deliver and maximize financial results on Balance sheet, Profit & Loss and Free Cash Flow elements.
• Manage internal and external audits, make sure audit actions are solved on time and bring improvement on site processes in general
• Consistent exercise of independent judgment and discretion in matters of significance
• Regular, consistent and punctual attendance is required. May need to work nights and weekends, variable schedule(s) and additional hours as necessary
• Other responsibilities as assigned
• Travel as required.
Job Specifications
Education: Bachelor Degree in Accounting
Years Experience: 5-10 years of Finance experience in a manufacturing environment; Multinational experience a plus.
Skills
• Knowledge of SAP – Finance and Controlling modules
• Strong Excel skills
• Excellent people management skills and experience.
• Extensive knowledge of cost accounting practices, acquired through related work experience in increasingly complex roles.
• Capable of driving change transformation and strategy execution to achieve specific business results.
• Excellent written and oral communication skills with the ability to negotiate and influence, while exercising sensitivity to the audience.
• Ability to anticipate internal or external business challenges/regulatory issues and make recommendations.
• Capable in directing the resolution of complex or unusual business problems, while applying advanced analytical thought and judgment.
This position requires use of information which is subject to the International Traffic in Arms Regulations (ITAR). All applicants must be U.S. persons within the meaning of ITAR. ITAR defines a U.S. person as a U.S. Citizen, U.S. Permanent Resident (i.e. 'Green Card Holder'), Political Asylee, or Refugee.
Meggitt is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law. | https://careers.meggitt.com/job/Akron-Cost-Accounting-Manager-OH-44306/706270300/ |
BACKGROUND
The present invention generally relates to computing devices and, more particularly, to systems and methods for enhancing security during access and retrieval of data with multi-cloud storage.
Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. Network storage is a computing capability that is typically offered by cloud computing providers. In particular, a user of cloud computing services may store and retrieve data on cloud infrastructure maintained by a cloud computing provider.
SUMMARY
In a first aspect of the invention, there is a method that includes: receiving, by a computing device, data to be stored in a distributed computing environment; compressing, by the computing device, the received data; shredding, by the computing device, the compressed data into a plurality of data chunks; storing, by the computing device, the plurality of data chunks in a plurality of locations in the distributed computing environment; generating, by the computing device, a metadata file including a mapping of each of the plurality of data chunks and a corresponding location of the plurality of locations in the distributed computing environment in which the data chunk is stored; shredding, by the computing device, the metadata file into a plurality of file chunks; and storing, by the computing device, the plurality of file chunks in the distributed computing environment.
In another aspect of the invention, there is a computer program product that includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computing device to cause the computing device to: receive data to be stored in a distributed computing environment; shred the received data into a plurality of data chunks; store the plurality of data chunks in a plurality of locations in the distributed computing environment; generate a metadata file including a mapping of each of the plurality of data chunks and a corresponding location of the plurality of locations in the distributed computing environment in which the data chunk is stored; shred the metadata file into a plurality of file chunks; store the plurality of file chunks in the plurality of locations in the distributed computing environment; and generate a metadata of the metadata file including a mapping of each of the plurality of file chunks and a corresponding location of the plurality of locations in the distributed computing environment in which the file chunk is stored.
In another aspect of the invention, there is a system that includes: a hardware processor, a computer readable memory, and a computer readable storage medium associated with a computing device; program instructions configured to receive data to be stored in a distributed computing environment; program instructions configured to compress the received data; program instructions configured to shred the compressed data into a plurality of data chunks; program instructions configured to store the plurality of data chunks in a plurality of locations in the distributed computing environment; program instructions configured to generate a metadata file including a mapping of each of the plurality of data chunks and a corresponding location of the plurality of locations in the distributed computing environment in which the data chunk is stored; program instructions configured to shred the metadata file into a plurality of file chunks; and program instructions configured to store the plurality of file chunks in the plurality of locations in the distributed computing environment, wherein the program instructions are stored on the computer readable storage medium for execution by the hardware processor via the computer readable memory.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is described in the detailed description which follows, in reference to the noted plurality of drawings by way of non-limiting examples of exemplary embodiments of the present invention.
FIG. 1
depicts a cloud computing node in accordance with aspects of the invention.
FIG. 2
depicts a cloud computing environment in accordance with aspects of the invention.
FIG. 3
depicts abstraction model layers in accordance with aspects of the invention.
FIG. 4
depicts an illustrative environment in accordance with aspects of the invention.
FIG. 5
depicts a block diagram of an exemplary program module in accordance with aspects of the invention.
FIG. 6
depicts an illustrative data flow between components of an exemplary data distribution program module in accordance with aspects of the invention.
FIG. 7
depicts an illustrative data flow in an exemplary data distribution program module in accordance with aspects of the invention.
DETAILED DESCRIPTION
The present invention generally relates to computing devices and, more particularly, to systems and methods for enhancing security during access and retrieval of data with multi-cloud storage. As described herein, aspects of the invention are directed to a system and method that provide for enhanced security while accessing data stored in a multi-cloud environment. In particular, security threats are minimized by distributing data across different vendors in the multi-cloud environment. Aspects of the invention receive encrypted data from a user and distribute the encrypted data across different locations in a distributed computing environment (e.g., different clouds operate by different vendors) that are selected using a hash algorithm. Additionally, metadata is encrypted and distributed across the different locations in the distributed computing environment. Aspects of the invention also replicate the encrypted and distributed data to improve data accessibility.
As more companies utilize distributed computing environments such as cloud computing environments to store sensitive data, security risks have increased. In particular, security incidents have occurred when data is stored with a single cloud provider. In embodiments, these security risks are minimized by distributing stored data across different cloud vendors in a multi-cloud environment. In particular, the risk of the stored data being accessed by an unauthorized user is minimized because the unauthorized user would have to: (1) hack through user-defined security features (e.g., password, etc.), (2) hack through the encryption implementation and other security features provided by each of the different cloud vendors in the multi-cloud environment, and (3) hack through the metadata, which is distributed across the different cloud vendors. Additionally, even if an unauthorized user does obtain a chunk of the stored data from one of the cloud vendors, the chunk of data is unusable on its own because the stored data is distributed across the different vendors in the multi-cloud environment.
Accordingly, embodiments of the invention improve the functioning of a computer by providing improved software and/or hardware that implements systems and methods for providing for enhanced security while accessing data stored in a multi-cloud environment. In particular, embodiments minimize security threats by distributing data across different vendors in the multi-cloud environment. Additionally, embodiments of the invention use systems and techniques that are, by definition, rooted in computer technology (e.g., distributed computing environments, cloud computing environments, multi-cloud environments, replication, etc.) that cannot be performed manually by a person.
The present invention may be a system, a method, and/or a computer program product at any possible technical detail level of integration. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the blocks may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
It is understood in advance that although this disclosure includes a detailed description on cloud computing, implementation of the teachings recited herein are not limited to a cloud computing environment. Rather, embodiments of the present invention are capable of being implemented in conjunction with any other type of computing environment now known or later developed.
Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
Characteristics are as follows:
On-demand self-service: a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider.
Broad network access: capabilities are available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
Resource pooling: the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
Rapid elasticity: capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
Measured service: cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
Service Models are as follows:
Software as a Service (SaaS): the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based e-mail). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS): the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
Infrastructure as a Service (IaaS): the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
Deployment Models are as follows:
Private cloud: the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
Community cloud: the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on-premises or off-premises.
Public cloud: the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Hybrid cloud: the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
A cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability. At the heart of cloud computing is an infrastructure comprising a network of interconnected nodes.
FIG. 1
10
10
Referring now to , a schematic of an example of a cloud computing node is shown. Cloud computing node is only one example of a suitable cloud computing node and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the invention described herein. Regardless, cloud computing node is capable of being implemented and/or performing any of the functionality set forth hereinabove.
10
12
12
In cloud computing node there is a computer system/server , which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.
12
12
Computer system/server may be described in the general context of computer system executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types. Computer system/server may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices.
FIG. 1
12
10
12
16
28
18
28
16
As shown in , computer system/server in cloud computing node is shown in the form of a general-purpose computing device. The components of computer system/server may include, but are not limited to, one or more processors or processing units , a system memory , and a bus that couples various system components including system memory to processor .
18
Bus represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.
12
12
Computer system/server typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server , and it includes both volatile and non-volatile media, removable and non-removable media.
28
30
32
12
34
18
28
System memory can include computer system readable media in the form of volatile memory, such as random access memory (RAM) and/or cache memory . Computer system/server may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only, storage system can be provided for reading from and writing to a nonremovable, non-volatile magnetic media (not shown and typically called a “hard drive”). Although not shown, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided. In such instances, each can be connected to bus by one or more data media interfaces. As will be further depicted and described below, memory may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
40
42
28
42
Program/utility , having a set (at least one) of program modules , may be stored in memory by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment. Program modules generally carry out the functions and/or methodologies of embodiments of the invention as described herein.
12
14
24
12
12
22
12
20
20
12
18
12
Computer system/server may also communicate with one or more external devices such as a keyboard, a pointing device, a display , etc.; one or more devices that enable a user to interact with computer system/server ; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces . Still yet, computer system/server can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter . As depicted, network adapter communicates with the other components of computer system/server via bus . It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server . Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc.
FIG. 2
FIG. 2
50
50
10
54
54
54
54
10
50
54
10
50
Referring now to , illustrative cloud computing environment is depicted. As shown, cloud computing environment comprises one or more cloud computing nodes with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) or cellular telephone A, desktop computer B, laptop computer C, and/or automobile computer system N may communicate. Nodes may communicate with one another. They may be grouped (not shown) physically or virtually, in one or more networks, such as Private, Community, Public, or Hybrid clouds as described hereinabove, or a combination thereof. This allows cloud computing environment to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device. It is understood that the types of computing devices A-N shown in are intended to be illustrative only and that computing nodes and cloud computing environment can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser).
FIG. 3
FIG. 2
FIG. 3
50
Referring now to , a set of functional abstraction layers provided by cloud computing environment () is shown. It should be understood in advance that the components, layers, and functions shown in are intended to be illustrative only and embodiments of the invention are not limited thereto. As depicted, the following layers and corresponding functions are provided:
60
61
62
63
64
65
66
67
68
Hardware and software layer includes hardware and software components. Examples of hardware components include: mainframes ; RISC (Reduced Instruction Set Computer) architecture based servers ; servers ; blade servers ; storage devices ; and networks and networking components . In some embodiments, software components include network application server software and database software .
70
71
72
73
74
75
Virtualization layer provides an abstraction layer from which the following examples of virtual entities may be provided: virtual servers ; virtual storage ; virtual networks , including virtual private networks; virtual applications and operating systems ; and virtual clients .
80
81
82
83
84
85
In one example, management layer may provide the functions described below. Resource provisioning provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment. Metering and Pricing provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses. Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources. User portal provides access to the cloud computing environment for consumers and system administrators. Service level management provides cloud computing resource allocation and management such that required service levels are met. Service Level Agreement (SLA) planning and fulfillment provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.
90
91
92
93
94
95
96
Workloads layer provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping and navigation ; software development and lifecycle management ; virtual classroom education delivery ; data analytics processing ; transaction processing ; and data distribution and aggregation .
FIG. 1
FIGS. 1-3
FIG. 4
40
42
96
42
42
42
42
42
42
410
Referring back to , the program/utility may include one or more program modules that generally carry out the functions and/or methodologies of embodiments of the invention as described herein (e.g., such as the functionality provided by data distribution and aggregation ). Specifically, in embodiments, the program modules receive encrypted data from a user and distribute the encrypted data onto different clouds that are selected using a hash algorithm. In additional embodiments, the program modules encrypt metadata and distribute the encrypted metadata onto different clouds. Other functionalities of the program modules are described further herein such that the program modules are not limited to the functions described above. Moreover, it is noted that some of the modules can be implemented within the infrastructure shown in . For example, the modules may be representative of a cloud computing server as shown in .
FIG. 4
400
400
410
1
410
2
410
450
460
460
410
1
410
2
410
450
410
1
410
2
410
450
n
n
n
depicts an illustrative environment in accordance with aspects of the invention. As shown, the environment comprises a plurality of cloud computing servers -, -, . . . , -and a client computer system that are in communication with each other via a computer network . The computer network may be any suitable network such as a LAN, WAN, or the Internet. In embodiments, the plurality of cloud computing servers -, -, . . . , -and the client computer system are physically collocated. More typically, in other embodiments, the plurality of cloud computing servers -, -, . . . , -and the client computer system are situated in separate physical locations.
400
400
400
400
FIG. 4
FIG. 4
The quantity of devices and/or networks in the environment is not limited to what is shown in . In practice, the environment may include additional devices and/or networks; fewer devices and/or networks; different devices and/or networks; or differently arranged devices and/or networks than illustrated in . Also, in some implementations, one or more of the devices of the environment may perform one or more functions described as being performed by another one or more of the devices of the environment .
410
1
410
2
410
400
50
10
410
1
410
2
410
61
62
63
64
65
66
71
72
73
74
75
410
1
410
2
410
n
n
n
FIG. 2
FIG. 3
In embodiments, the plurality of cloud computing servers -, -, . . . , -in the environment are situated in the cloud computing environment and are one or more of the nodes shown in . The plurality of cloud computing servers -, -, . . . , -are implemented as hardware and/or software using components such as mainframes ; RISC (Reduced Instruction Set Computer) architecture based servers ; servers ; blade servers ; storage devices ; networks and networking components ; virtual servers ; virtual storage ; virtual networks , including virtual private networks; virtual applications and operating systems ; and virtual clients shown in . In embodiments, each of the plurality of cloud computing servers -, -, . . . , -are associated with a different vendor (e.g., a different cloud computing provider).
410
1
410
2
410
420
430
440
42
410
1
410
2
410
420
430
n
n
FIG. 1
In embodiments, the each of the plurality of cloud computing servers -, -, . . . , -includes a data distribution program module , a data aggregation program module , and data storage , each of which includes hardware and/or software and is one or more of the program modules shown in . In another embodiment, some of the plurality of cloud computing servers -, -, . . . , -omit the data distribution program module and/or the data aggregation program module .
FIG. 4
420
420
Still referring to , in embodiments, the data distribution program module includes program instructions for receiving encrypted data from a user and distributing the encrypted data onto different clouds that are selected using a hash algorithm. Additionally, the data distribution program module includes program instructions for encrypting metadata and distributing the encrypted metadata onto different clouds.
430
420
430
In embodiments, the data aggregation program module includes program instructions for reconstructing metadata that was encrypted and distributed onto different clouds by the data distribution program module . Additionally, the data aggregation program module includes program instructions for reconstructing the original encrypted data using the metadata and sending the reconstructed data to a user.
FIG. 4
FIG. 3
440
410
1
410
2
410
440
65
410
1
410
2
410
440
10
n
n
Still referring to , in embodiments, the data storage receives and stores data in a storage resource provided by a cloud computing provider associated with the particular cloud computing server of the plurality of cloud computing servers -, -, . . . , -on which the data storage is located. The storage resource is any type of data storage device or system (e.g., storage device of ) and is located on the cloud computing server -, -, . . . , -on which the data storage is located or on another cloud computing node or other location associated with the cloud computing provider.
450
400
12
450
61
62
63
64
65
66
71
72
73
74
75
450
FIG. 1
FIG. 3
In embodiments, the client computer system in the environment includes one or more components of the computer system/server (as shown in ). Alternatively, the client computer system is implemented as hardware and/or software using components such as mainframes ; RISC (Reduced Instruction Set Computer) architecture based servers ; servers ; blade servers ; storage devices ; networks and networking components ; virtual servers ; virtual storage ; virtual networks , including virtual private networks; virtual applications and operating systems ; and virtual clients shown in . In other embodiments, the client computer system is a desktop computer, a laptop computer, a mobile device such as a cellular phone, tablet, personal digital assistant (PDA), or any other computing device.
FIG. 5
FIG. 4
FIG. 6
FIG. 1
FIG. 5
420
410
1
410
2
410
420
420
500
510
520
530
540
550
560
42
420
n
depicts a block diagram of an exemplary data distribution program module in the cloud computing server -, -, . . . , -(of ) in accordance with aspects of the invention, and depicts an illustrative data flow between the components of the data distribution program module in accordance with aspects of the invention. In embodiments, the data distribution program module includes user registration , data compressor , data shredder , data chunk storer , metadata file generator , metadata of the metadata file generator , and replicator , each of which comprises one or more program modules as described with respect to . In embodiments, the data distribution program module may include additional or fewer components than those shown in . In embodiments, separate components may be integrated into a single computing component or module. Additionally, or alternatively, a single component may be implemented as multiple computing components or modules.
420
450
500
FIG. 5
FIG. 6
In embodiments, in response to the data distribution program module of receiving, via the client computer system , a request from a user (e.g., a customer) to store data in a multi-cloud environment as illustrated in , the user registration registers the user in a user registration database. In aspects, the user registration database is an in-memory database supporting in-memory key-value storage.
500
1
420
500
1
1
550
In particular, the user registration assigns a unique customer ID (CID) to the user (e.g., CID-). In embodiments, the CID is only known to the data distribution program module . The user registration then registers the user in the user registration database by storing the CID assigned to the user as a key along with an encryption key (EK) of the user (e.g., EK-), an encoded value (EN) of the user (e.g., EN-), and a compression/decompression key as values associated with the key. As discussed in more detail below, the EK is used to encrypt the metadata of the metadata file that is generated by the metadata of the metadata file generator , and the EN provides the path to the metadata of the metadata file when decoded.
420
510
450
510
FIG. 5
FIG. 6
In embodiments, subsequent to the data distribution program module receiving the request from the user to store data in a multi-cloud environment and registering the user in the user registration database, the data compressor of receives encrypted data from the user via the client computer system , as illustrated in . The encryption key for the data (as well as the decryption key for the data) are only known to the user who provides the encrypted data to the data compressor .
510
500
510
The data compressor compresses the received encrypted data using the compression key stored in the user registration database by the user registration . By compressing the encrypted data received from the user, the data compressor improves the efficiency of space utilization on the cloud providers in the multi-cloud environment.
520
510
520
1
2
FIG. 5
FIG. 6
In embodiments, the data shredder of receives the compressed encrypted data from the data compressor and performs data shredding, as illustrated in . In particular, the data shredder divides the received compressed encrypted data into a plurality of data chunks DC-, DC-, . . . , DC-n using a binary shredding method.
520
520
Any number of data chunks may be used. For example, in embodiments, the data shredder divides the compressed encrypted data into a number of data chunks that is equal to the number of cloud providers in the multi-cloud environment. Alternatively, in other embodiments, the data shredder divides the compressed encrypted data into a number of data chunks that is greater or lesser than the number of cloud providers in the multi-cloud environment. The number of data chunks may be selected based upon security and performance considerations, with more data chunks leading to improved security but worse performance.
530
1
2
520
1
2
1
2
3
4
530
1
2
530
FIG. 5
FIG. 6
In embodiments, the data chunk storer of receives the plurality of data chunks DC-, DC-, . . . , DC-n from the data shredder , as illustrated in , and applies a hashing algorithm on each of the data chunks DC-, DC-, . . . , DC-n to generate a numeric value in a range that corresponds to the number of available storage locations (e.g., a number of cloud providers) in the multi-cloud environment. For example, if the multi-cloud environment includes four different cloud providers CS-, CS-, CS-, CS- (and therefore four different storage locations), then the hashing algorithm used by the data chunk storer generates a numeric value in the range of 1 to 4 when applied to each of the data chunks DC-, DC-, . . . , DC-n. In embodiments, the data chunk storer determines a number of storage locations to use in the multi-cloud environment based upon security and performance considerations, with more storage locations (i.e., more cloud providers) leading to improved security but potentially at the expense of performance.
530
1
2
520
1
530
1
4
The data chunk storer then takes each of the plurality of data chunks DC-, DC-, . . . , DC-n received from the data shredder and stores each data chunk in the cloud service provider corresponding to the numeric value output by the hashing algorithm in response to receiving the data chunk as a key. For example, in the case where the data chunk DC- is input as the key to the hash function, the hash function may output the value of “4.” In response to the has function outputting the value of “4,” the data chunk storer stores the data chunk DC- in a fourth cloud service provider (e.g., CS-).
530
1
2
520
According to another embodiment, instead of using the hash function, the data chunk storer uses range partitioning to determine a storage location of each of the plurality of data chunks DC-, DC-, . . . , DC-n received from the data shredder .
530
1
2
1
2
540
In embodiments, the data chunk storer maintains a mapping between each data chunk DC-, DC-, . . . , DC-n and the corresponding cloud service provider CS-, CS-, . . . , CS-n, where the data chunk is stored. This mapping is stored by the metadata file generator , as discussed below.
540
1
2
520
540
500
1
1
2
1
2
530
540
1
2
1
2
FIG. 5
In embodiments, the metadata file generator of generates a metadata file that includes information for retrieving and reassembling the plurality of data chunks DC-, DC-, . . . , DC-n generated by the data shredder . In particular, the metadata file generator generates a metadata file that includes the unique customer ID assigned by the user registration (e.g., CID-) as well as the mapping of the data chunks DC-, DC-, . . . , DC-n to the corresponding cloud service providers CS-, CS-, . . . , CS-n, where the data chunks are stored, maintained by the data chunk storer . In other words, the metadata file generated by the metadata file generator includes information regarding which data chunk of the data chunks DC-, DC-, . . . , DC-n is stored in which cloud service provider CS-, CS-, . . . , CS-n.
540
1
2
1
2
The metadata file generated by the metadata file generator also includes information regarding a replication mapping. In particular, the replication mapping indicates which data chunk of the data chunks DC-, DC-, . . . , DC-n is replicated on which cloud service provider CS-, CS-, . . . , CS-n.
540
540
2
540
510
510
520
520
1
2
FIG. 6
FIG. 6
After the metadata file generator generates the metadata file, the metadata file generator encrypts the metadata file with an encryption key (e.g., EK-). Next, as illustrated in , the metadata file generator passes the encrypted metadata file to the data compressor , which compresses the encrypted metadata file. The data compressor then passes the compressed metadata file to the data shredder , as illustrated in , and the data shredder shreds the compressed metadata file into metadata file chunks FC-, FC-, . . . , FC-n.
520
530
530
1
2
520
FIG. 6
The metadata file chunks generated by the data shredder are then passed to the data chunk storer , as illustrated in , and the data chunk storer takes each of the plurality of metadata file chunks FC-, FC-, . . . , FC-n received from the data shredder and stores each metadata file chunk in the cloud service provider corresponding to the numeric value output by the hashing algorithm in response to receiving the metadata file chunk as a key.
1
530
1
2
510
For example, in the case where the metadata file chunk FC- is input as the key to the hash function, the hash function may output the value of “2.” In response to the has function outputting the value of “2,” the data chunk storer stores the metadata file chunk FC- in a second cloud service provider (e.g., CS-). Accordingly, additional security is provided by shredding and distributing the metadata file, which is necessary to reconstruct the encrypted data received from the user by the data compressor .
530
1
2
1
2
550
In embodiments, the data chunk storer maintains a mapping of the file chunks FC-, FC-, . . . , FC-n to the corresponding cloud service providers CS-, CS-, . . . , CS-n, where the file chunks are stored. This mapping is stored by the metadata of the metadata file generator , as discussed below.
FIG. 5
550
540
540
1
500
2
540
2
1
2
1
2
Still referring to , the metadata of the metadata file generator generates a metadata of the metadata file that includes information for retrieving the metadata file generated by the metadata file generator . In particular, the metadata of the metadata file includes information used to reconstruct the metadata file generated by the metadata file generator . Specifically, the metadata of the metadata file includes information about a CID assigned to the user (e.g., CID-) by the user registration , the encryption key (e.g., EK-) used by the metadata file generator to encrypt the metadata file, the decryption key (e.g., DK-) used to decrypt the metadata file, and the mapping between the file chunks FC-, FC-, . . . , FC-n of the metadata and the cloud service providers CS-, CS-, . . . , CS-n where the file chunks are stored.
550
1
2
1
2
The metadata of the metadata file generated by the metadata of the metadata file generator also includes information regarding a replication mapping. In particular, the replication mapping indicates which file chunk of the file chunks FC-, FC-, . . . , FC-n is replicated on which cloud service provider CS-, CS-, . . . , CS-n.
550
1
500
550
410
1
410
2
410
550
1
550
500
n
The metadata of the metadata file generated by the metadata of the metadata file generator is encrypted using an encryption key (e.g., EK-) which is stored in the user registration database by the user registration . The metadata of the metadata file generator then stores the encrypted metadata of the metadata file at a location in or accessible to the cloud computing server -, -, . . . , -. Path information indicating this storage location of the metadata of the metadata file generated by the metadata of the metadata file generator is encoded to generate an encoded value (e.g., EN-) which is passed from the metadata of the metadata file generator to the user registration , which stores the encoded value in the user registration database.
FIG. 5
FIG. 6
560
1
2
1
2
1
2
530
1
560
560
1
3
2
1
3
4
4
2
Still referring to , the replicator maintains a backup of the data chunks DC-, DC-, . . . , DC-n and the file chunks FC-, FC-, . . . , FC-n so that they can be recovered if any one of the cloud service provider CS-, CS-, . . . , CS-n goes down or crashes. For example, the data stored by the data chunk storer in CS- is passed to the replicator , as illustrated in , and the replicator replicates the data from CS- in CS-. Additionally, the data stored in CS- is replicated in CS-, the data stored in CS is replicated in CS-, and the data stored in CS- is replicated in CS-.
FIG. 4
FIG. 4
FIG. 5
FIG. 7
FIG. 7
430
410
1
410
2
410
420
420
430
450
1
1
n
Referring back to , the data aggregation program module in the cloud computing server -, -, . . . , -(of ) provides for the retrieval and reconstruction of data stored by a user using the data distribution program module , as described above with respect to , and depicts an illustrative data flow in the data distribution program module in accordance with aspects of the invention. In particular, the data aggregation program module , in response to a request from a user, via the client computer system , to retrieve data, queries the user registration database using the CID assigned to the user (e.g., CID-) to retrieve the encoded value of the user (e.g., EN-), as illustrated in .
1
430
550
430
1
1
FIG. 7
Next, the encoded value of the user (e.g., EN-) is decoded by the data aggregation program module to determine the path information for the metadata of the metadata file generated by the metadata of the metadata file generator . After determining the path information, the data aggregation program module then retrieves the metadata of the metadata file and decrypts it using the encryption key (e.g., EK-) associated with the user, as illustrated in . (Note that the same key, EK-, may be used for both encryption and decryption.)
430
430
1
2
1
2
FIG. 7
After decrypting the metadata of the metadata file, the data aggregation program module obtains the file chunk to cloud service provider mapping list from the metadata of the metadata file. Using the file chunk to cloud service provider mapping list, the data aggregation program module retrieves the file chunks FC-, FC-, . . . , FC-n which are distributed across the cloud service provider CS-, CS-, . . . , CS-n, as illustrated in .
430
1
2
1
2
2
540
FIG. 7
Next, the data aggregation program module decompresses the retrieved file chunks FC-, FC-, . . . , FC-n and then decrypts the file chunks FC-, FC-, . . . , FC-n using the decryption key (e.g., DK-) stored in the metadata of the metadata file to regenerate the metadata file originally generated by the metadata file generator , as illustrated in .
430
430
430
1
2
1
2
FIG. 7
Once the metadata file is regenerated by the data aggregation program module , the data aggregation program module retrieves the data chunk to cloud service provider mapping list from the metadata file. Using the data chunk to cloud service provider mapping list, the data aggregation program module retrieves the data chunks DC-, DC-, . . . , DC-n which are distributed across the cloud service provider CS-, CS-, . . . , CS-n, as illustrated in .
430
1
2
430
450
FIG. 7
FIG. 7
Finally, the data aggregation program module builds the compressed data from the retrieved data chunks DC-, DC-, . . . , DC-n, as illustrated in . The data aggregation program module then decompresses the data and sends the decompressed, encrypted data back to the user who requested to retrieve the data, via the client computer system , as illustrated in . The user then decrypts the decompressed, encrypted data using a decryption key for the data that is only known to the user.
In embodiments, a service provider could offer to perform the processes described herein. In this case, the service provider can create, maintain, deploy, support, etc., the computer infrastructure that performs the process steps of the invention for one or more customers. These customers may be, for example, any business that uses cloud computing technology. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
12
12
FIG. 1
FIG. 1
In still additional embodiments, the invention provides a computer-implemented method, via a network. In this case, a computer infrastructure, such as computer system/server (), can be provided and one or more systems for performing the processes of the invention can be obtained (e.g., created, purchased, used, modified, etc.) and deployed to the computer infrastructure. To this extent, the deployment of a system can comprise one or more of: (1) installing program code on a computing device, such as computer system/server (as shown in ), from a computer-readable medium; (2) adding one or more computing devices to the computer infrastructure; and (3) incorporating and/or modifying one or more existing systems of the computer infrastructure to enable the computer infrastructure to perform the processes of the invention.
The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. | |
Various autoimmune diseases have association with each other but it is very rare to see multiple autoimmune diseases in one patient. Presence of more than two autoimmune diseases in one patient is known as multiple autoimmune syndrome (MAS).1 We report the case of an 11 years old girl who presented with history of swelling in front of the neck along with constipation, anorexia, weight gain and increasing pallor over a period of six months. Additionally she had an episodic history of joint pains and abdominal pain with no specific relation to diet, time, other gastrointestinal or genitourinary symptom. Hypothyroid goiter (Autoimmune thyroiditis, Hashimoto's thyroidits) was diagnosed by raised thyroid stimulating hormone (TSH), low T4 and presence of thyroid specific antibodies in blood. Patient was discharged on tablet Levothyroxine to which she responded well with reduction in size of the swelling and relief of the symptoms except for the joint pains and abdominal pain. To evaluate the persistent symptoms she was investigated further for other autoimmune diseases and was diagnosed to be having systemic lupus erythematosus (SLE) and Coeliac disease also. The final diagnosis was multiple autoimmune syndrome. | https://ucdavis.pure.elsevier.com/en/publications/multiple-autoimmune-syndrome-hashimotos-thyroiditis-coeliac-disea |
Offering prototype conditions for temporary and emergency shelter, Domestic Sections conjoins the thematic of storage and mobility endemic to American culture with the language of “flexibility” often used to describe the spatial conditions of the contemporary sub-urban home. Anchored to trailers that provide a movable support base, units are structured by an armature of parallel walls that enframe spaces of storage, service, passage, and study.
Sections through the armature also reveal the existence of individual storage elements / dividers that track between the armature and open interior space. Positioned by the inhabitant, these units unfold to further define interior sites based on the actions of the individual. As freestanding movable stations, they become active agents in the negotiation
of public and private territories within the interior realm. | http://conwayandschulte.com/domestic_01.html |
+St. Henry II+
In treating the recent rash of papal bashing by the anti-Fatima crowd, the seriousness of appreciating what the Roman Pontiffs teach and how these various teachings must not be taken as isolated and disjointed proclamations was once more brought to the forefront. The remedy for this is the practice of integralism as emphasized by Msgr. Fenton, something this author has stressed and attempted to practice. Whether this has always been accomplished remains to be seen, but at least the effort has been made. Gallicanism is a subject that has been treated often on this blogspot. Likewise the actual sort of jurisdiction possessed by bishops, how it is possessed, and how it can and cannot be exercised. Because questions have been raised regarding these topics, their actual interrelation needs to be explained.
What is Gallicanism?
Gallicanism is an error that surfaced at the time of the Western Schism. There were two types of Gallicanism: political (favoring monarchical interests in France) and ecclesiastical. It was confined almost entirely to France when it first made its appearance, but later spread to England and Germany. As M.L. Cozens, in his 1928 A Handbook of Heresies, explains: “The Gallican school held 1) that the Pope’s definitions were not infallible in themselves but only after acceptance by the Universal Church and 2) that a general council’s authority was above that of a Pope. Some French ecclesiastics also claimed that the king had the right to forbid the publication in France of papal bulls that no act done by the king’s agent on his authority could involve excommunication and that the king could prevent any bishops recourse to Rome even if the Pope commanded his presence.”
One of Gallicanism’s most enthusiastic proponents during the Western Schism era, the theologian Jean Gerson taught: “The decision of the Pope alone, in matters which are of faith, does not as such bind (anyone) to believe; Bishops in the primitive Church were of the same power as the Pope; The Roman Church, the head of which is believed to be the Pope …may err, and deceive and be deceived, and be in schism and heresy, and fail to exist.” (Henry Cardinal Manning, The Ecumenical Council and the infallibility of the Roman Pontiff: a Letter to the Clergy, 1869). And here is recognized the very same teachings which the Anglicans and Luther used to justify their separation from Rome at the time of the Protestant Reformation.
This we find also from Cuthbert Butler’s summary of Gallicanist teachings in his work The Vatican Council, Vol. 1, 1930: “As the common father of Christians, the Pope can make new laws and propose them to the Church. But they have not the force of general laws except by the acceptance of his colleagues in the episcopate. The bishops are bishops by divine right; THEY HOLD THEIR POWER IMMEDIATELY FROM JESUS CHRIST and not from the Sovereign Pontiff WHOSE EQUALS THEY ARE except in the primacy which was established by Christ only to show forth unity (Cyprian). They judge with him in matters of faith and of discipline but their jurisdiction is limited by their diocese, whereas that of the Pope has no limits other than those of the Christian world” (pg. 29). So this demonstrates that the Gallicanists did indeed hold the theory of immediate jurisdiction, and because they held all the bishops in council superior to the pope, they even held themselves, AS A BODY, above him.
Gallicanism, the reformers and jurisdiction
During the Protestant Reformation, the ideas promoted by the Gallicanists were put into practice by Protestant ministers, many of them still possessing valid Orders. They declared their independence from Rome and, as St. Francis de Sales explains mediate and immediate mission or jurisdiction in his The Catholic Controversy (Ch. 2-3), a work sent to Catholics deceived by the Calvinists. He writes:
“To be legates and ambassadors… of Christ …they should have been sent; they should have had letters of credit from him whom they boasted of being sent by. Now you cannot be ignorant that they neither had nor have in any way at all this mission. For if our Lord had sent them it would have been either mediately or immediately. We say mission is given mediately when we are sent by one who has from God the power of sending according to the order which he has appointed in his Church… Immediate mission is when God himself commands and gives a charge without the interposition of the ordinary authority which he has placed in the prelates and pastors of the church such as Saint Peter and the apostles were sent receiving, from our Lord’s own mouth this commandment… But neither in the one or in the other way have your ministers any mission. How then have they undertaken to preach, how shall they preach, says the apostle, unless they be sent?“
While Traditionalists and others seem to distinguish mission from jurisdiction, theologians do not. Devivier and Sasa, in the index to their work Christian Apologetics, lists mission, canonical, which then references the reader to page 589 “on the power of jurisdiction… conferred by canonical institution.” One would think that a Doctor of the Church would be trusted to know what heresy is when he sees it and thendedicates 13 chapters to explaining it, however some question his testimony as insufficient.
The Protestants differed from the Gallicanists only in the fact that they decided to work outside the Church for reform rather than from within. The Gallican articles themselves were not addressed by the popes until 1690, when Alexander VIII declared them null, void and invalid (DZ 1322). Pope Pius VI later declared them rash and scandalous in Auctorem Fidei in 1794. (Manning in his Civil Allegiance states that the definition of infallibility “…by retrospective action makes all Pontifical acts infallible… such as Unam Sanctam, Unigenitus, and the bull Auctorem Fidei and by prospective action will make all similar acts in future binding upon the conscience.”)
To the above errors should be added those of Febronianism, first advocated by the German bishop of Trier, Johann Nickolaus von Hontheim, (using the pseudonym Febronius), in 1763. Hontheim taught that Christ did not give “…the power of the keys to Peter but to the whole Church; that the pope’s power, as head of the whole Church… is of an administrative and unifying character, rather than a power of jurisdiction;” that the appointment of bishops and the establishment of dioceses should be left to provincial synods and metropolitans and even the determination of matters of faith should be left to these same authorities. “Hontheim advanced along the same lines, in spite of many inconsistencies, to a radicalism far outstripping traditional Gallicanism” (Catholic Encyclopedia). In 1786, Pope Pius VI wrote Super Soliditate, condemning Febronianism, Regalism and Josephism:
“All the more must be deplored that blind and rash temerity of the man [Eybel] who was eager to renew in his unfortunate book errors which had been condemned by so many decrees; who has said and insinuated indiscriminately by many ambiguities that every Bishop no less than the Pope was called by God to govern the Church and was endowed with no less power; that Christ gave the same power Himself to all the apostles and that whatever some people believe is obtained and granted only by the pope, that very thing, whether it depends on consecration or ecclesiastical jurisdiction, can be obtained just as well from any bishop …” (DZ 1500). Some of these propositions were condemned as leading to schism and schismatic, also leading to heresy and heretical. Despite the fact that it also was condemned by so many other decrees, as Pope Pius VI notes, it was still being taught as an acceptable opinion because the brief did not condemn everything Eybel taught as heresy. Its propagators then used this as an excuse to escape censure, allowing it to continue to be taught in some form or other.
The Vatican Council and Gallicanism
And so it remained until the mid-1800s and the plans to convene the Vatican Council. During the Council preparations Cardinal Manning, then only an archbishop, worked within a commission comprised of five cardinal presidents, eight bishops, a secretary and dozens of other members of the clergy. This commission drew up a list of reasons why it was opportune to call the council, and enumerated on that list were the following, found in Manning’s The Vatican Council Decrees and their Bearing on Civil Allegiance (1875):
“5. Now, if the next General Council meet and separate without taking any notice of this denial [of infallibility], one of two inferences may perhaps be drawn. It may be said that Gallicanism has obtained its place among tolerated opinions; or, at least, that it may be held with impunity.
“15. Because the full and final declaration of the divine authority of the Head of the Church is needed to exclude from the minds of pastors and faithful the political influences which have generated Gallicanism, Imperialism, Regalism, and Nationalism, the perennial sources of error, contention, and schism.
“For these, and for many more reasons which it is impossible now to detail, many believe that a definition or declaration which would terminate this long and pernicious question would be opportune; and that it might forever be set at rest by the condemnation of the propositions following:
“1. That the decrees of the Roman Pontiffs in matter of faith and morals do not oblige the con- science unless they be made in a General Council, or before they obtain at least the tacit consent of the Church.
“2. That the Roman Pontiff, when he speaks in matters of faith and morals, as the universal Doctor and Teacher of the Church, may err.
And here we see the very errors expressed above by Gerson, who, Manning relates, later “…himself confessed that he was maintaining an opinion which was so much at variance with the Tradition of the Church before the Council of Constance that anyone who held it would be branded as a heretic.” Cardinal Manning then explains in his The Ecumenical Council and the infallibility of the Roman Pontiff, a Letter to the Clergy, 1869, (written shortly before the opening of the Vatican Council):
“English nationalism became the Anglican schism. French nationalism checked itself at the Gallican Articles. The Anglican Reformation has no perils for the Catholic Church; it is external to it, in open heresy and schism. Gallicanism is within its unity and is neither schism nor heresy. It is a very seductive form of national Catholicism, which, without breaking unity, or positively violating faith, soothes the pride to which all great nations are tempted, and encourages the civil power to patronise the local Church by a tutelage fatal to its liberty. It is therefore certain that Gallicanism is more dangerous to Catholics than Anglicanism. The latter is a plague of which we are not susceptible; the former is a disease which may easily be taken.
“Gallicanism has caused a divergence, which Protestants think or pretend to be a contradiction in faith. The combined action of Gallicanism within the Church and of Protestants without it, has given to this erroneous opinion a notoriety in the last two centuries, and especially in France and England, which takes it out of the category of imperfect and innocuous errors which may be left as a vapor to be absorbed. It has inscribed itself in the history of the Church, and will live on until, by the Church, it is finally condemned.” Manning would later remark in his work on Civil Allegiance: “Gallicanism was the only formal interruption of the universal belief of the Church in the Infallibility of its Head. The Vatican Council extinguished this modern error.”
Gallicanism condemned
So as with many other teachings proposed by those appearing to hold a tenable opinion within the Church, prior to its condemnation Gallicanism was condemned only as an error, or so the proponents of this position claimed. But once the Vatican Council concluded, its teachings could only be classified as heresy, which Gerson rightly agrees with above. Manning explains that a century before the Gallican Articles appeared, Gallicanist supporters debated this opinion at the Council of Trent, asking the Council to decide whether bishops receive their powers directly from Our Lord, or rather indirectly, from Christ but only through the Roman Pontiff. The Council refused to take up the question, and this question remained unsettled for over 300 years. Finally it was answered by the Vatican Council in 1869-70:
“I will give to thee the keys of the kingdom of heaven. And whatsoever thou shalt bind upon earth, it shall be bound also in heaven; and whatsoever thou shalt loose on earth, it shall be loosed also in heaven.” And it was upon Simon alone that Jesus, after His resurrection, bestowed the jurisdiction of Chief Pastor and Ruler over all His fold in the words, “Feed My lambs, feed My sheep.” At open variance with this clear doctrine of Holy Scripture, as it has ever been understood by the Catholic Church, are the perverse opinions of those who, while they distort the form of government established by Christ the Lord in His Church, deny that Peter in his simple person preferably to all the other Apostles, whether taken separately or together, was endowed by Christ with a true and proper primacy of jurisdiction; or of those who assert that the same primacy was not bestowed IMMEDIATELY AND DIRECTLY upon Blessed Peter himself, BUT UPON THE CHURCH, and through the Church [clergy and faithful] on Peter as Her minister.
(Canon) If anyone, therefore, shall say that Blessed Peter the Apostle was not appointed the Prince of the Apostles and the visible head of the whole Church Militant, or that the same directly and immediately received from the same our Lord Jesus Christ a primacy of honour only, and not of true and proper jurisdiction; let him be anathema” (DZ 1822, condemnation of Gallicanism).
As Manning demonstrated above, Protestantism worked hand in hand with Gallicanism, and of the two, Gallicanism was by far the greater worry. The entire thrust of this united effort was to either eliminate the papacy or reduce the popes to mere ministerial heads, with the bishops as equals; the Vatican Council ended that. But then came Liberal Catholicism and Modernism, and as Msgr. Fenton explains, “Liberal Catholicism shares with Jansenism and with Modernism (and this last was preeminently an expression of the liberal Catholic teaching itself) the unhappy distinction of being a movement whose leaders fought to keep active within the Church after its principles had been directly condemned by competent ecclesiastical authority.
“Ultimately theological minimalism was a device employed by liberal Catholics to make the rejection of authoritative papal teaching on any point appear to be good Catholic practice. Sometimes it took the crass form of a claim that Catholics are obligated to accept and to hold only those things which had been defined by the explicit decrees of the ecumenical councils or of the Holy See. This attitude…was condemned by Pope Pius IX in his letter Tuas Libenter (DZ 1683). Another crass form of minimalism was the opposition to the Vatican Council definition of papal infallibility. The men who expressed that opposition sometimes claimed to hold the doctrine of papal infallibility as a theological opinion but they showed a furious hostility to the definition which proposed that doctrine as a dogma of divine and Catholic faith” (“The Components of Liberal Catholicism,” The American Ecclesiastical Review, July, 1958).
This is what Pope Pius XII faced during his pontificate. And in order to make certain all the vestiges of Gallicanism, and Liberalism then manifesting as Modernism, were entirely wiped out, he delivered his unwelcome decision on immediate jurisdiction.
Episcopal jurisdiction decision ends Gallicanist contentions
In writing his encyclicals Mystici Corporis Christi in 1943 and Ad Sinarum Gentum in 1954, Pope Pius XII settled the final remaining question not answered by the Council of Trent — the last nail in the coffin of Gallicanism — by teaching what was already held as the common opinion by the theological schools:
“Bishops must be considered as the more illustrious members of the Universal Church, for they are united by a very special bond to the divine Head of the whole Body and so are rightly called ‘principal parts of the members of the Lord’; moreover, as far as his own diocese is concerned, each one as a true Shepherd feeds the flock entrusted to him and rules it in the name of Christ. Yet in exercising this office they are not altogether independent but are subordinate to the lawful authority of the Roman Pontiff, although enjoying the ordinary power of jurisdiction which they receive directly from the same Supreme Pontiff” (Mystici Corporis Christi). And in Ad Sinarum Gentum: “But the power of jurisdiction, which is conferred upon the Supreme Pontiff directly by divine rights, flows to the Bishops by the same right, but only through the Successor of St. Peter, to whom not only the simple faithful, but even all the Bishops must be constantly subject, and to whom they must be bound by obedience and with the bond of unity.”
This should have settled the question, but the minimalists then existing in the Church challenged the fact that infallible statements could be issued in an encyclical. Pope Pius XII answered this question by writing Humani Generis (1950),teaching that anything entered into the Acta Apostolica Sedis is to be considered as issuing from the ordinary magisterium.
“Nor must it be thought that what is expounded in Encyclical Letters does not of itself demand consent, since in writing such Letters the Popes do not exercise the supreme power of their Teaching Authority. For these matters are taught with the ordinary teaching authority, of which it is true to say: “He who hears you Hears Me,”: and generally what is expounded and inculcated in Encyclical Letters already for other reasons appertains to Catholic doctrine. But if the Supreme Pontiffs in their official documents purposely pass judgment on a matter up to that time under dispute, it is obvious that that matter, according to the mind and will of the Pontiffs, cannot be any longer considered a question open to discussion among theologians.”
And this only confirmed what Msgr. Fenton had already written in 1949: “Where a question of grave moment has been disputed among Catholics, and when the Holy Father intervenes to settle this question once and for all, there is clearly a definition, a decision which all Catholics are bound to accept always as true, even though no solemn terminology be employed.” (“The Doctrinal Authority of Papal Encyclicals,” Sept. 1949, AER).
In this same article, Msgr. Fenton also noted: “The private theologian is obligated and privileged to study these documents, to arrive at an understanding of what the Holy Father actually teaches, and then to aid in the task of bringing this body of truth to the people. The Holy Father, however, not the private theologian, remains the doctrinal authority. The theologian is expected to bring out the content of the Pope’s actual teaching, not to subject that teaching to the type of criticism he would have a right to impose on the writings of another private theologian.” As Revs. Pohle-Preuss write in The Sacraments, Vol. IV: “It matters not what the private opinions of…theologians [are]. It is not the private opinions of theologians but the official decisions of the Church by which we must be guided.” Yet always, Traditionalists favor the opinions of these theologians even over the clear teaching of the Church.
Minimalism and immediate jurisdiction
A friend recently shared the following quote from Cardinal Billot with me, and while it was not objectionable at the time Billot wrote it, prior to the issuance of Mystici Corporis, it is not something that remains true following Pius XII’s definition on the origin of episcopal jurisdiction.
“Whether episcopal jurisdiction is immediately from God, or immediately from the Roman Pontiff, was bitterly disputed in the Council of Trent, and nothing was defined at that time. In the Vatican Council, the question was not even proposed, chiefly because in practice, it is nearly indifferent, whether one or the other opinion is accepted. For even those theologians who hold that episcopal jurisdiction is derived immediately from God, also say that without a doubt it is conferred by God with a true and full dependency on the Supreme Pontiff.“
Obviously, in the face of Modernist inroads, Pope Pius XII did not think this was a matter “indifferent” in practice, and a survey of his related works on the subject demonstrates this. Cardinal Billot could scarcely know what Pope Pius XII would have to face during his pontificate. He also may have been hoodwinked by Modernists wishing to de-emphasize the importance of this question and leave it unanswered, for we know they only showed their true colors toward the very end. Bishops ruling 30 years later certainly did not reflect what Billot thought these theologians believed, as later proven by the false Vatican 2 council.
And most importantly, despite his comment above, Billot himself seemed to hold the common opinion, cited by Alfredo Cardinal Ottaviani, that the jurisdictional power of bishops comes only through the Pope: “For authority [in the Church] comes directly from God through Christ, and from Christ to his Vicar, and from the Vicar of Christ it descends to the remaining prelates without the intervention of any other physical or moral person” (Louis Cardinal Billot, S.J., Tractatus De Ecclesia Christi (Rome: Aedes Universitatis Gregorianae, 1927), Vol. 1. p. 524). This information is necessary to place his first statement in its proper perspective, for without it one could be led to believe Billot was either undecided or held the opposite opinion.
Cardinal Billot, then, would have considered the matter settled with Pope Pius XII’s definition, and would have adjusted his thinking on its “indifference” accordingly, just as Cardinal Ottaviani did. Humani generis settled the question on encyclicals and papal decisions made within them, forever closing any further discussion of his decision on the true nature of how bishops receive their powers: from Christ, yes, but only through the Roman Pontiff. Msgr. Fenton, in his articles on Doctrinal Authority, also Infallibility states:
“Thus it would seem that some teachings whose main claim to acceptance on the part of Catholics is to be found in the fact that they are stated in papal encyclicals would actually demand an assent higher than that which must be accorded to the content of the Church’s authentic but non-infallible magisterium. Such truths would demand the kind of assent usually designated in theology under the title of FIDES ECCLESIASTICA… (Doctrinal Authority in the Encyclicals, Pt. II, AER, 1949). “If that supreme power is exercised within the field of dogma itself, that is, by declaring that some particular truth has been revealed by God and is to be accepted by all men as a part of revelation,” Fenton continues, “then the assent called for by the definition is that of divine faith itself. If on the other hand, the Holy Father, using his supreme apostolic authority, does not propose his teaching as a dogma, but merely as completely certain, then the faithful are bound to accept his teaching as absolutely certain. They are, in either case, obliged in conscience to give an unconditional and absolutely irrevocable assent to any proposition defined in this way” (“Infallibility in the Encyclicals,” (AER, March 1953). And Ottaviani and Fenton both agree the teaching on the jurisdiction of bishops is certain. Humani Generis closes all discussion on such issues.
Yet, again, some argue it would be only temerarious to question this teaching and would not involve loss of membership in the Church, as would denying an article contrary to ecclesiastical faith. This appears to be minimism of another sort, and one that is very concerning. It presents as a reluctance to accept the full import of this decision and a desire to leave a crack open in this door, however imperceptible it might be, for whatever reason. This then would be a conditional, not an unconditional assent — an incomplete obedience — when such a decision requires irrevocable assent. Theological pygmies all of us are, who even dare venture into these things. Therefore, it seems that it is far more preferrable to prefer the safest course, as we have in praying at home, especially one recommended by a papally approved theologian. This is true especially since we have no one to consult in such matters.
Immediate mission outside the papacy a Protestant heresy
Gallicanism was an error that became even more dangerous than external heresies, as Cardinal Manning explains, because like Modernism it worked from within, not outside, the Church. It was basically a parasite that weakened the authority of the Roman Pontiff in order to placate the state and counteract the effects of Ultramontism. There are definite indications that those advocating it worked in tandem with secret societies to undermine the influence of the Church. It eventually was absorbed by Modernism. Gallicanism promoted the theory of immediate jurisdiction — that episcopal authority came by Divine right directly from Christ, but within the framework of the papacy. Protestants proposed the theory of immediate or extra-ordinary jurisdiction outside the Church, having rejected the papacy. It was their rejection of the papacy that necessitated resorting to Christ as the ultimate source of their authority. For them, this was part and parcel of their heresy.
Immediate mission could be held by bishops within the Church as an opinion, until the decision issued by Pope Pius XII that their jurisdiction was mediate, (through the pope, not immediately from Christ). Any direct appeal to Christ for such jurisdiction after that decision amounts to a denial of the necessity and supremacy of the papacy who alone can exercise it in regard to bishops. No matter how much they protest, or claim to still support the papacy, during an interregnum Traditionalists operate by appealing directly to Christ Himself, and this is the same sort of jurisdiction or mission claimed by Protetstants.
The Vatican Council condemned the tenets of the Gallicanists by defining infallibility. Pope Pius XII ruled that the theory of immediate jurisdiction could no longer be held because all jurisdiction comes from Christ to the Roman Pontiff, then to the bishops, a by-product of the Vatican Council definition. Catholics must hold this teaching with a firm and irrevocable assent. Today we see immediate jurisdiction claimed by Traditionalists. Even if they professed immediate jurisdiction under a pope-elect opposed to Rome, they would be in grave error at the very least. But that is not what they are doing. They are claiming to possess immediate jurisdiction during an interregnum in violation not only of Pope Pius XII’s decision on episcopal jurisdiction, but his infallible papal election law Vacantis Apostolicae Sedis (VAS), written several years after that decision was handed down. For this law teaches that during an interregnum, the acts of anyone attempting to exercise papal jurisdiction or who violate papal law are invalid. As Msgr. Fenton comments at the end of his article on episcopal jurisdiction, “[This decision] signifies that any bishop not in union with the Holy Father has no authority in the Church.”
Exercising jurisdiction reserved only to the pope by consecrating bishops, in defiance of VAS and in violation of a host of papal laws, is the full-blown version of the Protestant heresy of immediate mission or jurisdiction. This sort of mission, authority received directly from Christ, is claimed by Sedevancantists; “Those whom Our Lord has bound by divine law to confer sacraments, then, simultaneously receive from Him the legitimate deputation and the apostolic mission to confer them” (Anthony Cekada, Traditional Priests, Legitimate Sacraments, 2003). Other Traditionalists claim it implicitly by appealing to Can. 2261 §2 providing supplied jurisdiction, which can come only from a true pope. Since they claim it during an interregnum it can be assumed that they appeal then directly to Christ.
Anglicans believe their mission comes directly from God and from the community — mission Dei; this is extraordinary mission. Various Traditionalists also have stated the people have called them and that therefore they are bound to administer the sacraments to them, since technically they have a right to request them. (This is true, however, only when.such a request can be legitimately fulfilled.) This error, related to Gallicanism and Protestantism, was condemned as heretical at the Council of Trent (DZ 960, 967; Can. 147) to combat precisely what St. Francis de Sales was fighting in trying to free those from error who were following the Calvinists. Certainly jurisdiction was very much an issue then, and so it remains.
Conclusion
It is hoped that by providing a brief history of the origins and progression of the Gallicanist error (basically a denial of the full exercise of papal jurisdiction, condemned at the Vatican Council); and its relation to the theory of immediate jurisdiction (a Protestant heresy which has since been revived by Traditionalists), that those confused on this subject will now understand. For those who still feel that this question has not been settled and immediate jurisdiction as it remains today is not a Protestant heresy, it would be interesting to know: What else should we call it in light of the Trent anathema and Pope Pius XII’s decision? Of course the question answers itself, and the answer explains the incredulity of those denying it is a heresy in the first place.
This topic has always been about the papacy. It is at the core of the extended interregnum we have experienced for nearly 64 years. Is it possible for bishops only to rule the Church, can sitting pope err, does the episcopacy minus its head bishop constitute the Church, can bishops without the pope rule as Christ-assigned teachers if they have not received their mission from a true pope (and cannot even be certain of their own ordination and consecration)? The Church long ago answered “no” to all these questions, but liberals, Modernists and Gallicanists that they are, Traditionalists behave as though these condemnations do not exist and can be easily explained away.
Since today they practice immediate jurisdiction without the pope, Traditionalists now join the Protestants, despite all claims to hold extraneous jurisdiction in various forms. They can possess no authority without the pope. Any objection otherwise is only one more denial of the papacy to add to their long and growing list. I don’t feel obligated to apologize for those objecting to the fact that stripped of their immediate mission/jurisdiction garb, Traditionalist emperors now appear in their birthday suits. | https://www.betrayedcatholics.com/gallicanism-protestantism-and-immediate-jurisdiction/ |
Learn more:
Unsupported browser
You are using an outdated browser. Please upgrade your browser to improve your experience.
In avantgarde cuisine we currently witness the dawn of a new understanding for cooking that closely links science and craftsmanship. Millenniums-old traditions of cooking are used alongside of experimental science. It is the beginning of the third revolution in cuisine after the introduction of menu service and nouvelle cuisine. RAW is a study of culinary creations in this context. It refers to science while citing the aesthetics of herbariums known from the beginning of botany. The photography resembles both microscopic views and images from herbariums referring to the fusion of tradition and modern age. | https://ifworlddesignguide.com/entry/68463-raw |
I have been diagnosed with a back condition known as Scheuermann's disease.
I can't find any information on the condition - please help. I would like to know more about it.
All I have been told is that it is the cause of my backache and is due to the bottom vertebrae.
My doctor says he does not know much as it is a rare condition.
I am also concerned as to whether it is hereditary as I have three children.
Answer
There are a group of conditions in which developing bones in children and adolescents become temporarily soft, resulting in some deformity due to the pressure of bearing our weight.
These diseases are named osteochondroses.
After two or three years the bones harden again in their newly acquired, often deformed, shape. The cause is unknown.
Scheuermann's disease is a form of juvenile osteochondritis that usually affects several vertebrae, classically in the chest (thoracic) region.
The active stage of the disease usually affects 13-16 year olds and causes pain in the thoracic spine with rounding of the back.
After a few months the pain subsides to leave a slight forward stoop. Then, in later life there may be renewed backache from the development of osteoarthritis.
It maybe that you are suffering from this process of arthritis in previously damaged bones.
Perhaps you recall a long period of back discomfort during your youth?
In this condition there is a disturbance in the normal formation of some vertebrae and the cartilage plates that separate the vertebrae.
The changes are most marked at the front margins where the bones bear the most force and weight.
Consequently, the discs may be narrow at the front and the vertebral growth area may not develop fully such that instead of being squared like building-blocks, they are more like wedges; this can lead to arthritic change in the bones and joints of the affected part of your back.
There are no known genetic factors in this process, but the cause does remain unknown.
So if your children should develop persisting back pain, do take them to see their doctor and relate the story of your own situation because these days it should be possible to make the diagnosis in childhood.
Yours sincerely
The NetDoctor Medical Team
Other Qs & As
Are my symptoms consistent with a diagnosis of Raynaud's disease
Articular sclerosis or ankylosing spondylitis?
Bell's palsy and the herpes virus
Can I pass my scoliosis on to my children?
Constant pins and needles for nearly two days
Do I have white knuckle syndrome?
Do my medical conditions prevent me from using a sun bed?
Does 'thinning of the bones' always mean osteoporosis?
Familial spastic paraplegia: what is it?
Holt-Oram syndrome: a rare children's heart condition
How should I deal with my father
I have SLE but feel I don't get enough support from my GP
Is psoriatic arthritis a chronic condition?
Is sarcoidosis an inherited condition?
Is this carpal tunnel syndrome?
My chances of getting osteoporosis
My child has an asymetrical rib cage
Please tell more more about trigeminal neuralgia
Small bones growing from the neck
Tell me about autonomic dysreflexia
Tell me about transverse myelitis
What are the symptoms of an underactive thyroid gland?
What can be done about Osgood-Shlatter disease?
What causes bone calcification?
What could be causing my numbness?
What is cervical root compression?
What is De Quervain's syndrome?
What is my mother suffering from?
What is Osgood-Schlatter disease?
What is osteitis condensans ilii?
What is palindromic arthritis?
What is pleurisy and how did I get it?
What is Scheuermann's disease?
What is seronegative polyarthritis and how can it be treated?
What is the prognosis for degenerative scoliosis?
What is the Terry-Thomas sign?
Will my unborn child inherit Moebius syndrome from his father? | https://www.netdoctor.co.uk/ask-the-expert/pains/a2671/is-scheuermanns-disease-hereditary/ |
DAVENPORT, Iowa (CN) – In a case of religious freedom versus gay rights, a Christian student group argued before a federal judge Thursday that it should not have been booted from The University of Iowa campus for denying a gay member a leadership position.
During a Thursday morning hearing at the federal courthouse in downtown Davenport, Iowa, attorney Eric Baxter of the Washington, D.C.-based religious advocacy firm The Becket Fund asked U.S. District Judge Stephanie Rose for an order enjoining the university from revoking the campus registration of Business Leaders in Christ, or BLinC.
Based on questions from Judge Rose, however, a final ruling on the merits of the case could have the effect of forcing the university to examine the membership rules of all roughly 500 student groups on its Iowa City campus to determine whether they discriminate based on race, religion and sex.
BLinC sued The University of Iowa last month, claiming its registration as an on-campus student organization was revoked for denying a leadership post to a gay man, and refusing to amend its religious beliefs to accept “sexual conduct” that runs contrary to its mission.
The conservative Christian student group acknowledges that it denied its member Marcus Miller a leadership role in 2016 after he said he intended to pursue same-sex relationships. But it denies that it did so because of his sexual orientation.
It says it welcomes gay members but it decided that Miller was ineligible to become a leader because he was pursuing relationships “inconsistent” with the group’s beliefs on sexual conduct.
The University of Iowa, represented in the case by Assistant Attorney General George Carroll, has argued that BLinC’s action violated the university’s human rights policy that bars discrimination against students on the basis of gender identity.
But the case represents a conflict between gay rights and religious freedom, as BLinC leaders argue that the university’s decision to strip its registration is contrary to its own policy that forbids discrimination against students on the basis of religion.
In his argument on behalf of the university Thursday, Assistant Attorney General Carroll said BLinC was not “singled out” for deregistration and was targeted only after a formal complaint had been filed.
“Does a complaint have to be filed for the university to enforce its policy?” Judge Rose asked.
Carroll replied there is no audit procedure, but Rose pointed out that BLinC, in a filing two and a half months ago, cited an Islamic student organization as an example of a campus group that limits membership based on religion beliefs.
Asked by Rose if that violates the university’s nondiscrimination policy, Carroll conceded that “arguably, that is true,” but he said there has been no formal complaint against the Islamic group.
Rose said BLinC made the university aware of the discrepancy months ago.
“You haven’t taken any action in two and a half months to be sure that group” is not violating the university’s nondiscrimination policy, she said. “How do you respond to the plaintiffs’ concern that you have singled them out?”
Carroll replied that The University of Iowa may have to assess whether other student groups comply with its nondiscrimination policy. | https://www.courthousenews.com/christian-students-at-u-of-iowa-defend-rejection-of-gay-student/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.