content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Toy laptops which could damage children's hearing, pen caps which could stick in a toddler's throat and teddies which came apart at the seams were just some of nearly 300 "dangerous" products seized by Surrey trading officers.
The toys were imported from Hong Kong through Heathrow Airport and were destined for sale in the UK before they were destroyed after arriving at an inspection point in Surrey.
They were intercepted by Buckinghamshire and Surrey Trading Standards who discovered almost 300 toys that raised concerns.
A total of 236 items failed safety tests: 24 baby play gyms with soft toys, 104 toy laptops and 108 drawing mats.
A further 54 had missing or poor quality safety warnings or labelling, made up of 18 baby play gyms with rattles and 36 kitchen playsets.
Denise Turner-Stewart, Surrey County Council Cabinet Member for Communities, said: “Our trading standards officers are on alert for poor quality products which pose a safety risk to consumers and will take action whenever possible to make sure they can never be sold online or in stores.”
Keep up to date with the latest news from around the county via the free Get Surrey app.
You can set up your app to see all the latest news and events from your area, plus receive push notifications for breaking news.
Available to download from the App Store or Google Play for Android . | https://www.getsurrey.co.uk/news/surrey-news/almost-300-dangerous-childrens-toys-13551214 |
1) An Anglican priest, who is also an army chaplain, explained that the main source of conflict in the world today can be categorized as the “Balkanization” of the world – intra-national conflicts, based on ethnicity or religious differences. Hence an interfaith council may be able to address these issues more effectively.
2) There is a need for increased interreligious dialogue on the local, national, and regional levels to develop the consciousness among religious leaders that will allow an interfaith council at the global level to function well.
3) A Samoan national expressed that sometimes the types of aid sent to the Pacific islands by organisations such as the UN through the UN Development Programme or the World Health Organization are not culturally or religiously sensitive. An interfaith council at the UN would provide a forum for representatives of aid recipients to voice those concerns and explain the cultural sensitivities involved with certain types of aid.
4) The need for interfaith cooperation to move beyond dialogue into service was expressed. Many religious groups are involved in community service, but generally they work by themselves. Interfaith collaboration in community service would send a powerful message and build important bridges among communities.
5) The religious viewpoint on a situation can serve to provide an understanding of the root cause of a problem, rather than merely dealing with the symptoms. For example, the spread of AIDS is not only a health issue but also a moral issue, and can be addressed from both directions.
6) One participant who had lived in Beirut, Lebanon, for many years aired the point that conflicts that may appear to be, or be presented as being, religious in nature may in fact be a result of corruption on a governmental level.
7) It was noted that the mere presence of an interfaith body at the UN may bring a more ethical standard to the wider organization. Also, sometimes through religious teachings, people can begin to gain a new perspective and insight about resolving historical issues and resentments.
8) The point was made that analyses of the main teachings of all major religions show that approximately 70 percent of all teachings are common, and the differences account for only 30 percent. Therefore we should devote more focus to what religions have in common.
9) A community leader from the Cook Islands reported that there they have a Religious Advisory Council, which has a strong position and authority in that community. | http://www.upf.org/interfaith-programs/2983-consultation-in-auckland-on-proposed-interreligious-council |
"Shah-Kapadia Meets Again, Maaya to Give Shock to Anupamaa-Anuj " Anupamaa Upcoming 21st January 2023.
The episode begins in the car where Anuj, Anupama, Anu, and Dimpi leave for the event. Anuj wished Barkha and Ankush to join them.
Anupama tells him that she has requested Barkha but she didn’t agree to come. Anu tells Dimpi that she’s excited to meet Maaya. Anuj tells Anupama that the Shahs will come to the event too as Samar is putting up a stall. Anupama tells him that she didn’t know that the Shahs would come and prays so that they don’t meet face to face. The Shahs are ready for the event.
Anupamaa 21st January 2023 Today's Episode Written Update
Anupamaa 21st January 2023 Today's Episode Written Update
Pakhi and Adhik bring gifts for the family and join the Shahs for the event too. They all enjoy the laddoo made by Leela. Samar asks her to pack a few laddoos for Dimpi. Leela doesn’t agree to do that. Paritosh comes downstairs with his formal outfit and tells his strategy for attending the event. He tells everyone that he’s going to restart his business. The family feels disgusted at him for not learning a lesson.
Paritosh informs everyone that he has put up a stall in the event to promote his business. Hasmukh tells them that Kavya has already reached the venue. Leela thinks that the Kapadias will arrive there too and decides not to stay quiet anymore. Barkha and Ankush finally get ready to go to the event. They fight over the issue of Ankush’s illegitimate son.
When Ankush goes to bring the key to the car, Barkha decides to call her lawyer to know if Ankush’s son can claim his right to his property. The venue gets all decked up for the event. Anuj, Anupama, Anu, and Dimpi reach the venue and are excited to see the decoration all over. Dimpi decides to call Samar to know about their stall. Barkha and Ankush arrive there too. Anu becomes happy seeing them.
Anuj asks Anu not to go far away from them as she might get lost in the crowd. Anu asks him if they are going to fly the kites. Anuj nods his head. Anu tells him that she’s going to take the kite Maaya has made for her. She tells her parents that Maaya will come over to the event as she has informed her. Dimpi asks them to visit their stall. Samar hugs Anupama.
Anu gets excited as the Shahs arrive there with a brand-new car. Paritosh drives the car when Vanraj asks him where he arranged the car from. He tells him that he has lend the car from a friend for his business promotion. Barkha feels that there’s no limit to showing off for the Shahs. Leela gets down from the car and doesn’t like the presence of the Shahs.
Anuj and Anupama greet them from a distance with a faded smiles. Paritosh visits his stall and instructs his coordinators to distribute juice and snacks to the big businessmen and the visiting cards to everyone. He asks them to pretend to talk over the phone when someone visits their stall so that they seem the busiest. Anu asks Anuj to meet the Shahs.
When Hasmukh was about to walk toward them, Leela and Vanraj ask Kinjal and him not to meet Anuj and Anupama. Hasmukh doesn’t listen to them and goes to meet with the Kapadias with Kinjal and Arya. The Kapadias greet them with love. While Kavya gets ready in the makeup room, Mohit asks her not to get distracted as she has invited her family.
He suggests her perform confidently as the event can boost her career to the next level. Pakhi greets Barkha and Ankush. Though Barkha misbehaves with her, Ankush tells her that Pakhi’s trying to be nice and she should try too. Maaya keeps tracking Anu. Anu asks Anuj if they can go for playing games. Anuj takes her. Hasmukh decides to stay back and asks Kinjal to join them. Leela feels disgusted seeing Samar and Dimpi together. Meanwhile, Kavya sends a voice note to Vanraj saying that the event is a big opportunity for her and requests him not to create any issues but support her instead.
Leela overhears her voice note and decides to stop her before it’s too late.
Precap For Anupamaa Upcoming 22nd January 2023 :
Maaya meets Anuj and Anupama and introduces herself to be Anu’s biological mother. Anuj and Anupama are shocked. | https://www.tellyworld.in/2023/01/shah-kapadia-meets-again-maaya-to-give.html |
Some places are tainted, cursed. They are stained by past misdeeds that can’t be scrubbed clean, not even with the blood of the innocent. This concept recurs throughout the horror genre, most notably in Stanley Kubrick’s adaptation of The Shining. Writer Teresa Sutherland and director Emma Tammi effectively transplant this theme to the Western frontier of the late-1800s in their new film The Wind.
Isaac and Lizzie Macklin live alone of the desolate plains of New Mexico. They have suffered a loss, but that source of grief is unexplained through the first act of the film. One day Gideon and Emma Harper arrive, doubling the population of the “neighborhood”. Gideon is inept as a farmer and a homesteader, and Emma seems to think that Isaac makes for the better frontier spouse. When Emma becomes pregnant, the distrust between the two women grows, and things begin to take on a decidedly supernatural bent.
The Wind does for the turn-of-the-20th-century West what Robert Eggers’ The Witch did for 1630s New England. And, yes, that is intended as the high praise it seems to be. Both films beautifully render the fear and dread of living in a world where your safety and survival depend solely on your own wits. The fear of the unknown is a very real thing. The characters in The Wind have limited contact with the outside world. Myth and reality can be difficult to differentiate. The supernatural seems no less fantastical than the stories found in religious faith.
For the majority of the film, Lizzie finds herself alone, awaiting her husband’s return from an expedition to obtain provisions for the upcoming winter. Her only company is the incessant whispering and whistling of the wind. As with the best psychological horror, the action works on two levels. Lizzie may find herself in the midst of supernatural phenomena, or she may be slowly losing her mind, developing a bad case of cabin fever like Jack Torrence just before he picks up an axe and goes on his rampage in The Shining.
The Wind offers a feminist spin on the frontier western and shows us the ways in which the women were the backbones of families living in the untamed wilderness. Child birth is depicted as nothing short of mortal combat — a struggle for the mother to stay alive while bringing another life into the world. The women in The Wind also come to represent progress and receptiveness to new ideas. The bad news for the men is those new ideas involve prairie demonology and a growing realization that these four people may not be the only entities present on the plains.
The Wind results from that perfect storm of lower-budget film-making when writing, directing, production design, sound design, cinematography and performances come together to make something truly memorable. (And don’t forget the haunting and mournful score from Ben Lovett.) This film proves that you don’t need millions of dollars to tell a story well. The film has been “picked up” by IFC for a theatrical release in the near future. Don’t sleep on this one. See it in a theater. Back these artists with your box office dollars.
The Wind deserves to find an audience. | https://themovieisle.com/2018/09/21/the-wind-fantastic-fest-2018-film-review/ |
Carnegie Science Center expansion plan stumbles out of the gate
February 17, 2014 11:56 PM
Darrell Sapp/Post-Gazette
A view from Mount Washington of the Carnegie Science Center.
By Marylynne Pitz / Pittsburgh Post-Gazette
The Carnegie Science Center is hoping to raise $55 million to renovate and expand its building so it can attract major exhibitions and make science and technology education more lively, especially for youngsters.
However, a fundraising analysis prepared in November by the firm of Pursuant Ketchum called the plan "extremely ambitious and unachievable" and suggested scaling back and spreading improvements to the 23-year-old complex on the North Shore over a longer period.
Ann M. Metzger and Ronald J. Baillie, the science center's Henry Buhl Jr. co-directors since 2009, said they had seen the report and acknowledged that the project's fundraising and construction would take longer than they had anticipated. They said they now believe the project will require three years of fundraising followed by two years of construction.
Mr. Baillie said the center lost the ability to stage traveling exhibitions such as "Bodies" and "Titanic" after the old SportsWorks building was razed in 2009 to make room for the Allegheny Station of the North Shore Connector. In 2008, those popular shows drew 750,000 visitors, a substantial increase over the annual average of 515,000 visitors.
Blockbuster shows such as "Da Vinci," "Cleopatra," "Tut" and "Harry Potter," Ms. Metzger said, "are all going to Washington, D.C., but not here."
The confidential report, obtained by the Pittsburgh Post-Gazette, was based on interviews with 55 key community leaders, including science center board members, representatives of local foundations and corporations, and other prominent people.
The museum's directors want to build a new science pavilion, renovate the existing building, update exhibits and theaters and increase the museum's presence with a new entrance and cafe linked to an existing riverfront trail. The science center recently applied for authorization from the state budget office for funding through the Redevelopment Assistance Capital Program.
The co-directors said they realize the building's expansion, under a design by Indovina Associates Architects in Shadyside, must be done in stages. The project's purpose is to encourage more students to study science, technology, engineering and math because demand in the workplace for those graduates is high.
A preliminary architectural drawing shows the building expanding eastward toward Heinz Field with four stories covered in glass panels. This new, 60,000-square-foot science pavilion would house blockbuster exhibitions, an outdoor terrace where people could eat and view fireworks displays at the Point, additional classrooms and offices and sufficient conference space to attract daylong gatherings of scientists.
The report outlines 10 challenges the proposal faces. A major one is the fact that Carnegie Museums of Pittsburgh currently has an interim president.
David Hillenbrand, a retired Bayer executive, led the Carnegie museums from 2005 to 2011 and returned as interim president in 2013 after John Wetenhall's 17-month tenure ended. A quest for Mr. Hillenbrand's successor began last year and is being led by Sally M. Sterling from the search firm of Spencer Stuart.
"Until a CEO is in place, funders lack confidence that this initiative is -- and will continue to be -- an institutional priority," the report said.
The museums' board of trustees also "must demonstrate their enthusiasm for the project by their participation in the campaign before others can be expected to respond," the report said.
Among top 10 prospects -- described in the report as corporations, individuals and foundations likely to give $1.5 million or more -- potential funding broke down this way: $5.25 million from foundations; $1.9 million from individuals; and $425,000 from corporations, for a total of $7.6 million. That would require raising an additional $47.4 million.
Frederick Thieman, president of the Buhl Foundation and a member of the science center's board, is undeterred by the fundraising report.
"I think the Carnegie Science Center is one of, if not the largest tourist attraction facility in Western Pennsylvania. I think it's a critical organization both because of their mission and because of their physical location. It's a signature spot, and they are a signature organization. Expansion or keeping that facility vibrant and fresh is important to the organization and it's important to the community," he said.
Of the 55 likely benefactors interviewed by Pursuant Ketchum, eight serve on the Carnegie Science Center board. None of the wealthy individuals interviewed by Pursuant Ketchum was willing to pledge $1.5 million or more, suggesting instead that foundations and corporations would supply major funding. But leaders of foundations told the report's authors that their contributions will not be that sizable. The report does not name specific foundations.
Interviewees repeatedly named a half-dozen people as likely candidates to serve in high-level leadership roles to raise money for the science center. Five of these potential leaders were interviewed, but none of them wanted to take on the task.
Most key players interviewed support the programming initiatives but are reluctant to back major improvements to the building or capital projects. Several people said deferred maintenance and upgrades should have been included in the science center's mission and that this is the organization's responsibility. Many said the science center should move ahead with its plans but do so in stages.
State Sen. Jay Costa, a Democrat who represents the 43rd District, said obtaining a Redevelopment Assistance Capital grant is a very competitive process. The science center will compete for funding with other Western Pennsylvania projects, such as redeveloping the 28-acre site occupied by the former Civic Arena, the former Saks Fifth Avenue and the Oliver Building plus building a parking garage on the South Side.
Bonnie VanKirk, a science center board member, acknowledged that "raising money is very difficult right now.
"Public money is not as it used to be. Foundations are very particular about what they donate to. I do think it can be achieved. Under the leadership of Ann and Ron, it will be achieved."
Most Read
Most Emailed
Most Commented
Join the conversation:
To report inappropriate comments, abuse and/or repeat offenders, please send an email to
[email protected] and include a link to the article and a copy of the comment. Your report will be reviewed in a timely manner.
Thank you.
| |
The supplier directory
A comprehensive international database of suppliers of fabric, leather, dyeing, printing, fashion, wardrobe sundries, dry cleaning, manufacturers & disposal.
Modespitze
Modespitze is a GOTS certified lace manufacturer that creates embroidery, embroidered based in Germany. They produce fabrics and embroidered lace for womenswear, fashion accessories, bridal and lingerie. | http://wearealbert.org/inspiration/costume-directory/suppliers/@tag/embroidered |
.
Science / project summary
This award supports data collection on Syrian refugees' experience being accepted by Iceland. The conflict in Syria has added to a global refugee crisis that is one of the largest in history with an estimated 20 million known refugees currently displaced. While Syrian refugees were forced from their country due to war, it is estimated that by the year 2050 potentially 200 million people could be displaced due to environmental change from a warming climate. These changes are not only affecting life-ways around the world but are also influencing the role of nations in these crises. In early 2016, Iceland received Syrian refugee families and placed them in three Icelandic communities. Now is an exceptional time to examine Iceland's reaction and capacity to address forced migration into the Arctic. There is great potential in Iceland to serve as a global model as it determines policies, procedures, and communications among the stakeholders for developing best-practices for addressing the challenges of refugees and forced migration. Providing culturally effective services to a population that continuously changes in country of origin, language needs, health and mental health needs, and cultural experiences will be a significant problem for service providers around the world. Knowledge gained through this research has the potential to provide critical insights other nations facing similar crises. This project will examine service provision to refugees and their families (language services, social services, health services, education, job training) in Iceland. The broader impact of this research project is in its potential to contribute to the development of effective and culturally appropriate services for refugees. The PI will conduct qualitative interviews with refugees and providers twice in a 12-month period starting in the summer of 2016 through the winter of 2017. This project will build on early data collected in the winter of 2016, as Iceland prepared for the arrival of Syrian families. The research was supported by Iceland's Ministry of Welfare that requested the PI of this project, a Fulbright Specialist in refugee resettlement, meet with providers and administrators from welfare, education, health, and other agencies that would be involved in the resettlement of the Syrian refugee families. The PI facilitated discussions on the needs of the service providers and communities who would be receiving refugee families. This project will continue those discussions six months after the Syrian families’ arrival and then 12 months after the arrival. This research has the potential to inform healthcare providers, social service workers and administrators, policy makers, educators, and community agencies on the development of best practices in resettling refugees and forced migrants. | https://isaaffik.org/syrian-refugee-families-iceland |
For many of us, the offer of cake brings pleasurable expectations of sweet, tender layers with a complementary filling and swirls of cloudlike, fluffy frosting on top. In addition to tasting heavenly, cakes can do wonders for the soul.
Cake, in one form or another, has been part of the world’s culinary landscape throughout recorded history. The earliest types, probably from Egypt, were modified from round disks of bread, a fundamental food. Cake was viewed as a celebratory food offered in gratitude to the deities during religious ceremonies and at annual events like the harvest festival. The cake’s traditional round shape symbolized continuity, the sun and moon, and the cyclical nature of the seasons and life.
The peoples of ancient Greece and Rome added honey, dried fruits, nuts, and spices to their bread-like cakes. Fig, raisin, and honey cakes are mentioned throughout the Bible. More than 2,000 years ago, the Greeks made a prototype cheesecake called plakous (“flat mass”). Baked in honor of the Olympian goddesses, cheesecake was served at the first Greek Olympics Games in 776 B.C.
The Persians infused cakes with rosewater, adding pistachios, cardamom, and almond paste. The moon cakes of China’s Han Dynasty (202 B.C. - 220 A.D.) were made with red bean paste or lotus paste; today, they are likely to be made from Häagen-Dazs ice cream and chocolate.
When did the boundary between bread and modern cake become fixed? The English word cake comes from the Old Norse word kaka, which is still used in Sweden. Vikings who invaded the British Isles spoke the North Germanic language. Cake was often defined as an enriched, flattened, white bread cooked on both sides.
Many British cakes originated from religious festivals and were of vital importance to the church sacraments like Holy Communion. William Shakespeare wrote, “Dost thou think, because thou art virtuous, there shall be no more cakes and ale?”
Cakes evolved rapidly throughout medieval Europe. Sugar was a luxury beyond the reach of the masses. Few homes had ovens, so honey-sweetened dough was carried to the closest bakehouse. Gingerbread was the iconic cake of the Middle Ages; each country produced its own variation. Skilled craftsmen molded it into elaborate shapes and then covered the surfaces with gold leaf.
Early Britons adopted the Roman custom of breaking wheat and barley cakes over a bride’s head for good luck. This evolved into a towering display of spiced buns. Plum or “plumb” cake, which is fruitcake with currants and double icing, eventually became the prevailing wedding tradition. Marzipan-covered fruitcakes coated with sugar icing remain popular today. In 1840, a special type of sugar coating called “royal icing” was created for Queen Victoria’s wedding cake. It is used to decorate many types of cakes through piping, a French innovation.
Elaborate medieval court cakes were gilded with gold leaf, silver, and gemstones. Elizabethan “great cakes” made with 14 pounds of white flour and copious spices were leavened with barm — the froth of fermenting ale. Covered in an opaque glaze, the enormous cakes were a great luxury for the upper class.
Sugar was an expensive rarity for all but the wealthiest Britons. Necessary for making tender cakes, it was viewed as medicine as much as a sweetener. Eating sugar in excess darkened the teeth from cavities, which was considered a status symbol during that time. German visitors to the royal court of Queen Elizabeth I wrote about her blackened teeth from overconsumption.
Cake’s transformation accelerated through the 16th and 17th centuries. Baking molds for cakes were developed as well as boiled frostings. Spanish sponge cake became popular in Europe; Portuguese traders introduced it to Japan, where it was called kasutera. Tea and sugar emerged as a “power couple” and began to keep company with plum cakes, seed cakes, bun-like spice cakes, and gingerbread made with breadcrumbs.
The colonists baked America’s first cakes: golden pound cake, yeast-raised spice cake, sponge cake, and rich plum cake (fruitcake), which became an annual Christmas tradition. English and German gingerbread evolved into a soft gingerbread cake.
After sugar colonies were established in the New World, sugar slowly became affordable for all classes. In 1796, Amelia Simmons’ American Cookery became the first cookbook published by an American. The title page promised, “… All Kinds of Cakes From the Imperial Plumb to Plain Cake Adapted to This Country …” One appealing “receipt” is a buttery Queen’s Cake perfumed with rosewater. Making cakes was laborious work, and they were denser and less sweet than those to which we are accustomed.
American cakes were leavened with yeast (e.g., Election Day Cake) or by whipping air into cake batters and egg whites — no easy task. Martha Washington’s Great Cake required the whites and yolks of 40 eggs to be whipped separately. They were combined with 8 pounds of butter creamed with sugar and 5 pounds of flour, mixed entirely by hand.
Cakes took on new flavors and ingredients in the New World: pumpkin, cranberries, hickory nuts, molasses, huckleberries, rum, and Indian meal or cornmeal. Coconut arrived later and was used to make Coconut Cakes, Lane Cakes, and German Chocolate Cakes. The elegant Lady Baltimore Cake has close historical ties with Charleston, South Carolina.
Cupcakes appeared in the early 1800s; teacups were used as both measuring cups and baking molds. Within a decade, enterprising homemakers were baking cupcake batter in a single, large pan using the formula: one cup butter, two cups sugar, three cups flour, and four eggs. A spinoff from the pound cake, this butter cake would become the basis for the uniquely American layer cake.
Major cake advancements occurred in the mid 1800s with the hand-cranked eggbeater and development of leavening agents. Pearl ash, or potassium carbonate, worked well in heavily spiced cakes that masked its bitter aftertaste. It was soon replaced by saleratus, a precursor to baking soda. In 1856, baking powder became the most reliable form of chemical leavener. Many of America’s favorite cake recipes appeared in recipe booklets published by baking powder companies at the turn of the century.
In 1933, Pittsburgh’s P. Duff and Sons Company was granted a patent for canned gingerbread cake baking mix. The company planned to use up a surplus of dehydrated molasses. Cake mixes took off in the 1950s after homemakers were inspired to “glorify their cakes with frosting” and add further embellishments. During this time, the art of cooking was in general decline and culinary skills were not being passed down from mothers and grandmothers. Novice bakers often couldn’t discern the difference between a “scratch” cake and one from a mix, which did excel in height, lightness, and convenience. Culinary historian Laura Shapiro writes, “Cake mixes have redefined what home baking really means.” The quality of cake mixes is constantly improving, and new artisan mixes with natural ingredients offer superior flavor. Cake mixes can be a boon for people with busy lifestyles.
The basic lineup of American cakes offers endless variations including Tres Leche Cake, Raspberry Chocolate Icebox Cake, Butter Pecan Pound Cake, Salted-Caramel Chocolate Cake, California Grapefruit Cake, Lemon & Elderflower Sponge, Mango Cheesecake, Olive Oil Cake, Crepe Cake, Boston Cream Pie, and Chiffon Cake — an American original. Luscious cakes are made with figs, carrots, prunes, bananas, sauerkraut, mashed potatoes, tomato soup, and peanuts (from South America via Africa).
Cakes may retain bread-like qualities or incorporate the best of other desserts: fruits, custards, whipped cream toppings, ice cream, and meringues. They range from a simple one-bowl cake to the sublime. Consider Julia Child’s Le Kilimanjaro, a flaming mountain of ice cream cake.
Modern cake design is becoming avant-garde. Trends for 2020 include naked cakes, which have minimal frosting; hand-painted cakes with which “the spatula is the new paint brush;” and those incorporating different flours, sweeteners, botanicals, and herbs. Thankfully, the resurgence in popularity for baking-from-scratch and vintage recipes continues with an eye toward fresh and local ingredients and international flavors.
Special cakes for momentous occasions symbolize the circle of life. A favorite, anonymous quote reminds us, “Birthdays are nature’s way of telling us to eat more cake!” A birthday cake with a circle of luminous candles glows with the promise of ritual and celebration.
Chocolate Hazelnut Cupcakes
The term “Cup Cake” first appeared in Seventy Five Receipts, a Philadelphia cookbook by Eliza Leslie in 1828. In The Lady’s Receipt Book (1846), she included a cake recipe with grated chocolate and nutmeg. In the 1870s, chocolate frosting was often a cooked “paste” that was stirred into cake batters. Sarah T. Rorer, principal of the Philadelphia Cooking School, stirred melted chocolate into her cake. The recipe, which appeared in her 1886 cookbook, was the first true chocolate cake in print. Nutella hazelnut spread evolved in Italy from a sweet paste of hazelnuts, sugar, and cocoa. It is especially appealing in the filling and frosting of this recipe, but you could eliminate both and spread pure Nutella directly on top of each cupcake for a luscious treat.
4 tablespoons melted butter
1 cup all-purpose flour, spooned into measuring cup
1 cup sugar
1/3 cup unsweetened baking cocoa
1 teaspoon baking soda
1/2 teaspoon baking powder
1/4 teaspoon salt
1 large egg
1/4 cup buttermilk
1/4 cup vegetable oil
1 teaspoons pure vanilla extract
1/2 cup hot water
1 jar Nutella
Chocolate Hazelnut Frosting
Preheat oven to 350 degrees F. Grease a nonstick pan for 12 cupcakes; dust with flour mixed with a little unsweetened cocoa; tap out the excess. Use a paper-lined cupcake tin, if preferred. Melt butter; set aside. Put flour into a large bowl; add sugar, cocoa, baking soda, baking powder, and salt. Use a large, sturdy whisk to blend for 30 seconds. In a medium bowl, mix melted butter, egg, buttermilk, oil, and vanilla; pour into flour mixture. With the whisk or a wooden spoon, mix ingredients together until smooth. Add water; stir just until batter is blended. With an ice cream scoop, fill the cupcake pan. Bake 15 minutes or until cakes are firm and test done. After 10 minutes cooling, carefully remove warm cupcakes from pan; cool completely. With an apple corer or small paring knife, remove the center of each cupcake, cutting down about halfway. With a piping bag and a small, plain tube or with a small spoon, fill centers with Nutella. With a larger swirl tube, pipe frosting on each cupcake or spread with a knife; decorate with roasted hazelnuts or Ferrero Rocher chocolates. Place cakes into paper cases before serving. Batter can be baked in a 9-inch pan. Recipe can be doubled.
Chocolate Hazelnut Frosting
1 stick (4-ounces) unsalted butter, softened
1/3 cup Nutella
1/8 teaspoon sea salt
2 teaspoons pure vanilla extract
1 level tablespoon unsweetened baking cocoa
2 1/2 to 3 cups sifted confectioners’ sugar, more if needed
Cream or milk, if needed for thinning
In a mixing bowl, beat the first five ingredients, then slowly add confectioners’ sugar; beat for 3 to 4 minutes or until smooth. Thin with a little cream if necessary.
Variation: Chocolate Berry Cupcakes
Bake cupcake batter but omit adding the filling. Make the Hazelnut Frosting with the following changes. Substitute 3 ounces soft cream cheese for the Nutella and omit the cocoa. Beat in 2 to 3 tablespoons blackberry, blueberry, or raspberry puree made by simmering down 1 cup fresh berries with 1/2 cup water for 6 to 8 minutes. Strain mixture and cool.
Mocha-Toffee Cream Cake with Fresh Berries
Like a European torte, this cake is layered with a luscious filling; in this case, it is a cheesecake-soft mixture with crunchy English toffee. This is a great way to use up extra cake whether sponge or chiffon layers or even sliced pound cake or angel food cake. Skor bars are a crisp butter toffee, similar to Heath Bars.
1/4 cup sugar mixed with 1/4 cup water
2 tablespoons each, brewed espresso and dark rum
1 (8 ounce) softened bar cream cheese
1/2 cup confectioners’ sugar
2 cups heavy cream
1 teaspoon pure vanilla extract
1 8-inch round cake layer, sliced in half (if larger, trim to fit)
3 Heath Milk Chocolate Toffee Bars (or 15 miniatures) or Skor Bars
To make flavored syrup, simmer sugar and water in a small pan until nearly reduced by half; stir in espresso and dark rum. In a mixing bowl, beat cream cheese and confectioners’ sugar until soft and smooth. Slowly pour in cream, beating only until mixture begins to look thickened. Scrape down the pan well and add vanilla; continue beating a few seconds until soft and billowy. The cream thickens very quickly; watch continuously. (If overbeaten, gently stir in extra cream by hand.) Snugly fit 1/2 of the split cake layer over the bottom of an 8-inch springform pan, cut-side up; brush with 1/2 of the syrup. Spread 1/2 of the filling over the top; sprinkle with 1/2 of the candy. Top with the second round of cake; brush with syrup. Top with remaining filling. Cover and chill 8 hours or overnight. Garnish the top with remaining chopped toffee candy.
Options: Scatter berries between the layers. Frost the top with lightly sweetened whipped cream; decorate with berries or chocolate curls.
Chocolate Raspberry Icebox Cake
Icebox cake recipes appeared when electric refrigerators began to replace the icebox during the 1920s. They were easier to make than the popular 19th century molded Charlotte with Bavarian cream and ladyfingers. National Biscuit Company, known as Nabisco, popularized the icebox cake in 1924 when it introduced Nabisco Famous Chocolate Wafers with a recipe that still appears on the package. Cutting the cake at a 45-degree angle reveals zebra-like stripes of chocolate and cream. Icebox cakes are endlessly adaptive to 21st century ingredients and flavors. In the variation, use three or four Champagne (Ataúlfo) mangoes. They are smaller with a superior flavor and texture; purchase during the spring and summer.
1/4 cup quality raspberry preserves
1 tablespoon orange liqueur or orange juice
3 cups heavy cream, divided
1/2 cup, plus 3 tablespoons confectioners’ sugar, divided
2 teaspoons pure vanilla extract, divided
1 (9-ounce) box Famous Chocolate Wafers
Garnish (optional): mixed fresh berries
Combine preserves and liqueur; set aside. Whip 2 cups heavy cream with 1/2 cup sugar and 1 teaspoon vanilla. Separate cookies into four stacks of 10 each. On the first stack, spread about 1 tablespoon whipped cream on one side of the first cookie and about 1/4 teaspoon raspberry mixture on the other side. Continue the process as you stack the 10 frosted cookies. Lay the stack on its edge to chill; prepare the remaining three stacks. Place four stacks on a platter to form the cake, 10 cookies wide and four stacks long. Cover and refrigerate 8 hours or overnight to soften. (Or freeze on a parchment-lined baking pan; transfer to a platter to frost and serve.) Whip remaining cup of cream, sugar, and vanilla, then frost the cake, saving a little to pipe around the top edge. Decorate the top with berries.
Adapted from Susan Slack’s recipe in Ladycom Magazine, Washington, D.C.
Variation: Mango Crème Cake
Line the bottom and sides of a 9-inch square pan with parchment, leaving a 1-inch overhang on each side. Arrange six or seven whole, plain, or cinnamon graham crackers (4-3/4 by 2-1/2) in the pan, breaking, as necessary, to fit. Whip 1 3/4 cups heavy cream to soft peaks, then beat in 3/4 cup sweetened condensed milk or sweetened cream of coconut, 1/4 cup sour cream, and 1 tablespoon dark rum or zest of 1 lemon. Spread 1 cup cream mixture over the crackers; top with about 1 cup diced fresh mangos. Repeat the process two more times, layering crackers, cream filling, and mangoes. Cover and refrigerate overnight or freeze; serve chilled or frozen. Lift frozen cake out of the pan before cutting into squares. Fresh raspberries, toasted coconut, or sliced almonds can also be scattered over the top.
Rose & Almond Cake
This delicate almond cake is reminiscent of the 19th century Lady Cake that was popular with brides and eventually replaced fruitcake as the traditional wedding cake. If rose geranium leaves aren’t available, you can add a few drops of quality rose water (Nielsen-Massey) to the batter or flavor a thin glaze made with confectioners’ sugar for coating the cake’s surface. Rose water is an elegant steam distillate from highly scented rose petals; use sparingly. This is the signature cake in my book Cooking With Grains (HP Books).
1 cup soft-wheat flour (unbleached cake flour or White Lily)
1/4 teaspoon baking soda
1/4 teaspoon baking powder
1/4 teaspoon salt
1/2 cup soft almond paste, crumbled into pieces
1 stick (4-ounces) quality, unsalted butter, room temperature
1 cup fine sugar
3 large eggs, room temperature
1/2 cup sour cream, room temperature
2 small rose geranium leaves, rinsed, dried, minced
Preheat oven to 325 degrees F. Using shortening, grease well and flour a 2-quart decorative baking pan with a tube or a glass loaf pan. Sift together flour, soda, baking powder, and salt; set aside. In a mixing bowl, beat almond paste with butter until smooth. Gradually beat in sugar. Add eggs, one at a time, beating well after each addition. Beat 2 minutes more until thick and creamy. Add half each of the sour cream and the flour mixture. Beat on medium-low until flour is incorporated. Add remaining sour cream and flour; beat just until batter is blended. Stir in geranium leaves, if used. Scrape batter into the prepared pan. Bake 30 minutes; reduce heat to 300 degrees F. Bake 20 minutes or until a cake tester comes out clean. Cool 15 minutes; turn cake out of the pan while slightly warm. Cool completely; dust with confectioners’ sugar or coat with a thin glaze, if desired.
Ed’s Favorite Pound Cake
Pound cake is one of America’s oldest and most treasured cakes. This moist cake is from Ed Wimberly, a local physical therapist whose full-time hobby is baking — he even baked his children’s wedding cakes. Ed learned to cook from his mother, who taught him as soon as he could stand on a stool to reach the stove. Through the years, he has experimented with ingredients to create different flavor profiles for this cake: coconut, banana, flavoring extracts and oils, pumpkin spice, streusel, chocolate chips (“dust with flour; fold in at the end”), and eggnog. Ed says dark brown sugar adds additional moisture and character. Weighing ingredients will give the most accurate results in baking.
4 sticks (2 cups) quality butter
3 1/2 cups unbleached cake flour
1/2 teaspoon baking soda
1 teaspoon baking powder
1 teaspoon sea salt
1 pound light brown sugar (2 1/3 packed cups)
5 large eggs, plus 1 large yolk, room temperature
1 tablespoon pure vanilla extract
1/2 cup whole buttermilk, room temperature
Preheat oven to 320 degrees F. Butter and flour your favorite tube cake pan; set aside. (Wrap the exterior of a two piece angel food pan with foil or place pan on a baking sheet to catch any leaks.) Melt the butter and allow it to cool to a warm liquid. Sift together the flour, baking soda, baking powder, and salt. Mix the sugar in the bowl of an electric mixer, slowly adding in the butter. Pour in the eggs, little by little, beating until smooth. On low, beat in flour in about three portions, then add vanilla and buttermilk. Blend about 30 seconds more. Pour into the pan and bake up to 1 hour and 20 minutes or until a toothpick placed in the thickest part of the cake comes out clean. (Check cake after 50 minutes; cover top loosely with foil if browning too quickly.) Cool, and then turn cake out of the pan. Serve plain or frost with a frosting of confectioners’ sugar, molasses, and cream.
Note: Ed’s recipe has been slightly adapted for this article. The baking time can vary from 1 hour to 1 hour 20 minutes depending on the material of the pan and the temperature of the oven. The sides of the golden brown cake will just begin to pull away from the pan when done. | https://columbiametro.com/article/easter-cakes/ |
Biotics Research's B6 Phosphate contains a biologically active form of vitamin B6, combined with superoxide dismutase (SOD) and catalase, important antioxidant enzymes. Vitamins B6 is important for proper immune function, metabolism, and cardiovascular health (necessary for healthy homocysteine levels). Vitamin B6 status can be impacted by a wide range of pharmaceutical compounds.
Vitamin B6 performs a wide variety of functions in the body and is essential for good health. Low levels of vitamin B6 have been associated with paresthesia in the extremities, repetitive stress injuries, joint pain, joint nodules, sensitivity to bright light, irregular hair loss, acne [skin eruptions], appetite loss, apthous ulcers, fatigue, poor wound healing, elevated C-Reactive Protein (CRP) and mood alterations. Vitamin B6 must be acquired through diet or supplementation, since humans are incapable of synthesizing it on their own. While B6 is plentiful in numerous types of foods, it is very sensitive to processing. Freezing can result in a 15%-70% loss in fruits and vegetables, processing meats lose 50%-70%, and milling grains results in a 50%-90% loss. Additionally, the consumption of several medications, including oral contraceptives, antidepressants, antibiotics, diuretics, and some corticosteroids deplete the body’s reserves of vitamin B6. Alcohol and smoking are also known to exacerbate depletion.
In order to be utilized by the body, vitamins must first be converted into their active coenzyme forms. The coenzymatic form of vitamin B6 is Pyridoxal-5-phosphate (P5P). It has been estimated that P5P may be five times more bioavailable than traditional pyridoxine (B6) as it does not require activation by the liver. Furthering the importance of vitamin B6 assimilation, it is interesting to note that P5P is the only form of vitamin B6 that the fetus and newborn can utilize. Vitamin B6 is an indispensable vitamin for a wide variety of metabolic processes. As the coenzyme needed for over 100 essential enzymes, vitamin B6 is involved in the conversion of amino acids, fatty acid metabolism, neurotransmitter production, prostaglandin metabolism, hemoglobin production, carbohydrate metabolism, protein metabolism, blood glucose regulation, and immune function. | https://humannaturellc.com/products/biotics-research-b6-phosphate-100-caps |
Last Tuesday night, Alhambra’s Council chambers were filled with residents attending the Planning Commission meeting where the City Ventures LLC Midwick project was discussed and considered.
Alhambra Preservation Group had six board members in attendance with three board members speaking against the project. “While none of the buildings in the proposed construction zone are listed on the National Register of Historic Places or included in Alhambra’s list of historic buildings, that does not mean the buildings aren’t significant. Some of them date back to 1937, and most were built between 1947 to 1968,” stated Christine Olson, APG President. “The city of Alhambra … has not compiled a list of its historic resources in more than 30 years, and that one was limited in its scope. What that means is that no one really knows if there are locally significant historic buildings in Midwick that will be demolished by this project,” she continued.
The meeting lasted until after 10 p.m with almost two and a half hours of public comment. Resident after resident gave informed, rational and heartfelt reasons why the project, which will be located at 2400 South Fremont Avenue in the Midwick Tract, should not move forward. Unfortunately, the Planning Commission approved the project by a vote of 7 to 2. Tom Maloney and Ross Maza were the only commissioners to vote against the project, which will demolish all existing structures, build 70 new residences and re-zone a portion of the area. The proposed project’s specific plan will now go before the City Council for final approval.
At its annual award presentation in late fall, Alhambra Preservation Group honored three remarkable historic homes with Heritage Home Awards. Among the awardees was a 1925 Pueblo Revival residence located in the Emery Park Tract. Guests at the November meeting were surprised to learn that it was once the childhood home of little Barbara Iverson, Alhambra’s own “Princess of Beauty” who in 1940, at 8 years of age, was chosen to lead the Storybook Parade down Main Street, before a huge crowd of onlookers and admirers estimated at more than 50,000 people. Barbara’s subsequent career as an actress, musician, poet and songwriter began in Alhambra, when she was a student at Emery Park School.
Emery Park was a newly-developed residential area on the outskirts of Alhambra when Daniel Eckerman bought two acres of land here in 1924. Intending to make his fortune in the booming real estate market, he hired a local construction firm to build several small homes for him in styles that reflected the Spanish influence that was extremely popular at the time. The Pueblo Revival residence honored by APG with its 2014 Heritage Home Award features a smooth stucco exterior finish, painted in subtle earth tones; minimal ornamentation; a flat roof with no overhang and terra cotta tile capping the parapet; and a restrained arch over the dining room window, which is echoed in the front porch entry.
Purchased by its current owners in 2005, the home had suffered a prolonged period of neglect. In addition to addressing the home’s long-deferred maintenance issues, they completely renovated the kitchen and bathrooms, while also adding a new bedroom suite. Where possible, they preserved valuable historic features and materials; where necessary, they replaced missing or damaged elements with ones that matched the character and quality of the originals. The result is a harmonious blend of modern comforts and historic character that is fully ADA compliant and more than ready to meet the needs of a new century. In recognition of the owners’ investment in the preservation of Alhambra’s architectural heritage, this home now proudly displays its Heritage Home Award sign.
Alhambra Preservation Group, a 501(c)(3) nonprofit organization, was founded in 2003 to ensure that the historical, architectural and cultural resources of Alhambra are identified, protected and celebrated for their contributions to Alhambra’s heritage, economy and environment. For more information, contact us at (626) 795-3467 or visit our website.
| |
How do the Psalm texts and antiphons used in Psallite meet the requirements of the GIRM with regard to use for the Responsorial Psalm in the context of the Eucharistic Liturgy?
In the dioceses of the United States of America, the following may also be sung in place of the psalm assigned in the Lectionary for Mass: either the proper or seasonal antiphon and Psalm from the Lectionary, set either in the manner of the Roman or Simple Gradual or, in another musical setting; or, an antiphon and Psalm from another collection of the psalms and antiphons, including psalms arranged in metrical form, providing that they have been approved by the United States Conference of Catholic Bishops or the diocesan Bishop. Songs or hymns may not be used in place of the Responsorial Psalm.
Psallite always uses the responsorial "psalm text assigned in the Lectionary for Mass" but with "an antiphon [almost always a more responsive version of the antiphon assigned in the Lectionary for Mass] . . . approved by the diocesan Bishop." Bishop John Kinney of the Diocese of St. Cloud in Minnesota granted Psallite the imprimatur on May 10, 2005; like Cardinal George of Chicago and Archbishop Vlazny of Portland, Bishop Kinney has responsibility for a major publisher in his diocese.
Let me explain the bracketed remark. We in the Collegeville Composers Group feel strongly that the litanic styles in the Simple Gradual needed to be explored. So we have written in a litanic style that, as in the Simple Gradual, calls out for the antiphon or a half-antiphon after each verse of psalmody. The Simple Gradual was meant to be a primer for musicians in the authentic call-and-response styles that are in the most ancient repertories.
How does Psallite connect to the liturgical cycle and the lectionary?
For each Sunday, Solemnity, and major feast day of the liturgical year, Psallite provides biblically based options for the entrance / opening song (the SONG FOR THE WEEK / DAY); the response song during the Liturgy of the Word (the SONG FOR THE WORD); and the song during the Communion procession (the SONG FOR THE TABLE). The Accompaniment Editions for Years A, B, and C are organized with the three songs for each Sunday, Solemnity or Feast appearing as a grouping. In the Cantor / Choir Edition, which includes all music for all three years (A, B, and C), the songs appear alphabetically. A variety of indices help the user find songs by first line, topic, liturgical use, or scriptural verse reference.
Is Psallite just for the Responsorial Psalm?
No! Psallite may be used at a variety times within the liturgy. It offers a collection of liturgical songs inspired by the antiphons and psalms of the Roman Missal which may be sung as the entrance / opening song, the song during the Communion procession, as well as for the response song during the Liturgy of the Word. While the music in this collection suggests specific Sundays or celebrations for its use, they have various, repeatable uses throughout the liturgical year. Singing the antiphons and psalms of Psallite restores psalm-singing as our primary prayer language. Singing this kind of music helps our assemblies find their voices so that we all can sing the Mass, not just sing at Mass.
Who are the members of the Collegeville Composers Group?
Carol Browning has been active as a pastoral musician and liturgist for more than twenty years, for the past fifteen years mainly in Roman Catholic settings, although she is a member of the Religious Society of Friends (Quakers). She is a liturgical composer, on her own and as part of the Collegeville Composers Group, and an independently published inspirational songwriter. She also writes occasional articles for various liturgical music magazines.
Catherine Christmas, an accomplished organist and former cathedral director of music, currently working as Pastoral Coordinator for a group of parishes based in Winchester, England, and studying for a Master's in Pastoral Liturgy at Heythrop College, University of London.
Cyprian Consiglio, OSB Cam, a monk of the Camaldolese Congregation, who is a musician, composer, author, and teacher. He spends about half his time at home, writing and composing, and the other half of his time on the road, performing and teaching.
Paul F. Ford, PhD, professor of systematic theology and liturgy, St. John?s Seminary, Camarillo, California. He is the author of By Flowing Waters: Chant for the Liturgy, published by Liturgical Press.
Paul Inwood, who serves as Director of Liturgy and Director of Music for the Diocese of Portsmouth, England. He is an internationally known liturgist, composer, organist, choir director, and clinician. His liturgical music appears in numerous hymnals worldwide.
What is the collaborative composition process of the Collegeville Composers Group?
The composers come together for five days at a time, either in Santa Cruz, CA, or Hampshire, England. They begin each day by celebrating Mass followed by breakfast (they dine, exercise, and recreate together). Each composing session begins with prayer, often praying the songs composed the previous day. They then pray through one Sunday?s lectionary texts and review the Roman Missal and Roman Gradual as their reference books.
The first element composed for a specific day is the Song for the Table. The theology of this choice is VERY specific: they ask themselves ?what are the few words (ideally from the gospel of the day) that will help the assembly receive as Food and Drink what the Father breathed to us in the Word??
Once a consensus is reached on the text, they write the text on music paper and begin to silently mull over possible melodies. As soon as someone is inspired and music emerges from the words, they massage the melody and begin to color the antiphon with harmony.
So they ALL write the text, they ALL write the tune, and they ALL arrange the piece. That?s why there is no individual ownership of any text, tune, or arrangement. They say it is the hardest work they?ve ever done, and the most exhilarating.
How do the three smaller collections of songs relate to the full Psallite collection?
The full Psallite collection includes nearly 300 liturgical antiphons and psalms. Three smaller collections feature songs for each liturgical year drawn from the full collection: Where Two or Three are Gathered (25 songs from Year A), Walk in My Ways (27 songs from Year B), We Will Follow You, Lord (28 songs from Year C).
How do I obtain permission to use the Psallite antiphon graphics in the worship aid for my parish?
Permission to use the antiphon graphics from Psallite may be obtained via an annual license from Liturgical Press ($35.00 / year). Additionally, Liturgical Press is pleased to be a publisher member of the licensing service OneLicense.net. If you subscribe to the Onelicense.net annual reprint license, you are permitted to reprint the assembly antiphons from Psallite and the assembly antiphons from By Flowing Waters, as well as the assembly part for all other music titles copyrighted by the Order of Saint Benedict, Collegeville, MN 56321 and/or administered by Liturgical Press (as well as a variety of other publishers). A condition of this permission is that you are mandated to report the usage of each title through Onelicense.net every time it is used. | https://litpress.org/Psallite/psallite-faqs |
CDLU Recruitment 2022: Chaudhary Devi Lal University recently announced the vacancy for the 52 positions for posts of Professors, Associate Professors and Assistant Professors. The application registration process started on 25th September 2022 and will go on till 18th October (midnight). Make sure to check the eligibility for these posts before applying online. All the information you will be needing regarding the eligibility and application process are available in this post.
CDLU Recruitment Notification 2022
The application forms for the latest CDLU University’s 52 vacancies for various subjects are out now. You can apply at the official website of the University, https://www.cdlu.ac.in/. Candidates also need to post the hard copy of the application form along with other necessary documents to the postal address of Chaudhary Devi Lal University. The physical copy of the documents must reach CDLU by 26th October (by 5 pm).
Overview: CDLU Assistant Professor Recruitment 2022
CDLU Assistant Professor Recruitment Vacancy Details 2022
The code-wise distribution of the 52 vacancies for the teaching posts along with the scale pay of the vacancies are given in the table below:
Pay Scale for CDLU 2022 Teaching Posts
The entry-level scale pay for the 52 posts of Professors, Assistant Professors and Associate Professors are given below in the table.
Eligibility for Chaudhary Devi Lal University Teaching Posts
The academic and experience qualifications necessary for being eligible for the teaching positions of level 10, level 13A & level 14 academic posts are listed below:
Note: In addition to the aforementioned qualifications, factors such as academic record, API scores, level of research publication and scientific awards will also be considered during the shortlisting process. And the detailed eligibility criteria for these posts are available in the official notification pdf which can be downloaded from the Important Links section at the end of this article.
Application process for CDLU Assistant Professor Recruitment
- Visit the official portal of Chaudhary Devi Lal University Recruitment Portal, ‘https://cdlurecruitment.ac.in/’
- Click on the Registration tab on the homepage.
- Read the instructions carefully and click on the little checkbox.
- Now, press the Start Registration button.
- Select the Advertisement No. you are applying for, the post of your choice, Department and then carry on filling in the academic and personal details for the vacancy.
- Pay the online fees and download the fee receipt.
- You will also need to print your application form.
- After printing the application and fee receipt, you will need the photocopies/ printouts of a few academic records (listed later in this section) and post them to the University Recruitment Cell.
- The post should reach the university cell by 26th October, 5 pm.
List of documents to be posted to CDLU
- Online Application form print
- Receipt of fee payment
- Candidates applying for the posts of professor need to send the documentary proof of their best 10 research publications while associate professor need to send in their 8 publications along with other documentation that will be filled in the form by the applicant.
CDLU Assistant Professor Application Fee
The application fee for the CDLU vacancies can be paid through online mode gateways only. The category-wise application processing fee for different categories are given in the table below:
Important Links: CDLU Recruitment 2022
The application mode of CDLU Recruitment 2022 is both a mixture of online and offline methods. The applicants need to fill out the application form online first and then send it to the Recruitment Cell of CDLU along with documentary proofs of their research and teaching experience.
The last date for applying online for the CDLU Assistant Professor vacancy is 18th October 2022. And the print of the application form, fee receipt and other documents should reach the university by post/ registry or another method by 26th October 2022.
Football 2022 Standing Updates --> FIFA World Cup 2022 points table
Yes, candidates from other states can apply for the teaching vacancy of CDLU 2022. | https://nvshq.org/recruitment/cdlu-recruitment-2022/ |
Proctor & Gamble, the consumer goods manufacturer, plans to double the amount of recycled resin it uses in plastic packaging by 2020.
ensuring that 90 per cent of its packaging is recyclable or that programmes are place to create the ability to recycle it.
working across its supply chain to develop the capability by 2020 to replace top petroleum-derived raw materials with renewable materials as cost and scale permit.
reducing water used in its manufacturing facilities by an added 20 per cent per unit of production on top of the 70 per cent it saved between 2002 and 2012.
P&G has 12 environmental sustainability goals towards its vision of 100 per cent renewable energy use, 100 per cent renewable or recycled materials for all products and packaging, and zero consumer and manufacturing waste going to landfill.
Since establishing these goals in 2010, P&G now has 70 zero-waste manufacturing sites. | https://www.ecosurety.com/news/pg-sets-out-progress-on-sustainability/ |
Website decideconsultng We are looking for a strong Senior Network Engineer to join a growing team with a Global industry leader. Our South Houston client offers great benefits, growth opportunity and work from home on Mondays and Fridays. The Sr. Network Engineer is responsible for activities pertaining to planning, design
The Sr. Network Engineer is responsible for activities pertaining to planning, design, implementation and support of all aspects of a Global network infrastructure spanning 40 locations. The role is an integral part of enabling information technology to be fast, flexible and responsive. This hands-on technical role includes developing strategies and architectures for evolving enterprise scale networks, their implementation, maintenance, and monitoring in support of mission critical production environments and applications.
What you will do
- Develop strategies and architectures for evolving enterprise scale technologies
- Lead selection and use of networking technologies
- 1 day a week work from home
- Coordinate operations of network and Disaster Recovery systems, including monitoring detailed usage, security, network system service levels, maintenance, turnaround, and response times, and initiate response activities.
- Oversee network asset management, including maintenance of network component inventory and related documentation and technical specifications.
- Collaborate with technology and business stakeholders to understand goals, determine functional and network requirements for software, middleware and infrastructure.
- Define appropriate network policy and procedures. Lead policy development and work with cross functional teams to ensure policies align with business operations and risks.
- Assess network performance by conducting testing to ensure that appropriate controls have been designed and built within our network infrastructure.
- Perform network testing at a unit, functional, and system wide level.
- Demonstrate a thorough understanding of various network performance concepts and their impact on business operations.
- Conduct network monitoring and packet analysis uses tools like SolarWinds.
- Maintain, configure and optimize F5 BigIP load balancers.
- Manage Virtual Private Networks (VPN) and provide technical support for other remote access technologies.
- Participate in "on call rotation " as part of 24-hour support team.
Qualifications and Competencies
- 10 years of IT network infrastructure work experience and a stable job history
- CCNP or CCIE Certifications desired
- Strong Cisco Networking experience with Firewalls, Routers, Switches and VIOP
- Cisco ASA Firewall experience desired
- Ability to Problem Solve
- Strong Troubleshooting ability
- Experience in a Mid-Size Enterprise environment working with multiple locations
- Solid understanding of industry-standard network technologies
- Strong understanding of networking and transport protocols (i.e. SSL/TLS, DNS, DHCP, WINS, NTP, FTP, HTTP, SMTP, CIFS, LDAP, and Microsoft AD).
- Ability to produce architecture diagrams and requisite documentation
- Extensive hands on experience and the ability to manage complex networking projects is required
- Strong teamwork and communication skills
- Enjoys working in a collaborative team environment
Nice to Have
- Bachelor’s degree in Computer Science, Computer Engineering, Network Security, Information Security, Information Technology or equivalent experience & training acceptable in lieu of degree
- F5 load balancing experience nice to have
Recruiter: Jack Vann
Position Type: Direct Placement
Experience Level: | https://decideconsulting.com/job/sr-network-engineer-houston-19-00140/ |
Lessons Learned in Inter-Organization Virtual Integration
The SAE AS2C Standard AS5506C Architecture Analysis and Description Language (AADL) is a modeling language for predictive analysis of real-time software reliant, safety and cybersecurity critical systems that provides both the precision of formal modeling and the tool-agnostic freedom of a text-based representation. These traits make AADL ideal for virtual integration, a process that enables early detection of integration defects through model integration of software, computer hardware, and interacting physical devices. AADL supports multiple domains of architectural analysis such as timing, latency, resources, safety, scheduling, and cybersecurity.
Adventium Labs conducted an exercise to determine the applicability of software engineering practices (e.g., continuous integration (CI), application programming interface (API) sharing, test driven development (TDD)) to the AADL-based Architecture Centric Virtual Integration Process (ACVIP). Our exercise consisted of four teams: supplier, integrator, Authoritative Source of Truth (ASoT) provider, and customer. We isolated each team and required the use of pre-selected tools (e.g., git) for collaboration between teams. We conducted a series of design reviews; each requiring the teams to exchange AADL models to facilitate increasingly detailed analyses (e.g., processor utilization, then thread schedulability, then fault tree analysis). We determined that software engineering practices add value to inter-organization virtual integration. We identified several modeling best practices and recommendations for extensions and changes to the AADL. Best practices of note include: Read-only git repositories, API definition through test harnesses, and “headless” implementations of analysis tools. Language recommendations included: Improved semantics for bus access, component “overriding”, and incorporation of Universally Unique Identifiers (UUIDs) into the AADL language. | https://www.adventiumlabs.com/publication/lessons-learned-inter-organization-virtual-integration |
The Central Bank yesterday said it has ordered commercial banks and credit unions not to use clients' COVID-19 unemployment benefits to repay loan facilities.
The regulator, in a statement issued yesterday, said it had told financial institutions to communicate with clients on "the processes" that will be used to reimburse customers whose benefit payments were taken to service outstanding credit facilities. It added that it "did not endorse" its licensees redirecting customers' benefit payments without their knowledge or permission.
The Central Bank said it had taken action because increasing numbers of recipients were avoiding direct deposits to their accounts to safeguard their unemployment benefits from lenders, which was "not in the interest of an orderly payments system".
"The Central Bank has taken note of public concerns that unemployment benefits and equivalent government assistance payments for COVID-19 relief might involuntarily be applied to loan payments when sent directly to deposit accounts," the regulator said. "Moreover, the bank is aware that recipients might be electing less efficient payment options to avert this suspected practice.
"The Central Bank does not endorse the involuntary redirection of unemployment benefits or other government-funded assistance payments. Given the volume of such payments and public health/safety concerns around processes by which these are being converted to cash, avoidance of direct deposits is not in the interest of the orderly functioning of the domestic payments system nor the domestic banking system."
The Central Bank added that it has "therefore requested that commercial banks and credit unions maintain adequate systems to preserve COVID-19 income replacement proceeds for their intended social safety net use".
"Financial institutions have also been requested to communicate with their clients, through accessible public channels, on the processes that have been established for recipients to recover proceeds that were involuntarily applied to other purposes," it continued.
"Recipients of unemployment benefits and assistance are urged to have payments sent directly to their deposit accounts, and to request correct guidance from their financial institutions on how to specify their account numbers."
The National Insurance Board (NIB), meanwhile, yesterday disclosed that the Government-funded self-employed benefit programme it previously administered had now closed after some 7,183 claimants received a collective $15.5m.
The national social security system said its own unemployment benefits initiative had paid-out $84.2m to 36,813 claimants since the COVID-19 crisis began in mid-March 2020. However, Dr Nicola Virgill-Rolle, NIB's director, lamented in a statement that it had seen "far too many returned" benefits payments because recipients either failed to provide bank details or gave incorrect information.
Noting that NIB has moved away from a previously-manual process, where jobless Bahamians first had to register with the Department of Labour and obtain the B81 labour card to qualify for benefits, she said: "Recognising the realities of COVID-19, NIB changed its process to allow for direct deposit payments and payments through employers.
"However, some claimants did not provide banking information or their banking information was incorrect, and so cheques had to be prepared. We were seeing far too many returned payments which then needed to be reissued to customers."
Comments
tribanon 2 years ago
This is like telling people not to leave money in their bank accounts where the bank can get at it to repay loans and advances they owe the bank. The Central Bank no longer seems to be concerned about the financial well being of the licensees that it supervises. Just as the Minnis led government no longer seems concerned about the health and well being of the vast majority of Bahamians as evidenced by its no notice draconian yo-yo lockdowns. Kinda makes you want to cry.
bogart 2 years ago
Good point. Plus curious situation with Dr. Nicola Virgill-Rolle, NIB mandated by job to instruct sending out funds, govt intention to benefit recipients, to recipients legally authorized designated bank accounts .......and husband, Mr. John Rolle Govenor of Central Bank, Central Bank, powers of Regulator, Bank Supervisor, Inspector intervening into banks at same time and situation telling banks to relinquish bank contractual arrangement whichinin is Contract between Customer and Bank. Conflict.
ohdrap4 2 years ago
The bank programs automatic deductions for the duration of the loans. Not sure those can be easily suspended.
trueBahamian 2 years ago
The Central Bank speaks, wow! With everything going on, this is the major item to speak about. Really? This is a sidebar conversation with the banks and a move on. A side article at best.
We need the Central Bank to speak to the economic situation we're in. We need them tackle the big ticket items that they're there to address. This subject here is like the police arresting a kid for stealing potato chips while helping a serial killer escape.
bogart 2 years ago
The Authority ought to know that the Customer and the Bank has a Contractual arrangement. The Customer has the voice to arrange with the Bank.
However, 2018 the Central Bank 'acquired' some $108.8 million dollars belonging to some 41,459 to 42,452 customers bank accounts because these customers cannot be found and notified.....( likely most customers on 7 x 21 mile island) even though the Central Bank mandated as Central Bank Supervisor an Regulator, Inspector of Banks have customers provide realms of identification papers, NIB govt Card, Govt Passport, Govt birth certificate an plenty more papers....to find people an give them back their money then. Soooooooooo now same Central bank can take plenty of plenty people money....an local banks cant...even though rules right to set off, appropriation .
Each Bank, under market condition, Contract between themselves an customer, has their own rights on how to deal wid each and erry customer and not "told" by Central Bank Regulator. Central Bank ought to know that banks have Private investors, shareholders as owners and do not operate like Govt bank with number of population owners and private shareholders and still not revealling Canadian Martelly report and forensic investications. In a not too long ago situation wid protesters protesting on road on bank charging hurtful $16. Bank fee same Central Bank did nothing an told all market forces prevailing. | http://www.tribune242.com/news/2020/aug/18/banks-told-dont-take-benefits-repay-loans/ |
Snow leopard cub successfully reintroduced in Himachal’s Spiti Valley
Shimla: Wildlife officials in Himachal Pradesh on Friday said that they have “successfully” reintroduced the six-month snow leopard in the wild in the Spiti Valley, some 350 km from Shimla, after 16 days of captivity.
The snow leopard cub that got trapped in a corral of Giu village of Kaza subdivision was captured on May 2, a media statement by Chief Wildlife Warden Savita said.
It was found to be injured and dehydrated and was brought to the nearest wildlife quarantine centre of the Himalayan Nature Park in Kufri for necessary treatment.
During its quarantine, extreme care was taken lest the animal develops any kind of human imprinting. After diligent care, it was found to be healthy for its release back into the wild, she said.
Wildlife officials transported this vulnerable species for veterinary checkup to the nature park in Kufri, near here, some 350 km from the spot.
On its reintroduction, the wildlife wing statement said a team transported the animal to the location in the vicinity of its capture on May 16-17.
Keeping in mind the vulnerability of the species, due care was taken to complete the journey only during the cool hours of the day. The animal was medically observed at intervals of two hours throughout the journey and was adequately fed, watered and rested intermittently.
Another team headed by the DFO (Spiti) and representatives of the Nature Conservation Foundation had located a female snow leopard, probably the cub’s mother, near Giu village.
The team kept close tabs on the movement of the animal. A strong liaisioning between the two teams was developed and a strategy was formulated to release this cub in its habitat itself near to the place from where it was captured, said the statement.
The cub was kept at this location for a short period and the team set up a camp at a short distance from the place. Entire area was covered through camera-trap surveillance and the animal was finally released in the evening of May 18 in accordance with guidelines.
Till the morning of May 21, no report of cub straying into human habitation has been reported and it is presumed that the animal receded deep into its wild habitat which is good for everyone, added the statement. | https://indileak.com/2020/05/snow-leopard-cub-successfully-reintroduced-in-himachals-spiti-valley/ |
Forgot password?
Reset password here
UH - BIOL 1361 - BIO FINALS STUDY GUIDE - Study Guide
Created by:
Alejandra Paiuk
Elite Notetaker
Schools
>
University of Houston
>
Biology
>
BIOL 1361
>
UH - BIOL 1361 - BIO FINALS STUDY GUIDE - Study Guide
UH - BIOL 1361 - BIO FINALS STUDY GUIDE - Study Guide
View Full Material
5
5
3
39 Reviews
View Full Material
This preview shows pages 1 - 5 of a 27 page document.
Sign up
to view the rest of the content
BIO FINAL
Chapter 1
● Hypotheses : A possible explanation for something, can be tested
● Predictions : What you think you will observe if the hypothesis is right
Chapter 2: Water & Carbon
● Chemical Bond: mutual attraction between two atoms that binds them and holds energy
○ Covalent Bond: Bond where electrons are shared between atoms
■ Polar: One of the atom has more electronegativity (attracts more electrons to its side)
■ Non-polar: All electrons shared equally
■
○ Ionic Bond: Bond where electrons are NOT SHARED. One atom gives and the other receives.
Leads to cations (+ ion) and anions (- ion)
○
○ Hydrogen Bond: Weak polar bonds between hydrogen with partial positive charge and another
atom with negative charge (usually O or N)
○
● Properties of Water:
○ Co hesion : Attraction between like molecules (water sticks to water)
Remember co- prefix means
common
■ Forms because of hydrogen bonds between molecules
○ Adhesion : Attraction between unlike molecules (water sticks to things not water, things with polar
or charged components)
■ Forms because of water partial positive charge due to hydrogen bonds.
○ Surface Tension: Cohesive force at water surface that cause the top to behave like an elastic
sheet, giving off resistance to things that interrupt it (reason why belly flopping hurts)
■ Caused by the attraction of the water molecules in the surface, which tends to minimize
surface area since there are no water molecules above but there are next to and below.
○ Solvent for charged or polar compounds: Hydrogen Bonds form between partial charges of
water and opposite charge in polar solutes, making water a superb solvent
○ Denser as liquid: Water expands as ice as each water molecule forms 4 hydrogen bonds. Liquid
Water’s bonds are continuously broken and reformed so water molecules are Packed together
○ High Specific Heat: Specific heat is the energy required to raise the temperature of one gram of
something by one degree
○ Water’s is high because hydrogen bonds must be broken first before the molecules can move
and thus generate heat
○ High heat of vaporization: heat of vaporization is energy to change one gram from liquid to gas
○ Same thing as specific heat, A lot of heat energy must be absorbed to break the bonds and
make things happen
● Polarity of Water: Electrons are pulled to the oxygen in H2O because it has more electronegativity
●
● Hydrophilic: Substances that loves to interact with water. Include polar molecules and ions
● Hydrophobic: Do not love water, minimum interactions. Nonpolar substances
● Functional groups
○ Hydroxyl:
Highly polar (you know because it has O), forms hydrogen bonds, is sometimes
a weak acid and drops H. Family- alcohols (-ol). Ex: ethanol
○ Carbonyl :
polar, Family- ketones & aldehydes. Can increase the melting or boiling point of a
compound by producing larger molecules. Ex: acetone
○ Carboxyl :
Carbo nyl and Hydr oxyl combined
.
Polar and acidic (tends to releases/lose its
H+ in solutions). Family- Carboxylic acids. Ex: acetic acid
○ Amino:
Acts as a base (tend to attract/accepts H+ in aqueous solution). Family: Amines.
Ex: Glycine amino acid
○ Phosphate:
strong potential to react with water & release a lot of energy. Family- organic
phosphates. Ex: ATP
○ Sulfhydryl :
can form disulfide bridges (S-S) between molecules, helping stabilize
proteins. Family: Thiols. Ex: Cysteines
Chapters 3 - 5: Proteins, Nucleic Acids, & Carbohydrates
● Macromolecules: molecules formed by joining smaller molecule
○ Proteins
■ Provide structural support, storage, transport, cell communication, movement, and defense.
Ex: enzymes, RBC, hormones, collagen, elastin, keratin, myosin, tubulin,
■ Monomers are Amino Acids
Amino+A central carbon+Hydrogen+A
side chain (the R)+ Carboxyl
■ Link by Peptide Bond
■ Protein are anything from one peptide (Less than 50 amino acids linked) to multiple
polypeptides (more than 50 amino acids)
■ Protein function depends on structure
■ Primary Protein Structure: Only the amino acid sequence
■ Secondary: The a-helix (coiled structure) or b-pleated sheet (series of accordion folds in
the same plane) made by hydrogen bonding between functional groups of amino acid
backbone
■
■ Tertiary: 3D structure of a protein. Has Hydrogen bonds, Ionic bonds, Van Der Waal’s
interactions (Relatively weak electric forces that attract neutral molecules to one another,
but no bonding), and Disulfide bridges
■
■ Quaternary: Multiple polypeptides. ex:hormones, hemoglobin, etc
○ Nucleic Acid
■ DNA & RNA; genetic info
■ Monomers are Nucleotides
Phosphate+Pentose Sugar+Nitrogenous
Base
■ Link by Phosphodiester bond, nucleotides connected by phosphate group
■
■ RNA- ribonucleic. Sugar Ribose has 2 OH. One strandred and can fold into many shapes
■ DNA- deoxyribonucleic. Sugar deoxyribose has one OH and one H. 2 anti-parallel strands
linked by hydrogen bonds and twisted to double helix
■ Bases- Adenine,Guanine,Cytosine, Uracil for RNA or Thymine for DNA
○ Carbohydrates: Main source of fuel and fuel storage and build structures in the body. Ex: the
sugars: glucose, starch
■ Monomers are Monosaccharides
Carbonyl+several Hydroxyl+CH bonds.
Form ring structure. This one above is glucose
■ Polymers are Disaccharides ( 2 mono ) and Polysaccharides (3 or more)
■ Link by glycosidic bond ( covalent bond formed between two monosaccharides by a
dehydration reaction. Usually O or N linked)
■
○ Lipids: store energy and regulate the body's metabolic processes. Ex: the fats
■ Non-polar and thus hydrophobic.
■ Structure highly variable
■ Two kinds of monomers, fatty acids and glycerol
● Fatty Acids: Carboxyl linked to one hydrocarbon chain
○ Saturated : all C atoms linked by single covalent bonds to H. Straight
○ Unsaturated: At least one C has double bonds, causing a bend
○
● Glycerol: three carbon biomolecule containing three hydroxyl groups
●
■ Ester linkage: What connects glycerol and fatty acids. Dehydration synthesis leaves only
COO behind
This is the end of the preview. Please
Sign up
to view the rest of the content
Join more than 18,000+ college students at University of Houston who use StudySoup to get ahead
School:
University of Houston
Department:
Biology
Course:
Introduction to Biological Sciences
Professor:
Mahon
Term:
Spring 2015
Tags:
Biology, biol1361, Water, carbon, Macromolecules, Carbohydrates, Lipids, Nucleic Acids, Proteins, cell membrane, Cell Anatomy, metabolism, Cellular Respiration, fermentation, Photosynthesis, cell to cell interaction, Cell Cycle, thermoregulation, homeostasis, osmoregulation, nitrogenous waste, Animal Nutrition, plant nutrition, gas exchange, vascular system, internal transport, Endocrine system, and neurons
Name:
BIO FINALS STUDY GUIDE
Description:
Everything for the final. Chapters 1-12 then 34-46
Uploaded:
12/02/2017
27
Pages
115
Views
92
Unlocks
Better Grades Guarantee
24/7 Homework help
Notes, Study Guides, Flashcards + More!
Recommended Documents
Study Guide for upcoming exam
Textbook notes of chaps 10-13
This EXTENSIVE study guide covers topics 6.2, 6.5, 7.1, 7.2, 8.1, and 8.2. Examples from class are included, with the steps shown as well!
This study guide includes questions from each chapter 5-13 and a list of terms to know for each chapter
Vocabulary and equation intensive study guide for managerial accounting 2020 chapters 11 and 12 with professor Carroll
Final exam study guide
Hooray! It's the study guide for exam 3 of Geology 107, our final exam! Contains all information addressed on Dr. Madsen's study guide posted on Sakai, all straight from lecture! Comprehensive and outlined. Contains notes up until "location of major oil reserves." Happy studying!
These notes cover water balance, different minerals and their deficiency symptoms, toxicity symptoms if any, and other characteristics that make each nutrient unique.
These notes cover everything that will be on the final.
I hope this study guide will help you do great in your finals. Goodluck.
This guide covers the material for exam 3. In addition, read the textbook pages assigned from week 10 up till the present. This includes information on australopiths, early Homo species, and the emergence of anatomically modern humans via mosaic evolution. Good luck everyone!
This study guide is based on both the class powerpoints and the textbook, although more so on the powerpoints because of the way he stressed their importance in class. If there is any other information I need to look up to complete the practice questions I will add it to this study guide.
Join StudySoup for FREE
Get Full Access to
UH - BIOL 1361 - Study Guide - Final
Join with Email
Already have an account?
Login here
Cancellation Policy
StudySoup Inc, 2020. | https://studysoup.com/guide/2623340/bio-finals-study-guide |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
EXAMPLES
Example 1
General Process for the Preparation of a Sesame Paste-Based Sorbet
(a) Preparation of the Ice Cream Mix
(b) Preparation of Sesame Seed Paste
(c) Preparation of Fruits
(d) Preparation of the Unfrozen Mass
(e) Dynamic Freezing
(f) Immediate Deep Freezing and Packaging
Example 2
Non-Dairy, Egg-Free Sorbet
The present invention relates to nutritious food products and, particularly, to non-dairy, egg-free products comprising sesame paste, fruit juice and/or fruit pulp, and to sesame paste-based non-dairy yogurts.
More than ever before, there is a growing awareness and concern in the population regarding the nutritional requirements and the importance of consuming healthy food products for achieving an optimum quality of life. The growing interest in the field of nutrition has led consumers to strive for new nutritious food products, thus encouraging manufacturers and suppliers of food products to explore and develop healthier foods. Moreover, health conscious consumers are now seeking healthier alternative foods that are delectable and at the same time boost their energy and stimulate their immune systems. Thus, the knowledge of how to produce food products that meet the nutritional and health requirements of today, while still being delicious and enjoyable, has become instrumental for the wellbeing of the public.
The necessity to address the special dietary needs of a relatively large portion of population which is allergic to a variety of food ingredients such as lactose, gluten, albumin, and/or of people suffering from high cholesterol levels, obesity and the like, motivates the search for a healthier, yet at least as tasty, alternatives for common desserts and appetizers.
Sesamum indicum
The oval-shaped seeds of the sesame plant are one of the oldest seeds known as an important oilseed crop. Africa is considered to be the primary centre of origin of this crop, and India and Japan are considered as secondary centers of origin. Sesame seed contains a high percentage of oil (ca 55%), and has a very good stability due to the presence of natural anti-oxidants. Sesame oil is extensively used for cooking, manufacturing perfumed oils and medicine.
There are three types of sesame seeds distinguished by their color: white, brown and black seeds. The white-seeded varieties have higher oil content compared to the black-seeded. The testa color of the white seeds ranges from cream to white, of the brown seeds ranges from light-brown to dark-brown, and of the black seeds ranges from dark-brown to black. White sesame seeds have a nutty flavor, while black seeds taste slightly bitter.
Sesame seeds are featured in many traditional Asian cuisines. Spice paste concoction made with sesame seeds enhance Indian dishes, and sesame play a role in Japanese vegetarian cooking. In China, sesame seeds are used for flavoring savory dishes.
Sesame paste obtained from grinding the sesame seeds has a rich aroma and resembles peanut butter in color and texture. In Mediterranean countries, the sesame paste, known as “tahini”, is prepared from untoasted seeds. Toasting sesame seeds to make sesame paste is a time honored culinary technique, giving the paste a different flavor than tahini.
The sesame seeds are also used in sweet confections. Baking and preparation of sweets and confectionery (e.g., benne cakes) with sesame seed provide desserts as a rich source of protein, carbohydrates, and minerals like calcium and phosphorous. Tahini is used in a Middle Eastern confection called “halvah”. In India, sections of the Middle East and East Asia, popular treats are made from sesame mixed with honey or syrup and roasted (called pasteli in Greece). In Japanese cuisine goina-dofu is made from sesame paste and starch.
Sesame seeds and/or sesame paste have been reported to be incorporated into frozen desserts along with dairy ingredients. JP 1107500 describes a soft ice-cream comprising sesame paste. CN 1057948, JP 03297353 and CN 1078865 disclose a dairy ice-cream comprising sesame paste. US 2006/0078651 describes a dairy ice-cream comprising sesame paste and a nutritional supplement. CN 1158222 describes a “crisp” dairy ice-cream containing sesame “skin” and cracker crisp.
CN 1036310 and CN 1078861 describe sesame ice cream bars. CN 1078861 describes an ice-cream bar having 3-4% sesame juice made of raw sesame. CN 10783103 discloses a dairy ice-cream made of cooked black rice and ground sesame seeds.
JP 06078681 discloses ice-cream made of pumpkin or plum, mashed sesame, rice powder, cream and milk. JP 2006262854 describes a frozen dessert made of sugar, fat, and one or more fruits or vegetables such as: pumpkin, banana, mango, citrus fruits, sesame, etc.
U.S. Pat. No. 5,962,062 and CA 2542180 describe dairy ice-creams having a vegetable oil, which may be sesame oil.
It would be highly desirable to provide a non-dairy and egg free food product, particularly a sweet snack, refresher or dessert, containing sesame paste that would meet the needs of providing an all natural, as well as gluten- lactose-, albumin- and cholesterol-free alternative that not only appeals to the public because of its superior flavor, but also possesses a high nutritional index suitable to a population with special diet needs.
In one aspect, the present invention provides a non-dairy, egg-free food product comprising sesame seed paste, natural fruit juice and/or natural fruit pulp.
In another aspect, the present invention provides a sesame paste-based non-dairy yogurt that may optionally contain natural fruit juice and/or natural fruit pulp.
In addition to being free of dairy ingredients and eggs, the product according to the invention is gluten-, cholesterol-, and albumin-free, and as such is particularly suitable for a wide range of population with special diet needs.
The food product of the invention may be frozen or not. In one preferred embodiment, the product is frozen and, most preferably, it a sesame paste-based sorbet, soft ice cream or frozen yogurt. In another preferred embodiment, the non-dairy, egg-free product is not frozen and comprises, preferably, yogurt, pudding or snacks.
The food products of the invention comprise preferably natural ingredients, more preferably organic ingredients, such as organic fruits and organic sesame seeds. Any fruit available in its natural season such as strawberry, blackberry, cranberry, cherry, grapefruit, pomegranate, mango, papaya, orange, apple, grape, lychee, lemon, tangerine, persimmon, melon, peach, apricot, plum, guava, dates, pineapple, fig, banana, passion fruit, coconut or a mixture thereof, can be used for the preparation of the non-dairy food product of the invention.
The present invention further provides a process for the preparation of a sesame paste-based sorbet and soft ice cream.
The present invention provides, in a main aspect, novel high nutritive value non-dairy and egg-free food products based on polyunsaturated vegetable fats originating from sesame seeds. The food products provided by the invention contain no animal fat, eggs, or dairy ingredients such as milk or cream, and as such they are cholesterol-free, gluten-free and have low calorie content. These products provide a healthier alternative and, particularly, address the needs of allergic individuals presenting susceptibility e.g., to gluten, lactose, eggs and/or individuals suffering from high cholesterol levels and/or obesity.
In one preferred embodiment, the present invention provides a non-dairy, egg-free food product comprising sesame paste, natural fruit juice and/or natural fruit pulp.
In a more preferred embodiment, the sesame paste used according to the invention is the crude paste known as “tahini”. The tahini may comprise any of the known variety of sesame seeds, namely, white, brown, black or any combination thereof. In a most preferred embodiment, the sesame paste is made of white seeds.
The sesame paste may be made from hulled seeds, namely seeds that were skinned of their shell, or the paste may be made from whole seeds and thus be richer in minerals, especially calcium, which reside in the shell. In one preferred embodiment, the sesame paste in made from hulled seeds. In another preferred embodiment, the sesame paste is a “whole paste”, i.e., made from unhulled seeds.
Many types of fruits can be used for the preparation of the non-dairy, egg-free products of the invention. Non-limiting examples include strawberry, blackberry, blueberry, cherry, cranberry, grapefruit, pomegranate, kiwifruit, mango, papaya, orange, apple, grape, lychee, lemon, tangerine, persimmon, melon, peach, apricot, plum, guava, dates, pineapple, fig, banana, passion fruit, coconut or a mixture thereof.
In a most preferred embodiment of the invention, the non-dairy food products are organic food products namely, comprise ingredients, which are cultivated organically, or derived from organically grown fruits or vegetables.
The products provided by the invention do not comprise milk or cream nor eggs and are, therefore, healthy and nutritious substitutes for common food products, especially sweet food products such as desserts, snacks and refreshers. The non-dairy, egg-free food products of the invention are designed to resemble known dairy and egg-containing products in appearance, texture and taste. For convenience reasons, the products of the invention are named herein according to the dairy and/or egg products for which they represent alternatives. Thus, it is to be understood that the food products herein designated “mousse”, “pudding”, “custard”, “sorbet”, “gelato”, “mellorine”, “frozen custard”, “yogurt”, “frozen yogurt” or “soft ice cream” are in fact mousse-like, pudding-like, custard-like, sorbet-like, gelato-like, mellorine-like, frozen custard-like, yogurt-like, frozen yogurt-like, or soft ice cream-like food products based on sesame paste, and contain no dairy ingredients or eggs.
The sesame paste-based food product of the invention may further comprise ingredients that contribute to the texture, look and palatability of the products or provide additional nutritional and/or therapeutic value. These additional ingredients include, but are not limited to, (a) soymilk; (b) natural supplement selected from nutraceuticals, nutrients, colorants or flavorants such as vanilla; (c) dietary fibers such as bamboo fibers or Chicory fibers (Inulin); (d) chocolate; or (e) carob.
Thus, in one embodiment, sweet, unfrozen, sesame paste-based products are provided selected from mousse, fruit shake, sherbet, pudding, custard, or snacks.
In another preferred embodiment, frozen products are provided selected from sorbet, frozen fruit puree, gelato, mellorine, frozen custard or soft ice cream.
In one preferred embodiment, the invention provides non-dairy, egg-free snacks, more preferably an alternative snack to the chocolate-coated marshmallow treats known in the United States as “Mallomars”. The snack comprises a circular biscuit or Graham cracker base on the bottom and whipped egg white cream or a puff of extruded marshmallow from above, coated with a thin layer of chocolate, which forms a hard shell. According to the invention, the sesame paste replaces the puff inside. This snack is produced in different variations around the world, with several countries claiming to have invented it or hailing it as their “national confection.” In the United Kingdom this confection is known as a chocolate teacake or Tunnocks, in Canada it is called Whippet, in the Netherlands the name is “Negerzoenen” (“Negro kiss”), in Germany it is “Schokoküsse”, and in France the name is tête de choco (“chocolate heads”) or simply meringue au chocolat (“chocolate meringue”). In Israel this dessert is called “Krembo” (literally “cream-in-it”), and it is a very popular alternative to ice-cream during winter time.
In most preferred embodiments of the invention, the frozen sesame-based products or refreshers of the invention are sorbet or soft ice cream.
Classically, “sorbet” refers to the frozen fruit dessert typically made with a sweetener and a fruit puree. Sorbet evolved from sherbet, a cooled drink served widely in the Middle East, prepared from fruit juices, sugar, and water or ice. Unlike gelato, sorbet is made vegan, meaning that it contains no animal products, and it tends to be slightly softer than gelato. It also tends to be lower in fat than many other frozen fruit desserts, as it contains no animal products. Because sorbet is not typically thinned with water, it tends to be very dense and intensely flavored.
In the United States, sherbet and sorbet are synonyms and often confused with Water Ice and Italian Ice. The American sorbet/sherbet must also include dairy ingredients such as milk or cream to reach a milk fat content between 1% and 2%. Products with higher milkfat content are defined as ice cream; products with lower milkfat content are defined as water ice.
The sorbet provided by the present invention contains sesame paste, fruit juice and/or fruit pulp and thinned with water. The sorbet of the invention is dense and even in texture, unlike the slushy ice or a granular granita. It is made like ice cream and gelato by slowly freezing down the ingredients while mixing them constantly to create an even, consistent texture.
The fruit pulp or fruit puree content in the sorbets of the present invention is lowered as compared to a classical sorbet by thinning with water and/or fruit juice, but unlike classical sherbet it is not based solely on fruit syrup and water, has non-dairy fat content of between 1 and 2%, and may further comprise stabilizers and emulsifiers useful in the manufacture of ice cream. Preferably, the fruit juice and/or fruit puree content in the sorbet of the invention is 30-65%, more preferably about 40%.
The products of the invention may be categorized into three groups, herein designated: “standard”, “premium” and “supper premium”. The standard group included products containing up to 32% fruit and additives, stabilizers and emulsifiers, which are commonly used in the food industry.
The premium products contain at least 40% fruit and all the additives, stabilizers and emulsifiers used are 100% natural ingredients. The supper premium products contain at least 40% fruit and all ingredients are organic. These products are also categorized as organic food products.
The non-dairy, egg-free products of the invention may be sweetened with a natural sweetener selected from, but not limited to, sucrose, corn syrup, honey, glucose, dextrose, fructose, date honey, maple syrup or maltodextrin.
In a preferred embodiment of the invention, sucrose is the main sweetener and the dessert may contain from 10 to 20% sucrose. In a more preferred embodiment, the products is sweetened primarily with sucrose and further contains glucose, honey and/or date honey (also known as date syrup), each in amounts ranging from 1 to 5% of the total mass.
In another embodiment, the products may be sweetened with sugar alcohols which technically are not artificial sweeteners, and are herein referred to as semi-artificial sweeteners. Examples include sorbitol, xylitol, lactitol, mannitol, isomalt, and maltitol, which are used to sweeten “sugar-free” foods such as candy, cookies, and chewing gum.
The non-dairy, egg free products of the invention may also be sweetened with an artificial sweetener selected from, but not limited to, saccharin, aspartame, sucralose, neotame or acesulfame potassium.
According to one preferred embodiment, the product of the invention contains the main following ingredients: fruit juice and/or fruit pulp in amounts ranging from 30 to 65%, preferably 50 to 60%; crude sesame seed past (tahini) in amounts ranging from 1 to 3%, preferably 1.5 to 2.5%; sucrose in amounts ranging from 10 to 23%, preferably 13 to 18%; at least additional natural or semi-artificial sweeteners in amounts ranging from 1 to 5.5%, preferably 1.5 to 4%; and water, up to 50% of the total mass. The product may further contain stabilizers and emulsifiers, depending on the texture desired. The additional, one, preferably two or three natural or semi-artificial sweeteners in the product may be glucose, honey, date honey or maltitol.
Most preferably, the sweet non-dairy, egg free product provided by the invention is a sesame paste-based sorbet or soft ice cream, which comprise (i) sesame paste from white sesame seeds; (ii) fruit juice and/or fruit pulp, wherein said fruit is strawberry, blackberry, cranberry, cherry, grapefruit, kiwifruit, pomegranate, mango, papaya, orange, apple, grape, lychee, lemon, tangerine, persimmon, melon, peach, apricot, plum, guava, dates, pineapple, fig, banana, pear, passion fruit, coconut, or a mixture thereof; and (iii) natural sweeteners selected from sucrose, honey or date honey.
In most preferred embodiment, the sorbet or soft ice cream are selected from pomegranate, red grapefruit, grape, coconut, or lychee sorbet or soft ice cream.
In a further aspect, the present invention provides sesame paste-based non-dairy yogurt.
The thick, custard- or pudding-like yogurt provided by the invention is made by the natural bacterial fermentation, wherein the bacteria are grown on sugars other than lactose, most preferably dextrose.
Lactobacillus acidophilus
Streptococcus thermophilis
Lactobacillus bulgaricus Lactobacillus casei, Lactobacillus rhamnosus
Bifidobacterium bifidium, Lactobacillus lactis
The process of making dairy yogurt involves culturing cream or milk with live and active bacterial cultures; this is accomplished by adding bacteria directly to the milk, wherein the bacteria use the milk sugar lactose for growth. Commercially made yogurt is mostly made with cultures of and , but other cultures may be useful such as or . Acidophilus is touted for its many health benefits, some of which have been known about for thousands of years.
Lactobacillus bulgaricus
Streptococcus thermophilus
Soy yoghurt (also termed soygurt) a commonly marked vegan substitute for the dairy yogurt, is prepared using soymilk, yogurt bacteria, mainly and and sometimes additional sweetener, like fructose, glucose, honey or raw sugar. Soymilk has about the same amount of protein (though not the same amino acid profile) as cow's milk, but unlike cow's milk it has little saturated fat and no cholesterol, which is a benefit.
Recent studies concerning soy products consumption and its short- and long-term effects on human health, have raised questions over whether the ingredients in soy might increase the risk of breast cancer in some women, inhibit the production of sperm in men, affect brain function and lead to hidden developmental abnormalities in infants.
The core of soy critics' concerns rests with the chemical makeup of soy: in addition to all the nutrients and protein, soy contains an impressive array of natural phytochemicals (biologically active components derived from plants), the most interesting of which are known as isoflavones, which mimic estrogen, the female hormone, and thus may alter sexual development. Soybeans also contain high levels of an anti-nutrient called “phytic acid”, which may block the absorption of certain minerals, including magnesium, calcium, iron and zinc.
Streptococcus thermophilus, Bifidobacterium bifidium, Lactobacillus bulgaricus, Lactobacillus acidophilus, Lactobacillus casei, Lactobacillus rhamnosus
Lactobacillus lactis
Streptococcus thermophilus
Lactobacillus acidophilus
The non-dairy yogurt of the present invention addresses the need for a daily-basis consumed food product having the beneficial effects of yogurt but devoid of the harmful effects of cow milk and soymilk. The yogurt comprises sesame paste, and at least one bacterial culture selected from , or , preferably or , and sugar as substrate for bacterial growth, preferably dextrose. This product is a rich source of absorbable calcium, manganese, magnesium, copper, iron, zinc, vitamins, minerals and proteins.
According to a more preferred embodiment, the sesame paste-based non-dairy yogurt comprises: (i) fruit juice and/or fruit pulp, wherein said fruit is selected from strawberry, blackberry, cranberry, cherry, grapefruit, kiwifruit, pomegranate, mango, papaya, orange, apple, grape, lychee, lemon, tangerine, persimmon, melon, peach, apricot, plum, guava, dates, pineapple, fig, banana, pear, passion fruit, coconut or a mixture thereof; (ii) natural sweeteners selected from sucrose, honey or date honey, preferably honey; and optionally, at least one semi-artificial sweeteners; (iii) one or more stabilizers; and (iv) an emulsifier.
In a preferred embodiment, the sesame paste-based non-dairy yogurt of the invention may further comprise soymilk, however the amount of soymilk is, at most, half of the amount used in common soy yogurts.
The sesame paste-based non-dairy yogurt of the invention may be enjoyed in a variety of ways, most likely as a cool dish either naturally flavored or mixed with fruits. The yogurt can be used to make healthy shakes or frozen to eat like ice cream. The non-dairy yogurt can also be used when cooking, in place of milk, sour cream, and even some cheeses.
In one more preferred embodiment, the sesame paste-based non-dairy yogurt is served as a frozen dish, i.e., frozen yogurt.
The fats in the non-dairy products of the invention originate from sesame seeds. In addition, the sesame seeds provide minerals such as manganese, magnesium, copper, iron, zinc and calcium (90 mg per tablespoon for unhulled seeds, 10 mg for hulled), and contain vitamins such as B1, B6 (thiamine) and E (tocopherol). Just a quarter-cup of sesame seeds supplies 74.0% of the daily value (DV) for copper, 31.6% of the DV for magnesium, and 35.1% of the DV for calcium. This rich assortment of minerals translates into important health benefits such as possible relief for rheumatoid arthritis imparted by copper, which is a trace mineral important in a number of anti-inflammatory and antioxidant enzyme systems; Magnesium supports vascular and respiratory health, whereas calcium helps to prevent colon cancer, osteoporosis, migraine and PMS; zinc may be beneficial for bone health, making sesame-containing food valuable for bone mineral density especially for older men and women.
In addition to these important nutrients, sesame seeds contain two unique substances: sesamin and sesamolin that belong to a group of special beneficial fibers called lignans, and have been shown to have a cholesterol-lowering effect in humans and to prevent high blood pressure and to increase vitamin E supplies. Sesamin has also been found to protect the liver from oxidative damage.
Sesame seeds further contain phytosterols, which lower cholesterol levels. Phytosterols are compounds found in plants, have a chemical structure very similar to cholesterol, and when present in the diet in sufficient amounts, are believed to reduce blood levels of cholesterol, enhance the immune response and decrease risk of certain cancers. Sesame seeds have the highest total phytosterol content (400-413 mg per 100 gr) as compared to other seeds and nuts.
Another important factor contributing to the high nutritive value of sesame seeds is their high content of polyunsaturated fatty acids (PUFA). It is suggested that the presence of high levels of polyunsaturated fatty acids in sesame oil might help in controlling blood pressure and lowering the amount of medication needed to control hypertension. Sesame oil is unique in that it has high concentrations of omega-6 fatty acids, particularly linoleic acid, which is present in amounts ranging from 35 to 50%.
The nutrients of sesame seeds are better absorbed if the seeds are ground or pulverized before consumption.
Any of the non-dairy, egg-free food products of the invention may further comprise a natural supplement selected from a nutraceutical, nutrient, dietary fiber, colorant or flavorant.
Nutraceuticals provide medical or health benefits, including the prevention and treatment of disease and include, without limitation, flavonoids, antioxidants such as gamma-linolenic acid, beta carotene and anthocyanins, dietary supplements such as folic acid or any other nutraceuticals approved by the FDA.
Nutrient is a substance essential to an organism's metabolism or physiology, which cannot be synthesized by the organism in sufficient quantities and must be obtained from an external source. Nutrients useful for the purpose of the invention include, without being limited to, organic nutrients such as carbohydrates, fats, proteins (or their building blocks, amino acids), vitamins, and inorganic chemical compounds such as minerals.
In certain preferred embodiments of the invention, the non-dairy, egg-free food products may contain stabilzer(s). The stabilizers are a group of compounds, usually polysaccharide food gums that are responsible for adding viscosity and firmness to the product. Introduction of stabilizers into the products results in many functional benefits for frozen as well as for the unfrozen products. Stabilizers extend the shelf life of frozen products such as sorbet by limiting ice re-crystallization during storage. Without the stabilizers, the frozen product would become coarse and icy very quickly due to the migration of free water and the growth of existing ice crystals. Stabilizers help to prevent heat shock effects resulting from partial melting followed by re-freezing. The stabilizers also stabilize the air bubbles and hold the flavourings. Thus, they prevent shrinkage from collapse of the air bubbles. In addition, at the time of consumption, the stabilizers promote good flavour release and provide some body and mouth feel without being gummy.
In non dairy, egg-free products such snacks, custard or mousse, the stabilizers provide the required firmness for the product.
The stabilizers useful for the purpose of the present invention include, but are not limited to, locust bean gum, guar gum, carboxymethyl cellulose, xantham gum, sodium alginate, gelatin or carrageenan, preferably guar gum or carrageenan.
Each of the stabilizers has its own characteristics and often, two or more of these stabilizers may be used in combination to obtain synergistic effect. Guar, for example, is more soluble than locust bean gum at cold temperatures, thus it is more applicable for the frozen products of the present invention. Carrageenan is generally not used by itself but rather as a secondary colloid to prevent the whey off of mix, which is usually promoted by one of the other stabilizers.
The non-dairy, egg-free products of the present invention may, preferably, contain an emulsifier. The emulsifiers are a group of compounds, which aid in developing the appropriate fat structure and air distribution necessary for the smooth eating and good meltdown characteristics desired particularly in frozen food products. The emulsifier molecules reside at the interface between fat and water, and as a result they act to reduce the interfacial tension or the force, which exists between the two phases of the emulsion. The emulsifiers actually promote a destabilization of the fat emulsion, which leads to a smooth, dry product with good meltdown properties.
The traditional ice cream emulsifier was egg yolk, which was used in most of the original recipes. Today, two emulsifiers predominate most frozen food formulations: mono- and di-glycerides, derived from the partial hydrolysis of fats or oils of animal or, more preferably for the purpose of the present invention, of vegetable origin, primarily derived from soybean and canola oil. Together, the stabilizers and emulsifiers make up less than one half percent by weight of the products of the invention. They are all compounds which have been exhaustively tested for safety and have received the “generally recognized as safe” (GRAS) status.
In another aspect, the present invention provides processes for the preparation of the non-dairy food products of the invention. These processes combine techniques known in the food industry for the preparation of frozen and non-frozen products, with techniques specially designed for the present sesame paste based products.
In a preferred embodiment, the invention provides a process for the preparation of a non-dairy sorbet, which comprises the following steps:
a. preparing a mixture herein designated “ice cream mix”, comprising blending water, sweetener(s), stabilizer(s) and emulsifier(s), followed by pasteurizing;
b. preparing a pasteurized mixture of sesame paste and fruit juice and/or fruit pulp;
c. combining the pasteurized mixture obtained in (b) with the ice cream mix obtained in (a) and homogenizing the mass;
d. cooling the homogenized mass to a temperature of 4-8° C.;
e. transferring the homogenized mass obtained in (c) into an ice cream machine for half-way freezing; and
f. packaging the half-way freezed mass in containers, and shock freezing it at −30° to −40° C., followed by deep freezing at −28° C. for at least 24 hours to obtain said non-dairy sorbet.
Thus, first the ice cream mix is prepared and pasteurized. As used herein the term “ice cream mix” refers to a blend of water, sucrose, glucose, stabilizer and emulsifier.
In a separate process, a sesame paste obtained from either hulled or whole (unhulled) seeds ground in grindstones is heated to a temperature around 100° C. and mixed with fresh fruit juice and/or fruit pulp, such that the juice and/or pulp is heated and subsequently pasteurized. The heat generated from pasteurizing the sesame paste is thus used for pasteurizing the fruit juice.
Prior to grinding by grindstones into a paste, the sesame seeds are collected and monitored for their quality and ripeness, and then undergo selection based on their size.
The next step in the preparation of the frozen sesame paste-based food products of the invention, is combining the ice cream mix with the pasteurized mass which comprises the sesame seed paste and fruit juice and, optionally, the fruit pulp, and homogenizing the resulting mixture. Homogenizing forms the fat emulsion in the presence of an emulsifier, makes a smoother texture, gives a greater apparent richness and palatability, better air stability and increases resistance to melting. Since sesame seed paste readily mixes with water, homogenization of the mix can take place at ambient temperature.
Following homogenization, the mass is cooled from a temperature of 80-90° C. down to a temperature of 4-8° C., then transferred to an ice cream machine and enters the dynamic freezing process, which both freezes a portion of the water and whips air into the frozen mix. This stage in the process is termed “aging”. Any ice cream machine or ice cream maker commonly used in the manufacture of ice cream may be suitable for the purpose of the invention.
The frozen food products of the invention, particularly sorbet and soft ice cream, contain a considerable quantity of air, up to half of their volume. This gives the products their characteristic lightness. Without air, the refresher would be similar to a frozen ice cube. The semi-frozen slurry obtained up op this point in the process, wherein about half of its water is frozen, has a consistency similar to soft-serve dessert.
After the product, preferably sorbet, is half-way frozen, it is packaged in containers, and placed into a blast freezer at −30° to −40° C. where most of the remainder of the water is immediately frozen in a process termed “shock freezing” or “hardening”. The shock freezing enables faster hardening, which provides a smoother product. For packaging of the sorbet, any containers commonly used for marketing of frozen food products may be suitable as long as the package type does not impede heat transfer during the hardening process. Thus, for example, styrofoam liner or corrugated cardboard may protect against heat shock after hardening, but reduces heat transfer during freezing so they are not feasible.
Following the immediate hardening stage, the containers are transferred to a deep freezer and maintained at a temperature of about −28° for at least 24 hours before the product is marked. The sorbet is stable for indefinite periods at this temperature without danger of ice crystal growth; however, above this temperature, ice crystal growth is possible and the rate of crystal growth is dependant upon the temperature of storage.
In one preferred embodiment, the frozen product, preferably sorbet, of the invention is defrosted or softened back into its liquid condition, and transferred into a soft ice cream machine to obtain a soft ice cream (also termed “American ice cream”), which is consumed in situ.
The sorbet is prepared by combining two masses prepared separately: the ice-cream mix and the sesame seed paste, and processing the combined mass according to standard process known in the art of ice cream manufacture.
The mix is prepared by blending water, sweetener(s), stabilizer(s) and emulsifier(s), in a container followed by pasteurizing. A quantity of 1000 ml of the ice cream mix contains: water in amounts ranging from 500 to 800 ml, preferably 650 to 750 ml; sucrose or semi artificial sweetener in amounts ranging from 100 to 250 gr, preferably from 150 to 220 gr; glucose, in amounts ranging from 35 to 55 gr, preferably from 45 to 55 gr; a stabilizer in amounts ranging from 1.5 to 7.7 gr, preferably 2.5 to 6.8 gr; and an emulsifier in amounts ranging from 1.6 to 7.5 gr, preferably 2.8 to 6.8 gr.
Sesame seeds are collected and monitored for their quality and ripeness, and undergo size selection using a mechanical filter. The sifted seeds are rinsed and soaked in sweet water, following which they are hulled, immersed in salt water to facilitate the separation of the hull from the grain, and finally drained in a centrifuge. After thoroughly drying the seeds (in a steam oven), they are ground by grindstones into a paste.
The fruits used for the preparation of the sorbet are first checked for their quality, and after rinsing they are extracted by squeezing. The fibers and pulp are separated and collected and may later be combined with the juice for the preparation of a thicker or richer product.
The ice cream mix obtained in (a) is combined with the pasteurized mass which comprises the sesame paste and fruit juice and/or fruit pulp obtained in (b) and (c), and the resulting mixture is homogenized.
Following homogenization, the mass obtained in (d) is transferred to an ice cream machine and enters the dynamic freezing process, which both freezes a portion of the water and whips air into the frozen mix.
After the sorbet is half-way frozen, it is packaged in containers, shock freezed by placing it into a blast freezer at −30° to −40° C. where most of the remainder of the water is immediately frozen.
For packaging, any container commonly used for marketing of frozen food products is suitable, provided the package does not impede heat transfer during the hardening process.
Following the immediate hardening stage, the containers are transferred to a deep freezer and maintained at a temperature of about −28° for at least 24 hours before the product is marked.
A non-dairy sesame paste-based sorbet may contain any kind of fruits, preferably available fresh, wherein fresh organic fruits in their natural season are more preferred. The sorbet comprises, per 1000 ml:
a. fruit juice and/or fruit pulp, from about 200 to about 600 gr, preferably from 300 to about 450 gr, wherein said fruit is selected from strawberry, blackberry, cranberry, cherry, grapefruit, kiwifruit, pomegranate, mango, papaya, orange, apple, grape, lemon, tangerine, persimmon, melon, peach, apricot, plum guava, dates, pineapple, fig, banana, pear, passion fruit, coconut or a mixture thereof;
b. natural sweeteners: sucrose from about 100 to about 220 gr, preferably from about 120 to about 180; honey from about 7 to about 20 gr, preferably 10 to 18 gr; and date honey from about 5 to about 20 gr, preferably 8 to 12 gr;
c. white sesame seed paste, from about 8.0 to about 25.0 gr, preferably from about 10 to 18 gr;
d. stabilizer, from about 0.7 to about 3.0 gr, preferably from about 1.5 to about 2.5 gr;
e. emulsifier, from about 0.7 to about 1.0 gr preferably from about 1.5 to about 2.5 gr;
f. lemon juice, from about 15 to about 35 ml, preferably from about 20 to about 30 ml; and
g. water, from about 350 to about 570 ml, preferably from about 450 to about 550 ml. | |
'Experiment', referring to science, is a research method carried out to support, refute or validate different assumptions. Relating to the culture, art and music, the experiment becomes a search for innovation, different ways of expression and sensibilities. Questioning the already known elements the artists explore the unpredictability of their own talent and imagination.
The Camerata Europaea (CE) wants to break new ground by creating innovative programs and giving way for experimental orientations. This platform accesses the audience and involves it actively. New means of expression will be discovered and creative ideas will be developed. The CE supports a sustainable dialogue with training programs (tonSpuren), interactive experiences (workshops), Europe-wide cooperation initiatives (Creative Europe Cooperation Program) and modern cycles (experimental videos/performances). All this draws a thematic bow between music, art, culture and lifestyle.
PROJECTS
Music meets Architecture
Music and architecture – what do they have in common? Music creates a world out of sound, architecture creates a world out of raw material. One world is immaterial, while the other is visible and touchable. At the series 'Music meets architecture', both disciplines go hand in hand. The collective Krater Fajan, which is upcycling old materials for its art, built a sculpture out of 18.000 plastic cups. The sculpture was fixed above the concert hall. Alighted by visuals and in connection with music of Mendelssohn Bartholdy, room and sound transformed to a synesthetic overall impression. This transferred a vision of the world that can be created if sound and space form a symbiosis.
Utopia – New Reality
Utopia draws a picture of an ideal society. Frequently, there is still a great gap between this longing and the reality that surrounds us. There is a beautiful metaphor for this: diamond, the hardest mineral and graphite, the softest mineral, are both carbon. Due to their molecular structure, however, there are great differences in their strength. This principle could also apply to mankind. Fixed, inelastic systems are created through hierarchical structures, nationality and religion. If we were to recollect our original, great common ground of being-human beings, these fixed structures would break open. One way to do this is through music, art and culture. CE strives to combine various artistic disciplines. Not only the artist crosses the boundaries of his art, he also takes the viewer or listener on this journey. Especially music and art are able to show us the relativity of rigid patterns of thought and how to loosen them.
The Sound of the Product
What is the sound of an object? Can an object be assigned a sound, even a tone? And how come this sound? These questions can be answered by adding an acoustic dimension to objects. In order to answer these questions, is necessary to do a creative analysis of the objects. Through experiments the Camerata Europaea searches for acoustic traits of objects. This search will soon no longer refer to objects only. It extends to the acoustics of workflows, movements, spaces and much more. In the end, the entire sound of a creative world can be incorporated into the results of this search.
CLASSIC works, NEW perception, EVERLASTING inspiration
The search for inspiration and the longing for enlightenment accompany mankind since its existence. Also Art resembles an endless search for new things. It has the power to compose its own worlds and bringing it to life. Through modern reinterpretations of classical works they are transposed into the timeless. On the one hand, this is achieved through creativity and innovation. On the other hand, there is a revival through a touch of our present-day spirit. The desire for something fresh, daring and moving is driving every creator.
New approaches modify our traditional understanding of the arts and our expectations. The result is a world without artistic certainties that makes the viewer a part of it. This unorthodox approach requires a curious, progressive audience. Traditional mechanisms are erased and replaced by heterophonic, polyphonic, visual and musical lines.
Within the framework of the 'Borderless' festival, such an opportunity presented itself with the reinterpretation of Stravinsky's 'The Soldier’s Tale', which was brought to the present through new media, choreography and music offering a new experience. This is the magic of Art.
Creative Europe Cooperation Programme 2014-2020 'DISPLACEMENT'
'displacement' of people towards new places
The project targets an international audience with the central location of Berlin and the EU countries and takes the spectator to spectacular places within everyone’s own interpretation.
'displacement' of artists towards experimentation
Artists are supported and encouraged to create their art within a new context. As major musical event these concerts communicate distinguished, as well as experimental musical culture and sound art.
'displacement' of ideas towards re-interpretation
The series represents a musical research and an artistic border experience. By reinventing the existing musical culture, it offers a new level of interpretation. The synthesis between the different art forms is a crucial factor distinguishing it from the great mass of performances and offers a platform for a musical discovery.
'displacement' of audiences towards groundbreaking experiences
The series offer a framework for one-of-a-kind experiences and unique impressions for the audience, which are emphasized by the interaction of the public with the artists.
'displacement' of performances towards innovative spaces
The series offers a broad spectrum and new trends of contemporary music and visual art with new media and applications of technology in the arts and opens it for discussion. Music, art, improvisation and performance merge together. | https://www.camerata.eu/en/camerata-active/camerata-experimental |
WikiTribune, according to its Wikipedia entry, is a news website in which journalists with established backgrounds “research, syndicate and report on widely publicised news stories alongside volunteers who curate articles by proofreading, fact-checking, suggesting possible changes, and adding sources from other, usually long established outlets”.
Theirs is a good list – I don’t personally know all the sources on the list, but the ones I do are all reputable.
And I thought it might be useful to make a similar list of South African news websites as an addition to the more US-centric sources they name. If you look for, or share, news from the sites listed below, you are unlikely to be dabbling in the troubled waters of misinformation and propaganda (especially if you cross-check one against the other).
That said, all these sites have in the past, and will in the future, make mistakes. Journalists are human too. But on the whole they are staffed with real people trying to bring you news as accurate as they can make it.
African News Agency (ANA) – a news agency rather than a news website, so you will see it a credit at the end of a story. Owned by Independent Media; has rights to overseas news sources.
* I have stuck with the big websites rather than sites representing individual print publications.
* The list has a short note giving my personal understanding of who the site represents – this is not necessarily an accurate reflection of every nuance of ownership, just my own mental shorthand of the place the site occupies in the media spectrum.
* You may feel that some entries in the list are biased, or you may have particular feelings about the owners of the site – and your reservations may be justified. But I personally know, or have known, actual coal-face journalists at all of these institutions and can vouch for their every day struggles to do their jobs to the best of their abilities. And that is the basis of my trust.
* * If I have left anyone out, please let me know in the comments below! | https://safehands.co.za/2018/05/24/dodge-fake-news-by-using-reputable-sources-heres-a-list/ |
Two years ago, I read Ulysses for the first time. Last semester, I did a course on this incredible book and I reread it. At the end of this course I had to write a paper and I just heard I got a very good mark for it, so yay!
As someone who studied Greek and Latin for a while, I have always been a bit intrigued by the intertextuality in Ulysses. I like intertextuality in general, it often feels like a nice literary puzzle. So when I had to choose what I wanted to do my paper about, I quickly decided to look at the relationship between Ulysses and Homer.
Now, I won’t bore you with all the technical details I analysed in my paper. What I do want to talk about, is the use of intertextuality. Because although I love analysing a work that way, I don’t like it when it becomes the main focus.
Ulysses is full of references to Homer, not just The Odyssey but The Iliad as well. I can spend a lovely afternoon reading about all those references or trying to find them out for myself, and thinking about the consequences for the story. But the problem with Ulysses, and with lots of other works that use intertextuality, is that this book is so much more complex. When you focus on intertextuality too much, you forget to do a feminist interpretation, or a postcolonial one, and if you specifically focus on Homer as an intertext, you might forget to look at Shakespeare and Dante! You don’t want your interpretation to become too narrow and miss all of these wonderful other aspects. This was one of the conclusions of my paper, that even though it can be clarifying to focus on an intertext, it is seldom the only key to a text. Always keep in mind that other interpretations are valid and necessary as well.
However, to me, Homer is still very important when reading Ulysses. Not only because Homer is important to me personally, but also because it helped me understand the text so much better. I read Ulysses in English, which is not my native tongue, and I found it quite difficult at times. Recognizing the intertextuality helped me understand the story better, the situations, the relationships between the characters. It gave me some support while I was trying to understand the text. And this can be done for any kind of interpretation: if you know more about another intertext or literary approach, use it! This is a complex text and it might come in handy. | https://booksien.com/2018/01/29/about-ulysses-and-the-odyssey/ |
current curriculum with the overarching aim of improving student-learning outcomes at the School.
Aims
- To give students the opportunity to develop skills and flexibility in using a variety of these technologies to enable them to develop into empowered, responsible users of ICT.
- To integrated the use of technology throughout the educational program and promote an inclusive learning environment.
- To increase students’ access to technology and provide tools and resources for the future.
- To promote safe use of digital technology and encourage responsible online behaviour.
Implementation
- ICT includes the use of: computers, iPads, tablets etc., and their learning programs; the Internet; communication programs including email; and hardware such as interactive whiteboards and digital cameras.
- All students are required to complete and return the Agreement for Responsible Student Use (the Agreement) at the beginning of each school year to their class teacher before using the Internet or hardware. This ensures parents/guardians are included in supporting the appropriate use of ICT. The Agreement for Responsible Student Use outlines the standards of student behaviour, appropriate use of ICT and consequences for inappropriate use.
- Staff will make all efforts to ensure students understand and comply with the Agreement, with the support at home of parents/guardians.
- Access to the Internet is provided through a filtered Internet service. While this provides protection from inappropriate content, full protection cannot be guaranteed.
- Students are to access digital media that relates to learning activities and teachers supervise the use of ICT.
- Digital images taken as part of recording learning experiences may only be used for educational purposes.
- Teachers will support students to gain an understanding of digital technology issues such as online privacy and intellectual property. Teachers will provide guidance and strategies to students when using ICT.
- Students are taught, and reminded, of inappropriate use of ICT, including the necessity of maintaining privacy when using the Internet and must inform their teacher of any inappropriate materials or content they encounter. This information will be passed on to a member of the school’s leadership team to investigate and, if necessary, block access.
- Any inappropriate use of ICT at school or within the school community will result in a corresponding consequence, which may include reporting illegal activities to the authorities and/or suspension of the use of ICT at school.
- Parents/guardians are supported by teachers to understand the importance of safe and responsible use of digital technologies and encouraged to monitor their child(ren)’s use of ICT at home at all times, including when completing school related tasks. The school will arrange for annual parent information sessions for this. Parents/guardians are encouraged to monitor all forms of ICT available to their child(ren) including, but not limited to, smart phones, tablets, iPads, computers and other new technologies as they are released.
- All incidences of cyber bullying are to be reported to teachers, including any incidences that occur out of school hours. Teachers may then investigate in accordance with the Preventing Bullying Policy.
- The school will include regular articles in the newsletter relating to the promotion of safe and responsible use of technologies.
- Any technology needs to be used accordance with our school values, the C.A.R.E. values.
- The school will arrange for cyber safety incursions for students at least annually. Professional development programs will be implemented at least annually to allow teachers to develop and refresh skills in relation to providing a safe, integrated and supportive digital learning environment. | http://ais-edu.org/?page_id=654&lang=en_US |
In 2012, Iraq and Afghanistan Veterans of America saw a need to create a safety net for transitioning veterans to connect them to the extensive, but often fragmented, network of support systems and resources available to them. The Rapid Response Referral Team has connected over 8,000 veterans to more than 9,400 resources. Unfortunately, the needs of today’s veterans remain high.
Clients reached out this week seeking assistance with VA disability claims, financial assistance, mental health access and legal support. Clients continue to reach out seeking employment services. Emergency financial assistance needs were related to multiple issues which included being behind on rent/and or have been served an eviction notice, utility bills, car loans and car insurance. Clients continue to reach out seeking legal assistance and help accessing their VA benefits, as well as navigating family law issues. | http://iava.org/blogs/rrrp-weekly-report-september-8-2017/ |
Technology is changing the way we teach.
As schools continue to invest in new classroom innovations, school leaders are laser focused on persistent problem areas—classroom instruction, student voice and engagement, and staff communication, to name a few.
One area of innovation, though, is talked about hardly at all: testing. In the post-No Child Left Behind era standardized testing isn’t the sexiest of topics. The hangover is understandable.
But ignoring the impact of technology on student testing isn’t an option, writes education researcher and blogger Matthew Lynch.
In a post on Education Week’s Education Futures blog, Lynch offers several reasons why schools are hesitant to adopt new testing technology—and why they should re-think their approach to student testing.
Mistrust stifles change
Though educators have shown a willingness to experiment with new instructional technologies, many are still understandably wary of technology’s ability to equitably and effectively assess student learning.
It’s a combination of old habits dying hard and fear of the new, writes Lynch:
Changing the format of how these tests are delivered is a scary proposition for many lawmakers and administrators, one that does not come without a hefty price tag. When you add in the consortium (albeit a small one) of educators who are leery when it comes to any technology takeovers in classrooms, it isn’t difficult to see why there is so much hand-wringing when it comes to updating the way that assessments are delivered.
To be fair, educators’ mistrust of technology isn’t unfounded.
In the era of WikiLeaks, hacked emails, and digital identity theft, it’s natural to worry about how tampering might affect test results. Given the importance of those test results—the implications on school funding alone are huge—it’s not surprising that school leaders are slow to embrace unproven solutions.
Just this summer, the Reuters news agency reported a leak of new questions on upcoming SAT tests. Now College Board (who produces the SAT) and other test suppliers are under pressure to tighten security on exams. Such stories only serve to deepen educators’ concerns about the technology.
Still too expensive?
Cost is also an important factor—one that often prohibits districts from adopting the solutions that make the most sense.
The prospect of revamping testing procedures and implementing new technology is daunting and expensive. Faced with limited budgets, Lynch explains, educators would rather spend on tools that enhance classroom learning versus testing.
Online assessment and other testing technologies will no doubt become more affordable over time, but for many schools the idea of adopting expensive technology to do what, in their minds, has traditionally been done via paper or a Scantron is difficult to reconcile.
Learning through testing
While cost and security are important considerations, Lynch says there is a larger issue at stake when it comes to student assessment.
“It is our job to ensure students have adequate access to and mastery of the technology that will be part of their everyday lives as adults,” Lynch writes. What better way to expose students to the proper-use and challenges of technology than via the tests they take in school?
For Lynch, the transition to digital assessments is an obvious one. Not only will it enhance students’ understanding of technology, but it will complement the rapidly changing nature of technology in classroom instruction.
New school technology investments always create a stir. Do you know where your community stands on the latest testing technologies? If not, it might be time to find out.
Have you integrated new assessments in your schools recently? How did it go? Tell us in the comments.
For his innovative thinking on ed-tech and other important issues, Matthew Lynch is one of our TrustED 20. Find out who else made the list and why. | https://www.k12insight.com/trusted/nobody-talking-testing-anymore/ |
The purpose of OOFRAS chat on Twitter is a learning exchange.
A way develop the knowledge and networks you need to provide safe and ethical occupational therapy services with people displaced by war and persecution.
Do you have a topic to discuss?
Previous #OOFRASchat Topics
- Integration – occupational aspects
- Networking – the ‘Who’s Working Where’ project
- New year, new direction – how to prepare for work with refugees?
- Language matters – how to work with interpreters?
- Disability – how does it intersect with displacement?
Discussion is easy
Add #OOFRASchat into the Twitter search bar to see the latest conversations.
Go ahead, ask questions, share information or links about the practice topic. Just don’t forget to add #OOFRASchat to each Tweet!
(If you’ll be asleep or at work, use Tweetdeck to schedule a Tweet. Others will respond and you can continue the chat later)
Do you need a record of professional development to maintain registration standards? Use the template provided by your regulatory body to record your reflections and learning outcomes and download the transcript as supporting evidence.
There is guidance on navigating the blurry line between work and personal life issued by regulatory bodies and professional associations. Basically, we maintain the same standard of professionalism and ethics online, as we do offline. | https://oofras.com/practice/oofraschat/ |
This module is designed to equip students with the necessary knowledge and skills base to undertake the appraisal, industrial application and exploitation of an idea in the vaccination/gene therapy sector of biosciences. It is an elective module for the MSc in Biotechnology, Bioprocessing and Business Management which when combined with the other electives in the biopharmaceutical area will provide a new industrial focus for students pursuing this Masters programme. The context of this module is that it sits within a programme that seeks to explain the increasing importance of integrating knowledge transfer, key regulatory and ethical issues, protection of ideas generation and funding to commercialisation.
Subject knowledge and understanding: By the end of the module the student should have a broad knowledge and understanding of the fundamental principles of vaccines, vaccination and gene therapy. A detailed understanding of vaccine development manufacture and use; ability to assess the potential for application, optimisation and commercialisation of biological processes relating to vaccines and gene therapy. Recognise and analyse the problems associated with the development and use of biological systems in relation to vaccines and gene therapy leading to a commercial process. Recognise the underlying principles associated with the transition of processes from the laboratory through manufacture to end use. The role of a multi-disciplinary approach to solving problems with vaccine development/implementation. Have a thorough understanding of the immune system, viral/cancer diagnosis and the role(s) of cancer vaccines and gene therapy. Be aware of issues involved in the exploitation of vaccines and gene therapy. Recognise the importance of education, multidisciplinary interaction and research for the future development of the speciality. Demonstrate an understanding of ethical issues pertinent to vaccines and gene therapy.
Lectures per week 10 x 1 hour; Seminar sessions 8 x 1 hour. | https://warwick.ac.uk/services/aro/dar/quality/modules/archive201617/postgraduate1617/pg_archive201617/lf/bs971/ |
Meet Me at the Museum (MMatM) is an initiative that seeks to make elementary school field trips to NYC museums as educational and meaningful as possible. By developing museum tours that highlight pieces that are relevant to what each class is focusing on in their current classroom curriculum, tours are interesting to the students and museums begin to feel more familiar and approachable. Enthusiastic college students lead each tour, passing their love for art onto each new class.
Our Beginnings
Meet Me at the Museum was founded at Columbia University in September 2015 by Alexandra Pass (Barnard '17) and Audrey Marutollo, a fifth grade teacher at PS-96. Since MMatM's inception, there have been 19 tours at both the Metropolitan Museum of Art and The Met Cloisters. Over 500 students have been able to enjoy an informative and interactive museum experience.
Our Values
Critical thinking
By guiding students through the process of analyzing a piece of art, we are cultivating the important skill of thinking critically across disciplines. Critical thinking empowers students to articulate their learning no matter what content is being addressed.
Connectedness
By connecting our tours’ content with the curricula students are already studying in school, we create an interdisciplinary connectedness. The value of an interdisciplinary education cannot be overstated as it has been proven promote significant learning takes place when meaningful and lasting classroom experiences occur. Interdisciplinary instruction fosters the acquisition of foundational knowledge, promotes integration of ideas from multiple disciplines and provides insight on how to apply knowledge, all of which enhances a students understanding of how to learn.
Communication
By fostering student’s participation throughout the tours, student’s ability to communicate original ideas can improve. Students will cultivate their ability to practice empathic thinking by looking at a work, identifying the emotions of the piece, and putting into words what they think is being expressed. This exercise will improve English language abilities across all disciplines.
Creativity
By studying the arts, a student’s creativity is naturally engaged. Furthermore, the arts drive creative inquiry, which is the fuel of all disciplines. It is through creative inquiry that we unlock questions, solve problems, and discover new possibilities both in and out of the classroom. | http://www.meetmeatthemuseum.com/about-us |
This invention relates to disperse dyes and more particularly to disperse dyes of the monoazo series and to methods for their manufacture and use.
In the synthetic dye field, many hundreds of individual products are manufactured. Of these, a small number become established as market leaders in their particular area of utility. Factors influencing the attainment of this status by a particular dye include hue, brightness, ease of manufacture, dyeing properties and fastness properties. One dye that has reached this position for the production of blue shades on polyester fibers is CI Disperse Blue 56 which has a simple anthraquinone structure and is easily applied giving bright blue colorations of high fastness.
Dyes of the anthraquinone series are noted for their brilliance of hue, especially in the blue region, and also for their excellent fastness properties, especially fastness to light. Unfortunately, they have relatively low tinctorial strength compared with all other major classes of dye and they are costly to manufacture. The replacement of anthraquinone dyes by other chromophores, because of their low cost- effectiveness, has been described by Renfrew (Rev.Prog.Coloration, 15, 1985, 15) as "a commercially attractive but technically difficult objective for dye manufacturers".
In a review of the disperse dye situation, Annen et al (Rev. Prog. Coloration, 17, 1987, 72) refer to the intensive efforts that have been made to replace anthraquinone dyes with technically equivalent and more economical products. The possible replacement of a number of red and blue anthraquinone dyes, including specifically the CI Disperse Blue 56 structure, by other chromophores is disscussed in some detail.
In our United Kingdom Patent No. 1394365, disperse dyes of the monoazo series based on certain 2-aminothiophene diazo components are described. The dyes vary in shade from yellow to green but, although cheaper to manufacture, none of the blue dyes specifically described has the combination of shade, brightness and fastness properties which are required in a replacement for CI Disperse Blue 56.
It has now been found, however, that a small class of dyes selected from the general class disclosed in Patent No. 1394365 provide the desired bright blue colorations having better heat and wet fastness that can be obtained from CI Disperse Blue 56 and at much lower cost.
Accordingly, the invention provides disperse monoazo dyes of the formula: ##STR2##
wherein each of R and R.sup.3 represents a lower alkyl radical,
R.sup.1 represents a lower alkyl or C.sub.3 -C.sub.6 alkenyl radical and
R.sup.2 represents a C.sub.2 -C.sub.6 alkyl radical carrying a hydroxy or acyloxy substituent.
Lower alkyl radicals which may be represented by R, R.sup.1 and R. sup. 3 include C.sub.1 -C.sub.4 radicals but R and R.sup.3 are preferably methyl radicals and R.sup.1 is preferably an ethyl radical.
Acyloxy substituents which may be present in R.sup.2 include
(i) radicals of the formula --OCOR.sup.4 wherein R.sup.4 represents an optionally substituted lower alkyl, aryl, arylalkyl or aryloxyalkyl radical,
(ii) radicals of the formula --OCOOR.sup.5 wherein R.sup.5 represents an optionally substituted lower alkyl or aryl radical, and
(iii) radicals of the formula --OSO.sub.2 R.sup.6 wherein R.sup. 6 represents an optionally substituted lower alkyl or aryl radical.
As examples of optionally substituted lower alkyl radicals which may be represented by R.sup.4, particular mention may be made of C. sub.1 -C. sub.4 alkyl radicals which may be substituted by halogen (especially chloro or bromo), lower alkyl or lower alkoxy.
As examples of optionally substituted aryl radicals which may be represented by R.sup.4, there may be mentioned phenyl radicals which may be substituted by halogen (especially chloro or bromo), lower alkyl, lower alkoxy, nitro, trifluoromethyl or cyano.
As examples of optionally substituted arylalkyl radicals which may be represented by R.sup.4, there may be mentioned phenyl substituted lower alkyl radicals, for example benzyl, which may be substituted in the phenyl radical by lower alkyl, halogen (especially chloro or bromo), lower alkoxy, nitro or trifluoromethyl.
As examples of optionally substituted aryloxyalkyl radicals which may be represented by R.sup.4, there may be mentioned phenoxy substituted lower alkyl radicals which may be substituted in the phenyl radical by lower alkyl, halogen (especially chloro or bromo).
It is preferred that R.sup.4 is methyl.
As examples of optionally substituted lower alkyl and aryl radicals which may be represented by R.sup.5, there may be mentioned optionally substituted C.sub.1 -C.sub.4 alkyl radicals and phenyl radicals.
As examples of optionally substituted lower alkyl and aryl radicals which may be represented by R.sup.6, there may be mentioned C. sub.1 -C. sub.4 alkyl radicals and phenyl radicals which may be substituted by halogen (espescially chloro or bromo), lower alkyl, lower alkoxy or nitro.
Preferred examples of R.sup.2 include 3-acetoxypropyl, 5- acetoxypentyl, 6-acetoxyhexyl and especially 4-acetoxybutyl. Other structures deserving particular mention include 2-hydroxyethyl, 2- hydroxypropyl, 3-hydroxypropyl, 2-hydroxybutyl, 4-hydroxybutyl, 5- hydroxypentyl and 6-hydroxyhexyl.
The dyes of Formula I may be prepared by diazotising an amine of the formula: ##STR3## wherein R has the meansing stated above, and coupling the resulting diazo compound with an aromatic amine of the formula: ##STR4## wherein R.sup.1, R.sup.2 and R.sup.3 have the meanings stated above.
The diazotisation and coupling may be carried out by appropriate methods conventionally used for these reactants and the dyes so formed may be isolated using known techniques.
In order to achieve maximum brightness, it can be advantageous to subject the dyes to conventional purification procedures, for example recrystallisation from organic solvents, chromatographic separations or washing with aqueous organic solvents. Suitable solvents for this purpose include alcohols, for example methanol, ethanol, propanol, isopropanol, ethylene glycol, diethylene glycol and the mono-lower alkyl ethers of these glycols, for example the methyl, ethyl and n-butyl ethers.
The 2-aminothiophenes of Formula II are known compounds and may be prepared by methods described in the prior art for the production of thiophene derivatives. The aromatic amines of Formula III are also known compounds.
The disperse monoazo dyes of the invention are valuable for colouring synthetic textile materials, especially secondary cellulose acetate, cellulose triacetate, polyamide such as polyhexamethylene adipadimide and, above all, aromatic polyester such as polyethylene terephthalate textile materials. Such materials can be in the form of filaments, loose fibres, yarn or woven or knitted fabrics. The dyes are also useful for colouring fibre blends containing one or more synthetic fibrous material together with other types of fibre, for example polyester-cotton blends.
The dyes, optionally in conjunction with other disperse dyes, may be applied to the synthetic textile materials by methods which are conventionally employed in applying disperse dyes to such materials. Thus, the dyes in the form of aqueous dispersions can be applied by dyeing, padding or printing processes using the conditions and additives conventionally used in carrying out such processes.
The dyes may also be applied to textile materials by known methods of transfer colour printing such as sublimation transfer printing and wet transfer printing. They can also be used for the melt coloration of synthetic polymers and as pigments for the coloration of inks and paints.
The invention is illustrated but not limited by the following Examples.
EXAMPLE 1
3.22g of sodium nitrite was added to 20ml of concentrated sulphuric acid and the mixture heated to 70° C. and then cooled to 5° C. A further 15ml of concentrated sulphuric acid was added followed by 25ml of an 86:14 mixture of acetic acid and propionic acid. 8. 45g of 2- amino-3-acetyl-5-nitrothiophene was then added slowly below 0. degree. C. and the mixture stirred at -2 to 0° C. for 2 hours and then at 0 to 2° C. for 3 hours when diazotisation was complete. The solution was then added to a mixture of 17g of N-(4- acetoxybutyl)-N- ethyl-m- toluidine, 100ml of methanol, 200g of crushed ice and 25ml of 1M sulphamic acid solution. The temperature was maintained at 0°-5. degree. C. and the pH at 1-2 by addition of sodium acetate solution. The mixture was stirred at 0°-5° C. for 2 hours and then the product filtered off, and washed with water. The filter cake was slurried in 50% aqueous methanol, refiltered and washed with methanol. Drying at 60° C. gave 9.79g of product. Alternatively, the product may be purified by slurrying in other aqueous solvents such as aqueous ethanol, 2- methoxyethanol, 2-ethoxyethanol, 2-n- butoxy-ethanol, or ethylene glycol, and if necessary heating up to reflux temperature then cooling and refiltering.
When applied to an aromatic polyester material from an aqueous dispersion, it gives a bright blue shade similar to that given by the anthraquinone dyestuff, CI Disperse Blue 56, with good build up, good heat fastness and light fastness and good wet fastness.
EXAMPLE 2
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 17.9g of N-(5-acetoxypentyl)-N-ethyl-m- toluidine.
When applied to aromatic polyester materials from an aqueous dispersion, the product gave bright blue shades similar to the anthraquinone dyestuff CI Disperse Blue 56 and showed good build up, good heat and light fastness and good wet fastness.
EXAMPLE 3
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 16.1g of N-ethyl-N-(6-hydroxyhexyl)-m- toluidine.
When applied to aromatic polyester materials, the product gave bright blue sshades similar to Example 1 with good heat and light fastness and good build up.
EXAMPLE 4
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 19g of N-(6-acetoxyhexyl)-N-ethyl-m- toluidine.
When applied to polyester materials, the product gave shades similar to CI Disperse Blue 56 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 5
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 16.1g of N-(4-acetoxybutyl)-N-methyl-m- toluidine.
When applied to aromatic polyester materials, the product gave bright blue shades having good build up, good heat and light fastness and good wet fastness.
EXAMPLE 6
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 19g of N-(4-acetoxybutyl)-N-n-butyl-m- toluidine.
When applied to aromatic polyester textile materials, the product gave shades similar to CI Disperse Blue 56 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 7
In place of the 8.45g of 2-amino-3-acetyl-5-nitrothiophene used in Example 1, there was used 9.2g of 2-amino-3-propionyl-5- nitrothiophene.
When applied to aromatic polyester materials, the product gave shades very similar to CI Disperse Blue 56 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 8
In place of the 8.45g of 2-amino-3-acetyl-5-nitrothiophene used in Example 1, there was used 9.8g of 2-amino-3-butyryl-5-nitrothiophene.
The product gave bright blue shades on polyester materials having good build up, good heat and light fastness and good wet fastness.
EXAMPLE 9
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 14.1g of N-ethyl-N-(2-hydroxybutyl)-m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good build up and good heat and light fastness.
EXAMPLE 10
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 14.1g of N-ethyl-N-(4-hydroxybutyl)-m- toluidine.
The product gave bright blue shades on polyester materials similar to CI Disperse Blue 56 with good build up and good heat and light fastness.
EXAMPLE 11
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 12.2g of N-ethyl-N-(2-hydroxyethyl)-m- toluidine.
The product gave blue shades on polyester materials similar to CI Disperse Blue 56 with good build up and good heat and light fastness.
EXAMPLE 12
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 13.2g of N-ethyl-N-(3-hydroxypropyl)-m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 having good build up and good heat and light fastness.
EXAMPLE 13
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 17.8g of N-(4-acetoxy-butyl)-N-allyl-m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 14
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 18g of N-ethyl-N-(4-propionyloxybutyl)- m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 15
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 19g of N-(4-butyryloxybutyl)-N-ethyl-m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 16
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 21.3g of N-(4-benzoyloxybutyl)-N-ethyl- m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good heat and light fastness and good wet fastness.
EXAMPLE 17
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 19.1g of N-(4-ethoxycarbonyloxybutyl)- N-ethyl- m-toluidine.
The product gave bright blue shades on polyester materials similar to CI Disperse Blue 56 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 18
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 19.5g of N-(4-methylsulphonyloxybutyl)- N-ethyl- m-toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good build up, good heat and light fastness and good wet fastness.
EXAMPLE 19
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 23.3g of N-ethyl-N-(4- phenoxyacetoxybutyl)-m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good heat and light fastness and good wet fastness.
EXAMPLE 20
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 22.2g of N-ethyl-N-(4- phenylacetoxybutyl)-m- toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good heat and light fastness and good wet fastness.
EXAMPLE 21
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 23.7g of N-ethyl-N-(4- phenylsulphonyloxybutyl)- m-toluidine.
The product gave bright blue shades on polyester materials similar to Example 1 with good heat and light fastness and good wet fastness.
EXAMPLE 22
In place of the 17g of N-(4-acetoxybutyl)-N-ethyl-m-toluidine used in Example 1, there was used 16g of N-(3-acetoxypropyl)-N-ethyl-m- toluidine.
The product gave bright blue shades on polyester materials with good heat and light fastness and good wet fastness. | |
Transmuting Negative To Positive Affirmations
Now every week I receive messages from people who are really suffering for one reason or another. When describing the issues they are facing they write in terms such as these:
"I never seem to have any money"
"I always seem to be suffering from ill health"
"Nobody seems to like me"
"I am slipping ever deeper in to debt"
"Life just doesn't seem worth living anymore"
These statements in fact reveal the extremely powerful affirmations passing through the Minds of these people, and because they are repeated with such emotion, and so faithfully believed to represent their true reality, they are impressed upon the Subconscious Mind in a very powerful way, ultimately assuring they will manifest into experience.
Just think for a minute how powerful the opposite of these thoughts would be, especially driven my the same level of emotion. In addition, positive thoughts have a much higher vibration, than their polar opposite negative thoughts, and are therefore exert a much more powerful impression on the Subconscious and consequently Universal Minds.
In principle it is much easier to consciously manifest wealth than it is to manifest debt. Yet because, in the case of debt, people are reacting to something they believe to be tangible, often fuelled by the powerful emotions of fear, worry and dread, as opposed to something perceived to be intangible, which in fact is the case, the emotion placed behind the negative situations are much greater.
Ask, and it shall be given you; seek, and ye shall find; knock, and it shall be opened unto you. For every one that asketh receiveth; and he that seeketh findeth; and to him that knocketh it shall be
opened.-- Matthew 7:8-9
The moment we "ask" for something it is immediately given and is every bit as real as the unwanted "things" that people focus on.
Imagine therefore if the same level of high vibration, positive emotion is channeled into the wanted things as the unwanted things.
There would be nothing that you cannot be, do or have.
The missing ingredient, and by far the most powerful and important one for most people is Faith. Not "blind" faith in a religious context for example, or an abstract faith based upon dogma, but true Faith in the knowing, beyond all doubt, the truth of our own Divine, immortal, infinite Being, and God given powers of creation though the infinite powers of our Subconscious, Subjective Mind.
Now turning back to these negative statements I receive from people, and for whom of course I do everything I possibly can to help.
Never, ever, ever finish a negative thought or statement! I simply cannot stress this enough. A negative thought becomes a "seed"
implanted in the fertile ground of your Subconscious, Subjective Mind where it will surely sprout and grow, fertilized by negative emotions until it bears poison fruit as a monster in your life.
By transmuting any negative thought in to a positive thought, only positive seeds will be sown, and, if fertilized by positive emotions, expectations and above all Faith, will soon become the things you most wish to experience in life instead of unwanted things.
So, taking these above negative statements received as an example - at the first sign of any such statement appearing in your Mind they should become:
"I always enjoy an abundance of money"
"I always enjoy perfect, radiant health"
"Everywhere I go, people enjoy my presence and wish to be my friend"
"Each and every day, more and more abundance flows in to my life"
"I look forward to the joyful experience of every new day"
And so on.
Always be vigilant for negative, destructive thoughts, and if one appears either cancel it by saying "cancel, cancel, cancel" as many times as necessary until the thought dissipates, or better still, transmute the thoughts in to their polar opposites as above.
Transmutation is an aspect of alchemy, which includes the transmutation of thoughts, and at its highest level, the transmutation of base human characteristics, representing base metals, in to the Gold of Divine perfection. | http://ourultimatereality.com/transmuting-negative-to-positive-affirmations.html |
derivational(redirected from derivationally)
Also found in: Thesaurus, Legal.
der·i·va·tion(dĕr′ə-vā′shən)
n.
1.
a. The act or process of deriving.
b. The state or fact of being derived; origination: a custom of recent derivation.
c. Something derived; a derivative.
2. The form or source from which something is derived; an origin.
3. Linguistics
a. The historical origin and development of a word; an etymology.
b. The process by which words are formed from existing words or bases by adding affixes, as singer from sing or undo from do, by changing the shape of the word or base, as song from sing, or by adding an affix and changing the pronunciation of the word or base, as electricity from electric.
c. In generative linguistics, the generation of a linguistic structure through an ordered or partially ordered series of operations on other structures, such as the creation of a surface structure from a deep structure, or of a complex word from its morphological components.
d. The formal description of the process of such generation.
4. Logic & Mathematics A logical or mathematical process indicating through a sequence of statements that a result such as a theorem or a formula necessarily follows from the initial assumptions.
der′i·va′tion·al adj.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Switch to new thesaurus
|Adj.||1.||derivational - characterized by inflections indicating a semantic relation between a word and its base; "the morphological relation between `sing' and `singer' and `song' is derivational"|
inflectional - characterized by inflections indicating grammatical distinctions; "inflectional morphology is used to indicate number and case and tense and person etc."
derivationaladjective
Stemming from an original source: | http://www.thefreedictionary.com/derivationally |
TECHNICAL FIELD OF THE INVENTION
BACKGROUND
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
The present invention relates to a wireless communication method and system for moving vehicles, such as trains, and in particular a method/system allowing more efficient communication to and from the moving vehicle, and in particular a method/system for wireless communication between a moving vehicle and remote servers through at least one external mobile network.
The demands on wireless communication capabilities in today's society are increasing rapidly. In particular, fast and easily accessible communication is desired through hand-held devices over large areas. It is particularly challenging to achieve such communication for mobile devices which are moving, e.g. when moving over large distances with poor network coverage or when affected by unknown sources of noise interrupting a signal for communication, such as clients moving on e.g. trains, airplanes, and other types of moving vehicles. In particular, if a client, such as a mobile phone, moves over large areas the client has to connect to several base stations in order to maintain a sufficient connection for communication.
Further, e.g. train carriages are made of metal, and even the windows are normally covered with a metal film. Accordingly, train carriages are shielded compartments, and direct communication between terminal antennas within the carriages and externally located antennas is difficult to obtain.
The mobile nature of a client with respect to the base stations may also introduce several potential sources of communication performance degradation. Such sources may derive from complex terrain, competition for available channels, or the source may be an unknown source of noise related to e.g. radio-frequency interference.
At the same time, there is today an increasing demand from passengers to be able to communicate through mobile phones and other handheld terminals when travelling on e.g. trains, and also to be able to get access to the Internet with laptops, PDAs etc. Further, with the new smartphones, and the way these are used, with e.g. continuously operating applications, many phones are active at all times, meaning that many handovers are required when the train moves. Even though this problem is common for all moving vehicles, it is especially pronounced for vehicles moving at high speed, such as trains and airplanes, and trains are in addition facing problems with poor line-of-sight between the base stations and the train. This puts a strain on the wireless network infrastructure, leading to poor performance.
To this end, it is known to provide a mobile access router for data communication, also connected both to an external antenna and an internal antenna, in each carriage, in order to provide Internet access on board the vehicle. Such mobile access router solutions are e.g. commercially available from the applicant of the present application, Icomera AB, of Gothenburg, Sweden, and are also disclosed in EP 1 175 757 and WO 15/169917 by the same applicant. This method has greatly improved the reliability of high-bandwidth wireless communication for trains and other large vehicles.
However, this solution may still be insufficient to obtain an optimal transmission performance, especially for large data volumes. Trains and other moving vehicles often pass through areas with bad radio coverage, and present solutions are often unable to handle the required traffic. Further, the data traffic using cellular network communication, such as over 3G or 4G, is relatively costly.
Further, it is known to communicate with trains and other vehicles through dedicated base stations arranged sequentially along the rail track, and with a certain distance apart. Such base stations are generally referred to as trackside base stations or trackside access points, and typically operates with e.g. WLAN. However, trackside base stations may also operate in accordance with other protocols or standards, such as unlicensed LTE, licensed LTE, GSM-R, etc. However, trackside networks are extremely costly to implement, since the base stations need to be very close to each other, thereby requiring a very large number of base stations arranged close to the railway or road, and relatively evenly distributed. Thus, on the one hand trackside base stations cannot be arranged too far away from each other, since the performance deteriorates rapidly when the distance increases, however, on the other hand, closely arranged trackside base stations interfere with each other, making efficient communication problematic. Thus, implementation of trackside networks requires huge investments, and takes very long time. Despite this, it may still be difficult to obtain good coverage over the entire railway or road, and the communication performance may still be poorly and inadequate. The high costs are primarily related to the close arrangement of the base stations/access points, costs for building rather high radio towers, power to operate the base stations/access points and provision of fiber/radio link connections to the trackside network, such as the internet or a company specific networks. Thus, known trackside communication systems are very costly both to install and to operate.
There is therefore a need for an improved method and system for communicating with moving vehicles, and in particular trains, allowing increased capacity, capacity utilization, quality and/or cost-efficiency. Even though the above discussion is focused on trains, similar situations and problems are encountered in many other types of moving vehicles, and in particular moving passenger vehicles, such as buses, ships and airplanes.
It is therefore an object of the present invention to provide a method for wireless communication and a wireless communication system for moving vehicles, and in particular a train, which alleviates all or at least some of the above-discussed drawbacks of the presently known systems.
This object is achieved by means of a wireless communication method and system for a moving vehicle, such as a train as defined in the appended claims.
According to a first aspect of the present invention, there is provided a method for wireless communication between a mobile router in a moving vehicle, such as a train, and one or several external server(s) via at least two types of external wireless networks, a first external wireless network type comprising a plurality of trackside base stations, such as access points, for communication in compliance with a Wireless Local Area Network (WLAN), said trackside base stations being arranged in the vicinity of a vehicle path of travel, such as a train route, and a second external wireless network type communicating via cellular network standard(s), such as in accordance with 3G, 4G or 5G standards, wherein the mobile router is arranged, at least periodically, to simultaneously communicate with the two types of external wireless networks thereby providing at least two concurrently useable external wireless networks, the method comprising:
identifying for data streams to or from said mobile router a data communication type for said data stream, said data communication type being selected from a set of at least two different data communication types, each data communication type being associated with a specific prioritization;
determining, preferably in real-time, the availability of external wireless network(s) of the first of said external wireless network types, and, when good availability of such external wireless network(s) has been determined, allowing communication through this external wireless network(s) for all different data communication types with no or limited restrictions, and when it has been determined that such an external wireless network(s) of the first external wireless network type is not available, allowing communication through external wireless network(s) of said second external network type based on prioritization, wherein data streams of highest priority are allowed with no restrictions, whereas data streams of lower priority are restricted or prohibited.
The present invention is based on the understanding that while providing WLAN access or the like with trackside base stations over entire routes is extremely cumbersome and expensive, it is relatively inexpensive to provide WLAN access or the like with trackside base stations over part of most routes, such as covering between 1-90%, such as 5-70%, 5-50% or 5-25%. By means of the present invention, data streams with high priority, such as voice communication (VoIP and the like), are allowed with limited or no restrictions also over the second external wireless network type communicating via cellular network standard(s). Hence, the high priority data communication will work well over the entire route, with high bandwidth, low latency, etc. Data communication of lower or low priority will mostly be forwarded on the trackside network, whereas communication over the cellular network will be restricted or even prohibited. Data communication of lower priority may e.g. be streaming video, downloading of web pages, etc. Such low priority data communication normally amounts to the greater part of the total amount of data communication, but is less sensitive to higher latency and the like. Further, the low priority data communication may also be buffered at the router, making short interruptions in the data communication essentially unnoticeable for the user.
Hence, in this way, a trackside network which does not cover the entire route, and which may even have a relatively poor coverage, may still forward a significant amount of the overall data communication to and from the moving vehicle. This makes the data communication very cost-effective, and saves the resources and capacity of the cellular network to where it is really needed. Thus, the LTE network is not choked with streaming video and the like, and the capacity is saved for prioritized data communication, such as voice communication. Further, drawbacks for the clients onboard the train, in terms of e.g. longer latency, are hardly noticeable, and are insignificant.
When building trackside networks, the costs increase exponentially towards the end when attempting to provide 100% coverage. It has been found that when building a trackside network with 100% coverage, the last 20% will cost 80% of the total costs for the trackside network. By means of the present invention, it becomes possible to build trackside networks only in areas where it is reasonable and affordable, in a very cost-effective way, and still use this trackside network for the bulk of the data traffic, and with no or very limited negative consequences for the user compared to if a trackside network with 100% coverage had been provided.
Such trackside networks with limited coverage can also be built and set-up very quickly compared to trackside networks with full coverage, and can also easily be complemented further over time, to provide better coverage, if there is need for such better coverage. Thus, the hurdles to implement the present invention are very low, since trackside networks of poor but adequate coverage are already present along many railways and roads, such as in the vicinity of railway stations, or can alternatively be built quickly and to a very low cost. Trackside base stations can e.g. easily and advantageously be located in positions where there is already access to optical fibers or the like, and a suitable distance from the railway or road, such as within a distance of 0-1 km from the railway/road, and preferably within a distance of 0-0.5 km. For railways and roads extending over areas with much population, there will already be a plethora of such suitable positions. It is also possible to connect trackside base stations positioned within close range from the railway/road to optical fibers or the like being farther away by e.g. radio link connections. In this way, trackside base stations may be connected to optical fibers which are e.g. within a range of 0.5-10 km or more from the railway or road.
At the same time, areas where it is difficult to build trackside network, such as where the terrain makes it difficult, where it is difficult to obtain building permits, where it is far to the closest optical backbone connection, etc, can by means of the present invention be left without trackside network coverage, since the prioritized data communication will anyway be allowed over the cellular network.
A dedicated trackside network gives a very high capacity/bandwidth to the train/vehicle. When the initial investment is done the train/vehicle has more capacity than the onboard customers and services can use. You don't need to have any bandwidth restrictions to the customers or applications. Thus, the trackside network has a high initial investment, but when built, high data volume, high bandwidth usage does not increase the running cost for the trackside network. When the train/vehicle are connected to the trackside network it is of advantage to use this as much as possible. By means of the present invention, the majority of the data streams can be forwarded through the trackside network, with very limited noticeable drawbacks for the users.
Cellular network, such as 4G and 5G networks, on the other hand have low initial investment, since the system is using the commercially available cellular networks, but high data volume, high bandwidth is available to a substantial cost since the cost is normally dependent on the volume, and the cellular network capacity is normally lower than for dedicated trackside network.
By means of the present invention, it is possible to efficiently restrict the usage of the cellular networks in an optimal way, but without lowering the onboard Internet service too much. This is lowers the overall costs, and also ensures that the limited available capacity of the cellular networks is used where it is most needed.
Building 100% coverage on the trackside network is normally expensive, some tower installations are cheap, have easy access to fiber and power, on other locations fiber/network and power access are impossible or costs are very high, with need for radio links and solar/diesel powered system and the like. These remote areas in most cases have adequate cellular network coverage and capacity. By only building trackside networks where it's cheap and easy or as a complement where there is no cellular network coverage at all (even if, at those places, it may be quite costly) and by efficiently distributing the data streams between these network types in accordance with the invention, it is possible to combine the strengths of both networks. This is done by limiting the maximum bandwidth per passenger and or per application and blocking certain bandwidth demanding services when only in cellular coverage, and allowing high bandwidth to all types of data streams when in coverage of the trackside network. Hereby, high bandwidth internet access is allowed to the passengers and also all bandwidth demanding services.
A combined solution with partially trackside coverage that is built where it's cheap give a big advantage, when utilized in accordance with the present invention. When in trackside coverage your bandwidth demanding services will be updated regularly, but when only in cellular coverage these services will be blocked. The onboard service for a passenger/onboard applications will be seen nearly as good as a high bandwidth unrestricted network. Your Windows update, iCloud, Dropbox etc will be downloaded and updated when in trackside coverage.
This solution by only building partially coverage will lower the investment costs and the cost for cellular data and increase the system performance. If you e.g. build 50% trackside coverage you might download 90% of the data to the train/vehicle over the trackside network. This combined network solution can lower overall system investment and running cost and increase the system performance.
The control of the data transfer in accordance with the present invention may be implemented e.g. as software in the router onboard the vehicle, that dynamically can change service and network preferences/settings depending on what network technology that is used.
The “router” or “mobile router” is a networking router, which is a machine that forwards data packets between computer networks, on at least one data link in each direction. The router may be a mobile access router, and preferably a mobile access and applications router. The router preferably comprises means for determining the data communication type of a stream of wireless data packets received by the router, such as if the data stream corresponds to a prioritized VoWIFI call, the means being for example appropriate hardware and/or software, from here on referred to as a control unit. The identification step can be performed on a stream of wireless data packets received from a client onboard the public transport vehicle, or from a remote server outside the vehicle.
An internal LAN may be provided inside the public transport vehicle for providing wireless communication between the router and at least one client onboard. The at least one client onboard may accordingly be connected to said router via a LAN (local area network) provided by one or more wireless access points within the public transport vehicle. Preferably, at least one such wireless access point is provided in each carriage. All wireless access points may be connected to a single, central router, arranged in one of the carriages of a train. However, each carriage in the train may also be provided with a separate router connected to at least one wireless access point, where the wireless access point may be external to the router or an integrated function of the router.
The method is preferably executed by a controller, being part of or connected to mobile router on-board the train, or alternatively being part of or connected to the exterior mobile network(s), and in communication with the trackside base stations. The method can be implemented and realized solely or to a large extent in software, but may also, to some extent or even completely be realized in hardware.
In a preferred embodiment, the vehicle route/path is predetermined and the external wireless network comprising a plurality of trackside base stations, such as trackside access points, distributed along a vehicle path of travel, and located along the predetermined route. The coverage of each trackside base station is inter alia dependent on the height of the antenna of the cell, the height of the vehicle, the maximum, minimum or average distance between the vehicle and the antenna, and the frequency of communication. Preferably, the trackside base stations are operated at about 5 GHz but can operate in any frequency available, 2.4 GHz, 3.5 GHz and others.
The system may comprise a plurality of masts, each mast having at least one antenna structure or construction mounted thereupon. Each antenna structure or construction may be coupled to a respective, separate base station/access point for communication with the vehicle-based mobile router, although in some embodiments, multiple antenna structures or constructions on the same mast may be coupled to the same base station/access point, or provide two or more base stations/access points. The base stations/access points may be connected to each other, to a network backhaul using e.g. an optical fiber system.
The communication between the trackside base stations and the mobile router is preferably made in compliance with a WLAN standard, and most preferably in compliance with the IEEE 802.11 standard (which may also be referred to as WiFi). However, it is also possible to use other wireless communication protocols/technologies. For example, trackside base stations may also operate in accordance with other protocols or standards, such as unlicensed LTE, licensed LTE, GSM-R, etc.
The determining, preferably in real-time, of the availability of external wireless network(s) of the first of external wireless network types, i.e. the trackside, WLAN network, corresponds to determining whether the mobile router is within the access area of any of the trackside base stations. This can be made by signal detection in the trackside base stations and/or in the mobile router, and by forwarding information regarding this to the controller. However, alternatively or additionally, this determination can also be made based on GNSS (Global Navigation Satellite System) signals, such as GPS signals, received by the mobile router. In this case, exact position data can be communicated to the controller, and by knowing the positioning and coverage areas of the trackside base stations, the controller can determine in which coverage area(s) the mobile router is present. Further, the controller may predict this based on the timing and sequence of base stations in which the mobile router has been previously.
Similarly, the direction of travel for the vehicle may be determined in various ways. For example, the positioning data received by GNSS/GPS signals in the mobile router may be used to this end, the sequence of trackside base stations in the coverage areas of which the mobile router has been may be used, etc.
In a preferred embodiment, the mobile routers are arranged to receive GNSS/GPS data, and communicate this to the external mobile network, said GNSS/GPS data being useable to detect the presence of the mobile router within the access area of any of said plurality of trackside base stations.
Preferably, the controller comprises or is connected to a database comprising data at least about the identity of the trackside base stations and the positioning of the trackside base stations, and optionally also about the coverage area of the trackside base stations in relation to the vehicle path.
The trackside base stations/access points may at least at some locations be arranged so that there is at least some overlap between the coverage areas for neighboring trackside base stations. When a vehicle travels through this overlap area, a conventional handover may be performed from the previously passed trackside base stations to the trackside base stations ahead of the vehicle. Alternatively or additionally, the overlapping coverage areas can be used to enable simultaneous communication with more than one trackside base stations. Thus, the mobile router can preferably be arranged to simultaneously communicate with the external trackside network through at least two trackside base stations when more than one trackside base stations is accessible for the mobile router, thereby providing at least two concurrently useable external wireless networks. This enhances the communication performance significantly, and also alleviates the problems related to handovers.
The mobile router may be arranged to communicate with the cellular network, i.e. the second external wireless network, only when there is no access to the trackside network, i.e. the first external wireless network. However, the mobile router may alternatively simultaneously communicate with at least one second external wireless network, thereby providing at least one further concurrently useable data link.
When several external wireless networks of the same type are available, the mobile router is preferably arranged to evaluate the quality of said external wireless networks, e.g. on a host layer and e.g. by repeatedly sending requests arranged to trigger a determinable automated response to said stationary communication server via said external wireless network and measure the time until the triggered automated responses are received; and assigning data streams to said external wireless network at least partly based on said evaluated quality.
Further, the mobile router in the moving vehicle may be arranged to receive and transmit wireless data packets to and from a stationary communication server outside the moving vehicle through the at least one exterior mobile network via at least one antenna, and to and from at least one client onboard the moving vehicle.
When the router is arranged to communicate with the communication server on at least two different external wireless networks (communication routes) having different characteristics, the router may be arranged to automatically separate the communication traffic between said external wireless networks based on an evaluation of the quality. The data streams may then be forwarded on one or several links to and from a dedicated external server, which may be referred to as an aggregation server or gateway. The different links thereby form a single virtual link between the router and the gateway.
The communication can be automatically optimized based on the evaluation, and also optionally on other conditions, such as price, speed, latency, etc. Thus, in addition to the evaluation, prioritizing and assignments may be made based on other static or dynamic parameters, such as signal strength and the like. Such further optimizations are per se known from EP 1 175 757 and WO 15/169917 by the same applicant, said documents hereby being incorporated by reference. An automatic selection is then made among the available external wireless networks to use the most efficient combination. Hence, a seamless distribution of the data among the different external wireless networks is obtained.
The router may, in addition to the trackside, WLAN (or other protocol used for the communication with the trackside base stations), use any available external wireless networks, such as GSM, Satellite, DVB-T, HSPA, EDGE, 1×RTT, EVDO, LTE, Wi-Fi and WiMAX; and optionally combine them into one virtual network connection. In particular, it is preferred to use external wireless networks provided through wireless wide-area network (WWAN) communication technologies.
The selection of links is preferably made once for each data stream. However, re-selection for data streams that have failed may also be made. Further, data streams may also be split among two or more external wireless networks, e.g. by transferring a first part of a data stream on one data link to begin with, and then continue the transfer of the rest of the data stream on another data link, based on a re-assignment decision. Re-selection and/or re-assignment may also be made based on other criteria than complete failure of the presently used data link, such as when the evaluated quality of the link presently used is significantly deteriorated, falls below a certain threshold, or the like.
The step of identifying a data communication type for data communication is preferably made for each data stream. The data communication types may be only two—prioritized and non-prioritized—but three or more data communication types may also be used, such as high priority, medium priority and low priority.
Data streams corresponding to voice traffic would typically fall under the category “prioritized” or “high priority”, whereas streaming video would typically fall under the category “non-prioritized” or “low priority”. VPN data streams may be assigned to “prioritized” or “high priority” or “middle priority”, whereas http data streams may be assigned to “non-prioritized” or “middle priority” or “low priority”.
Thus, the step of identification of data type may involve determination of if a stream of wireless data packets received by said router corresponds to at least one of a VoIP (Voice over IP) stream and a VoWIFI (Voice over Wi-Fi) stream. VoWIFI may also be referred to as Wi-Fi calling, or GAN/UMA (Generic Access Network or Unlicensed Mobile Access). VoWIFI is in the present context to be understood as a solution whereby mobile service providers can deliver the same set of mobile voice and messaging services they currently offer over their macro cellular network, over any Wi-Fi network, globally. In short, it can be said that the cellular world has two separate core networks, called CS (circuit switched) that was used for voice and PS (packet switched) for data. As operators moved more and more voice communication over to the PS part two new terms evolved, Voice over HSPA/3G (VoHSPA) and Voice over LTE/4G (VoLTE), and subsequently it was realized that one can use WiFi to access the PS part of the network, hence, VoWIFI.
The VoWIFI is preferably used in accordance with the IEEE 802.11 standard, and may also be referred to as voice over WLAN (VoWLAN), but other wireless internet networks may also be used.
In more detail, VoWIFI enables the user to make standard phone calls over Wi-Fi. This is done by routing the call traffic through the Wi-Fi connection, instead of over the air to a cell tower. In VoWIFI the user dials the number, and places the call in a conventional way, just like in a circuit switched environment. However, the difference is that the call connects over Wi-Fi, and is transferred in data packets, and is subsequently injected back into the cellular network as if the call had been beamed over the air. Furthermore, an increasing number of smart phone providers are providing built-in support for Evolved Packet Core (EPC) integrated Wi-Fi calling support as part of their device fleet. This provides users with native Wi-Fi calling experience without any need to download a specific software application, but instead users can continue to use the built-in phone dialer and continue to be reached on their phone number. Unlike services like Skype, Viber, WhatsApp and other Over the Top (OTT) Voice over IP (VoIP) applications, which place calls using call forwarding or an internet-based interface, VoWIFI lets the user use the ordinary carrier phone number over the internet. VoWIFI is also distinct from VoIP technology in that VoIP transfers the voice over the internet to the switched telephone network, whereas VoWIFI connects the voice traffic to the mobile carrier's network using the internet instead of cell towers. A wireless communication system capable of transferring voice communication via VoWIFI between at least one mobile terminal and an exterior mobile network is disclosed in the pending and still unpublished Swedish patent application No. 1451302-2, by the present applicant, said document incorporated herein by reference in its entirety.
Therefore, in accordance with an exemplary embodiment of the present invention the step of determining, in the router, if a stream of wireless data packets from the at least one client on board the public transport vehicle corresponds to at least one of a VoIP stream and a VoWIFI stream comprises:
determining at least one of a source, a destination, a size and pattern of the stream of wireless data packets, and using this for identification if the stream of wireless data packets corresponds at least one of a VoIP stream and a VoWIFI stream. In addition to, or as an alternative, the step of determining if a stream of wireless data packets from the at least one client on board the public transport vehicle corresponds to at least one of a VoIP stream and a VoWIFI stream comprises identification of a data packet type or data stream type for the stream of wireless data packets based on deep packet inspection.
The concept of analyzing packet size and shape of various packet streams in order to identify and determine the data stream type, as such, is per se known, and often utilized in traffic shaping or packet shaping. Traffic shaping techniques can be found in e.g. US2005/0172008, EP1912385, U.S. Pat. No. 7,061,860, US2004/0111461, Adaptiband™ by XRoads Networks, Radware's Deep Flow Inspection™, and NAVL by Procera Networks, all of which are hereby incorporated by reference. However, as far as is presently known, this has never been used on public transport vehicles, and in particular not for the same purposes as in the present invention. It has now been realized by the present inventors that these various ways of determining a type of data stream can be used to improve the travelling experience and increase passenger satisfaction on public transport vehicles. Furthermore the present invention enables communication networks onboard public transport vehicles to be much more compatible with on-going technological trends such as VoLTE, VoWIFI, etc.
The present invention is based on the realization that data communication of different types have different needs, which varies greatly, and by treating such data communication differently, great savings and much increased performance can be obtained. For example, an individual HTTP request is relatively insensitive to latency. Furthermore, HTTP traffic constitutes a large portion of passenger traffic. Therefore, excluding or restricting all HTTP traffic from the cellular network is highly beneficial. At the other end of the spectrum, a VPN connection is likely to be lengthy and sensitive to perturbations. VPN connection data streams would therefore be among the prioritized types of data communication.
The automatic analysis of data streams, for the purpose of identifying the data communication type can take place by a variety of means, as discussed below.
Identification of data communication type may comprise determining whether the data communication involves a HTTP communication, and to assign this to a data communication type having a low or moderate priority. Additionally or alternatively, the identification may comprise determining whether the requested resource involves a TCP communication a destination port of 80, and to assign this to a data communication type having a low or moderate priority. The same may apply to HTTPS communication, using a destination port of 443, and this data communication type may also be assigned low or moderate priority. Additionally or alternatively, the identification may comprise determining whether the requested resource involves a VPN communication, and to assign this to a data communication type having high priority.
Preferably, the identification comprises determining if the data communication is at least one of voice-over-IP (VOIP) and VPN, and to assign this to a data communication type with high priority. The data stream type may e.g. be determined based on deep packet inspection.
However, the identification of a data communication type can be made in many different ways, such as based on packet size and pattern of a packet stream. Additionally the match may depend on a source and a destination of the wireless data packets. For example, it is possible to determining if the packet stream is related to web browsing, e-mailing, computer gaming, media-streaming, such as video, voice over IP (VoIP), VPN communication, etc. For example, a stream of small packets every 15-25 milliseconds in both directions can with high probability be recognized as a VoIP call.
Thus, the step of identifying a data communication type preferably comprises determining at least one of a source, a destination, a size and pattern of the wireless data packets, and using this for identification of a data communication type. In particular, it is of interest to identify if the data packet is a video data packet, and to assign such data communication to a data communication type having low priority. Since video, e.g. in streaming services, is normally responsible for a very large part of the data traffic, restricting or prohibiting such data communication over the cellular network is highly beneficial. It may, additionally or alternatively, be of great interest to identify data communication types which are most in need for good quality and high bandwidth at all times, and to grant access for such communication via the cellular network. Such packet types to be prioritized are e.g. voice-over-IP (VOIP) data packets and a VPN data packets.
The availability of the external wireless network(s) of the first type, i.e. the trackside, WLAN network(s), can be determined to be either on or off. In this case, all data communication types will be allowed in the “on” state, with no or limited restrictions, whereas only data communication of highest priority will be allowed with no restrictions in the “off” state, data communication of lower priority being restricted or prohibited.
However, the availability of the trackside, WLAN network(s) can also be determined more finely, e.g. in three or more states. E.g. the “on” state may comprise “on with low capacity” and “on with high capacity”. For example, “on with low capacity” may be where the throughput is less than 100 Mb/s, and “on with high capacity” may be where the throughput is more than 100 Mb/s. In such cases, data communication for data communication types having lower priority may be more restricted in the “on with low capacity” state than in the “on with high capacity” state.
In a quick and relatively simple, but yet highly efficient, embodiment, the step of identifying a data communication type comprises comparing at least one of a destination address of said data stream and an output port of said data stream with a whitelist comprising at least one predefined address or port, and assigning a higher priority to said data streams in case of a match. This provides an alternative or additional means for determining if a stream of wireless data packets corresponds to a prioritized data communication type, such as at least one of a VoIP stream and a VoWIFI stream, as compared to analyzing size and/or shape of the stream. A whitelist is in the present context to be interpreted as a defined list of IP-addresses and/or ports, where data streams associated with these IP-addresses/ports are assigned the highest priority. Such highly prioritized data streams will be allowed with no restrictions, or as few restrictions as possible, both for trackside networks and cellular networks. Preferably the whitelist comprises at least one IP-address associated with e.g. VoWIFI and/or VoIP protocols, e.g. a destination address. The whitelist may also be dynamically and periodically updated. Alternatively, or in addition to IP-addresses and/or ports, the whitelist may comprise a list of web addresses, enabling prioritizing streams when an attempt is made to contact certain web addresses via e.g. a DNS server.
Alternatively, or preferably in addition, the step of identifying a data communication type may comprise comparing at least one of a destination address of said data stream and an output port of said data stream with a blacklist comprising at least one predefined address or port, and assigning a lower priority to said data streams in case of a match. This provides for alternative or additional means for determining if a stream of wireless data packets corresponds to data communication types of lowest priority. A blacklist is in the present context to be interpreted as a defined list of IP-addresses and/or ports, where data streams associated with these IP-addresses/ports are assigned lowest priority. Such data streams may e.g. be blocked when only cellular networks are available, and may also be somewhat restricted on trackside networks. Preferably the blacklist comprises at least one IP-address associated with e.g. streaming video, downloading of files, etc, e.g. a destination address. The blacklist may also be dynamically and periodically updated. Alternatively, or in addition to IP-addresses and/or ports, the blacklist may comprise a list of web addresses, enabling blocking of streams when an attempt is made to contact certain web addresses.
Data communication to be prioritized/whitelisted, may e.g. be voice calls, VPN data streams, etc. Prioritized/whitelisted data streams will be allowed to be transferred over both trackside networks and cellular networks, and preferably without any restrictions.
Windows update
Android update
Apple update
Operating system autoupdate services like:
Automatic file synchronization with Apple iCloud
Automatic file synchronization with Microsoft OneDrive
Automatic file synchronization with Google Drive
Automatic file synchronization with Dropbox
Automatic cloud storage synchronization services like:
Data communication of lowest priority, i.e. blacklisted communication, can e.g. be:
Such blacklisted communication is allowed on trackside networks, but possibly with some limitations in bandwidth, but are preferably completely blocked from cellular networks.
Manual access of files on Apple iCloud
Manual access of files on Microsoft OneDrive
Manual access of files on Dropbox
Manual access of files on Google Drive
Cloud storage services like:
Youtube
Netflix
HBO
Vimeo
Twitch
Video streaming services like:
Data communication of medium priority, i.e. neither being blacklisted nor whitelisted, may be transferred over trackside networks whenever available, but may also be allowed to some degree on cellular networks, but with restricted, throttled bandwidth. Such data communication can e.g. be:
According to another aspect of the invention, there is provided a computer-readable storage medium encoded with instructions for executing in a wireless device the instructions, when executed, performing the above-discussed method.
With this aspect of the invention, similar advantages and preferred features are present as in the previously discussed first aspect of the invention.
Thus, when it has been determined that external wireless network(s) of the first of said external wireless network types is available, but with limited capacity, communication through this external wireless network(s) is preferably for all different data communication types, but with restrictions for data communication types having lower priority.
When good availability of such external wireless network(s) has been determined, the external wireless network(s) of said first external network type are preferably primarily or solely used for communication for all different data communication types with no or limited restrictions.
According to a second aspect of the present invention, there is provided a wireless communication system for wireless communication with a mobile router in a moving vehicle, such as a train, via at least two types of external wireless networks, a first external wireless network type comprising a plurality of trackside base stations, such as access points for communication in compliance with a Wireless Local Area Network (WLAN), said trackside base stations being arranged in the vicinity of a vehicle path of travel, such as a train route, and a second external wireless network type communicating via cellular network standard(s), such as in accordance with 3G, 4G or 5G standards,
wherein the mobile router is arranged, at least periodically, to simultaneously communicate with the two types of external wireless networks thereby providing at least two concurrently useable external wireless networks, the system comprising a controller, including a processor, and being connected to the mobile router and/or a remote server connected to said external wireless networks, the controller being arranged to:
identify for data communication to or from said mobile router, and preferably for each occurrence of such data communication, a data communication type for said data communication, said data communication type being selected from a set of at least two different data communication types, each data communication type being associated with a specific prioritization;
determine, preferably in real-time, the availability of external wireless network(s) of the first of said external wireless network types, and, when good availability of such external wireless network(s) has been determined, allowing communication through this external wireless network(s) for all different data communication types with no or limited restrictions, and when it has been determined that such external wireless network(s) of the first external wireless network type is not available, allowing communication through external wireless network(s) of said second external network type based on prioritization, wherein data communication of highest priority is allowed with no restrictions, whereas data communication of lower priority is restricted or prohibited.
Also with this aspect of the invention, similar advantages and preferred features are present as in the previously discussed first aspect of the invention.
These and other features and advantages of the present invention will in the following be further clarified with reference to the embodiments described hereinafter.
In the following detailed description, preferred embodiments of the present invention will be described. However, it is to be understood that features of the different embodiments are exchangeable between the embodiments and may be combined in different ways, unless anything else is specifically indicated. Even though in the following description, numerous specific details are set forth to provide a more thorough understanding of the present invention, it will be apparent to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well known constructions or functions are not described in detail, so as not to obscure the present invention. In the detailed embodiments described in the following are related to trains. However, it is to be acknowledged by the skilled reader that the method and system are correspondingly useable on other moving vehicles, such as buses, ferries, airplanes and the like.
FIG. 1
1
2
3
4
4
4
a
b
c
In a schematic illustration of a vehicle , such as a train, having a communication system is provided. The communication system comprises a data communication router for receiving and transmitting data between an internal local area network (LAN) , and one or several external wide area networks (WANs) , , , including two types of external wireless networks, a first external wireless network type comprising a plurality of trackside base stations, such as access points, for communication in compliance with a Wireless Local Area Network (WLAN), the trackside base stations being arranged in the vicinity of a vehicle path of travel, such as a train route—in the following referred to as WLAN or trackside network—and a second external wireless network type communicating via cellular network standard(s), such as in accordance with 3G, 4G or 5G standards—in the following referred to as cellular network. The trackside network preferably comprises a plurality of trackside base stations/access points distributed along a vehicle path of travel, preferably for communication in compliance with a Wireless Local Area Network (WLAN) standard, such as an 802.11 standard.
5
a
n
Communication to and from the WANs is provided through one or several antennas -arranged on the train, the antennas may be arranged on the roof of the train, on window panes of the train, etc. Two or more external wireless networks are preferably available, either between the train and one of the WANs, and/or by using several WANs simultaneously.
6
6
The LAN is preferably a wireless network, using one or several internal antennas to communicate with terminal units within the vehicle. It is also possible to use a wired network within the vehicle. The LAN may be set-up as wireless access point(s). The client(s) may be computing devices such as laptops, mobiles telephones, PDAs, tablets and so on.
21
23
23
a
n
The data communication router further preferably comprises a plurality of modems -. Assignment of data streams to different WANs and/or to different data links on one WAN is controlled by a router controller . The router controller is preferably realized as a software controlled processor. However, the router controller may alternatively be realized wholly or partly in hardware.
7
The system may also comprise a receiver for receiving GNSS (Global Navigation Satellite System) signals, such as a global positioning system (GPS) receiver for receiving GPS signals, indicative of the current position of the vehicle, and wherein the controller may be arranged to control in particular the performance of the communication with the trackside base stations in accordance with the vehicle position determined based on the GNSS/GPS signals.
The data communication router may also be denominated MAR (Mobile Access Router) or MAAR (Mobile Access and Applications Router).
FIG. 2
11
12
11
11
12
12
11
11
12
12
a
b
a
b
a
b
a
b
In , the trackside network a plurality of trackside base stations, such as trackside access points, are provided, distributed along a vehicle path of travel, i.e. the rail, for communication in compliance with a Wireless Local Area Network (WLAN) standard, such as an 802.11 standard, is illustrated in more detail. The external mobile network comprises a plurality of trackside base stations , , arranged along the vehicle path. The base stations have coverage areas , , , extending in both directions along the vehicle path. The coverage areas on the two sides of the base stations may be related to the same base station/access point, or to different base stations/access points. Thus, coverage area and may be related to the same base station/access point, or be operated independently, as different base stations/access points, and the same applies to coverage areas and , etc.
9
2
The base stations/access points are connected to a controller , via a wired or wireless connection, such as via a fiber connection. The controller is preferably realized on a processor, and at least partly in software. However, the controller may also be realized on several processors, in a distributed fashion. Further, the controller may alternatively be arranged in, or connected to, the mobile router .
The mobile router is also connected to other external networks, in particular cellular networks, and may consequently simultaneously distribute the communication also over these networks.
The data communication router is preferably arranged to communicate on at least two different communication routes having different characteristics, such as on two or more trackside networks, two or more cellular networks, or at least one trackside network in combination with at least one cellular network. Hereby, the communication can be automatically optimized based on specific conditions, such as price, speed, etc. Such data communication routers operating on multiple simultaneous links are e.g. known from EP 1 175 757 by the same applicant, said document hereby incorporated by reference. Such routers are also commercially available from the applicant, Icomera AB. Hereby, the router may use all available data channels, such as two or more of e.g. Satellite, DVB-T, HSPA, EDGE, 1×RTT, EVDO, LTE, LTE-A, WiFi (802.11), Ethernet and WiMAX; and combine them into one virtual network connection. An automatic selection may be made among the available channels to use the most cost effective combination that fulfils the users' availability, bandwidth and reliability requirements. Hence, a seamless distribution of the data among said different channels can be obtained.
FIG. 3
1
is a schematic illustration of a simplified embodiment of the present invention. Here, a data communication type is first determined for each data stream to be transmitted, as illustrated in step S. The data communication types are associated with various prioritization, so that certain data communication types are considered prioritized, i.e. having high priority, whereas other are considered non-prioritized, i.e. having low priority. The methods to identify and distinguish various types of data communication, and the rules to assign prioritization are per se known. For example, it is possible to identify voice communication, and to assign such data communication to a high priority. The same may apply to VPN communication. Non-identified data communication may, as a default, be assigned to a low priority. Alternatively, low priority data communication types may be identified, such as http communication, video communication, gaming communication and the like, and remaining, unidentified data communication types may, as a default, be assigned to high priority. It is also possible to identify data communication types of both high and low priority, and to assign unidentified data communication to either high or low priority.
In the illustrative example, data communication types are assigned either to high or low priority. However, further levels of prioritization may also be provided, such as three, four, five or more levels.
2
3
a
In case a low priority data communication type has been determined, the next step Sdetermines whether a trackside network is available. If so, the data communication is allowed without restrictions over the trackside network, step S, and may also be used for buffering and the like, which is e.g. useable when streaming video data.
1
If the data communication has low priority and trackside networks are not available, the request is returned to step S, possibly after a certain waiting time, and the process is repeated until a trackside network has been determined to be available.
2
3
4
b
In case a high priority data communication type has been determined, the next step Ssimilarly determines whether a trackside network is available. If so, the data communication is allowed without restrictions, and preferably partly or solely over the trackside network, step S. If the data communication has high priority and trackside networks are not available, the data communication will be made over the cellular network, step S.
In the above-illustrated embodiment, the low priority data communication is allowed without restrictions over the trackside network, when available, and prohibited over the cellular network. However, it is also possible to allow some or all low priority data communication also over the cellular network, but with restricted bandwidth or the like. Similarly, the high priority data communication is in the illustrative example forwarded over the trackside network when available, and otherwise over the cellular network. However, the high priority data may alternatively be forwarded only over the cellular network, or by any combination of the cellular and trackside networks.
Further, in the illustrative example, the method first identifies the data communication type, and its associated priority, and thereafter determines the availability of the trackside network. However, these steps may also be performed in the opposite order.
FIG. 4
is a schematic illustration of another simplified embodiment of the present invention. In this illustrative example, data communication types are assigned either to high priority (“whitelisted”), normal or low priority (“blacklisted”). However, further levels of prioritization may also be provided, such as four, five or more levels. Further, the whitelist and blacklist need not be used in combination—it is also possible to use only a whitelist, to provide the two data communication types “whitelisted” and normal, or only a blacklist, to provide the two data communication types normal and “blacklisted”.
1
2
3
4
a
a
a.
Here, it is first determined whether the stream has a destination address, output port, or the like, included on a whitelist, step S′. If this is the case, the data stream is identified as whitelisted, i.e. a highly prioritized data communication type. If it is also determined that a trackside network is available, step S, the data stream is forwarded via this trackside network without any restrictions, step S. If no trackside network is available, the data stream is instead forwarded over the cellular network, again without any restrictions, step S
1
1
If it is determined that the destination address, output port, or the like, is not included on the whitelist in step S′, it is then determined whether the stream has a destination address, output port, or the like, included on a blacklist, step S″. If this is the case, the data stream is identified as blacklisted, i.e. a data communication type of lowest priority.
2
3
4
b
b
b.
If the data stream has not been blacklisted, it is determined whether a trackside network is available, step S, and if so, the data stream is forwarded via this trackside network without any restrictions, step S, or with limited restrictions. If no trackside network is available, the data stream is instead forwarded over the cellular network, but with restrictions, such as restricted bandwidth, step S
2
3
c
c
If the data stream has been blacklisted, it is determined whether a trackside network is available, step S, and if so, the data stream is forwarded via this trackside network, step S. However, there may be some restrictions on this data transfer, such as limitations in bandwidth. If no trackside network is available, the blacklisted data stream is not allowed to communicate over the cellular network. Instead, the process is held in a waiting loop, awaiting the next time a trackside network is available.
As before, other restrictions etc may be assigned to the different types of data (normal, whitelisted and blacklisted), the steps may be performed in different order, etc.
FIG. 5
An exemplary embodiment for communicating with the trackside base stations/access points will now be described with reference to .
1
111
116
111
9
FIG. 4
Here, a train travels on a railway track, along which a plurality of trackside base stations - are located. In the position of the train as indicated in , the train is within the coverage area of base station . The position and direction of travel for the train may be determined by the controller , for example based on information, such as GNSS/GPS information, received from the mobile router on the train, and/or information received from the trackside base stations.
111
112
112
Here, it is determined by the controller that the train is in the coverage area of trackside base station , and travelling towards trackside base station . As a result, the controller sends control instructions to the base station to continue with the data transmission. In this state, all data communication, regardless of priority, is allowed, and takes place over the trackside network.
112
201
200
As the train moves forward, it will leave the coverage area of trackside base station , and enter into an area without access to a trackside network. In this area, only a cellular network is available, based on the coverage area from cellular base station . In this area, only prioritized data communication will be forwarded.
113
After a while, the train will enter into the coverage area of trackside base station , and again data transmission will be allowed for all requested data communication, regardless of priority.
In case the train is within the coverage area of several trackside base stations, the data communications may be divided between these trackside base stations. Similarly, in case the train is within the coverage area of several cellular base stations, the data communication may be divided between these cellular base stations. It is also possible to allow some high priority data communication over the cellular network even when the train has access to a trackside network.
The invention has now been described with reference to specific embodiments. However, several variations of the communication system/method are feasible. For example, the present invention has here been disclosed in relation to trains, where it is considered to be particularly advantageous. However, it may also be implemented and used on other moving vehicles, and in particular vehicles intended for passenger traffic, such as buses, ferries, airplanes, etc. Further, the examples are mostly related to the 802.11 standard, but other WLAN protocols may also be used in the same or similar ways, and it is also possible to use the same method and system for communication in compliance with other communication protocols and standards, such as unlicensed LTE, licensed LTE, GSM-R, etc.
Further, the above-described embodiments of the present invention can be implemented in any of numerous ways. For example, the embodiments may be implemented using hardware, software or a combination thereof. When implemented in software, the software code can be executed on any suitable processor or collection of processors, whether provided in a single computer or distributed among multiple computers.
Also, the various methods or processes outlined herein may be coded as software that is executable on one or more processors that employ any one of a variety of operating systems or platforms. Additionally, such software may be written using any of a number of suitable programming languages and/or conventional programming or scripting tools, and also may be compiled as executable machine language code.
In this respect, the invention may be embodied as a computer readable medium (or multiple computer readable media) (e.g., a computer memory, one or more floppy discs, compact discs, optical discs, magnetic tapes, etc.) encoded with one or more programs that, when executed on one or more computers or other processors, perform methods that implement the various embodiments of the invention discussed above. The computer readable medium or media can be transportable, such that the program or programs stored thereon can be loaded onto one or more different computers or other processors to implement various aspects of the present invention as discussed above.
The terms “program” or “software” are used herein in a generic sense to refer to any type of computer code or set of computer-executable instructions that can be employed to program a computer or other processor to implement various aspects of the present invention as discussed above. Additionally, it should be appreciated that according to one aspect of this embodiment, one or more computer programs that when executed perform methods of the present invention need not reside on a single computer or processor, but may be distributed in a modular fashion amongst a number of different computers or processors to implement various aspects of the present invention.
Such and other obvious modifications must be considered to be within the scope of the present invention, as it is defined by the appended claims. It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting to the claim. The word “comprising” does not exclude the presence of other elements or steps than those listed in the claim. The word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements.
BRIEF DESCRIPTION OF THE DRAWINGS
For exemplifying purposes, the invention will be described in closer detail in the following with reference to embodiments thereof illustrated in the attached drawings, wherein:
FIG. 1
is a schematic illustration of a train having a wireless communication system in accordance with an embodiment of the present invention;
FIG. 2
is a schematic illustration of a train being associated with two trackside base stations of an external mobile network, in accordance with an embodiment of the present invention;
FIG. 3
is a flow chart illustrating the method in accordance with one embodiment of the present invention;
FIG. 4
is a flow chart illustrating the method in accordance with another embodiment of the present invention; and
FIG. 5
is a schematic illustration of a train being associated with both a trackside network and a cellular network during travel, in accordance with an embodiment of the present invention. | |
Academics by the numbers: The pandemic’s impact on UNL student performance
When the University of Nebraska-Lincoln announced it would shift classes online on March 12, 2020, due to the COVID-19 pandemic, faculty, staff and students had to quickly pivot to new ways of learning.
More than a year later, synchronous versus asynchronous learning, Zoom breakout rooms and virtually proctored exams have been among strategies educators are using to continue teaching.
Across the nation, higher education institutions, including UNL, have strived to find the most effective ways to maintain their standards of education during a time of limited capability for in-person classes. Previous studies, such as one conducted by Columbia University in 2013, have suggested students’ average persistence rates and grades are lower for online courses compared to in-person classes.
Data from the Office of the University Registrar on UNL academics can shed light on how students’ overall academic performance has changed due to COVID-19, according to Amy Goodburn, UNL’s senior associate vice chancellor and dean of undergraduate education who provided the data to The Daily Nebraskan.
She said average GPA, average earned credit hours, total graduates, the number of students who maintain a GPA above 3.5 and the percentage of class withdrawals are five metrics she usually tracks for academic performance.
With a full semester of pandemic-affected learning completed in the fall, Goodburn said UNL administrators can compare this academic data from that semester to previous academic years to help determine the impact of the pandemic on education at the university.
Average GPA
Grade point average, which converts students’ grades into a point system and indicates how well students perform on average, did not see much change across the fall semesters since 2016. Average GPA from the fall 2020 semester was slightly lower than fall 2017 and 2019, but it was higher than in fall 2016 and 2018.
Average earned/attempted credit hours
Earned credit hours at UNL consist of all hours passed with a grade of A+ through D-, or Pass. Attempted credit hours at UNL include earned hours plus incomplete, failed, no pass and withdrawn hours.
Average earned hours from the fall 2020 semester were at 12.62 — less than the previous fall but higher than fall 2016-2018. Average attempted hours reached 14.04 — the highest mark of any semester since fall 2016.
Goodburn said the university looks closely at earned hours each semester to make sure students are generally on track to graduate in four years. She said this metric can also be used to encourage administrators to be much more proactive with contacting students if they aren’t optimizing their courseload efficiently.
Increased efforts can also be made based on this metric to create more robust schedules for students, she said.
Total graduates
While graduation numbers can fluctuate from semester to semester based on class size, comparing trends across semesters can also indicate the progress of students in achieving graduation. The total number of graduates in fall 2020 increased compared to fall 2019, but it was lower than fall 2016-2018.
Total students with a GPA greater than 3.5
The total number of students who finished the fall 2020 semester with a 3.5 or higher GPA was considerably higher compared to the last four academic years, up 5% from the previous high in fall 2019.
Nearly half of all undergraduate students finished with a 3.5 or higher GPA last fall.
Total course withdrawals
Students can withdraw from classes before the specific withdrawal deadline each semester, receiving a “W” on their official transcript. The highest percent of class withdrawals occurred in the fall, a slight increase up to 3.66%, compared to the previous four fall semesters.
Data interpretation
Goodburn said the standout data trend to her is the lack of variation between fall semesters.
“I'm not saying that students didn't have a different experience in the classroom; I mean, it's a pandemic. It's much more stressful [and] anxiety filled,” she said. “But in terms of their overall academic performance, they did just as well as they have done historically, and in some cases, better, which surprised me.”
Goodburn credited the adaptability and flexibility of faculty to support student needs as a main reason why overall academic performance didn’t seem to suffer.
Additionally, she said she speculated the lack of on-campus social events led students to better prioritize their academics because there was little else to focus on.
“It'll be interesting to see once those restrictions are eliminated what that will mean for our campus,” she said. “I think I highly valued those co-curricular opportunities, those experiences that you get in person [and] experiential learning … We always knew that they were valuable, but now we really appreciate the opportunity to provide them.”
Though the raw data indicates the UNL campus community has adapted to learning amid a pandemic, Goodburn said there are many elements that are impossible to quantify.
The sense of community and ability to learn more actively through student-to-student and student-to-educator interactions have been lost this academic year. But, Goodburn said she is hopeful that as more in-person opportunities are possible, a return to more traditional and healthy learning environments will lead to an exciting fall 2021 semester.
“I don't think we really understand the extent to which every classroom is this vibrant community [that] can contribute to building knowledge in ways that it requires people's engagement in a space,” she said. “I'm not dissing online learning or web conferencing — there are amazing instructors who promote engagement — but there's just a different type of experience that you can have in person that we as an institution really value … With faculty and students having sort of a renewed appreciation for what that educational experience can be, I'm really excited about the fall.” | |
Engaged Teaching Approach
A practical approach to teaching and learning that improves social, emotional and academic outcomes, develops inclusive and respectful learning communities, and fosters a sense of meaning, purpose, and motivation in schools. 'Engaged Teaching' practices and principles integrate academic learning with social-emotional learning, cultural responsiveness, mindfulness and whole systems thinking. We collaborate with schools to foster classrooms where students think creatively and critically, excel academically, manage their emotions, communicate skillfully and authentically, and work effectively with people who are different from themselves. These 21st century skills and capacities help young people thrive in our complex world.
Engaged Teaching Tips
- Regenerative Schools: Seeing School Communities as Organisms
- Equity and Social & Emotional Learning: An Integrated Approach to Change
- Resetting in the New Year: Looking for Gifts in Unexpected Places
- Welcoming the Unwelcome
- Mindfulness for Educators 101
- Be the Change: Shifting the Culture within our Schools
Upcoming Programs
See list of upcoming courses below.
For SMART in Education Course Calendar, click here. | http://passageworks.org/ |
I am a guest researcher at NCMM, where I work with Nikolai Engedal in the Autophagy Project Group. Link to www.ncmm.uio.no/ncmm.
Sætre, Frank; Hagen, Linda K Korsberg; Engedal, Kim Nikolai & Seglen, Per O. (2015). Novel steps in the autophagic-lysosomal pathway. The FEBS Journal. ISSN 1742-464X. 282(11), s 2202- 2214 . doi: 10.1111/febs.13268 Full text in Research Archive.
To facilitate the purification of rat liver autophagosomes, isolated rat hepatocytes are first incubated for 2 h at 37 C with vinblastine, which induces autophagosome accumulation by blocking the fusion of these organelles with endosomes and lysosomes. The hepatocytes are then electrodisrupted and homogenized, and the various cellular organelles sequentially removed by subcellular fractionation. A brief incubation of the homogenate with the cathepsin C substrate, glycyl-phenylalanine-naphthylamide (GPN), causes rapid osmotic disruption of the lysosomes due to intralysosomal accumulation of GPN cleavage products. Nuclei are removed by differential centrifugation, and the post-nuclear supernatant subsequently fractionated on a two-step Nycodenz density gradient. Autophagosomes are recovered in an intermediate density fraction, free from cytosol and mitochondria. The autophagosomes are finally separated from the membranes and vesicles of the endoplasmic reticulum, Golgi, endosomes, etc., by sieving through a density gradient of colloidal silica particles (Percoll). The final preparation contains about 95% autophagosomes and 5% amphisomes according to morphological and biochemical criteria.
Proteins associated with membranes from purified rat liver autophagosomes were separated by two-dimensional (2D) gel electrophoresis (zoom gels, pl 4-7 and 6-9), silver-stained and identified by MALDI-TOF mass spectrometry. Among >1,500 detectable protein spots, 58 (derived from 39 different known proteins) were at least twofold (and significantly) enriched in autophagosomal membranes relative to cytoplasmic membranes. All of these membrane-associated proteins were also present in the cytosol, many of them being truncated enzyme variants that would be expected to serve a binding rather than an enzymatic function. Eleven proteins were highly enriched (consistent with the theoretical maximum of 25x), corresponding to an exclusive membrane localization in the delimiting membrane of the autophagosome. Three of these were methyltransferases: betaine:homocysteine methyltransferase (five variants); catechol O-methyltransferase (one phosphorylated and one unphosphorylated variant) and methionine adenosyltransferase, perhaps indicating that methylation/demethylation of membrane components could play a role in autophagy. A fourth highly enriched autophagosomal protein, phosphatidylethanolamine binding protein, is particularly interesting considering that the autophagic marker protein, LC3/ Atg8, is linked to autophagosomal membranes through its covalent conjugation with phosphatidylethanolamine (as the form LC3-II). LC3-II was not detectable on silver-stained 2D-gels, but could be shown by immunoblotting to be highly enriched in autophagosomal membranes. Other highly enriched proteins were heat shock cognate protein Hsc70 (one short and one long variant), peroxiredoxin 2, peroxiredoxin 6 (two variants), fructose 1,6-bisphosphatase (one phosphorylated and one unphosphorylated variant), adenosine kinase, inorganic pyrophosphatase and selenium-binding protein 2. Hsc70, a chaperonin that plays an important role in the recognition and proteasomal degradation of aggregated proteins as well as in the lysosomal membrane uptake and degradation of certain cytosolic proteins (chaperone-mediated autophagy), could conceivably also serve a recognition function in the autophagic scavenging of denatured or aggregated proteins (aggrephagy). The moderately enriched (2-14x) autophagosomal membrane-associated proteins included a remarkably high proportion of drug-metabolizing enzymes, such as several glutathione S-transferases, sulfotransferases and aromatic hydrocarbon/steroid oxidoreductases. If the autophagic function of these proteins is to recognize protein-drug adducts, they may, along with the peroxiredoxins, chaperonins and methyl metabolic enzymes, make the phagophores (the sequestering precursors of the autophagosomal delimiting membrane) well equipped for the detection and scavenging of proteins denatured by oxidation, hypermethylation, drug adduction or other mechanisms.
Autophagic activity in isolated rat hepatocytes is strongly suppressed by OA (okadaic acid) and other PP (protein phosphatase)-inhibitory toxins as well as by AICAR (5-aminoimidazole-4-carboxamide riboside), a direct activator of AMPK (AMP-activated protein kinase). To investigate whether AMPK is a mediator of the effects of the toxin, a phosphospecific antibody directed against the activation of phosphorylation of the AMPK α (catalytic)-subunit at Thr172 was used to assess the activation status of this enzyme. AICAR as well as all the toxins tested (OA, microcystin-LR, calyculin A, cantharidin and tautomycin) induced strong, dose-dependent AMPKα phosphorylation, correlating with AMPK activity in situ (in intact hepatocytes) as measured by the AMPK-dependent phosphorylation of acetyl-CoA carboxylase at Ser79. All treatments induced the appearance of multiple, phosphatase-sensitive, low-mobility forms of the AMPK α-subunit, consistent with phosphorylation at several sites other than Thr172. The flavonoid naringin, an effective antagonist of OA-induced autophagy suppression, inhibited the AMPK phosphorylation and mobility shifting induced by AICAR, OA or microcystin, but not the changes induced by calyculin A or cantharidin. AMPK may thus be activated both by a naringin-sensitive and a naringin-resistant mechanism, probably involving the PPs PP2A and PP1 respectively. Neither the Thr172-phosphorylating protein kinase LKB1 nor the Thr172-dephosphorylating PP, PP2C, were mobility-shifted after treatment with toxins or AICAR, whereas a slight mobility shifting of the regulatory AMPK β-subunit was indicated. Immunoblotting with a phosphospecific antibody against pSer108 at the β-subunit revealed a naringin-sensitive phosphorylation induced by OA, microcystin and AICAR and a naringin-resistant phosphorylation induced by calyculin A and cantharidin, suggesting that β-subunit phosphorylation could play a role in AMPK activation. Naringin antagonized the autophagy-suppressive effects of AICAR and OA, but not the autophagy suppression caused by cantharidin, consistent with AMPK-mediated inhibition of autophagy by toxins as well as by AICAR.
Several protein phosphatase-inhibitory toxins (okadaic acid, microcystin, calyculin A, cantharidin, tautomycin) administered to isolated rat hepatocytes were found to induce phosphorylation in the tail region of S6 kinase (S6K; p70S6K1) as detected with a phosphospecific antibody against doubly phosphorylated Thr-421/Ser424. 5-Aminoimidazole-4-carboxamide riboside (AICAR), an adenosine analogue that elicits activation of the hepatocellular AMP-activated protein kinase (AMPK), similarly stimulated S6K tail phosphorylation. The flavonoid naringin prevented the effects of AICAR, okadaic acid, and microcystin on AMPK activation as well as on S6K tail phosphorylation, suggesting AMPK as a mediator of the latter. The effects of AICAR and the toxins were rapamycin resistant; in contrast, amino acids induced an S6K tail phosphorylation that was rapamycin sensitive, suggesting mediation by the protein kinase mammalian target of rapamycin (mTOR). Amino acids activated S6K by phosphorylation at Thr-389, but the toxins did not, and AICAR in fact suppressed the activating phosphorylation induced by the amino acids. The possibility thus must be considered that the phosphorylated S6K tail may transmit a toxin-induced signal independently of S6K enzymatic activity. Despite their inability to activate S6K, the toxins (but not AICAR) stimulated phosphorylation of the ribosomal protein S6, presumably by activating some other S6-phosphorylating protein kinase.
Glycine N-methyltransferase (GNMT) is an abundant cytosolic enzyme that catalyses the methylation of glycine into sarcosine, coupled with conversion of the methyl donor, S -adenosylmethionine (AdoMet), into S -adenosylhomocysteine (AdoHcy). GNMT is believed to play a role in monitoring the AdoMet/AdoHcy ratio, and hence the cellular methylation capacity, but regulation of the enzyme itself is not well understood. In the present study, treatment of isolated rat hepatocytes with the protein phosphatase inhibitor okadaic acid, was found to induce an overphosphorylation of GNMT, as shown by proteomic analysis. The analysis comprised two-dimensional gel electrophoretic separation of (32)P-labelled phosphoproteins and identification of individual protein spots by matrix-assisted laser-desorption ionization-time-of-flight mass spectrometry. The identity of GNMT was verified by N-terminal Edman sequencing of tryptic peptides. Chromatographic separation of proteolytic peptides and (32)P-labelled amino acids suggested that GNMT was phosphorylated within a limited region, and only at serine residues. GNMT phosphorylation could be suppressed by naringin, an okadaic acid-antagonistic flavonoid. To assess the possible functional role of GNMT phosphorylation, the effect of okadaic acid on hepatocytic AdoMet and AdoHcy levels was examined, using HPLC separation for metabolite analysis. Surprisingly, okadaic acid was found to have no effect on the basal levels of AdoMet or AdoHcy. An accelerated AdoMet-AdoHcy flux, induced by the addition of methionine (1 mM), was likewise unaffected by okadaic acid. 5-Aminoimidazole-4-carboxamide riboside, an activator of the hepatocytic AMP-activated protein kinase, similarly induced GNMT phosphorylation without affecting AdoMet and AdoHcy levels. Activation of cAMP-dependent protein kinase by dibutyryl-cAMP, reported to cause GNMT phosphorylation under cell-free conditions, also had little effect on hepatocytic AdoMet and AdoHcy levels. Phosphorylation of GNMT would thus seem to play no role in regulation of the intracellular AdoMet/AdoHcy ratio, but could be involved in other GNMT functions, such as the binding of folates or aromatic hydrocarbons.
To identify phosphoproteins that might play a role in naringin-sensitive hepatocellular cytoskeletal disruption and apoptosis induced by algal toxins, hepatocyte extracts were separated by gel electrophoresis and immunostained with a phosphothreonine-directed antibody. Use of dilute (5%) polyacrylamide gels containing 6 m urea allowed the resolution of one very large (approximately 500-kDa) okadaic acid- and naringin-sensitive phosphoprotein, identified by tryptic fingerprinting, matrix-assisted laser desorption/ionization time-of-flight mass spectrometry, and immunostaining as the cytolinker protein, plectin. The naringin-sensitive phosphorylation induced by okadaic acid and microcystin-LR probably reflected inhibition of a type 2A protein phosphatase, whereas the naringin-resistant phosphorylation induced by calyculin A, tautomycin, and cantharidin probably involved a type 1 phosphatase. Okadaic acid caused a collapse of the plectin-immunostaining bile canalicular sheaths and the general cytoskeletal plectin network into numerous medium-sized plectin aggregates. Inhibitors of protein kinase C, cAMP-dependent protein kinase, or Ca(2+)/calmodulin-dependent kinase II had moderate or no protective effects on plectin network disruption, whereas naringin offered 86% protection. Okadaic acid induced a naringin-sensitive phosphorylation of AMP-activated protein kinase (AMPK), the stress-activated protein kinases SEK1 and JNK, and S6 kinase. The AMPK-activating kinase (AMPKK) is likely to be the target of inhibition by naringin, the other kinases serving as downstream components of an AMPKK-initiated signaling pathway.
Seglen, Per O. (2004). Økologisk samspill i Bærum: Vegetasjon og insektliv på Isi.
Seglen, Per O. (2003). Biologisk mangfold i Bærum: Sommerfuglfaunaen på Isi. | https://www.mn.uio.no/ibv/english/people/aca/pseglen/index.html |
This project will develop a TMDL for all impaired lakes within the Crow Wing Watershed by furthering data collection in the watershed, analysis of data, allocation calculations, and introducing outreach and stakeholder participation activities.
This first year of the project will collect available data relevant to the TMDL development, determine the data sets best suited for the TMDL development. Gain a better understanding of the watershed and impaired lakes, and assessment of all potential sources (internal and external) of the causes of lake impairment. EOR will also review the data produced by the MPCA for the impairment assessment for each of the lakes during year 1 of the project.
This project covers activities necessary to complete the major watershed restoration and projection project. The major objectives this project covers include contract administration, watershed coordination, stressor ID activities, identifying priority management zones, engage watershed citizens, and the creation of watershed restoration and protection plans.
This project will finalize HSPF watershed model construction by incorporating internal phosphorus loading in modeled lakes, run a suite of implementation scenarios and generate a GenScn project containing model output. The consultant will produce HSPF watershed models that can readily be used to provide information to support conventional parameter TMDLs. The consultant will deliver all modeling files for baseline and implementation scenarios and provide a GenScn project containing model output.
This project will complete a pollutant source identification and subwatershed information report and support the development of a Draft Restoration and Protection Plan (RAPP). It will also support the devlopment of a Implementation Plan that will identify target areas for BMP implementation for bacteria reductions.
This project will support the completion of a final draft Total Maximum Daily Load (TMDL) document for the Osakis, Smith and Faille Lakes TMDL and the submittal to EPA for final approval.
PROJECT OVERVIEW
The Minnesota DNR and the Minnesota Forest Resources Council work with forest landowners, managers and loggers to implement a set of voluntary sustainable forest management guidelines that include water quality best management practices (BMPs) to ensure sustainable habitat, clean water, and productive forest soils, all contributing to healthy watersheds. This project will monitor the implementation of these forest management guidelines and BMPs on forested watersheds in MN.
BWSR will administer funding to eligible County projects that provide funds and other assistance to low income property owners to upgrade or replace Noncompliant Septic Systems. BWSR will also manage annual reporting completed by each County.
This project will continue HSPF watershed model construction beyond the initial framework development. The consultant will add representation of point source discharges to the model. The consultant will also compile flow data for the purposes of calibration and validation. Finally, an initial hydrologic calibration will be performed and submitted for approval.
Phase 4 of the Lake Winona Total Maximum Daily Load (TMDL) project will finalize the draft Lake Winona TMDL, dated November 2009, by completing additional data analysis, lake quality modeling, updating the TMDL report, and supporting the public involvement process.
This project is to finalize the Total Maximum Daily Loads (TMDLs) and Watershed Restoration & Protection Strategies (WRAPS) for the Red Eye and Long Prairie Watersheds.
The goal of this project is to develop a Total Maximum Daily Load (TMDL) for all impaired stream reaches and lakes within the Long Prairie and Red Eye Watersheds.
This project will gather watershed data to support the development of a Watershed Restoration and Protection Strategy with parameter-specific targets that will maintain or improve water quality for the Long Prairie River Watershed. This project will also provide an important framework for civic and citizen engagement and communication, contributing to long-term public participation in surface water protection and restoration activities throughout the watershed.
This Sauk River Watershed District project will conduct the Whitney Park river clean-up, adopt a river program and other community events as part of their healthy living programs; will collaborate with the city of St. Cloud to install a rain garden demonstration site at Whitney Park; use local radio and public television stations to promote the District’s “neighborhood rain garden initiative” and other incentive programs.
This project will develop a Watershed Restoration and Protection Strategy (WRAPS) report as well as Total Maximum Daily Load (TMDL) studies where needed. The TMDLs will provide the quantitative pollutant load reduction estimates and a set of pollutant reduction and watershed management strategies to achieve water quality standards for the impairments within the watershed. Strategies for protecting the unimpaired waters within the watershed will also be included.
This project will complete an assessment of watershed lakes and streams. The assessment will include biological and stressor id analysis, which will support a summary report on lake conditions and protection strategies for lakes included in this watershed study.
This project will provide the monitoring of reaches where there are data gaps, incorporate new data and analyze relevant data, identify pollutant sources, hold a stakeholder meeting, and gather information towards the future development of a Draft Restoration (TMDL) and Protection Plan.
This project will support the monitoring of reaches where there are data gaps, incorporate new data and relevant data, continue identification of pollutant sources, complete load duration curves, coordinate and encourage participation in stakeholder meetings. The information gathered during Phase IIB will be utilized towards the development of a Draft Restoration (TMDL) and Protection Plan (Plan). | https://www.legacy.mn.gov/projects?search_api_fulltext=&%3Bamp%3Bf%5B0%5D=fiscal_year%3A2011&%3Bamp%3Bf%5B1%5D=project_facets_counties_affected%3A467&%3Bamp%3Bf%5B2%5D=project_facet_watershed%3A59&%3Bamp%3Bf%5B3%5D=project_facets_counties_affected%3A457&%3Bf%5B0%5D=project_facet_recipient_type%3A150&f%5B0%5D=project_facets_counties_affected%3A420&f%5B1%5D=project_facet_activity_type%3A131 |
Attorney Rep Adjuster (ATR) The candidate will investigate and verify coverage. Will investigate and determine liability by analyzing documents, conducting telephone interviews and determining negligence. Provide extraordinary customer service to..
Paralegal The candidate duties includes: To be an active team member of the legal team by providing high-quality professional administrative legal support to in-house counsel for the protection of the..
Paralegal The candidate will draft routine motions, pleadings, correspondence, etc. Perform litigation assistance by coordinating witnesses, schedules, exhibits for Trials or hearings and securing records as needed. Assist in preparing..
Legal Secretary The candidate work includes; E-filing in all Court; Opening files; Keep cases organized; Experienced with drafting standard discovery, demands (interrogatories, requests for production, etc); Draft routine motions, pleadings,.. | https://www.employmentcrossing.com/jobs/c-loya-insurance-group-jobs.html |
My interest in the study of Religion emerged from a youthful fascination with the poetics of the human imagination expressed in myth, literature, and psychological writings as well as the texts of the world religions. As an undergraduate at the University of California at Santa Cruz I pursued an interdisciplinary major in this area, guided by a mentor whose academic location was the department of “History of Consciousness”. My undergraduate thesis focused on the images of “the primitive” in the writings of twentieth century poets and anthropologists. As a theoretical tool in this context I became absorbed with the ideas of post-Jungian archetypal psychology, especially the writings of James Hillman. The pursuit of this psychological dimension of myth, imagination, and religion lead me to graduate studies in Religion at Syracuse University whose department of Religion was then known for its receptivity to the approach of Hillman and related ideas about religion as emerging from the depths of the human mind and not necessarily confined to the traditions usually thought of as “the religions”.
My Phd. Studies at Syracuse familiarized me both with the comparative approach to world religions as well as to the wide range of modern and postmodern critical theories that have provided the interpretive lenses by which the meanings of religion have been grappled with, especially during the two hundred or so years in which the academic discipline of Religious Studies has been constituting itself. I gradually supplemented my psychological orientation with an awareness of political theories, critiques of ideology, and sociological inquiries into the roles of religion in society and culture. This growing interest in the politics as well as psychology and poetics of religion lead to an immersion in Marxist and neo-Marxist literature, and I eventually wrote a dissertation on the critical theory of religion from a neo-Marxist perspective, making primary use of the writings of the Frankfurt School of Social Research and the work of Fredric Jameson, a significant American Marxist literary and cultural critic.
Along with these academic pursuits of the elusive religious phenomenon, I was engaged in a simultaneously academic and personal study of the practices and philosophies of one of the great world religions, Buddhism. As of this writing (2009) I’ve been studying and practicing Buddhism, especially in the Tibetan tradition, for over twenty years, working under various Tibetan lamas (spiritual teachers) and other Buddhist meditation masters. The meditative mind of Buddhism has always struck me as a beneficial foundation both for academic work that values the intellectual but also remembers that there are other facets of the human person, and for teaching Religious Studies, punctuating (if subtly) the discourse of the academy and the classroom with the silences of contemplative awareness.
My teaching and research interests have ranged widely across the domains mentioned above, from the neo-Marxist critical theory of my dissertation through a growing interest in the phenomenon of “socially engaged Buddhism” which puts the contemplative practices of Buddhism and the spiritual philosophies of that tradition into dialogue with the social crises of the contemporary world. My interest in all of this, focused especially in the teaching-space of the classroom and personal conversations with students, is in attempting to bridge the gaps between inner and outer, psycho-spiritual and political, in such a way that Religious Studies itself becomes a form of deep engagement, with the world and with our selves. | https://faculty.ithaca.edu/karafin/ |
If you happen to live in the Australian Capital Territory1, you live in a relatively small enclave excised from New South Wales. It is a subcrescentic area of land with a border that is just over 300 km long. If you stand on the northern extremity of the territory and your mother is a metre away to your right, and her mother (your grandmother) a metre to her right, and her mother (your great grandmother) a metre to her right, and so on all around the border, you will go through about 300,000 generations and the being standing on your left, as the loop is completed, will be just over a metre tall, covered in thick hair and may be at least partly arboreal. Given that it is likely that age at reproduction was considerably less that many generations ago than for modern humans2, it is likely this 300,000th ancestor would have lived about 3.5-4.5 million years ago. At that time the only hominins on our line of ancestry were gracile australopithecines such as Ardipithecus ramidus and Australopithecus afarensis3.
As you can see, these hominins have different species names to ours (sapiens) and they also have different generic names to ours (Homo). However, your mother belonged to the same species as you, and your grandmother belonged to the same species as your mother, and your great grandmother belonged to the same species as your grandmother. And this goes for every ancestor-descendant couple in these 300,000 generations. So what are we to make of the assignment of such small hairy beings to different genera and species to ours? It is purely an example of two phenomena, the human propensity to categorise things, and the relative paucity of fossil hominin specimens. As we find more and more fossils the distinctions between species become finer, and genera will proliferate.
This brings me to the fossils, reputedly of Homo sapiens, which have been found at Jebel Irhoud in western Morocco. These fossils have been dated to a little over 300,000 years, which places them at about 100,000 years older than the previous oldest specimens of H. sapiens from east Africa4. Parts of five individuals were recovered, and these indicate that the faces were much like modern humans in being relatively flat without the pronounced prognathous forward projection of earlier hominins, but with a less prominent chin, and with a steeply sloping forehead. The Moroccan specimens do have prominent brow ridges, but the forehead does not slope as strongly backwards from the brow ridges as in Neanderthals or H. erectus. One thing which has puzzled the discoverers slightly is that the skull is much more elongate than the bulbous modern human skull. This is interpreted to indicate that the brain was organised differently to that of modern humans4, perhaps more like that of Neanderthals.
As an indication of the problematic assignment to species, there is some doubt as to the assignment to H. sapiens, with Jeffrey Schwartz (University of Pittsburgh) claiming that too many different-looking fossils have been lumped together in the species, thus complicating efforts to interpret new fossils. In addition, María Martínon-Torres (University College London) has suggested that the lack of a prominent chin and a flat forehead should preclude assignment to H. sapiens4.
As more fossils are discovered, the ability to assign them to a species will become more difficult, and that is because a species can only really be defined at an instant in time. Add the fourth dimension and it all becomes fairly arbitrary, as in the thought experiment above, where you would need to decide where among your maternal lineage, the species Homo sapiens, to which you belong, ends and its predecessor species begins. That would entail drawing a boundary between a mother and daughter, and assigning them to different species, a clearly ludicrous proposition. It was Linnaeus who, in the 1700s, developed the binomen of generic and specific names to distinguish one species from another. Maybe Linnaeus got it wrong. | http://www.blotreport.com/science/linnaeus-get-wrong/ |
North Macedonia, has over two million inhabitants, and is among the European countries with the highest concentration of PM 2.5 fine dust in the air. In 2018 Skopje became the most polluted capital in Europe. Tetovo and Bitola are also regularly among the most polluted cities on the continent.
Particulate matter 2.5 contains a variety of components such as nitrates, sulphates, organic chemicals, metals, dust, black carbon and is considered to be the most dangerous pollutant for health. Its tiny particles - about three per cent the diameter of a human hair - can penetrate the respiratory system and even the bloodstream and have been linked to various respiratory diseases and deaths. According to the World Health Organization (WHO), 2,574 people prematurely die every year in Macedonia as a result of air pollution.
Pollution has been attributed to a mix of coal fuels, wood stoves, burning of outdoor waste, emissions from old industries and highly polluting obsolete vehicles. During the winter most Macedonian citizens burns coal, scrap wood, textiles or trash in order to keep warm, because they cannot afford to switch to cleaner and more sustainable forms of heating.
The geographical position of Skopje contributes to making the situation even more serious, as the mountains surrounding the city trap polluted air.
At the moment the authorities have not yet studied an efficient plan to combat this environmental problem. | http://www.alessiopaduano.it/stories/air-pollution-in-macedonia/ |
"cardboard"
curly hair. guitar congas drawing building brown or black shoes
Design quotient
Research
0pt
Idea
0pt
Evaluation
6pt
Collaboration
22pt
Total
28pt
Recent comments(3) View all
James commented on Student Led Conferences in Middle School Leads to Ownership of Learning
I can attest to the ability of SLC's to empower students to take ownership of their own learning. I've seen the incredible effect that it can have on student accountability & responsibility for learning, and how it can place all the stakeholders for the child's education together in conversation, so that everyone involved has an opportunity to express their interests.
James commented on Mind the Gap (Year)
Why not utilize this post secondary year as a service year? Let's let young people have the opportunity to work in a structured program that allowed them to travel, and get real-world experience alongside others of their own age, as well as experienced scholars and professionals, while fulfilling needs within NGOs, schools, relief projects, and public service sectors.
James commented on COLOR Club + Design Team Supervisor
I love it! his is a long term skill-building, mentorship-based program that helps individuals develop confidence over time and practical world experience that is transferable to both academic life and occupations. | https://collaborate.teachersguild.org/profiles/116995718090613733313 |
That which can be asserted without evidence, can be dismissed without evidence.
Evidence is information that indicates whether an idea or preposition is true and it also determines the validity of the idea. For one to state an idea without evidence, depending on what they state and the beliefs of others, dismissing this idea can be varied. Bias, which is a thought of being against a certain group of people or just an individual and this is a factor that contributes to answering the question. It is difficult to dismiss an idea containing no evidence since most great ideas in history began from this. To start with something big, one must be allowed to imagine and express their ideas. Belief also plays a role in this because it is the acceptance of a fact that has no proof but is believed by many people and this helps answer the question because based on one’s beliefs and what they have been taught to know, every person has a different perspective on what to take in as what they believe and what they don’t believe. If everything in life was based on the statement in the question then doubt will increase and trust will not exist anymore. It is easy to assert a statement without evidence however dismissing it is difficult to do. In everyday life, one may feel pain and state that they have a headache, they are the ones who can feel it and they do no have evidence for this headache thus making it difficult to prove the statement wrong therefore I disagree with Christopher Hitchens. My experience with religion and science defines this very well because I have parents that have completely different views of religion. Growing up I went to Sunday school and believed in everything that I was taught and until today, I do believe there is a God and Jesus Christ exists because I was...
Bibliography: 30-Days. "World Population Statistics." World Population Statistics. N.p., 27 Feb. 2013. Web. 09 Apr. 2013.
--------------------------------------------
[ 1 ]. 30-Days. "World Population Statistics." World Population Statistics. N.p., 27 Feb. 2013. Web. 09 Apr. 2013. | https://www.studymode.com/essays/That-Which-Can-Be-Asserted-Without-1590329.html |
Dr Sheena Warman was the lead academic on her project, ‘LeapForward’, for which she was awarded a Catalyst Fund from BILT for 2017/18. The project summary and conclusions can be found below – if you would like to view the full report please contact the BILT team.
As part of the 2018 Festival of learning and Teaching Sheena Warman and Sarah Kelly presented ‘Feedforward to support classroom to workplace transitions; an interdisciplinary approach‘, watch the recording or download the presentation PowerPoint.
Click here to access the LEAPforward resources.
Project Summary
The LeapForward project aimed to evaluate and improve feedback and feedforward practices within undergraduate Health Sciences programmes (BVSc Veterinary Science, MBChB Medicine, BDS Dentistry), MSc Social Work, and BA Theatre and Performance Studies – a truly interdisciplinary approach. We have focused on student transitions, particularly that from classroom to workplace-based learning environments.
The overall aims and objectives of our research were to:
- Explore the impact of current feedback and feedforward practices
- Identify priorities for improvement in feedforward in supporting students’ self-regulatory workplace skills
- Develop a novel feedforward intervention/resource relevant across diverse disciplines
- Identify what different disciplines can learn from each other’s practice
In Phase 1 of the project we explored the impact of current feedback and feedforward processes and practices, by collating existing resources and running ten focus groups, talking to groups of students and staff from each discipline (in separate groups) about their experiences. Analysis of the staff and student focus groups enabled us to identify twelve overall themes, clustered into three overarching categories, which illuminate the student and staff experience of feedback and feedforward across the different disciplines, in the Bristol context.
In Phase 2, we built on the earlier findings to design and develop a modular training package for both students and staff which is intended to support students in their development of self-regulatory workplace skills and provide new feedforward interventions which have the potential to be applicable more widely across the university.
Conclusions
- Interdisciplinary approach: there are similarities as well as differences in practices and experiences of feedback and feedforward and both are instructive in understanding feedback and feedforward processes at the University of Bristol
- The interdisciplinary nature of the project means that both Phase 1 findings and Phase 2 training packages developed can potentially be applied widely across the University to both Students and Staff, and that there are consistent messages for both parties in the feedback /feedforward dialogue.
- Student and Staff ‘Feedback Literacy’ is similar, however, for maximum overall benefit, both groups can be supported to move through ‘literacy’, via ‘capacity’ and ‘managing affect’ to ‘action’ (Carless and Boud, 2018) on a consistent and agreed trajectory. | https://bilt.online/the-leapforward-project/ |
Two steps forward and one step back. In early January I took the written exam for the Commercial certificate. I scored a healthy 86% and was anxious to get in the airplane to learn and master the Commercial maneuvers with the goal of a check ride by my birthday at the end of March.
We all know what happened next. As pilots we have had to exhibit some patience in order to try to tamp down the outbreak of the Corona virus. I would like to give a big shout out to my instructors, Mike Jesch [primary] and Christopher Keran [night] and my DPE Dave Koebel. We all had to exhibit patience, pivot and persistence. I am happy to report that on July 5th I took and passed my Commercial check ride in Hood River, Oregon. I hope that understanding and applying the following principles will help you to reach your aviation goals in 2020 and beyond.
The key to living in these times, psychologically speaking, is the use of Three P’s:
-
Patience
-
Pivot
-
Persistence
Patience
To say that these are unprecedented times would be an understatement. Our entire sense of “normal” has vanished like the many scheduled events on our flying calendars. Additionally with many working from home, off work, or recovering from illness, our ability to define normalcy has been decimated.
Personally I had two opposing forces; my desire to complete my training and achieve the Commercial; and my psychotherapy practice that was busier than ever. At the beginning of the pandemic I could have worked seeing clients virtually 24/7. There was [and is] so much need for psychological care. I had to develop some patience during this early transition to “COVID-normal”. Eventually I was able to strike a balance between work, study, and a personal life.
It is safe to say you haven’t lived through a global pandemic of this magnitude, so what I am about to say might seem a little strange. Let yourself be a learner; give yourself some grace. As information changes, life changes, and your feelings change, remind yourself that you are back to being a student-of-life. Try to show patience to yourself and others, as we all process at our own pace.
Pivot
Humans react differently to stress and trauma. For many the “shock” phase, in which the person feels foggy and is keen to deny reality, lasts longer. There comes a time where the shock wears off and we have to make new plans that line up with the new reality. This is where the concept of Pivot comes in. Flexibility is the key in learning to pivot. Like many of you, I had a timeline for my new rating. Then 2020 said, “Hold my beer” and those plans that included in-cockpit instruction were out the window. Time to change course and do as much as I could on my own.
I used King Schools for my Commercial ticket. Luckily the online content was up-to-date and very complete. Another added benefit of quarantine was that so many outlets [AOPA, EAA, FAAST, Social Flight, etc.] were offering educational content. Owning my plane provided a major advantage during COVID. I was able to practice maneuvers and get the night cross country and required night landings in all while being in complete control of my aircraft environment.
Persistence
As days turned in to months in our COVID-normal, I found myself drifting a bit. In the “before-times” I used to work really hard, so I could play hard at aviation events. Now the play was all gone, replaced by work, work, work, then zombie. You see, when you are staring at a screen all day your brain downshifts your body to zombie mode. Yet other parts of your brain are on high alert, keenly aware you are working, being observed and on-camera. The combination of sitting for long periods, body on zombie, brain on high alert leads rather quickly to exhaustion or burn out.
After I finished my day, mustered up something to eat, and took my pup Mooney out for a walk, the idea of watching another Zoom video, or online education video just made me cringe. Another factor was that my attention span was about 20 minutes. What I had to do was exhibit Persistence. I set small goals for myself; every day I would do at least one thing that would make me a better pilot.
In late May I talked with my CFI Mike Jesch about his feelings about resuming flight instruction. We agreed to wear our masks, disinfect the yoke/instruments, to use our own headsets and to be as socially distant as one can. We started up the flight training, specifically on the maneuvers. I had watched the King Commercial check ride prep videos repeatedly, read the Airplane Flying Handbook and did a fair amount of ground prep. CFI Chris Keran was on board for the night dual, which turned out to be a hoot from Santa Maria, to Bakersfield, then Fresno, CA.
The reality is, when you are in the air, you are back to being a learner. I had to exhibit the grace and grit I spoke of earlier. I can’t count how many people told me how much they loved flying the maneuvers, how graceful it felt to them. Let’s just say, at the beginning it wasn’t graceful for me. I had to apply my formula; patience in allowing myself to struggle, correct, and succeed; pivot by remembering how I learn best [by demonstration]; and perseverance in sticking to my commitment of becoming a better pilot.
Before I got my instrument rating pilots would tell me that there would be a moment in which instrument flight just “made sense”. I didn’t believe them, until it made sense for me. The same thing happened with the maneuvers and me. Instead of being afraid of the chandelle, power off 180 landing or 8s on pylons, I actually looked forward to it. Voila. All I needed now was a good flight to the Columbia River Gorge from California and the surface winds to take a chill pill in the Gorge.
18 years ago I learned to fly in Hood River Oregon. Nestled in a natural wind tunnel at the base of Mt. Hood, we used to say if you could fly in the Gorge, you could fly anywhere. The 15 years I have been in California erased some of the high-wind memories. Back then it was 18G26 on my PPL check ride. Turns out that the CPL wasn’t going to be much different. Hood River Oregon [4S2] departure Runway 25 280 @10G15, The Dalles Oregon [KDLS] landings-Runway 31 [email protected] 13G21, [email protected] 16G26. There is nothing like demonstrating a soft field takeoff on a warm day with those winds. My track from Foreflight is a sort of Rorschach test… what do you see? I see a T-Rex, taking a bite out of those maneuvers!
When I landed in Hood River after a successful check ride I felt proud of myself. Although the certificate was 3 months “behind schedule”, I am happy to have accomplished it during these trying times. My DPE got out of the plane and headed to his car. I was left on the ramp, gazing over N18213 the C150 that I got my private in all those years ago. The wind was blowing as I tied down Maggie. True to form my tears started flowing shortly after. Memories flooded my mind from 4S2, both good and bad. For today I was focused on the good. Another successful flight of Haywire Airlines and now on to the search for a fountain cherry Coke. | https://blog.aopa.org/aopa/2020/07/19/patience-pivot-and-persistence-get-a-new-certificaterating-during-covid/ |
Comox Trunks Sew-Along: Day 1 - Schedule
Welcome to the Comox Trunks Sew-Along. Each post will only involve about half an hour of sewing which makes this a great sew-along to follow if you are fairly new to sewing and a little overwhelmed or if you have a really busy schedule.
- April 4th: Choosing your fabric and elastic
- April 6th: Picking a size and ideas for customizing (lengthen the legs, enlarge the front cup, create narrower legs, or remove the right exit fly)
- April 8th: Cutting out your fabric and preparing your machine
- April 10th: Sewing the trunks front
- April 12th: Sewing the trunks back
- April 14th: Hemming the trunks
- April 16th: Attaching the elastic waistband (or adding a fabric covered waistband) – We’re done!
Comox Trunks Sew-Along: Day 2 - Picking a size and ideas for customizing
Welcome to Day 2 of the Comox Trunks sew-along!
Do you have your fabric picked out? You still have time to pre-wash it as we won’t be cutting out the pieces until Tuesday, April 8th.
Today we are choosing a size and later in the post I will show you some ideas I and a few other sewers have had regarding how to customize your trunks for the perfect fit and style.
First off, when choosing your size, it is important to realize that it is largely the elastic waistband that determines the fit of the trunks. Everyone has slightly different proportions to their waist, hips and butt and they may also have preferences to how tight or loose they like elastic waistbands to be (underwear are a very personal thing!). Also, there are many types of elastic which have different amounts of stretch to them. If the elastic you choose stretches more or less than our sample elastic did, you will end up with a different fit than we did!
I recommend using our body measurement guide to choose the size for the fabric portion of the trunks as you normally would for a sewing pattern but then wrap the elastic directly around the wearer to choose the length of your elastic. We have provided guideline measurements for the elastic in our “Materials Required” chart in case you prefer to use our estimates (if the trunks are a gift, for example), but otherwise, this is how you figure out how much elastic you will need:
1. Take a length of elastic and wrap it around the wearer’s upper hips (where their boxer elastic normally sits) making sure to wrap it as tight as they would like it to be when they wear the boxers. The elastic should have to stretch very slightly so that their trunks stay up!
2. Mark this length and then add 3/4″ to the length for your seam allowance (two seam allowances of 3/8″).
3. Compare your resulting measurement with our elastic measurements in the “Materials Required” chart. They should match ours or be fairly close. When you sew your trunks, you may have to ease or stretch the top edge of the trunks slightly when attaching them to the waistband. Don’t worry if this results in a few ripples – one the wearer puts them on they will stretch out to perfectly suit their body (due to their custom-fit elastic waistband!).
Now that we’ve determined the amount of elastic we need, here are a couple tips about choosing a size.
1. The trunks are drafted with negative ease. This means they are smaller than the wearer’s body so that they fit like a second skin. For our plus-sizes though (size 39-45) we have graded the pattern differently so that the wearer has more room in their trunks (the grading is larger and the sizes expand wider than the other sizes).
2. Our waist measurements correspond to the wearer’s natural waist. This is approximately at naval level and is NOT where the trunks will end up sitting (those would be some high-rise trunks!).
That’s it! Now lets move on to some ideas for customizing the fit and style. I have four different ideas and would also love to hear your suggestions (leave a comment below with tips and questions!).
Idea #1: Lengthen the legs: Some people may feel a little under-dressed in such tight fitting skimpy little trunks :P That’s an easy fix – simply lengthen the legs for a more conservative pair of shorts! Here is how you do this:
Idea #2: Enlarge the front cup: Are you sewing for someone who is generously endowed? Our trunks have what I would describe as a “solid medium” size cup. You can very simply enlarge (or decrease) the size of the cup by altering the curve of the front pieces as follows:
Idea #3: Create narrower legs: Does your wearer have skinny legs? They may be comfortable with the extra room in the legs (after all, no one wants to feel constricted by their undies) but if they would like the second-skin fit that these trunks are designed to have, you can adjust the pattern piece as follows (note that this must be done to the paper pattern rather than the fabric since these trunks don’t have a side seam!):
Idea #4: Remove the “right exit fly”: This is my favourite idea and is one that has generated some very hilarious discussions at our latest family gathering. I gave my brother-in-law a pair of Comox Trunks for his birthday at a large dinner party. Quickly one of the female dinner guests commented, “Does anyone actually use those tiny little front openings???” I must say that I didn’t really have an answer! We included them as part of the design because they are so commonly found on modern underwear and I didn’t want our design to lack something that ready-to-wear clothing normally has. Fortunately, my brother-in-law had a very confident answer: When in dress uniform/fancy attire (at his job, for example) his shirt has been very carefully ironed and tucked in. In a scenario such as this he, with out a doubt, goes “through the gate.” In casual uniform/regular clothes he is not constricted by his tucked in shirt and most certainly goes “over the fence.” HAHA! As you can imagine, his knowledgeable explanation of the matter, complete with specialized metaphors, gave us quite a laugh :).
If you see no reason to go “through the gate”, you can save yourself some sewing time by removing the bound entry. Simply adjust the sewing process as follows to create a completely closed front cup (I still recommend keeping it double layered so that the shorts provide nice coverage and are hard-wearing):
Do you have any other ideas to alter the design or fit of the trunks? It’s fun brainstorming these sorts of things for a pattern that isn’t very common. At first examination the design, with it’s unusual seams and close fit, seems quite un-alterable but hopefully you now realize that this is not the case! The Comox Trunks can be altered to create all sorts of menswear underwear styles and can be made to suit the many individual requirements men have for their undies.
Comox Trunks Sew-Along: Day 3: Choosing Your Fabric and Elastic
Welcome to the first day of our Comox Trunks Sew-Along! Today I will be giving you some tips and a photo guide to choosing your fabric and elastic. Here are the supplies I have gathered together to sew up some Comox Trunks:
As you can see, the fabric I have chosen is a lightweight charcoal coloured knit. It is comprised of bamboo and cotton with a touch of spandex. It is available as part of our Comox Trunks Supplies Kit along with the black elastic.
If your local haberdashery only has a small selection of knit fabrics, don't worry, you still likely be able to find something that will work for your Comox Trunks. The Comox Trunks will end up fitting best throughout a long day of wear if you pick a fabric with at least a small amount of spandex content. The spandex adds resiliency to the fabric to help prevent your trunks from growing baggier and saggier throughout the day.
Here is a close up examination of the bamboo/cotton jersey that we include in our Comox Trunk kits. It is deliciously soft and thinner than most t-shirt style knits. It is strong though and has just enough spandex content that it works perfectly for the trunks:
While it might be difficult to find a bamboo blend knit in your local fabric store, most fabric stores have at least one or two bolts of t-shirt style knits. These are medium weight knits that usually have a high cotton content. Here is an example of this (a medium weight striped t-shirt knit comprised of 95% cotton and 5% spandex):
A more stable (and thus easier to sew!) form of the t-shirt knit is also commonly found in fabric stores. The one I found is this red "Sport n Play" actionwear T-knit Jersey which is comprised of 90% cotton and 10% spandex. This is a great choice for people who are new to knits because it has a lot of stretch (so your tight fitting garment will stay tight fitting) but is also thick enough and tightly knit enough that it won't warp and become misshapen while you sew:
Lastly, as you saw in the photos of the prize pack that I showed the other day, I picked up a novelty Canadian maple leaf knit which was simply labelled "mixed fibres." It doesn't have as much elasticity as the other fabrics but has still worked well for the trunks:
Since the trunks only need a small piece of fabric and a short amount of time to sew, if you are in doubt about your fabric choice, why not try out a few types so that you will become more confident with sewing knits in the future (armed with your Comox Trunks sewing knowledge, you'll be eager to start sewing all sorts of comfy knit sweaters and dresses!!!)
To figure out if your prospective fabric has enough elasticity, use the handy knit guide in the instruction booklet (and also on the back of the envelope if you purchased the tissue version of the pattern).
To use this guide while standing beside the bolt of fabric in the store, lay down the guide on a table (or have someone hold it for you) and unroll a length of fabric to work with.
Since the Comox Trunks require a material that stretches in all directions (in other words, a fabric with 4-way stretch), you can test either the length or width of the fabric first. Just remember to test the other direction after!
Hold a 3" length of fabric up to the black bar and mark and keep the left hand (which is pinching the fabric) stable and still at the edge of the bar.
Stretch your right hand and the fabric to the right until the fabric has stretched as far as it easily wants to go (don't use all your strength, you will be able to tell how far it naturally wants to stretch). If your right hand and the pinched end of the 3" chunk of fabric are now within the lightest grey section of the bar, the fabric you have chosen has enough stretch to be made into Comox Trunks!
One last thing you want to check is how quickly and completely it 'bounces' back to its original position. If your fabric looks stretched out or warped when you release your right hand then it does not have enough spandex content and resiliency to maintain its shape once made into the trunks.
Now that we've found a suitable fabric, its time to move on to choosing an elastic!
The elastic I am using (the same elastic that is included in the kits) is firm without being scratchy. It is not soft on one side as some ready-to-wear underwear elastics are (both sides are the same texture on this elastic) but it is very strong and will likely survive many washes before it begins to ripple. If you are sewing these trunks for someone with extremely sensitive skin we will be covering how to create a soft fabric casing for the elastic later on in the sew-along!
While the pattern calls for 2" elastic, it is perfectly acceptable to choose something wider or narrower. I like the look of the 2" band and Matt thinks that this width produces the comfiest results (narrower elastics can sometimes create the feeling of a little more pressure against the skin). It is very common to see trunks with 1" to 1/2" elastic bands so go ahead and save a bit of money by choosing a narrower elastic if you desire!
The plush elastic that I picked for the sew-along prize pack is 1 1/2" wide and is quite thick. It is very soft on both sides. Here you can see how the two types compare:
While you're at the fabric store, don't forget to pick up a needle suitable for sewing knits. You can sew the entire project using a ball point needle or stretch needle. If you like using a twin needle, you can buy one of those for the hem and for attaching the elastic waistband. These are the ball point needles that I use:
Have any questions about what supplies you will need? If you are hesitating over a fabric or elastic choice, I would love to give you my opinion - just leave a comment or send us an email ([email protected])! Join us again in two days to pick a pattern size and to contemplate any customisation you might like to do!
Comox Trunks Sew-Along: Day 4 - Cutting out your fabric and preparing your machine
It is officially Day 3 of the Comox Trunks sew-along and today we are finally going to start working with our fabric! Today we will be cutting out our fabric and preparing our sewing machines to work smoothly with thin knits. By now you should have gathered together your pre-washed knit fabric, corresponding thread, a length of medium weight pre-shrunk knitted elastic (elastics will normally specify on the roll/packaging whether they have been pre-shrunk or not...if they aren't it is advisable to wash them with your fabric as that's what you'll be doing when the trunks are finished, after all!). You should also have picked your size.
If you have not yet chosen your materials, have a look at the fabrics and elastics I suggest throughout this post.
Okay, let's begin! Lay out your pre-washed fabric by folding it in half and matching up the selvages. I like to pin the selvages together, especially with knits that are prone to curling, so as to ensure that all the pattern pieces will be properly lined up with the grain of the fabric. See how the knit likes to curl?
In the first edition of our printed instruction booklets, I have made fabric layouts that specify you should cut pattern piece 2 and 3 on a single layer of fabric. We've since revised these layouts so that this is no longer necessary - simply cut them on the folded fabric along with all the other pieces so as to create two 'mirrored' versions of each piece.
The only pattern piece that needs to be cut 'on the fold' is piece 4 which is the back of the trunks. Cutting this on the fold will result in a single fabric piece that is double the width of the paper pattern piece.
Also, if you are using a fabric with 4 way stretch which is a recommended fabric choice for these trunks (this means that the fabric stretches length-wise and width-wise), you don't necessarily need to cut piece 6 (the binding) on the bias. We placed the grainline in this manner so that you have the option to use contrast colours or prints for your binding regardless of if they are 4-way or-2 way stretch (or even a woven fabric if you are feeling adventurous!).
When cutting out your fabric, mark notches by clipping triangles outwards our using chalk or a pin. Avoid clipping into the seam allowance partly because it is quite small (only 3/8") but mostly because some knits have a tendency to run when nicked (even after you've sewn the seam).
Here's a close up of the little notch I made:
Now that all of our pieces are cut out, its time to set up the machine!
For this sew-along I am sewing one pair of trunks with my regular domestic machine:
...And a second pair of trunks using my serger:
This way, you will be able to see how to construct your trunks with any available machine. It is well worth your while to play around with the settings on your machine with a scrap of your fabric until the machine works smoothly and your stitches are even. My little domestic doesn't have a huge amount of stitch options but I find the zig-zag stitch works well for the main seams with a narrow width. Also, it really helps to adjust the presser foot pressure so it is lighter than normal.
Also, I like to use a ball point or stretch needle when using knits. After all of our careful cutting of outward notches it would be a shame to cause a run in the fabric because the sharp needle has snapped some of the fibres!
This next picture is not very clear but hopefully you can see how I played around with adjusting the width of the zig-zag stitch. After creating a seam of varied zig-zag widths using two layers or knit I pulled open the layers to examine which width of zig-zag was the most invisible from the right side. If your stitch is too wide you will see threads and ripples on the right side of the garment - not good!
Here are the settings that I found worked best on the charcoal jersey for my machine (remember that the number scale and settings are different on every machine so don't be tempted to blindly use my numbers....test test test on your scraps!):
When I use the reinforced straight stitch for seams that need lots of strength (this works well on some knits but it is too rough on delicate knits and can cause holes because the needle punches the same area three times):
When I use the zig-zag stitch for major seams:
I didn't take photos of my serger's settings because it turned out that the stitches looked best on the Maple Leaf fabric that I used for my serged sample when I set the Differential Feed to "0". You might notice in the instruction booklet that I mention you should adjust the Differential Feed when sewing knits. I think this wasn't necessary for the Maple Leaf knit because it has very little stretch and acted more like a woven.
If you are confused about what I mean by Differential Feed, you need look no farther than this excellent blog explanation to have this dial de-mystified!
Are you raring to get sewing yet? We'll get started on Thursday by sewing the trunk front which is the most fiddly bit of this really fast project. Looking forward to it!
Comox Trunks Sew-Along: Day 5 - Sewing the trunks front
It’s time to get sewing! It’s nice to have our machines already set up after the last post so that we can get right into the fun part today!
Firstly, we have to prepare our two strips of binding. For my charcoal pair I went with self binding but for my Maple Leaf pair I used a contrast dark red – feel free to experiment with different combinations!
Start by folding each long edge into the middle and press:
Fold this segment almost in half. I like to make one “half” just a touch wider than the other so there is less chance of me missing the bottom layer of the binding sandwich in the next step (because that is SO frustrating…especially since knits are a bit tricky to un-pick).
Once your binding is pressed, pin it to both Front 1 sections along the sharp curve. Keep the narrower side of the binding facing you so that when you sew along the edge of it, the wider binding will be underneath the fabric and will be caught easily. In the printed instruction booklet I state: “DO NOT treat the two Front pieces as mirrored pieces.” Since we revised the cutting layout, as mentioned in this post and in the errata section of our website, you will now be treating these as mirrored pieces. Sorry for the confusion! The PDF pattern has been revised so if you are using the PDF instruction booklet, align your Front Pieces as illustrated (mirrored).
Now it’s time to sew the binding to Front 1. Before I show how to do that, I have a handy little tip that has saved me much sewing strife. It is a good habit when sewing both knits or wovens to start a seam with your needle down in the fabric. I must have lost this good habit somewhere along the way (I remember being taught to do it!) and so was continuously frustrated when I began to sew knits because my machine seemed to “eat” the knit at the beginning of seams about 50% of the time! It would suck the thin knit down into the bobbin chamber and create a huge mess. This problem was eliminated when I put my needle in the full “down” position before I even get my foot near the peddle to start the seam. If this tip helps save at least one person the frustration I felt when beginning to sew knits I will be thrilled to hear it!
And here is our attached binding. I used a zig-zag stitch for this version but you could also use a straight stitch or reinforced straight stitch as the binding itself doesn’t need to stretch:
Here you can see a close up of the stitching:
The binding is a little longer than the curve (especially if it has stretched while you sewed it. Just trim off the little bits of excess:
Now it is time to attach Front 1 to Front 2. Align with right sides together and pin along the long curve. From this point onwards I will include photos of both the charcoal pair that I’ve sewn with a regular machine and the Maple Leaf pair that I sewed with a serger:
Note that I sewed the binding to the front of the serged pieces after I sewed Front 1 and Front 2 together – you can sew the binding on either before or after, whatever you prefer!
By the way, look at my Maple Leaf placement! I was chatting with Sophie from TwoRandomWords about how I had forgotten to worry about pattern placement when I cut this pair out and was sad that I wouldn’t end up with the Canadian version of the classic fig leaf across the trunk fronts…to my surprise, luck would have it that the leaf lined up almost perfectly!
Now that the two layers of the front are assembled, we can sew them together to create the right exit fly. In the first version of the printed instructions the cutting layout would lead to front sections that are sewn with WRONG sides together (a nice way to eliminate a raw seam from the inside centre front of the trunks but this will lead to the wrong side of your fabric peeping out of the fly). Our revision instead instructs you to sew the two fronts with RIGHT side facing WRONG side. Here is how it will look:
When you go to baste these pieces together, remember to ensure that the bound edge is curved out of the way as much as possible – the hole needs to be open wide enough to allow for use ;).
I zig zagged within the seam allowance around the edges. You could also use a long straight basting stitch but then you’ll probably have to remove this stitching later on so that the seams can stretch without snapping threads:
I used a straight stitch for my serged version since it would be trimmed off by the serger later anyways:And just like that, our fronts are done! We’re moving on to sewing the backs in a couple days and before you know it they will actually look like underwear (not much to try on for fit now!!!). Please feel free to ask any questions, especially if you are confused about the changes we made to our cutting layouts after our first print of the instructions.
Comox Trunks Sew-Along: Day 6 - Sewing the trunks back
Today we are going to make big progress with our trunks – I have this post labelled ‘Sewing the Trunks Back’, but really, before we can really call the backs of these undies done, we need to have pretty much the whole trunks assembled. That may sound like a large task, but really it is just four curved seams and a quick rectangle! Here comes the first two curved seams:
It’s time to attach the trunk Front to the Main Shorts – the biggest two fabric pieces in your pile. You’ll notice that the smallest curved section on this piece has one notch. This will line up with the bottom of the bound fly as I point out below:
Pin the Front and Main Shorts with right sides together along this notched curve. Here you can see the notch near the centre of the curve:
And in this photo you can get more of a sense of how you will have to ‘reshape’ the Main Trunks curve when pinning it to the opposite curve of the Front:
I sewed this seam using a zig zag stitch and then, for good measure and extra strength, sewed over my seam again. This is how the seam looks from the Main Shorts side:
And from the trunks Front side:
And this is what my multiple layers of zig zag stitch looks like!
I like to trim the seams even though the seam allowance isn’t very big (only 3/8″) because it allows me to make everything tidy looking and even and reduces a little bit of the bulk.
Now we need to attach the second Main Shorts piece the same way that we did our first piece:
I pressed the seam allowances away from the front and didn’t finish them (aside from the trimming). This light jersey doesn’t fray and the seam allowances tend to roll up tidily and softly so I thought that the less stiff thread that could potentially cause rubbing, the better! If you are using a material that tends to fray you could finish these seams with a second wider row of zig zag stitching.
To serge these seams, it is the same process as we just covered (minus the trimming). Here is what it will look like if you choose to use the serger:
When serging, it is perfectly okay to leave your seams looking like they do in the photo above, but I thought you might be interested to see the topstitching that I decided to do along these seams to ensure that the serged seam allowance remains pointing away from centre front and lies flat against the body (see photo below). I ended up using a simple straight stitch because my reinforced straight stitch was causing the fabric to slide around and I couldn’t keep the top-stitching from wobbling all over the place. On other fabrics the reinforced straight stitch worked really well for me and I find it is a great way to do top-stitching on many knits. I didn’t mind using a straight stitch on these trunks though because the fabric doesn’t have much stretch anyway so I don’t think Matt will end up with broken stitches when he wears these.
And now we move on to attaching the Back piece! This will attach to the other long curved edge of the Main Shorts:
As you can see, below, the Main Trunks curve and the Back curve are opposite just like the front and will take a bit of pinning before they line up.
I sewed this seam twice again using the zig zag stitch. Might as well make it extra strong!
And then I trimmed the seam just like we did for the front. I pressed the seam towards centre back.
And now we have to repeat this process with the other back seam to create a closed loop!
Would you look at that? The trunks are starting to resemble trunks :).
If you’re using a serger, the back process is again very similar to using a domestic machine:
Now, the last step for today is to create and attach the gusset. While the word ‘gusset’ might intimidate you a little but really, a gusset is just a piece of material that is sewn into a garment to make it wider or stronger (in the case of the trunks, our gusset performs both jobs!).
Our gusset is formed from two rectangle pieces that are double layered for extra strength:
Pin the two pieces with wrong sides together and notches matching.
Baste around the outside. I used a zig zag stitch within the seam allowance but you could also use a long, straight basting stitch and just remove it after the seams are sewn.
Now our gusset is ready to attach to the trunks to create wider legs! Line up your main trunks so that the centre front seam lines up with the notch on the long edge of the gusset:
I used two layers of zig zag stitching once again and then pressed the seam open.
Now we can move on to the back seam! This time the notch lines up with Centre Back.
And, once the seam is sewn, it again gets pressed open. You can trim both of these seams if you like or you could finish them with a wide zig zag stitch.
And here is how my trunks look at the end of today’s sewing session…now that’s progress!
If you’re using a serger, you will still need to baste the two gusset pieces together with a domestic machine. I used a straight stitch to baste because I knew it would be trimmed off by the serger in the next step so wouldn’t interfere with the ability of the seam to stretch.
And now we serge the two seams:
I pressed the serging in towards the gusset on both sides:
And then, because this is an area that is quite likely to be sensitive to rubbing, I topstitched the seam allowances in place to keep them flat (again, it is advisable to use a stitch that can stretch such as the reinforced stretch stitch or even a small zig zag stitch but I didn’t do this because my fabric really doesn’t stretch too much):
Are your shorts coming along nicely? In two days we will be hemming them! And then it’s on to adding the elastic waistband and…the hardest part of the whole sew-along…finding a model on which to photograph your shorts for the contest ;P. Happy sewing!
Comox Trunks Sew-Along: Day 7 - Sewing the hem
After all of the progress during the last sew-along session, today we’ll just be sewing the hem. Easy peasy! I’ve sewn the charcoal pair using Option 2 from the instruction booklet (a double fold hem finished with a zig zag stitch) and the maple leaf version is hemmed using Option 1 (a serged edge and a twin needle) so you can examine my process and choose which method you prefer.
For the zig-zagged option, start by folding up the hem about 1/4″ and pressing:
Fold the hem again, this time about 3/8″ and press. Pin as you press and don’t slide your iron along the fabric, instead, lift it up and press down – this way you won’t ‘drag’ the fabric with you and twist the hem (a common issue when hemming thin and stretchy knits).
I changed the settings for my zig zag stitch slightly for the hem to make a larger, stretchier stitch. I increased the length ever so slightly and increased the width to match the length. This zig zag stitch will be very visible so it is nice to have a very even looking stitch.
I like to start sewing on a seam, especially one that isn’t very visible from the front, so that the back stitching doesn’t look obvious or messy. In this case, I started on the back gusset seam. As you can see, I chose to sew from the inside of the trunks so I could make sure that I was perfectly catching the folded hem. This isn’t necessary if you are a perfectionist and have a perfectly even hem – you could sew from the outside and keep an even distance from the bottom fold and know that you are catching the top fold the entire time. As you might guess from my approach, I don’t trust myself to have a perfectly even hem (especially with knits that like to shift around a lot!) and so find it saves me a lot of headaches and stitch picking to just sew it from the inside.
And here is the finished zig zagged hem! Super easy!
If you choose to try out the twin needle hem, the key is to make sure your twin needle is functioning smoothly before starting to sew – test on scraps until it is jam-free and even. My machine doesn’t really like working with a twin needle since my tension disks are quite faulty – it will be chugging along beautifully for a couple centimetres and then all of a sudden jam into the biggest snarl you could imagine…ug…regardless, I managed to sew the darned hem after starting and stopping a million times (don’t be scared away by my experience, I have had many snarl-free twin needle sewing experiences…just never on this silly machine!).
Many people like finishing their hem with only a twin needle since the stitch made by it forms a zig zag on the underside of the fabric that nicely encloses the raw edge. Of course, this requires you to have a lovely even hem and precise stitching. To save myself the worry that my raw edge wouldn’t be totally enclosed, I simply serge first and use the twin needle to stitch below the serging.
Here is my serged edge folded up once:
And here is my funny little double thread set up! I have two thread holders on the top of the machine but when I use both of those, the first tension disk doesn’t engage properly and I can’t get a single nice stitch. Placing a serger cone of thread behind the machine seemed to work well enough though:
The twin needle gives a lovely finish that is strong and very professional looking. Voila:
Well, that’s it for today and our next post will be the last one for the sewing segment of this sew-along! Are you looking forward to finally finishing your trunks? We’ll be adding the elastic waistband and I will also be discussing some ideas for adding a fabric covered waistband if that is more your style. See you in two days!
Comox Trunks Sew-Along: Day 8 - Attaching the elastic waistband
By the end of today’s post you will have finished Comox Trunks!
Today we’ll be attaching the elastic waistband.
First, I will show you the method included in the instruction booklet to create an exposed elastic waistband as you would find on most store-bought trunk style underwear.
After that, I’ll show you my attempt at a fabric covered elastic waistband. ***Full disclosure – I’ve somehow managed to avoid sewing fabric covered elastic waistbands my entire sewing-life and so am not sure if my technique is the best one available. You might have some tips for me about how to make this process smoother :) ***
Okay, lets get started on our exposed elastic waistband. First, we need to form a loop by sewing the two narrow edges together. I used a reinforced stitch for this but you could also use a narrow zig zag (and sew over the seam at least twice) or even a straight stitch if you sew over it several times to ensure that your threads won’t snap when the elastic stretches.
And here is our loop after I’ve pressed open the seam allowance:
I like to force the seam allowances to lay flat by zig zagging them to the main elastic. This will help prevent them from being too scratchy.
This is how the trapped seam allowances appear from the inside of the waistband:
In the instruction booklet I give two options for attaching your garment tag (which comes with the paper sewing pattern). I’ve gone with my favourite option. While I am all for proudly displaying our brand on the exterior of our garments (lol I hate clothing with visible brand names usually but it’s a different story with my own brand :P) I prefer to place the tag over the elastic seam allowance. Our tags are nice and soft so they’ll provide one extra layer between the wearer and the scratchy seam allowances. If you don’t have a garment tag you could use a fabric scrap or ribbon instead.
And now it’s time for us to add the waistband to the shorts. This step is very straight forward (indeed, it can sometimes be a little confusing to people because they are expecting it to be more difficult!). All you need to do is line up the trunks and elastic exactly how they will look when they are finished and then sew them in place! Here is how to line them up:
You will need to line up the right side of the shorts with the wrong side of the elastic so that the elastic overlaps the fabric 3/8″. The elastic is the outermost layer. Position the elastic seam at centre back and pin in place. Also pin centre front.
At this point, I like to divide the elastic in quarters and place pins where side seams normally would be.
I then place pins between each of my four pins to result in eight pins that evenly distribute the trunk fabric around the elastic.
Here, you can see how this will look from the inside once you have placed your pins:
And now it is just a matter of stitching the two layers together! I used a zig zag stitch but you can also use a twin needle for a lovely professional finish. You will need to stretch the elastic slightly as you sew to ease in the excess fabric. Depending on whether you created a custom fit waistband or not (by wrapping it around the wearer to determine the length needed) will depend on how much easing you need to do.
Don’t worry if the fabric looks a little gathered in areas by the time you are done (see mine below – especially in the front area) because this will stretch out when the wearer puts the trunks on and sit perfectly smoothly.
I went over my zig zag stitch a second time for added strength. You could even do this a third time if you wanted because of all the seams in these trunks, this is the one that is under the most pressure and is the most likely to snap.
Once I finished stitching I cleaned up my seam allowance by trimming the fabric closer to the zig zag stitches.
Wahoo! Our trunks are done! (Unless you are holding out for the fabric covered waistband of course).
Here is what I did to create a fabric covered waistband:
I sewed the elastic into a loop as I explained above (including stitching the seam allowances flat).
Next I needed to create a fabric loop that could sandwich the elastic and still have enough seam allowance to attach to the trunks. To create this, I cut two rectangles of fabric (you could cut one long rectangle if you only want one seam, I just didn’t have enough scrap fabric to do this). The rectangles each measured as follows: The length of your elastic loop (i.e. roughly the width of your trunks) plus two seam allowances + double the width of your elastic plus two seam allowances.
Sew the narrow edges together to form a tube and you will end up with this:
And here is a better view so you can see how the fabric tube relates in size to the trunks:
Now sandwich the elastic in your fabric by folding the loop in half over the elastic (with wrong sides together).
To keep everything lined up, you can baste the fabric loop closed along the bottom. I used a zipper foot so that I could get close enough to the elastic to prevent the elastic from sliding around.
Here is the elastic-stuffed and basted loop:
Now I pinned the elastic/fabric loop to the trunks with right sides together and the seams lined up at either side.
And I serged the entire loop. This is more or less effective – the only problem is that you can’t get very close to the elastic edge with the serger so the fabric waistband looks a little floppy and loose. The only way to create a narrower fabric tube would be to leave a hole in the tube and thread the elastic into it AFTER the tube is attached to the main trunks.
I just used the reinforced straight stitch and a zipper foot to stitch closer to the elastic:
And there we go, finished trunks with a super soft and comfy fabric covered waistband! | https://threadtheory.ca/blogs/sew-alongs/tagged/comox-trunks-sew-along |
Designing personalized learning goes beyond selecting technology tools, incorporating student-centered, real-world applications, and implementing the Four Cs (critical thinking, communication, collaboration, and creativity). Personalized learning includes many aspects of adapting the instructional environment such as what, when, where, and how students learn and designing your curriculum, as well as choosing technology, to fit those needs. In this micro-credential, you will develop the foundation and skills to apply instructional design models and select appropriate technology as you create personalized learning units that span your curriculum.
Learning Outcomes
After completing this Micro-credential, the learner should be able to:
- Apply elements of personalized learning and instructional design models into K-12 activities.
- Design a personalized learning unit for their current educational setting.
- Reflect on their perceptions of and progress in personalized learning.
- Develop a Professional Learning Network (PLN) and connect with other educators pursuing personalized learning in the classroom.
Micro-credential Open and Close Dates
This Micro-credential is facilitated, so there are specific dates that the content will be available. For more information about this Micro-credential visit www.loyola.edu/microcreds. | https://aspire.loyola.edu/product?catalog=MC3-20_SU-01 |
Hou Hsiao-hsien pressingly dwells in contested political territory like state, region, national culture and transnational identity. Hou's father passed away when just a young boy. The absence of a male authority figure forced him out and he got involved in the gang culture that surrounded him. In order to bear the street life, Hou learned the Hoklo language which is popularly referred to as "Taiwanese".
The four elements of Culture, Style, Voice, and Motion are important characteristics of Hou's oeuvre. Hou is always concerned with the complicated and multifaceted nature of cultural identity. Hou's style has garnered most attention among all the facets of his work. One thing that have always intrigued Hou Hsiao-hsien is the issue of voice which is critical to his cinematic art. Going back to his earliest films like Summer at Grandpa's, A Time to Live, A Time to Die and A City of Sadness, and beyond, voiceover is effectively used to establish a narrative coherence. At the beginning of Daughter of the Nile, the protagonist addresses the camera directly. In later films, such as Millennium Mambo, Hou remains dedicated to this device, although in this case the image of Vicky on the screen is in "real time" while the third-person voiceover is cast in past tense, forming a retrospective for the visual narrative.
Finally, there is also no question that in a variety of ways motion is integral to the cinema of Hou Hsiao-hsien. Motion is something inherent in the perception of the action, the phenomenology of film, the way the lens absorbs the action of the film. Hou Hsiao-hsien loves the stationary camera, but he also has a passion for the slow pan. His way of creating shots with a stationary or slow-moving camera eye, combined with the focus on what is conventionally considered to be the inessential details of a given film's story, are matters that concern motion.
Considered by many cinema aficionados to be one of the most innovative, provocative, and enthralling directors, Hou Hsiao-hsien has earned international acclaim for his work over the past three decades. Hou has been interested in juxtaposing motion and stasis, the fact that the more characters pursue teleological goals the more they wind up very close to where they began. His films are not mere documents of monumental accomplishment. On the contrary, they are closer in many cases to being monuments of colossal ineffectuality. But the feebleness of human endeavor, in the face of attempts to overcome individual flaws and social forces, is a quintessential human trait in itself. Hou Hsiao-hsien is an ethnographer of such vain quests.
Hou's use of the premodern texts as inspiration for his cinematic project also demonstrates some of the most observable examples of his distinctive style. The literary subject matter allows the audience to see in clear visual relief just how Hou works and how he uses the editing knife to fillet his master takes into laconic and suggestive interpretations of the literary originals. Hou's style on the set is inductive. What happens on the set on a given day is somewhat unpredictable, because, as he says, "when I get to the set, I let the location talk to me. It's an instinct, a sort of good fortune, rather than the subjective determinism of the creator."
With A Time to Live, A Time to Die (1985), Hou Hsiao-hsien had slammed shut the door on all the cornball comedies, Cold War historical romances, and lachrymose melodramas that had dominated the cinema scene in Taiwan, and much of East Asia in the postwar era, as well as a hefty portion of, if not all, the excessively commercial martial-arts kick ‘em ups as well. The qualities that initially impresses in early Hou classics- the stationary camera and long-take sequences that foster a ‘theatrical' cinematographic style, with the set functioning as a stage as it were; the measured pace; the focus on individual, seemingly inconsequential, conflict and familial repercussions with deeply submerged but stubbornly persistent historical implications; the studious evasion of overwrought melodrama and teleological resolutions of plot-driven film narrative; the cacophony of contending voices and sounds that include various national and regional languages, accents, and natural audible emissions from the environment, as well as the subdued nondiegetic music; and the meticulous attention to detail-have largely remained in Hou's aesthetic repertoire and conferred on him the approbation of film aficionados worldwide.
His rise has occurred through an unequivocal insistence on excellence in film style and an unrelenting attention to the marginal status of his subjects, as well as to the theme of marginality in general and the problem of communication that it entails. Hou's films abound with the inability to establish clear links of communication and the doomed yet dogged attempts to foster community. Hou has arranged a range of formal peculiarities and idyllic concerns, inspiring comparisons with the Yasujiro Ozu, the great Japanese filmmaker. It is in line with icons of Taiwanese nativist literature in theme to acquire a unique voice that speaks as powerfully in the local vernacular of Taiwan as it does to the expectations of a global film-viewing public. His films operate on different levels simultaneously-the local and the global, the carefully crafted and the politically engaged-etching characters who while caught up in their own personal struggles are nevertheless emblems of larger public forces. | https://www.lehren.com/news/hollywood/featured/hou-hsiao-hsien%E2%80%99s-syncretic-cinema-20190410 |
"The purpose of this study was to investigate and recommend various methods instrumental in finding the roots of a polynomial p(x) = 0. Many different methods are present today, and each has its advantages and disadvantages.
Through thorough investigation, the author has ascertained the key methods to be the method of Bisection, the Newton-Raphson method, and the Bairstow method. Special support in the form of algebraic theorems on the locations and kind of roots are extremely helpful. This combination of theorems and methods provides assurance, speed, and the ability to obtain complex roots.
The Bisnewbar method developed by this author combines the above methods and the algebraic theorems to provide a method capable of returning all real and complex roots"--Abstract, page i.
Advisor(s)
Gillett, Billy E.
Committee Member(s)
Lee, Ralph E., 1921-2010
Wellek, Robert M.
Murphy, William John
Department(s)
Computer Science
Degree Name
M.S. in Computer Science
Publisher
University of Missouri at Rolla
Publication Date
1967
Pagination
iv, 93 pages
Note about bibliography
Includes bibliographical references (pages 91-92).
Rights
© 1967 Charles Ray O'Daniel, All rights reserved.
Document Type
Thesis - Open Access
File Type
text
Language
English
Library of Congress Subject Headings
Polynomials -- Mathematical models
Equations, Roots of
Numerical calculations -- Data processing
Thesis Number
T 1973
Print OCLC #
5980591
Electronic OCLC #
921147508
Link to Catalog Record
Recommended Citation
O'Daniel, Charles Ray, "Comparative analysis of polynomial root finding techniques" (1967). Masters Theses. 2941. | http://scholarsmine.mst.edu/masters_theses/2941/ |
July 1, 2017
Social wellbeing matters. Feelings of belonging and connection to other people and community are essential elements of human health and happiness. People with strong connections to family and friends live, on average, 15 years longer than people who are disconnected. High trust cities report much higher happiness and GDP growth than low trust cities.
Yet modern cities are facing an epidemic of social disconnection that is shortening lives, weakening communities, and costing millions of dollars in health care.
The average American reports being able to confide in fewer than two people in the world. More North Americans are living alone (which is the condition most associated with poor mental health) than ever before. Meanwhile, 20 % of older adults in Canada report feeling lonely. In Vancouver, frequently ranked amongst the world’s most livable cities, young adults, seniors and newcomers all report higher levels of social disconnection.
Design plays a role in mediating this social wellbeing. Happy City’s research has found that multi-family housing design can make or break social connections and trust. City-builders have made big mistakes. For example, some cities attempt to provide affordable housing options by facilitating auto-oriented sprawl. But surveys show that people in auto-dependent communities on the edge of big cities are much less likely to trust or socialize with their neighbours. They are less likely to volunteer or even vote than people who live in walkable cores. Their commutes simply steal their social time.
An equally striking effect has been found at the other end of the density spectrum: Apartment tower residents report lower levels of trust and neighborliness than people in smaller-scale housing. They are the most likely urbanites to report feeling lonely and crowded at the same time.
This presents a challenge for cities dealing with both growth and affordability challenges. How can we accommodate growth and housing affordability in cities in ways that also boost social wellbeing?
With support from BC Housing’s Building Excellence Research & Education Grant, Happy City reviewed dozens of sources of evidence on the link between sociability and design in multi-family housing. We looked to neuroscience, sociology, environmental psychology, architecture and public health. We sourced action ideas from architects, public health professionals and city-builders. Then we rolled these into a visual toolkit that will change the way you think about, design, and build multi-family housing.
Some key insights from the toolkit:
- Certain kinds of density are better than others. Social trust and support is higher in buildings where no more than 8-12 households share a main entrance. Cities should focus on “Missing Middle” housing such as townhouses, rowhouses, courtyard apartments, low rises and cohousing.
- Residential towers can feel more friendly when they help people regulate their exposure to neighbours. New towers should create semi-private common areas for clusters of not more than 12 households.
- Excess parking corrodes social space and boosts the cost of housing. Parking requirements should be reduced or eliminated on properties near frequent transit corridors.
- The longer people live in their neighbourhood, the deeper their local connections. But housing unaffordability and instability force people to move. Governments must work with communities and developers to offer more tenure options such as rental opportunities and ownership with public support so people can stay longer in their communities.
Explore the toolkit here.
The toolkit was created with support from BC Housing Building Excellence Research & Education Program, The School of Community and Regional Planning at the University of British Columbia, Mitacs, RNL Design, Museum of Vancouver and dozens of idea contributors. | https://happycities.com/blog/crisis-of-social-disconnection |
A Polish company specialised in sauces, mustards, ketchups and mayonnaise manufacturing is looking for partners under distribution services and commercial agency agreements. The company was established as a family owned company with Polish capital. The company offers a wide range of products from mayonnaises and mayonnaise sauces, mustards and ketchups, through purees and tomato based sauces, as well as other vegetables, to a rich variety of mixed vegetable salads with unique flavour.
Inicio / Oportunidades de Cooperación empresarial / Polish company from food sector is looking for partners around the world under distribution and commercial agency agreements. | https://een.cea.es/polish-company-from-food-sector-is-looking-for-partners-around-the-world-under-distribution-and-commercial-agency-agreements/ |
top of page
Neshama Preschools’ ongoing commitment to provide children the very best quality of education has garnered numerous awards and widespread accolades.
The Circle of Hearts project gives families and friends a chance to gift our children with incredible opportunities that pave the way for their future success!
We invite you to join our Circle of Hearts by partnering with our school's vision of excellence and provide our future leaders and innovators with the best.
By giving as many Hearts as you can, you will experience a real sense of accomplishment, knowing that your loving financial care has funded and fulfilled the education of precious children.
Donors choose their level of participation to help complete a loving Circle of Hearts.
Join the circle.
Invest in
#Education.
Share
in our success! | https://www.neshamapreschool.com/heart |
Q:
Best way to organize a Go interface
Its been a long time since I have programmed in C++, but I know that in C++ the classes are organized into .h files and .cpp files. Also many other languages benefit from splitting up code into logical groupings within a directory structure to improve organization.
Well I am trying to learn Go now and I was reading over the Go for C++ Programmers article when I came upon interfaces. The article explains that interfaces in Go essentially take the place of classes, and shows how to set them up pretty well.
What I am trying to figure out though is how should I organize an interface into files? For instance, should the interface be in one file while the implementation is in another?
myInterface.go
type myInterface interface {
get() int
set(i int)
}
myImplementation.go
type myType struct { i int }
func (p *myType) set(i int) { p.i = i }
func (p *myType) get() int { return p.i }
My code here may be wrong since I do not completely know what I am doing yet (and if I am wrong please correct me), but would this be the best way to set this up? Im having a very hard time trying to wrap my head around how to organize code in Go so any help is appreciated!
Metropolis
A:
There is no need to put types and interfaces in separate files. The things exported from each package are what matters and you denote those by beginning the name with a capital letter. In C & co. what goes into a header file matters because that's the thing “imported” (included). In Go it's the package that is imported, and it doesn't matter how its contents are organised into different source files (it won't be visible to the importer anyhow).
My personal recommendation is to avoid creating unnecessary files. If the code is relatively short, keep it in one file. If it's long, then consider splitting off parts for which it feels natural to do so (e.g. interface + related functions that would be probably form a separate class if you were doing it in Java or C++). Don't split off anything just for the sake of separating definitions from code; it doesn't make sense in Go even though it does in C.
A:
The Go programming language is not C++, nor is it C. Approach it like a new language. Go has no equivalent to header files. It has only a loose association with the C++ concept of classes. Since you are not an expert C++ programmer, ignore the Go For C++ Programmers article.
Start by reading A Tutorial for the Go Programming Language. Then read Effective Go. Browse through The Go Programming Language Specification, so you'll know where to look things up.
Go is open source, so look at real Go package documentation and source code.
To start, look at the time package documentation and source code, which was written by the authors of Go. They don't use separate files for interface declarations and implementations, so why do you want to? As you say yourself, you don't know what you are doing yet, so why not start by following the example set by experts?
Some of the motivation for the development of the Go programming language came from a desire to create language which was better than C and much simpler than C++. Taking into account the procedural characteristics (often C like) of Go, procedural design concepts such as coupling and cohesion are useful. These concepts are evident in the partitioning of the Go time package into multiple source files. Some class design concepts will be useful too, but remember, Go does not support inheritance.
As Nicklaus Wirth pointed out in his classic paper, Program Development by Stepwise Refinement, early drafts of a program are rarely ideal, perhaps even sloppy sometimes. Even the final version is rarely perfect. For example, the Go authors, after only a few months, recently rewrote the Go json package.
The design and implementation of the Go programming language lends itself to the use of many small functions. It favors succinct solutions. Of course, many of the functions are not exposed outside the package. Arbitrary limits on function size or number rarely work in any language.
Go programs are constructed by linking
together packages. A package in turn
is constructed from one or more source
files that together declare constants,
types, variables and functions
belonging to the package and which are
accessible in all files of the same
package. Those elements may be
exported and used in another package.
Packages, The Go Programming Language
Specification.
What do want your first Go package to do? Ask specific questions that can be answered, and provide details.
| |
On the roofs of houses found cosmic dust
Scientists discovered particles of cosmic dust on the roofs of houses in Paris and Oslo.
This was reported in an article published in the journal Geology.
Yet in the 40-ies of the last century, researchers have known that the Earth’s atmosphere are constantly fine particles of cosmic dust. The most popular place to find them is usually considered to be Antarctica. This is because the air is less polluted than in other parts of the world, and the dark dust substance noticeable on pure white snow.
However, scientists are still trying to find particles that came from outer space, and in the cities that make particularly difficult, since there accumulate a lot of dust of terrestrial origin (the source are the transport and industry). However, researchers from the UK, Norway and Belgium reported that they managed to find space dust directly into the roofs of houses.
The Roof Of Oslo
The authors collected 300 kilograms of dust, which has accumulated in the gutters of the houses being in Paris and Oslo. Using magnets, they selected particles containing magnetic minerals, and then washed with water and separated by size. Geologists then examined the samples under a microscope and selected only those particles which had the characteristic of cosmic dust features: spherical or subspherical shape, black or grey color and luster and also special structure of the surface.
In the end, the researchers were able to “catch” 500 silica particles of cosmic dust.
They all had subspeices form and reached 0.3 mm in diameter. It came as a surprise to geologists, as they are usually found much smaller samples, with a size of about 0.01 millimeter. In addition, as reported in New Scientist, urban particles differed from the Antarctic that contain smaller crystals branching structures (dendrites).
Scientists believe that all particles fell to the Ground in the last six years, which means that they can be considered the most “fresh” micrometeorites today.
Their unusually large size of the geologists explained that the orbits of the planets, including Earth and Mars, evolyutsioniruet, that is slowly changing its parameters. This results in gravitational perturbations that can affect the trajectory of dust particles and the rate at which they enter the atmosphere of our planet, which in turn affects their size.
The Rooftops Of Paris
Recently, scientists from NASA analyzed the particles of cosmic silicate dust, which they were able to find in the fallen to our planet in meteorites. It turned out that about one. 5 thousand particles was born of another star, which had existed before the formation of the Solar system. Research dust also conducted by the station “Cassini”, which recently embarked on a series of “dives” near the F-ring of Saturn. The spacecraft collected particles had approximately the same chemical composition and probably appeared due to unknown repetitive process that occurs in the interstellar medium. | https://rusreality.com/2016/12/09/on-the-roofs-of-houses-found-cosmic-dust/ |
People and Culture
Our people – employees and contractors – are a key asset of the business and we are focused on creating a diverse and inclusive working environment, where you can be yourself and your contribution matters.
Our Values
At Drax, our values are shaped by our culture, fundamental to which is acting with integrity and what we call “doing the right thing”. These values are set by our Board, delivered by our people and permeate through all areas and levels of the organisation.
- We care about what matters
- We are a can-do kind of place
- We see things differently
- We listen carefully
- We do what we say we’ll do
Our People
* Limited external assurance by LRQA (qualified opinion) using the assurance standard ISAE 3000 for 20210 data as indicated. For assurance statement and basis of reporting see https://www.drax.com/sustainability/approach/
Additional people data is available in our ESG Data Supplement
ESG Data Supplement 2021
Our People Strategy
We work to maintain consistently high standards in our employment practices and all colleagues benefit from policies to support them in the workplace. Our three-year People Strategy focuses on five key areas.
- Attracting, retaining and developing diverse talent pools, which reflect the demographics of the areas we operate in, to ensure diverse thinking in our innovations
- Encourage an inclusive environment where innovation, flexibility and collaboration flourish and where people have the opportunity to reflect, adapt and to challenge the norm
- Focus on Future Workforce Planning and organisational design to enable us to grow our business internationally and adapt to business changes swiftly and seamlessly
- Create a high-performance and inclusive culture where our people are equitably incentivised, rewarded and recognised for their contribution
- Create effective and efficient frameworks, policies, and working practices that ensure simplicity, autonomy and ownership of people matters across the business
Diversity, Equity and Inclusion
We are committed to a supportive, diverse and inclusive working environment, where you can be yourself and your contribution matters. We aim to support everyone and to design ways of working that are inclusive and flexible, enabling equitable opportunities for all.
Our Diversity and Inclusion Steering Group meets monthly to consider and recommend plans to improve diversity and inclusion across Drax. The Steering Group is chaired and sponsored by the Director of Corporate Affairs and supported by the Chief People Officer, both of whom are members of the Executive Committee.
In 2021 we focused on the delivery of our three pillar DEI plan to support our ambitions:
- Collating colleague diversity data in the UK. With 78% of our UK workforce responding to date, this insight supports us in taking meaningful action based on real time data and has helped inform the development of our DEI strategy from 2022 onwards.
- Educating and inspiring our colleagues on diversity and inclusion. Through our Inclusive Leadership Programme, a series of colleagues’ personal diversity stories on the intranet and live panels to recognise events such as International Women’s day and Pride.
- Making careers at Drax more attractive to talented people from all backgrounds and ensuring a fair and equitable recruitment process. This has resulted in increasing leadership hires in the UK – 42% were female – and growing our overall UK female headcount from 34% to 36% in 2021.
Colleague representation and engagement
At Drax, 14% of our workforce is covered by collective bargaining and we have employee representative consultation and information arrangements in place for employees with individual employment contracts.
We communicate with our workforce through channels including our intranet, our quarterly magazine, newsletters, town hall meetings and our weekly online Q&A portal with the CEO.
Each business unit has a MyVoice Forum made up of colleague representatives and supported by senior leadership sponsors. The Forums enable exchange of information and views between colleagues, the Executive Committee and the Board on key issues, such as strategic decisions affecting ways of working and the work environment. Forum Chairs meet quarterly with the Chair and CEO to discuss colleague sentiment and feedback on key topics.
Our annual engagement survey is a key part of our listening and engagement strategy. In 2021 it was completed by 70% of colleagues and our engagement score was 79%. These were slight declines compared to 2020, during which organisations saw increased engagement scores (on average +2%), due to the Covid-19 pandemic. Whilst our engagement score is 1% below the Energy and Utilities sector benchmark, it exceeds the benchmark for companies going through significant organisational transformation, by 6%.
Development and training
We invest in the development of our colleagues to help them make the most of their talents, meet their career aspirations and enhance business performance. Our Performance, Potential and Succession processes enable managers to identify colleagues’ development needs and those with the skills and capabilities for succession into critical roles.
We launched our high-potential programme, Future Creators, in 2019. It is designed to support the development, retention and growth of our future leadership pipeline. 42 colleagues have completed the programme. We have retained 91% of participants and 71% have either moved up a career level or moved into broader roles since completing the programme.
Our Management Excellence programme is designed to support our line managers with key people skills. Since 2020 over 230 managers have participated in the programme.
In 2021 we launched our Inclusive Leadership Programme. Over 200 leaders, including the Executive Committee, have completed the programme, which gives senior leaders the tools and knowledge to role-model inclusive leadership across Drax. It is part of our strategy to educate and inspire colleagues, supporting our journey to make Drax an even more inclusive place to work. | https://www.drax.com/us/people-and-culture/ |
Medium-term evaluation of an educational intervention on dietary and physical exercise habits in schoolchildren: the Avall 2 study.
To assess whether the benefits seen in nutrition, physical activity. and body mass index were maintained at 2 years of completion of the educational intervention. An experimental, longitudinal, 4-year, two-arm, parallel study with cluster randomization to assess an intervention program aimed at children in their first year of primary schooling attending schools in the city of Granollers. Intervention consisted of promoting healthy dietary habits and increasing physical activity through the educational pedagogy Investigation, Vision, Action and Change (IVAC), applied over 2 school years (2006-2008). Weight and height of each child wee measured in situ, and families self-completed a physical activity survey and the Krece Plus quick test in 2006, 2008, and 2010. A greater increase in body mass index was seen in 2010 in children from the control group (2.84 ± 0.22 vs 1.96 ± 0.163 kg/m(2), <.001). Prevalence of overweight and obesity increased by 8% and 0.5% respectively in schoolchildren in the control group, while the intervention group showed a 5.3% increase in prevalence of overweight and a 3.6%decrease in prevalence of obesity. Prevalence of excess weight therefore increased by 8.5% in the control group and by 1.8% in the intervention group. Reduction in body mass indexincrease was maintained 2 years after completion of educational intervention regardless of sex, origin, maternal obesity, and educational level of parents. These results confirm that school-based interventions may help contain the current increase in childhood obesity.
| |
The purpose of this document is to define design, construction, operational, and maintenance requirements for hydrogen fuel storage and handling systems in on-road vehicles.
Performance-based requirements for verification of design prototype and production hydrogen storage and handling systems are also defined in this document. Complementary test protocols (for use in type approval or self-certification) to qualify designs (and/or production) as meeting the specified performance requirements are described.
Crashworthiness of hydrogen storage and handling systems is beyond the scope of this document. SAE J2578 includes requirements relating to crashworthiness and vehicle integration for fuel cell vehicles. It defines recommended practices related to the integration of hydrogen storage and handling systems, fuel cell system, and electrical systems into the overall Fuel Cell Vehicle.
NOTE: Ultimate design qualification for crash impact resistance is achieved by demonstrated compliance of the vehicle with applicable regulations.
Subscribers can view annotate, and download all of SAE's content. Learn More »
Want to participate in updating this standard? | https://www.sae.org/standards/content/j2579_201303/ |
II. International Conference on Immigration and Security: ??Immigration and Integration, Center for Research on Immigration and Border Security (CRIBS) ??
This paper is based on two complementary research projects focusing non-dominant variety of languages and policies concerning their education in two different contexts. It provides important insight into the complex issues of linguistic variation and immigrants’ integration into the educational system and in daily life. In Portugal, the Cape Verdean creole spoken in the Lisbon area, and in Canada, the Portuguese spoken by Portuguese immigrants in Montreal. Both studies focus on the dynamic evolution of languages through how they are practised within the two contexts of Language Contact, and the role of the state or power entity, namely Portugal and the province of Quebec in the integration of the two groups. The multidimensional methodological approaches adopted, allowed the observation of speakers’ discourses and representations as they relate to the current status of “their” language as a vehicle for community life. Discourse analysis would consider sociolinguistic aspects such as affective elements, identity processes of construction and integration in the host society alongside culture and social recognition. | https://ciencia.iscte-iul.pt/publications/between-community-life-and-official-discourses-in-urban-territory-the-case-of-portuguese-immigrants/42636 |
When meat is cooked using high heat, carcinogenic compounds called heterocyclic amines (HCAs) and polycyclic aromatic hydrocarbons (PAHs) are formed. But the carcinogens are more about the meat than the method of cooking.
The formation of HCAs is “not a problem in vegetables,” says Dee Sandquist, who is a registered dietitian and a spokesperson for the American Dietetic Association. A fact sheet put out by the National Cancer Institute explains that “HCAs form when amino acids (the building blocks of proteins) and creatine (a chemical found in muscles) react at high cooking temperatures.” Vegetables don’t contain creatine, so they don’t produce HCAs.
PAHs are formed only when you grill over an open flame and meat fat drips onto the flames, says Krista L. Haynes, staff dietitian for the Cancer Project, a nonprofit organization that researches the links between nutrition and cancer. Carcinogens then rise in the smoke and adhere to the surface of the food. Increased temperature and longer cooking times lead to higher levels of both PAHs and HCAs. | https://www.chowhound.com/food-news/54893/are-the-burnt-bits-of-veggies-carcinogenic/ |
Simple Strategies for Maintaining Weight Loss
Losing weight is difficult enough. But dieters are also faced with the fact that odds are stacked against them for long-term success. Researchers estimate that only about 20 percent of dieters maintain weight loss after a diet. Are you going to be one of them?
How to Maintain Weight Loss After a Diet
To increase your chances of weight maintenance after a diet, plan for a transitional phase after you reach your goal weight. During this time, make slow adjustments to your lifestyle and watch the effects on the scale. Abrupt changes are likely to cause weight to regain.
This transitional phase is also a good time to identify the eating habits and exercise patterns that you learned while dieting so that you can maintain for the long term. If you turn healthy diet habits into healthy lifestyle habits, you’re likely to prevent weight regain. | https://celebritygossipshub.com/simple-strategies-for-maintaining-weight-loss/ |
Your Financial Future:
Our Resources:
Fact Sheets
Women Face Unique Challenges When Planning For Retirement
Retirement planning is important for everyone, but it's especially important for women.
Unique Challenges Faced by Women in Preparing for and Managing Their Retirement Years
A Report Prepared by WISER
March 15, 2006
Acknowledgements
This report was written by Cindy Hounsell, President, and Board Members, Anna Rappaport, and Jeff Lewis, and Program Associate Alison Kane, for the Women’s Institute for a Secure Retirement (WISER).
The Challenges for Women
Retirement planning is important for everyone—but it’s especially important for women. The issues faced by women in particular are compounded by a number of factors, the result of which paints a startling post-retirement picture for millions of women who have worked their entire lives in one capacity or another.
Various studies point to what will be a huge burden on our society: some indicate that 75 percent of the baby boomers are not prepared for retirement. The average amount in 401(k) accounts for the group closest to retirement (ages 55-64) is anywhere from $21,000 to $110,000 depending on the study. According to the most recent Federal Reserve Board study, the typical account balance is $83,000.
The solution heard most these days is that boomers will continue to work, which may sound like a good idea. But circumstances may prevent work for some obvious reasons —no access to a job or bad health or, in the case of many women, providing care for a spouse, mother, or a mother-in-law. These negative shocks may cause significant financial consequences.
A recent study by the Urban Institute illustrates a way to measure the financial impact of negative shocks. The paper reviews two 10-year periods for those aged 51-61 and for those aged 70-80.What’s surprising is that one-half of adults in the earlier group aged 51-61 experience health problems or frail parents or in-laws, while more than three quarters experience one of these negative shocks: widowhood, divorce, job layoffs, health problems, or the onset of frailty among parents or in-laws.
People who experience these negative shocks end up with less wealth, but when they strike adults who may not have completed their retirement preparations, there is an even bigger financial impact. The study shows that the financial risks are greatest for older women.
Background
For women, the traditional three legged stool of retirement security—Social Security, employer-sponsored pensions, and individual savings, is wobbly at best, leaving them vulnerable to poverty in old age. Over the last decade, a fourth and fifth leg have been added to the stool—earnings, which have now become a significant source of income for the elderly, and Supplemental Security Income or SSI—a joint federal-state poverty program to help the elderly (and the blind and disabled of all ages) meet their basic needs. Instead of being reassuring, these additional legs show just how precarious the situation is for many who are nearing retirement age, especially since the majority of poor elderly SSI recipients are women.
The reality is that many women rely on the Social Security program as their primary source of income in retirement. For one in four unmarried retired women, Social Security provides their only income. Yet Social Security was not designed to be a retiree’s sole source of support. It was only intended to provide a “bare minimum of protection” and its benefit structure still reflects that original intention. That so many retired women rely solely on Social Security for support is one of the major reasons why so many retired women are poor.
Private pensions provide additional income to some women, but less than half of all workers are covered by private pensions. A much smaller proportion of women than men actually end up receiving income from private pensions when they retire. Fewer than one in five women age 65 and over received private pensions in 2000; among this small group, the median annual income from these pensions was only $4,164. While baby boom women are expected to do better than their mothers’ generation, the pension gap is unlikely to close significantly anytime soon.
If a woman working today works full time, has high earnings, and her employer offers a retirement plan, then she’s at least equally likely to participate in it. But the reality of the modern American workplace is that women are twice as likely to work part-time and part-time workers are less likely to have pensions. If a woman works for an employer with a tax deferred savings plan—such as a 401(k) or 403(b)—she is less likely to contribute to it, largely because she earns less.
Voluntary savings and investments have been promoted by many policymakers as the one solution that will provide the major source of retirement income for most workers in the coming years. But women’s lower earnings often leave them with few resources to invest. And in addition, research shows that even those with resources, women often choose not to save or if they do save they do not save enough.
This report is designed to educate policymakers and women about the facts of retirement income and the pitfalls to avoid. It presents an overview of women’s income, as well as the employment and caretaking patterns that place women at a disadvantage. It also addresses women’s experiences with Social Security, private pensions, and individual savings and investments. The report offers specific recommendations for reform.
The Reasons Women Face Retirement Income Insecurity
The fundamental issues are these: women work fewer years, earn less, live longer, and are likely to live alone in old age, which is highly correlated to poverty. Therefore, while women must plan for a longer retirement, they start off with less income and are left to rely too heavily on Social Security as their primary retirement income source. Women, along with their male counterparts, also tend to lack basic financial knowledge, which is one reason why there is little or no planning for retirement.
In every age group, women on average have lower incomes than men do, but the wage gap is especially pronounced in retirement. In fact, women’s average income after the age of 65 is only about half that of men’s: the median retirement income in 2004 for women was $12,080 compared to men’s income of $21,102. Furthermore, older women are about half as likely as older men to have earnings or pension benefits—and those women who do have these sources of income receive, on average, much less than men do.
The Effects of Women’s Work Patterns
Women’s work patterns have changed dramatically over the last several decades. In 2000, 60 percent of women were working for pay, up from 37.7 percent in 1960. Today, the majority of women in every age group are in the labor force. The most dramatic change has occurred among women with school-aged children: nearly three-fourths (70.4 percent) of women with children under the age of 18 now hold jobs.
Women work in female-dominated occupations that disproportionately lack pension and retirement savings opportunities, and as a result, they lose out on retirement income. One study comparing the income of unmarried retired women and men found that women have $8,000 less a year in retirement income than unmarried men. A portion of this difference results from women working in female-dominated occupations, and another portion is from earning less while working. The study also found that men working in female-dominated jobs did not lose out on retirement income.
The Effects of Women’s Lower Earnings
Women have joined the labor force in record numbers, have more opportunities, and work in many different fields, but there is still a substantial pay difference between men and women. Women continue to work in jobs and industries where women predominate and the pay is low. The industries employing the largest percentages of women are the service and caregiving industries—including hospitals, restaurants, educational institutions, and the retail trades. Recent studies show that women are paid less than men in almost every occupational classification for which data are available. Full-time working women in the aggregate earn 77 cents for every dollar earned by a man.
The median salary for full-time, year-round women workers in 2004 was $31,223, compared to $40,798 for men. The pay gap for minority workers is even larger. While Asian women working full-time earn on average more than white women—$35,975, Hispanic and Black women earn much less: $23,444 and $27,730 respectively. Part of the wage gap between the sexes is the result of differences in education, experience, or time spent in the workforce. But a significant portion of the gap cannot be explained by any of these factors, and may simply be the result of wage discrimination.
A study conducted by the Institute for Women’s Policy Research found that working women pay a steep price for unequal pay. The typical 25-year-old woman with a college degree in 1984, who is now in her mid 40s, has lost a total of $440,743 in wages over her lifetime—an amount that could add up to a comfortable retirement nest egg.
The Relationship of Education to Women’s Pay
Over the past 30 years there has been enormous growth in the number of women who have completed a college education. In 1970, fewer than 10 percent of all women received degrees. Today, when women are slightly more likely than men to attend college, one quarter have degrees. But statistics also show that pay for many college educated and professional women has not kept up with pay for men in the same profession. Women are earning about 73 percent of what men earn with the same college education. Indeed, a woman with a particular degree on average will earn less than a man with the next lesser degree.
Women as Caregivers
Women remain the primary caregivers in our society, and they are spending a significant part of their adult lives providing it. Whenever a sick child, an ailing spouse, or a parent requires care, it is most often the mother or the daughter who provides for it - even if that means leaving whatever she is doing at the time.
More than half of informal caregivers report that their careers are adversely affected by this role. Women far more than men compromise their work schedules by moving in and out of the labor force, experiencing breaks in their work histories.
Caregiving is also a factor for why more women work part-time. Because of the greater responsibility for caregiving, women are more likely than men to cut back on their hours of employment to meet family needs. A quarter of working women worked part-time in 2003, compared to about 11 percent of working men. The consequences are serious: part-time employment is associated with lower wages, fewer opportunities for promotion, and a lower likelihood of benefits.
Neither public nor private retirement programs grant credit for caregiving years in calculating retirement benefits. Lost work years are factored in as zeros, which significantly reduce the final benefit amount. However, Social Security’s spousal and survivor benefits are designed to provide benefits to a spouse with a lower lifetime work history.
In addition to the financial consequences of women’s moving in and out of the workforce, including the loss of pay increases, promotions, training opportunities, and career advances, there are more subtle consequences as well. These include lost opportunities for compounded returns on 401(k) matching contributions and a reduction in saving and investment opportunities.
Workplace benefits seldom provide support for dependent caregiving, and while federal legislation does require some employers to allow employees to take leave to care for extended family members, the option is viable only for those families whose budgets can accommodate unpaid leave.
Since caring for the family is not recognized in this country as an economic contribution, women lose out by bearing the main share of this responsibility. Research shows that the economic consequence for single women who care for their elderly parents is a likelihood of life in poverty: caregivers are 2.5 times more likely than non-caregivers to live in poverty.
Policymakers have begun to focus more attention on the need for support of long-term caregivers. This is a step in the right direction. However, while policymakers continue to study this issue, women will continue to take part-time jobs, take time off work, or retire early in order to provide care for their family members. While federal support for caregiving may ultimately improve, it is important in the meantime for women to consider the consequences of their potential role as a future caregiver when determining their retirement income needs.
Marital Status A woman’s marital status is a significant factor in determining what her income will be when she retires. Women with the most comfortable retirement incomes are those who are married and living with their husbands. By contrast, women with the lowest incomes are those who are the head of households and live alone. In 2002, just over 50 percent of married couples ages 65 and over had incomes of $35,000 or more. Fewer than one in fifteen women aged 65 and living alone had incomes of $35,000 or more. In fact, over 61 percent of women living alone after age 65 had income under $15,000.
In 2004, 57 percent of women aged 65 an older were single. They were either widowed (43.5 percent), divorced (8.9 percent), separated (0.9 percent), or never married (3.7 percent). In contrast, only 26 percent of elderly men are single.
Unfortunately, many older women find that marriage is no protection against poverty. After counting on their husband’s benefits to support them in retirement, they often discover that widowhood or divorce can sharply reduce their income in old age.
The Impact of Widowhood
Women are far more likely than men to be widowed. This is partly because women have a longer average life expectancy, and partly because men tend to marry younger women. Men are also much more likely to remarry after widowhood. Today, an average American woman’s life expectancy is 80.1 years, compared to 74.8 years for men. If a woman lives to age 65, she can expect to live until age 84 or 85—about three more years than a man age 65 can expect to live. Between the ages 75-84, only 34.2 percent of women are married with their spouse present. For women aged 85 and older, only 13.1 percent are married with their spouse present. In contrast, 70 percent of men aged 75-84 and 54.1 percent aged 85 and older are married with a spouse present.
Most married women are unaware of the reality that they might become widowed at a relatively young age. One-third of widowed women become widows by age 50 and nearly 46 percent are widowed before age 65. With the death of a spouse, women often experience a precipitous decline in income—a husband’s traditional pension benefits are typically cut in half, and even Social Security income drops sharply for the surviving spouse.
The Impact of Divorce
For married women, divorce is also a threat to economic security. In 2003, 12.2 percent of men and 15.9 percent of women in their early 60s were divorced. With this divorce trend expected to continue, women are at risk for not only a decline in their standard of living but the likely loss of future retirement benefits. For example, under a defined benefit pension plan, a married woman has a legal claim on her husband’s benefit. With traditional pensions on the wane and defined contribution plans on the rise, this safeguard is stripped away; married women currently have no legal right to control how 401(k) plan benefits are paid.
It is well known that divorce can have an immediate adverse impact on a family’s economic status. But it is less widely recognized that divorce can also negatively affect a woman’s retirement income. Although a pension that is earned during a marriage is considered to be the marital property of both spouses, state laws do not automatically require that pension assets be divided at the time of divorce. Even though federal law has mechanisms for splitting private pension benefits, a woman first needs to be awarded a share of the pension by the court at the time of the divorce. Then she needs to make sure that the pension plan recognizes her right to a share of the pension. However, the attorneys and judges involved in the divorce may lack the skills required to properly address this. A woman can wind up losing her share of her spouse’s pension if she is unaware of her rights, has an uninformed attorney, or a judge who is not familiar with the division of pensions.
Attorneys and judges need to become better educated about the existing regulations and requirements of the private retirement system pertaining to divorce, and women need financial education to help them make better financial decisions before they divorce. For example, women going through divorce often take the family home as their primary asset while leaving the pension to their husband. The impact is noticeable on the increasing number of divorced women at or near retirement who are forced to stay in the workforce, because they lack sufficient resources to retire.
With respect to Social Security, a divorced woman is entitled to benefits on the basis of her former spouse’s earnings if she is at least 62, unmarried, and the marriage lasted at least 10 years. However, the level of benefits for divorced women is low. In 2003, the average monthly benefit for a divorced wife of a retired worker was $614. If she survives her former spouse, she is treated the same as a widow; the average monthly benefit for a surviving divorced wife was $905.50.
Poverty Risks for Older Women
Despite the overall decline in poverty rates among older Americans during the last several decades, many older women remain poor; in 2004, 12 percent of women aged 65 and older were poor compared to 7 percent of the men in this age group. The likelihood of a woman being poor in retirement increases with age.
Older unmarried women and minority women are especially at risk. Approximately one in five unmarried elderly women is poor. The poverty rate for single black women over age 65 is 40.8 percent and for single Hispanic women it is 41.5 percent—more than twice the rate of white women. (In 2004 the poverty threshold for an individual age 65 and older was $9,060.)
The Social Security Administration projects that in 2030, the percent of women aged 65 or older who have never married or who are divorced (and not remarried) will double. It is important for policymakers to understand and address the needs of this at-risk population when considering changes to Social Security, pensions, and savings policies. Experts concerned about the further reduction of poverty among the elderly are looking at the impact of proposed changes to the current Social Security program. In the past, the largest decline in the poverty rate among the elderly coincided with an increase of about 35 percent in the average Social Security payment. Unless their needs are kept in mind, never-married women, divorced and widowed women, and minority women could particularly be at risk of losing the gains they have made against poverty. Women and Social Security
Social Security has been the nation’s single most successful social program, helping millions of women and men escape poverty in old age. The Social Security system was established in 1935 to provide American workers with protection from the loss of wages due to retirement; it was amended in 1939 to allow benefits to be paid to wives, widows, and children.
Social Security is a social insurance program financed by a federally-administered system of payroll taxes whereby current workers pay for the benefits of the older generation. In exchange for paying into the Social Security system during their working years, workers are promised benefits for themselves and eligible family members in retirement. Cost-of-living increases are provided to prevent inflation from eroding the value of benefits over time.
Because Americans are living longer, the number of retirees will grow significantly faster than the number of workers supporting the system with their payroll taxes. These trends will affect the financial well-being of future retirees by placing a strain on the programs they depend on, Social Security and Medicare.
Social Security is the predominant source of retirement income for millions of older women. In fact, women make up 57 percent of adult beneficiaries.For one in four older women, Social Security is the only source of income in their retirement. Without Social Security, the poverty rate for women would be significantly higher, increasing from about 12 percent to more than 50 percent.
Broadly speaking, Social Security is gender neutral: women and men with identical work histories and earnings can expect to receive the same benefits. But differing employment patterns of women and men create a gender gap in Social Security benefits. According to a recent report, the average benefit for retired women workers in 2004 was $826 a month, considerably less than the $1,076.50 received by men. The average retired workers’ benefits were about 10 percent lower for black women ($765.50) than for white women ($836.50), while Hispanic women received even less ($554).
There are three categories of Social Security benefits to which an older woman may be entitled: (1) a worker benefit based on her own earnings record, (2) a spousal benefit equal to a maximum of one-half of the worker’s benefit paid to a spouse (or a former spouse) of a retired worker, or (3) a survivor’s benefit paid to the wife (or former wife) of the deceased worker and based on the worker’s earnings.
If a woman receives a Social Security benefit based on her own earnings record, it is calculated on the basis of a 40-year work life. The 35 years with the highest earnings are averaged and the five lowest earning years are removed from the calculation; a zero is entered into the calculation for each year that she is not in the labor force. Each zero year reduces a woman’s lifetime benefit calculation. Among new retired-worker beneficiaries, women average 13 years of zero earnings from age 22.
Spousal Benefits
As noted earlier, upon reaching retirement age, a woman who is married, or a divorced woman who had been married for at least 10 years, may be entitled to spousal benefits. The maximum spousal benefit is equal to half of a husband’s, or former husband’s, retired worker benefit. She may receive the greater of her own worker benefit or a spousal benefit, but not both. While a woman who has earned benefits through her own work history as well as through spousal eligibility is considered “dually entitled,” that only means she qualifies for one of two benefits. Women with fewer than 40 credits (10 years of covered work) are entitled only to spousal benefits, assuming their spouses are eligible.
Women often receive spousal benefits rather than their own retired worker benefits. This is because the spousal benefits are higher than what they could have received from their own earnings records. The growth of dual-income families in the last 30 years means that a majority of Social Security-eligible women will be “dually-entitled” in the 21st century. Some analysts see an inequity here, since “dual earner” couples may contribute more to the system but actually receive less in benefits than a one-earner couple making the same income. This is an area that needs to be modernized to ensure that couples are not paying additional taxes for no additional benefits.
Survivor Benefits—Widowhood and Divorce Most women see their family Social Security benefits drop precipitously when they become widows. Survivors may collect their own retired worker benefits, or their spouse’s full benefit amount, whichever is larger. The additional 50 percent spousal benefit, which was paid while the husband was living, is no longer paid once a woman is widowed. In 2004, the average non-disabled widow of a retired worker received $920.20 in monthly benefits.
A divorced woman whose former husband dies (and who was married for at least 10 years) receives the greater of his full benefits or her own retired worker benefit. However, because the average length of a marriage that ends in divorce is seven years, many divorced women receive no benefit at all.
Recommendations for Reform
As the mainstay of support for women, the Social Security program has helped to protect many women from outright poverty in old age. Any future changes to the program should retain the income support features on which low and moderate income Americans rely most heavily. In addition to the broad reform debate centering on Social Security’s fiscal health, policymakers should take action to enact the following reforms of specific benefit to women:
- Eliminate the motherhood penalty by granting family service credits for up to five years spent out of the full-time workforce to care for children.
- Increase the widow’s benefit from 100 percent of the couple’s higher-earner benefit to 75 percent of the couple’s combined benefit, to address the fact that many older women are not poor until their spouses die.
- Increase benefits for lower-earner divorced spouses from 50 percent of the former spouse’s benefit to 75 percent. Reduce the number of years of marriage needed to qualify for the spousal benefit from the current 10 years to seven, as long as combined marriage and work history totals 10 years.
- Expand the special minimum benefit by changing the calculation formula to increase the minimum benefits, which are designed to compensate low-wage workers—predominantly women who stay in such jobs for most or all of their work lives.
- Support and encourage the continued sponsorship of defined benefit pension plans or a more portable plan with the best features of cash balance plans.
- Encourage annuities as an investment and distribution option in defined contribution plans and IRAs. This would address the need for basic spousal protections in 401(k) plans and rollover IRAs. While this is a complicated issue with a lot of contention among the players, annuities would provide the protection for spouses without regulating 401(k) plans in a way that employers would find objectionable.
- Encourage automatic enrollment and other pro-saving defaults in 401(k)-type defined contribution plans, with appropriate backstops to ensure that employers continue to have an incentive to increase participation by non-highly compensated workers.
- Analyze the coverage rules to identify possible opportunities to increase women’s coverage.
- Expand, extend, and simplify the Saver’s Tax Credit to provide a financial incentive for moderate and lower income workers to save for retirement.
- Make sure that asset limits in means-tested programs do not penalize lower income workers who save for retirement.
- Promote incentives for older workers to continue working and improve employment training and retraining programs to better serve older workers.
- Address spiraling health care costs, including the cost of long-term care, recognizing that there can be simply no retirement security in the absence of health reforms.
- Offer employer matching contributions, provide strong default options in plans, encourage maximum participation, and educate workers on retirement planning and investment considerations. Customized retirement planning information can be particularly helpful.
Join a growing trend and implement “auto pilot” plans. These plans allow for employees to opt out of preset defaults, but if they don’t, the defaults get employees into the plan and saving, often at a rate that goes up each year.
- As part of auto pilot plans, employers can set default investment options that use balanced funds or life-cycle funds, versus defaulting all participants into a low-risk money market-type investment. The employee can always override the default, but if she doesn’t, these choices can provide reasonable results.
- Offer payroll deduction savings opportunities in the absence of sponsoring a qualified retirement plan.
Social Security is women’s first line of defense against poverty in old age. Clearly, women have a strong stake in ensuring the financial solvency of the program and making sure that the range of protection remains. Women need to stay focused on the proposals and the debate to reform the current system.
Employer-Sponsored Pensions and Retirement Savings
Employer-sponsored programs have traditionally been an important part of retirement security. Increasingly, employers are playing a dual role in retirement security: providing retirement benefits and providing work options so that people can continue to work, often in a different role. Both pensions and continued earnings are important to the economic security of Americans. Women benefit both as employees and as wives of employees.
Employer-sponsored benefits include pension plans in which the employer contributes for all participants, programs that give employees the opportunity to save (often with an added employer contribution), and retiree health. Americans are much more likely to save when they have access to employer-sponsored savings program such as a 401(k) plan (or 403(b) plan for not-for-profit employers and 457 plan for some governmental employers) than when they are asked to save purely on their own.
Employers provide retirement plans for a variety of reasons. They help attract and retain employees and help long service employees exit the labor force with dignity. Without retirement plans, many older persons would be seeking jobs, be unwilling to retire, or both. In some cases, older workers would serve as needed talent, and in other cases, it would be a difficult situation for both employers and employees. All retirement plans help enable retirement, and qualified retirement plans help employees accumulate assets in a tax efficient way.
Types of Plans
Defined Benefit Plans
Private retirement plans are divided into two broad categories: defined benefit plans and defined contribution plans. A defined benefit plan requires employers to pay retirees a certain amount—the size of the benefit is generally based on salary level and years of employment. A plan administrator makes all the decisions regarding the investment of pension contributions, and the employer bears all the risk of these investments—if the level of funds falls short of what is needed, federal law requires the employer to make up the difference.
An important option of a traditional pension is the opportunity for married employees to choose a spousal benefit. In return for a somewhat lower benefit, a surviving spouse will receive a monthly benefit for life after the retired worker’s death. This choice has important implications for wives, who typically outlive their husbands. The spousal benefit option can only be given up with the written permission of the spouse.
Defined benefit plan sponsorship is on the wane. As of September of 2005, 627 of the Fortune 1000 companies sponsored traditional defined plans and 115 have been terminated, frozen, or closed to new workers.
Defined Contribution Plans
The prevailing trend over the past two decades has been for employers to discontinue offering traditional defined benefit plans in favor of the more portable defined contribution plans and, the most popular plan of all time, the 401(k). In 1993, 32 percent of private sector workers participated in a defined benefit plan while 35 percent participated in a defined contribution plan. Those numbers by 2005 slid to 21 percent in defined benefit plans and grew to 42 percent in defined contribution plans.
In a 401(k) plan, workers contribute part of their earnings to an individual account, deferring income taxes on their contributions and gains earned until the money is withdrawn at retirement. In some plans, but not all, employers also contribute an amount equal to a certain percentage of what the employee puts in. Only if there is an employer contribution can 401(k) plans truly be counted as part of the pension leg of the retirement portfolio. Otherwise, these plans are simply tax-advantaged opportunities for individual savings that are part of the savings leg of the retirement stool.
One major advantage of these plans is their “portability”—employees can take the amount contributed when leaving a job and roll it into another retirement plan or into an individual retirement account. Plus workers can take their employer’s contributions as long as they stay the required length of time to “vest,” either three years for “cliff” vesting or six years for “graded” vesting.
One disadvantage of 401(k) plans is that earnings are an important factor in determining participation. Aside from the obvious—lack of money to contribute—many low income workers are concerned about having access to their funds, a major reason for deciding whether or not to participate in a 401(k) plan. Participation varies significantly as income increases. The voluntary aspect of 401(k) plans requires education to inform employees about the importance of saving for the future and for more plans to offer automatic enrollment.
While the retirement system is moving toward requiring more action and responsibility on the part of individuals, there are several major gaps in the ability of Americans to deal with this responsibility. Between 10 and 20 percent of the population does not participate in basic financial vehicles such as bank accounts. Of the population currently covered by 401(k) plans, a significant percentage does not make choices and does not participate in planning. The public at large, including those who do participate in 401(k) plans, includes many people who do not have needed knowledge and who are operating from misperceptions.
Women are more likely to work part-time, which further reduces annual earnings and eligibility for workplace benefits. Working women not only earn less but are also less likely to work for an employer that offers a retirement plan. Even if they do, women are less likely to vest in a retirement plan because they typically have shorter job tenure. On average, women stay 4.7 years in a job, compared with 5.1 years for men. Traditional defined benefit pensions require employees to remain on the job for five years in order to vest and receive benefits at retirement.
Women are also more likely to work for small firms, where employer-sponsored retirement benefits are not common. Congress has passed a number of laws to increase pension coverage among small firms by making the requirements simpler. Education is an important aspect of small firm coverage: specifically, convincing small firm employers that they will need assets beyond the value of their business for their own retirement.
Women’s Income from Pensions
Even when women work at jobs that have pension coverage and participate in a pension plan, the amount that they receive in retirement income from their pensions will be less because their earnings are less. Many more women may be covered during their working years, but it is the lower income amounts that are still of concern.
As a result of lower income during their working years, time out of the workforce, and the inability to earn or vest in a pension during their working years, women have a much lower income during retirement.
While there is some evidence indicating that more women are working full-time, women still face greater risk of poverty in retirement. Because of the popularity of defined contribution plans, more women and men have retirement benefits that are not guaranteed, have no cost-of-living adjustment and are based upon smaller account balances and on investments that are subject to the returns of the stock market.
Lump-Sum Distribution Dangers for Women
With the growth of the more portable 401(k) plans, employees who leave an employer prior to retirement age typically receive a lump sum cash payment. Lump sum distributions can be rolled over into an Individual Retirement Account (IRA) or another tax-qualified savings vehicle.
Most 401(k) plans do not offer an annuity or lifetime payout option, which makes it harder to manage retirement savings to provide income over the course of retirement. In 2003, only 17 percent of large employer 401(k) plans offered an annuity payout option. Even in defined contribution plans that offer an annuity option, most participants choose to take that benefit as a lump sum payment, increasing the risk that the individual will either mismanage the amount or spend it on nonessential expenses fairly early in retirement, leaving less for later years.
Receiving pension benefits in a lump sum can have serious implications for women. If benefits are not carefully invested—or if benefits are cashed out and spent—little or no income will remain for retirement.
Recommendations for Reform
Given the critical role employer-sponsored retirement benefits play in the income security of older Americans, policymakers should take the following steps:
Employers should keep in mind mistakes that employees are likely to make if left on their own for retirement. The following ideas provide a basis for employer action: | http://www.wiserwomen.org/index.php?id=250&page=Women_Face_Uniq |
Tumor angiogenesis and metastasis--correlation in invasive breast carcinoma.
Experimental evidence suggests that the growth of a tumor beyond a certain size requires angiogenesis, which may also permit metastasis. To investigate how tumor angiogenesis correlates with metastases in breast carcinoma, we counted microvessels (capillaries and venules) and graded the density of microvessels within the initial invasive carcinomas of 49 patients (30 with metastases and 19 without). Using light microscopy, we highlighted the vessels by staining their endothelial cells immunocytochemically for factor VIII. The microvessels were carefully counted (per 200x field), and their density was graded (1 to 4+), in the most active areas of neovascularization, without knowledge of the outcome in the patient, the presence or absence of metastases, or any other pertinent variable. Both microvessel counts and density grades correlated with metastatic disease. The mean (+/- SD) count and grade in the patients with metastases were 101 +/- 49.3 and 2.95 +/- 1.00 vessels, respectively. The corresponding values in the patients without metastases were significantly lower--45 +/- 21.1 and 1.38 +/- 0.82 (P = 0.003 and P less than or equal to 0.001, respectively). For each 10-microvessel increase in the count per 200x field, there was a 1.59-fold increase in the risk of metastasis (95 percent confidence interval, 1.19 to 2.12; P = 0.003). The microvessel count and density grade also correlated with distant metastases. For each 10-microvessel increase in the vessel count per 200x field, there was a 1.17-fold increase in the risk of distant metastasis (95 percent confidence interval, 1.02 to 1.34; P = 0.029). The number of microvessels per 200x field in the areas of most intensive neovascularization in an invasive breast carcinoma may be an independent predictor of metastatic disease either in axillary lymph nodes or at distant sites (or both). Assessment of tumor angiogenesis may therefore prove valuable in selecting patients with early breast carcinoma for aggressive therapy.
| |
Flow State Training Program
We recommend doing these exercises under or in view of a willow tree. If that isn't possible, visualise a willow instead. The energy of the tree strengthens the effect of the exercises.
Flexibility, Part 1
a) Stand up straight and stretch your left arm horizontally to the left. As you breathe in, lift your right leg to the side, as high as you can. Let it down slowly again as you breathe out. Your arm should stay horizontal. 2 minutes. Don't change sides, this exercise is designed just to be done like this.
Stimulates the brain and stretches the right sciatic nerve.
b) Place your feet hip-width apart; as you breathe out, take your arm in a curve over your head while bending down to the right. At the same time see how far towards the ground your right arm can slide down your leg. Breathe in, straighten, breathe out and repeat the exercise on the other side. Watch out that you don't bend forwards or backwards. 25 times on each side.
Stretches the main back muscles and intercostal muscles (important for breathing).
c) Place your feet hip-width apart, stand tall and pull up your pelvic floor muscles. Clasp your hands behind your back. As you breathe in, lift your chest, bend your neck and bend backwards, stretching your arms downwards and away from your body. Then as you breathe out keeping your pelvic floor contracted, bend forwards, bringing your head down towards your knees and stretch your arms away from your body.
Increases the flexibility of the thoracic vertebrae.
Flexibility, Part 2
a) Bend down and place both hands just above your right knee. With a straight back, stretch your left leg to the back so that your leg and upper body are horizontal to the ground. Breathe long and deep. Keep your eyes focused on one point on the ground to help keep your balance. 1 minute 30 seconds, then change sides.
This exercise enhances balance and reduces the chance of degenerative disease developing.
You can support yourself on the tree or a wall.
b) Assume the crouching pose. (Feet hip-width or slightly more apart, heels flat on the floor, back of the head elevated.) Place your hands around your ankles. As you breathe in, stretch your legs bringing your head towards your knees. As you breathe out, come back to crouching again. 2 minutes.
You may want to place your hands just above your knees and just bring your bottom down as far as you can.
c) Place your feet as wide apart as you can (about 90 cm or so); support your hands on your hips with your fingers pointing backwards and your thumbs forwards. Tense your pelvic floor muscles, lift your chest, and bend backwards as far as possible as you breathe in. As you breathe out, bend forwards and see if you can touch the ground with your head. 1-3 minutes.
Bending forwards is about being able to humble yourself.
Flexibility, Part 3
a) Place your feet hip-width apart and stretch your arms over your head, palms facing forwards. Keep your pelvic floor elevated, lift your chest, and bend your upper body as far back as you can. Close your eyes. Firebreathe (p. 47). 1-3 minutes.
The ability to bend backwards is to do with trust, being able to open yourself and give service. This pose strongly exercises the forth open yourself and give service. This pose strongly exercises the forth
b) Place your feet about 50 cm apart. Stretch up your arms up so that they are about 60 degrees apart; your palms are open and face the front. Spread your fingers wide and shut your eyes. Long, deep breaths. 2 minutes.
Attune yourself even deeper to the tree.
(standing, sitting, or lying) 1-11 minutes
Listen to the murmuring of the leaves and branches, and the stillness that envelops everything.
Meditation for health and wellbeing
(YB 3 March 1978)
Sit with your legs crossed and hold your hands at the level of your diaphragm in the Shambavi Mudra. Your right hand palm up, lying in your left hand, with your left thumb lying in the palm of your right hand, and right thumb resting on left thumb. Let your breath flow in and out freely. Your eyes are open about 1/10, your gaze directed to the end of your nose.
Keeping your eyes about 1/10 open helps you to stay present and not drift away in this meditation.
'As soon as you start holding this pose you'll start to feel very comfortable in yourself.
As you become the seed at the centre of life, nature will start to serve you. This is the easiest way to live in harmony.
See if you can break through the barriers of time and space. The same energy that prevents us can also help us to break through.' (Yogi Bhajan)
Was this article helpful?
Free Your Mind And Achieve Peace. Discover How To Live In Peace And Harmony In A World Full Of Uncertainty And Dramatically Improve Your Quality Of Life Today. Finally You Can Fully Equip Yourself With These “Must Have” Tools For Achieving Peace And Calmness And Live A Life Of Comfort That You Deserve. | https://www.dahnyoga.net/practice/exercise-sequence-to-increase-flexibility.html |
Originally published December 15, 2018
2017 has been a year dominated by the lasting effects of multiple ransomware attacks, including WannaCry and NotPetya, and the growing fears within businesses about the security of their most sensitive and critical data. These have brought to light a few very important lessons that businesses must consider for next year, or else risk being the victim of increasingly worse attacks.
Add to this the looming deadline of GDPR in May, and 2018 is beginning to look like its main focus will be keeping data secure and private. Leading IT experts give their thoughts on what they believe 2018 will bring in the IT security sphere, from IoT to ransomware to data management
Ken Hosac, VP IoT Strategy & Business Development at Cradlepoint:
2018 will see organisations being smarter about how they secure their IoT devices. Global surveys show increasing enterprise IoT adoption, but with the spread of vicious botnets such as Reaper and Mirai, businesses know that deploying IoT devices on an existing network is dangerous. It creates cross-contamination, expands the attack surface and exposes corporate networks to new vulnerabilities. This is a serious threat that will need to be mitigated in 2018. | https://cradlepoint.com/news/key-2018-ensuring-private-data-stays-private |
Destroying Trust is Easy: What You Could be Doing to Hurt Your Relationship.
They sat across from me during a session. The room felt tense and uncomfortable. These two have been married for over a decade and came to counseling to improve their communication. Nothing could have prepared him, or me for that matter, for the bomb she was about to drop. Then, after a long pause, she said, “I am not sure why, but I don’t think I trust my husband anymore.”
I don't think you will be likely to find anyone who doesn’t believe that trust is a vital component to a healthy relationship. In fact, along with communication, trust is often at the top of my clients’ lists when I ask them what part of the relationship is most important. For the most part, trust is strong in most relationships. There are few of us who worry about our partner cheating or violating trust in some other big way. However, there are still small things you could be doing that, whether you realize it or not, could be damaging the trust in your relationship.
Stop Using the Word, “Fine.”
Ask any counselor, they will tell you that is is the real “F” word. “Fine” is the enemy of trust for a few reasons. First, because it is barely an answer to a very important question. How many times has someone you love checked on you and asked how you were for you just to disregard the concern and the question with an answer of, “fine.” The second way that “fine” damages trust is that it is almost never true. While nothing may be wrong with us, we are rarely fine. If you want to build trust, don’t just be honest…be thorough with your communication. Think about how you feel for more than two seconds and give an accurate and complete answer. Your partner will thank you for it.
You Never Struggle
Now, we both know this isn’t true, but boy do we work hard to make it look like it is. As men, we often want to suffer in silence and bear our burdens alone. While there are worse crimes than trying to be honorable, you appearing to have it all together all the time, might be hurting the trust in your relationship. See, when you don’t ever appear to struggle, it doesn’t give your partner much room to struggle either. You communicate that problems should be dealt with in silence by your action and your counterpart can feel disconnected from you because of that. Talk about your struggles, even if they are small. Let your partner see that you are open with even the difficult parts of yourself.
You Don’t Follow Through on the Small Things
“Sure, I’ll take out the trash when I get home.” Famous last words, my friend. You know, and I know that the trash will still be there tomorrow. After all, what is the big deal? People forget things, right? Yes. They do. But, if your default setting is to say you are going to do something and it doesn’t get done in a timely manner, your partner starts to learn that you don’t mean what you say. Sure, an ignored trashcan is far from having bodies in your trunk, but what are you going to do when you need your partner to trust you about something important if the trust in your relationship has already taken a hit in the small areas of life. Be a man of your word even on the things that don’t seem to matter.
Building trust is important. It is also difficult. It always takes a ton more time and effort to build trust than it does to damage or destroy it. At Mind Works Counseling Services in Lubbock, TX we specialize in working with couples to help them build trust in their relationships.
Learn more about the Relationship Therapy services we offer.
Contact us to schedule an appointment or to let us answer any questions you may have. | https://www.mindworkslubbock.com/post/destroying-trust-is-easy-what-you-could-be-doing-to-hurt-your-relationship |
I would like to share with you an experience that I had with one of my clients that should serve as a wake up call regarding an applicant's "job fit." I made a presentation to a local company and everything went well except that the vice president of human resources regarded personality assessments as having about the same accuracy and validity as the horoscopes that appear in the newspaper. I challenged the CEO to test the accuracy of the assessment by testing ten of his current employees. I told him that the assessments would be accurate enough for him to identify each employee even if I did not put the names on the reports. He accepted the challenge and ten employees were evaluated.
It took the company about three weeks to get all of the completed assessments back to me. I processed the reports and reviewed them with the CEO and his managers in a group meeting. The evaluations indicated that there were two employees that should have not been hired for their current positions. One employee definitely had an ethics problem and this was very much of a concern since she handled large sums of money. The committee was very impressed because they had terminated the individual several days before I delivered the results. The company had determined that she was indeed embezzling company funds for many years.
The second evaluation was another major concern because the lady was a total mismatch for the position in regards to her personality, however her mental abilities were very good. I told the CEO and the committee that I did not see how she could last over two months in her current position. I advised them to consider moving her to a different position that would be a better match for her strengths instead of zeroing in on her weaknesses. The assessment report clearly showed that she was not recommended for her current position but did show other jobs within the company that would have been a very good match for her. She had some excellent abilities, she was simply miscast in a position that virtually guaranteed her failure.
After a thorough review of all of the evaluations, the company was very impressed because nine out of the ten assessment reports had a very high degree of accuracy. The sticking point was concerning the employee whose report indicated that she was mismatched for her position. The company felt that she was the best employee that they had ever hired. What they wanted to do was to see what was so special about her so that they could hire more applicants just like her. If they had gone by the assessment report, none of the managers would have hired her for that position.
I explained to the company that she was an employee that they would not want to clone for that position. The assessment report indicated a high degree of accuracy. They were intrigued by the accuracy of the other reports and could not understand why that report was so incorrect. They reminded me of my statement that I didn't see how the employee could last in her present job for over two months. The fact was that she had already been employed for six weeks and was doing an excellent job.
I explained to the company that the assessment measured core behavior. That is our "natural" behavior. When an employee is first hired, they try very hard to be exactly what the company wants them to be and they will modify their behavior somewhat to adapt to their new environment. Normally we return to our core behavior within two months because it causes us a lot of stress to operate outside of our core behavior for any extended period of time.
That is the reason that you want to "match" people to jobs. It is very difficult to get the employee to change their natural behavior. At any rate, I knew that the company would always question the accuracy of the evaluation reports and that they would be second-guessing the results. I thanked them for their participation and advised them that since they were not totally satisfied with the results that there would be no charge for the evaluations.
Two weeks later I received a call from the company's executive secretary stating that they would like to be billed for the evaluations that I had done for them. They also wanted to know if I would do more assessments for the company. I advised her that it would not be a good idea because they would view each evaluation with suspicion and that they would end up relying on their "gut" feelings. The assessments would never provide enough value to the company if they were viewed as hit and miss regarding the accuracy. She told me that the company did have faith in the assessment system. I asked her what brought about the change in attitude and she told me that she was not at liberty to discuss the matter. She then transferred the phone call to the CEO.
The CEO advised me that the lady in question had not shown up for work on the day that I delivered the assessment reports and they had not heard from her since. About a week and a half later the company received a call from a psychiatrist stating that the employee had suffered a mental breakdown and was hospitalized. The psychiatrist stated that the lady's background did not seem to indicate any problems. Her husband had told the psychiatrist that the problem seemed to begin developing shortly after she had started her new job. The psychiatrist wanted to know if there might have been anything that had occurred at the company that could have caused or contributed to the mental breakdown.
The CEO told the psychiatrist that the lady had been doing an excellent job. He then shared the results contained in the Achiever assessment report with the psychiatrist and asked him if he thought that any of the factors mentioned in the report had any bearing on the mental breakdown. The psychiatrist responded that in this case it had everything to do with the breakdown. The psychiatrist thanked the CEO for sharing the evaluation results with him. Now that he knew what originated the problem, he felt that he had a better understanding of how to treat the patient.
The CEO admitted to me that he felt a bit of guilt about the entire matter. If he had tested the lady prior to her employment, he would have never hired her for that position. He now saw pre-employment testing as a two way street. Not only does the candidate have to be a good match for the company, the position offered has to be a good match for the applicant as well. He said that he realized that what had happened would cause the lady and her family a great deal of anguish.
Not only was it a tragedy for the family, it was also a disaster for the company. On the last night that she worked there, she apparently trashed all of the computer programs that she had been working on and destroyed all of the back-ups. Not only was all of her six weeks of work down the drain, so was her predecessor's work who had been there two and a half years. He also recognized that being confined to a mental institution is very expensive. He was concerned that it could have a very significant impact on his group health insurance premiums or his workman's compensation premiums, depending on how the claim was to be handled.
I want to provide you with a clear example of what happened in this case. Many cases of depression and anxiety seem to involve the inability to cope with domestic or work related problems. My experience has been that it is more of a matter of how well the individual's cognitive abilities and personality match those required by the job. Let's use an example of an exercise device called a bull-worker that is used to develop the chest muscles. It can be made of rubber or several springs with grips on each end. A person holds one end in each hand and stretches his arms out in order to put a strain on the chest muscles. You have probably seen them advertised on television.
If a person is in a job that matches his mental abilities and personality, it is the equivalent of holding the bull-worker in a relaxed position. A job like that does not cause stress. The person is basically doing a job that is comfortable and natural for them. In the case where an individual is mismatched for a job, visualize having to stretch the bull-worker for an additional inch for every personality dimension or mental aptitude where the individual is outside the recommended parameters of the hiring pattern. We can all cope with a little stretch for a little while, but when we have to stretch the bull-worker for 8 to 10 inches, we just can't hold on for that long without having to do some serious straining. Stress is the mental and emotional equivalent to that physical strain that we experience when we have to stretch ourselves too far. If you laid down the bull-worker after holding it for 15 minutes with 8 inches of stretch, your muscles would continue to quiver for a while and they would probably be sore the next day.
The major difference between physical stress and emotional and mental stress is that we can leave the exercise environment behind us. We cannot leave the stress environment behind us. We carry it with us in our minds and our emotions. If we hire a person into a job where he is going to have to give a lot of stretch, he will take that stress home with him in the evening. It will put a strain on his domestic relations and they will in turn cause more stress. Eventually the straw will come that breaks the camel's back unless some of the stress factors are reduced. An employee that is well matched to the job will have enough stretch in reserve to meet the requirements of a high stress period.
Please always remember that testing is a two way street. Not only does it provide a mechanism for matching the person with the job from the company's standpoint, it also tells you how beneficial the match up is for the individual. Individuals that are properly matched against the job requirements will have higher levels of job performance and overall job satisfaction. | https://www.employment-testing.com/job_related_stress.htm |
It seems like I’ve seen “Getting Away with Murder,” West Allis Players latest offering, before.
The murder mystery’s co-writer is Stephen Sondheim, better known for musicals such as “Into the Woods” and “Gypsy.” George Furth collaborated with Sondheim on this show.
The show follows a familiar murder mystery path that authors like Agatha Christie have tread: a group of people assemble in a secure place and, during the course of an evening, someone is found – dead. Someone in the room did the evil deed. But who?
There is a decided twist for this show. The murderer is revealed near the end of Act I. Plus – and this is a real bonus – theatergoers get to vote on whether or not the killer gets away with it!
It is a novel approach, no doubt, but doesn’t make up for the fact that “Getting Away with Murder” is not up to the level of similar shows, such as Christie’s “And Then There Were None.”
“Getting Away with Murder,” directed by Katherine Beeson, takes place in New York City during a scheduled evening group therapy session. Seven people are seeing the same doctor for individual sessions on a Saturday, and return in the evening for the group encounter.
The first to arrive are Dossie (Liz Whitford) and Martin (Rick Loos). Dressed provocatively, she shamelessly flirts with Martin, a new patient, who gets there at the same time. One by one the other patients show up – Pamela (Avidalis Hurst), Vassili (Kieran Kane), Gregory (Scott Fudali), Dan (Art Carter) and June (Brenda Poppy). But there will be no therapy session this evening. The doctor it seems, is permanently indisposed.
Several times scenes in the doctor’s waiting room, the right side of the stage, darken and action turns to stage left. A screen indicates a date and time, which is several weeks before the meeting in the doctor’s waiting room. In those alternate scenes, we first see a young man (Aaron Roeseler) and a young woman (Amy Wickland) meet for the first time at, apparently, a bar. We see them in subsequent cutaways from the main action, dating. But then something goes terribly wrong, and we soon learn the ramifications of that incident.
The staging of this play is very important. Stage right must be in full view in order for the audience to see key action during the show, and thus the left side of the West Allis Central High School auditorium is blocked off.
In the show, the doctor’s building is old, rundown and soon to be demolished. In the hallway outside the waiting room is an old elevator, plus a shaft where another elevator once was, with yellow caution tape over it. It doesn’t take too much imagination to figure out what might happen there.
There are plenty of dramatic moments in the show – a couple of murder scenes, gunplay, tension-filled confrontations between patients as they try to sort the wheat from the chaff – even a stormy evening and human faces outside a window. The authors of the show definitely studied Murder Mysteries 101.
There is an interesting tie-in to the Seven Deadly Sins, as well as an ominous warning to NYC. Clever touches, but not enough to overcome the show’s inherent flaws, not the least of which are some thick, clumsy dialogue and distracting scene changes, particularly in the first act.
The cast does well with the less-than-stellar material. Most notable among the performers are Whitford, with her high-pitched Judy Holliday-type voice a perfect choice for the sexy Dossie and really fun to watch, and Fudali as Gregory, a greedy real estate developer. Fudali has the right, take-charge attitude for his scenes and conveys nicely the hysteria in the final dramatic scenes (although the finale is, perhaps, a little too drawn out).
Carter as a dishonored cop gives his role a good dose of gravity. Loos’ Martin has a good look and demeanor for his role as a government official, but the actor could have inserted more energy into his role.
As the gluttonous Russian, Vassili, Kane presents a serviceable accent and a rather annoying persona befitting his character. Hurst and Poppy handle their roles well.
Generally speaking, the cast could have conveyed more tension throughout the interrogations meant to find the killer. They tended to look somewhat disinterested.
There are also funny lines here, some poking fun at Manhattan. When someone brings up a recent rape, another responds, “This is New York. There’s always a West Side rapist.” When the big-bellied Vassili gets on the ground to pick up food he’s dropped, someone suggests helping him up, which is answered with, “You’ll need a forklift.” These, and other laugh lines, could be showcased better, although Whitford, especially, does a nice job presenting some humorous moments.
Fudali’s set works well for the show, especially the open look to the hallway elevator, shaft and restroom. Pat Breed Kaiser has done yeoman’s work with the lighting, which is quite tricky for this show and helps keep the scenes in place.
The show, which ran for 17 performances in 1996 on Broadway, proves that Sondheim made a good choice in sticking with his musicals. | https://www.wisconsintheaterspotlight.com/players-get-away-with-flaws-in-intriguing-murdermystery/ |
If you love chocolate and coconut, make this easy German Chocolate Earthquake Cake! With rich chocolate and cream cheese swirls, you'll never believe this starts with a box cake mix.
Course
Dessert
Cuisine
American
Keyword
box cake mix recipe, chocolate cake, coconut cake, cream cheese cake
Prep Time
15
minutes
Cook Time
35
minutes
Total Time
50
minutes
Servings
15
Calories
488
kcal
Ingredients
1
box of German chocolate cake mix
1/3
cup
vegetable oil
3
large
eggs
1
cup
water
2/3
cup
unsweetened coconut
2/3
cup
semisweet chocolate chips
½
cup
chopped pecans
1/2
cup
unsalted butter
8
ounces
cream cheese
3 ½
cups
powdered sugar
Instructions
Preheat oven to 350 degrees and prepare a 9x13 pan with a non-stick spray.
Start by layering the coconut, chocolate chips and pecans on the bottom of your prepared pan. Set aside.
In a large bowl, mix together the cake mix, oil, eggs and water until combined. Pour the cake mix batter over the top of your layers in the pan and lightly spread around.
In a small saucepan, melt the butter and cream cheese on the stovetop. Pour the butter and cream cheese mixture into a large bowl and add in the powdered sugar. Using a mixer, mix together the powdered sugar and butter until a creamy consistency has been reached.
Spoon the cream cheese mixture over the top of the cake mix layer in your pan. Then, swirl a knife around the cake pan to create a swirling pattern between the cream cheese and cake mix. Don’t mix too much, just enough to combine the two with a pretty pattern.
Bake for 35-40 minutes.
Cool completely before cutting if you want clean slices. If you don’t mind a dump style cake and want to eat it warm you may do so. It's delicious served with ice cream!
Video
Notes
The calories shown are based on the cake being cut into 15 pieces, with 1 serving being 1 slice of cake. Since different brands of ingredients have different nutritional information, the calories shown are just an estimate. **We are not dietitians and recommend you seek a nutritionist for exact nutritional information.**
Nutrition
Calories:
488
kcal
|
Carbohydrates:
55
g
|
Protein:
4
g
|
Fat:
29
g
|
Saturated Fat:
16
g
|
Cholesterol:
70
mg
|
Sodium:
304
mg
|
Potassium:
209
mg
|
Fiber:
2
g
|
Sugar:
42
g
|
Vitamin A:
450
IU
|
Vitamin C:
0.1
mg
|
Calcium:
74
mg
|
Iron: | https://thebestcakerecipes.com/wprm_print/2612 |
Beyond 2015 is a global campaign aiming to influence the creation of a post 2015 development framework that succeeds the current UN Millennium Development Goals. It brings together some 800 civil society organisations in over 100 countries around the world. This paper, which focuses on education, was drafted by the Global Campaign for Education with the inputs of the Right to Education Project. It takes as a starting point the right to education and pleads for a universal, equitable access to quality education.
The Latin American Campaign for the Right to Education (CLADE, by its Spanish acronym) is a pluralistic network of civil society organizations with a presence in 18 countries in Latin America and the Caribbean, which promotes social mobilization and political advocacy to defend the human right to education. This collection of articles, essays and statements reflect on the vital role of public education in the region and the fault lines exposed by the pandemic, considering both the challenges public education in Latin America faces and possible solutions, alternatives and ways forward.
In recent decades, governments have made considerable efforts to provide education for all. However, a large gap remains between international commitments, such as the Sustainable Development Goal 4, and the actual achievement of equitable quality education for all. As a result, certain actors often critique public education as ineffective and inefficient, and thus incapable of addressing this issue. They argue for privatisation as a solution, deeming private providers as more innovative and effective than public ones. However, shortcomings in public education often arise not from lack of capacity, but lack of political will.
This review of examples of public education in low- and middle-income countries shows that, in direct contrast to widely disseminated (and empirically unvalidated) ideas, public education can be highly effective, efficient, and transformative and, crucially, it is possible to develop quality public education everywhere. | https://www.right-to-education.org/resources/issues/education-2030/issues/30/language/en/type/23 |
FROONT text editor supports all available Google and Typekit web fonts as you can enter your own font stack. It also supports text styles (Heading 1-6, Paragraph, Blockquote) that allow to keep your typography consistent.
Adding text
To add a Text Widget: | https://docs.froont.com/tag/fonts/ |
The article focuses on the problem of developing students’ critical thinking skills, which help them become independent learners. Analysis of research works of educators and scholars enable the authors to reveal qualities, necessary for students to enhance their critical thinking skills and become independent learners. Different points of view on the problem are given. The authors pay attention to the big role of command, team work. They consider project technology as one of its varieties, directed to improvement of learners creative and cognitive potential. The authors conclude that proper organization of independent work contributes much to development of students’ critical thinking, reflective skills.
Keywords: Independent learning, critical thinking, skills, university graduates, encouragement, primary conditions, convincing argument, efficiency, independence, effective thinking, substantiated conclusions
References
Braus, J.A. & Wood, D. (1993). Environmental Education in the Schools: Creating a Program that Works. Washington: Peace Corps. Direct access: http://www.peacecorps.gov/libra-ry/pdf/M0044_enveduc.pdf
Cluster, D. (2001). What is the critical thinking? Change: Intercultural. Journal about thinking development through reading and the letter, 4, 36–40.
Dewey, J. (1997). Psychology and pedagogy of thinking. How we think. Translation from English by N.M. Nikolskaya. Moscow: Sovershenstvo.
Dewey, J. (2009). How We Think. May 20, 2009.
Elder, L. & Paul, R. (2008) Defining Critical Thinking: Foundation for Critical Thinking. Direct access: http://www.criticalthinking.org/pages/defining-critical-thinking/766
Galperin, P.Y. (2012). The problem of ontogenesis of the human psyche. National Psychological Journal, 2(8), 9-13.
Halpern, D. (2000). Psychology of Critical Thinking. Saint-Petersburg: Piter.
Kapterev, P.F. (1877). Educational psychology for school-teachers, caregivers and educators. A. M. Kotomin Printing.
Komensky, Y.A. (1875). Great Didactics. Saint-Petersburg: Peter.
Leontiev, A.N. (2000). Lectures on general psychology. Moscow: Smysl.
Levin, P. (2002). Teamwork tutoring: Helping students working on group projects to develop teamwork skills. Direct access: http://www.teamwork.ac.uk/ MGS_teamwork_tutoring.PDF
Pidkasisty, P.I. (1972). Independent work of students: Didactic analysis of the process and structure of the play and creativity. Moscow: Pedagogy.
Polat, E.S. (2002). New pedagogical and information technologies in the education system: Manual for students of pedagogical universities and system of improvement of professional skill of teachers. Moscow: Akademiia,
Reynolds, M. (1994). Groupwork in Education and Training. London: Kogan Page.
Rubinshtein, S. (2000). Fundamentals of General Psychology. Saint-Petersburg: Piter.
Schlechty, P.C. (1990). School for the XXI century. Priorities for educational reform. San Francisco: Jossey-Bass.
Ushinsky, K.D. (1975). Selected works. Moscow: Progress.
Vygotsky, L.S. & Cole, M. (1978). Mind in Society. Harvard: Harvard University Press.
Zimnyaya, I.A. (2003). Key Competencies – a New Paradigm of Education Result. Higher education today, 5, 34-45. | http://www.ijese.net/makale/1619 |
Top Wall Street Executives Say Inflation Could Be Worse Than Predicted
Two of Wall Street’s top CEOs have differing views on inflation, but both diverge from the Federal Reserve’s predictions that price increases are transitory and will fade once supply shocks and other pressures ease.
Larry Fink, chairman and CEO of BlackRock, the world’s largest asset manager, is convinced that inflation isn’t temporary, as he believes deglobalization will lead to “systematically more inflation” in the future.
“It is my view that inflation is going to be more systematical,” Fink told CNBC on July 14. “I believe it is a fundamental, foundational change in how we navigate economic policy.”
The focus that shifted from globalization to national security during the Trump administration will continue, according to Fink.
“Post-World War II, our economic policy was based on consumerism,” he said, adding that this policy enabled Americans to buy cheaper goods.
“In the last five years, we’ve navigated away from that foundational belief, and now we are saying jobs are more important than consumerism,” Fink said.
He noted that Washington is now focusing more on national security matters, as well as bringing back manufacturing. – READ MORE | |
The first episode of the “Ancient Aliens” cable TV series promised to show that the growth of intelligent life on this planet had help that came from the stars.
The Prometheus Entertainment summary in 2010 asked: “If ancient aliens visited Earth, what was their legacy, and did they leave behind clues” that still exist?
The bigger question, nearly 200 episodes later, is whether aliens provided the building blocks of life itself. That’s the kind of subject — both theological and scientific — that surfaces whenever there are debates about whether extraterrestrial life exists.
It’s one thing for a recent U.S. national intelligence report — “Preliminary Assessment: Unidentified Aerial Phenomena” — to discuss incomplete technical data and the possibility of hostile spy drones. It was something else to say that experts had no scientific explanations for 140-plus reported “UAP” episodes.
The summary noted that 18 mysterious objects “appeared to remain stationary in winds aloft, move against the wind, maneuver abruptly or move at considerable speed, without discernable means of propulsion.”
This raised familiar questions for those who have followed decades, even centuries, of debates about these mysteries: Who created these objects? Who created the beings who created them? Should this planet’s religious leaders worry?
“The logic is that many people assume life is special, that human beings are uniquely purposed and created in God’s image and that this life — life made in God’s image — cannot exist anywhere else,” said Stephen C. Meyer, who has a doctorate in the philosophy of science from Cambridge University. He is known for writing controversial books, such as “Signature in the Cell: DNA and the Evidence for Intelligent Design” and the new “Return of the God Hypothesis.”
Many experts seem to think Christianity has explicit doctrines on this matter, he added, but “that’s not a sound judgment, since there’s no explicit Christian teaching on the subject — unless we have now taken C.S. Lewis as canonical.”
Lewis — Oxford don and Christian apologist — did, starting in 1938 with “Out of the Silent Planet,” write a space trilogy focusing on contacts between humans and intelligent beings on other planets. In an essay entitled “Will We Lose God in Outer Space?” he speculated that the distance between Earth and the rest of the universe served as “God’s quarantine precautions.”
Shortly before his death in 1963, Lewis told a journalist: “I look forward with horror to contact with the other inhabited planets, if there are such. We would only transport to them all of our sin and our acquisitiveness and establish a new colonialism. I can’t bear to think of it.”
Pope Francis has brushed away similar questions about extraterrestrials. In 2015, he told the Paris Match news magazine: “I think that we should stick to what the scientists tell us, still aware that the Creator is infinitely greater than our knowledge.”
But discussions of extraterrestrial life raise the same “Creator” questions that cause fierce arguments on Earth.
For example, some scientists have speculated that aliens may be linked to life on Earth. In a 1973 paper entitled “Directed Panspermia,” Francis Crick — co-discoverer of DNA structure — and biochemist Leslie Orgel noted that life may have been “deliberately transmitted ... by intelligent beings on another planet. We conclude that it is possible that life reached the Earth in this way, but that the scientific evidence is inadequate at the present time to say anything about the probability.”
That would raise another ultimate question, according to evolutionist Richard Dawkins of Oxford, a popular evangelist for atheism. During one “intelligent design” debate, he wrote that “even if our species was created by space alien designers, those designers themselves would have to have arisen from simpler antecedents — so they can’t be an ultimate explanation for anything.”
That’s a valid point, said Meyer, reached by telephone. But those committed to belief in a random, unguided process of creation — for the universe and life — would still need to demonstrate how conditions exist for this to have happened on other planets. Meanwhile, “a theistic God could have created life anywhere.”
“Not finding E.T. could be a blow to naturalists more than finding E.T. would be a blow to theists,” Meyer said. Substituting aliens for the work of a Creator God wouldn’t “just kick that can down the road, it would kick it out into space.”
Watch this discussion.Stop watching this discussion.
(0) comments
Welcome to the discussion.
Keep it Clean. Please avoid obscene, vulgar, lewd,
racist or sexually-oriented language. PLEASE TURN OFF YOUR CAPS LOCK. Don't Threaten. Threats of harming another
person will not be tolerated. Be Truthful. Don't knowingly lie about anyone
or anything. Be Nice. No racism, sexism or any sort of -ism
that is degrading to another person. Be Proactive. Use the 'Report' link on
each comment to let us know of abusive posts. Share with Us. We'd love to hear eyewitness
accounts, the history behind an article. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.