content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
An essay is, in general, a lengthy written bit that provide the author’s debate, but the precise definition is unclear, often overlapping with this affordable-papers.net a brief article, a letter, a novel, a newspaper, and even a short story. Essays traditionally have traditionally been categorized as formal and academic. In the last several decades, essays have increasingly been regarded as a way of presenting and communicating information or to encourage pupils to participate in research-based learning. As such many universities and colleges are very dedicated to the development of various forms of essay, such as technical, creative, and persuasive writing. Within this series, we will take a better look at some of the vital elements of this important genre.
Among the most fundamental details of the article is the debut. Unlike a brief summary of the topic, an introduction sets the stage by effectively starting the text. This part ought to be concise and to the point, drawing readers into the body of this essay. But it should not be the focus of the writing, as inferior writing creates a boring, one-dimensional document. The perfect essay starts with an intriguing introduction that engages the reader and makes them want to read on.
The transition words between paragraphs support and enhance the introduction. A nicely written essay uses transitional words, transition phrases which smoothly join 1 paragraph to another, offering a smooth sense of coherence throughout the composed piece. Additionally, the transition words demonstrate goodwill between paragraphs and provide a clear sense of direction. If a reader begins reading an article and does not see an introduction, as an instance, and then comes to the conclusion it will be difficult to connect both.
Another component of an essay that needs to be strong is your conclusion. The end is the most essential area of the essay and must offer a logical review of the main idea. The conclusion gives the URL to the beginning of the following paragraph or section. It must outline what was discussed at the introduction and elaborate upon the primary thought and arguments presented in every paragraph.
The thesis statement is the most vital portion of the essay and must stand out as the fundamental idea of this essay. The thesis statement generally starts the article and describes the main idea of the essay. The thesis statement affirms and enriches each of the other paragraphs and is the focus of the essay.
Each paragraph has to build on the main point and provide supporting evidence to confirm that primary point. Each paragraph has to build on the preparation provided in the previous paragraph and be composed in such a way that leaves a strong, logically organized decision. In order to write the best essay, each sentence has to be composed in a manner that builds up on the former paragraph. Sentences should be written in the sequence they’re composed, which generally happens to be from start to finish.
The introduction is the first part of the article and supplies information regarding the topic of the essay. The introduction must offer details regarding the main idea. One important tip for writing an introductory essay is to think like a reader and consider what you would expect to see in the literature study or topic area the essay has been written about. A suggestion for beginning writers is to begin the essay with an introduction and dig into the body of the essay.
Conclusion is usually the last paragraph of this essay. The conclusion summarizes what’s been discussed in the introduction and again presents a logical argument for the topic. There are several distinct types of conclusion, however a common conclusion is that both of these things could be true: Either the thesis statement isn’t right and the reader isn’t right, or the writer has presented enough evidence to convince the reader that their thesis statement is correct. A suggestion for ending essays will be to finish with your opinion. It is possible to explain why you think so, or just state it . | https://www.hausarztpraxis-zum-schloss.de/how-to-structure-a-written-essay/ |
The Cabinet Committee on Economic Affairs, chaired by the Prime Minister Shri Narendra Modi has given its approval to provide financial assistance @ of Rs. 5.50 per quintal of cane crushed in sugar season 2017-18 to sugar mills to offset the cost of cane, in order to help sugar mills to clear cane dues of farmers.
Details:
The assistance shall be paid directly to the farmers on behalf of the mills.
It will be adjusted against the cane price payable due to the farmers against Fair and Remunerative Price (FRP) including arrears relating to previous years.
Subsequent balance if any, shall be credited into the mill’s account.
Assistance shall be provided to those mills which will fulfil the eligibility conditions as decided by the Government.
Background:
Due to higher sugar production against the estimated consumption during the current sugar season 2017-18, the domestic sugar prices have remained depressed since the commencement of the season. Due to depressed market sentiments and crash in sugar prices, the liquidity position of sugar mills has been adversely affected, leading to accumulation of cane price dues of farmers which have reached to more than Rs.19,000 crore.
In order to stabilize sugar prices at reasonable level and to improve liquidity position of mills thereby enabling them to clear cane price dues of farmers, Government has taken following steps in past three months:
Increased customs duty on import of sugar from 50% to 100% in the interest of farmers.
Imposed reverse stock holding limits on producers of sugar for the months of February and March, 2018.
Government has also fully withdrawn the customs duty on export of sugar to encourage sugar industry to start exploring possibility of export of sugar.
In view of the inventory levels with the sugar industry and to facilitate achievement of financial liquidity, mill-wise Minimum Indicative Export Quotas (MIEQ) have been fixed for sugar season 2017-18. Export Quotas of 20 Lakh tonnes of all grades of sugar; viz. raw, plantation white as well as refined, have been prorated amongst sugar factories by taking into account their average production of sugar achieved by the sugar mills during last two operational sugar seasons and the current season (up to February,2018).
Further, to facilitate and incentivize export of surplus sugar by sugar mills, Government has allowed Duty Free Import Authorization (DFIA) Scheme in respect of sugar.
| |
Most people probably think of a local hero in a positive sense. A person who does something for others, who inspires others to learn something new and improve themselves. In Sweden, for instance, we have a television show called Vardagshjältar(Everyday Heroes), where "ordinary" people are recognized for doing something extraordinary. But can a local hero also be something negative?
Here's a real-life example: A company gets a new CEO and a new strategy is subsequently developed and communicated to the entire company. The new strategy involves some significant changes. Not only in terms of the organization, but also in the form of new roles and responsibilities for both employees and managers.
An employee survey is conducted to determine the current status and get a sense of the leadership quality. The survey's results vary quite a bit. Some managers are given a low score, some managers come in as average and some score high.
So what can you do with such varying results? Managers with poor scores need to be encouraged to think about the root cause of their employees' responses. It's important to put the results into some sort of context. Who is the manager, who are the employees, what is going on in the department, and so on.
Good results don't always mean good leadership
A low score isn't always the same as bad performance. For instance, the manager may have implemented a series of changes in line with the company's objectives and strategy, but without the involvement of the employees for some reason or other.
If we now consider the managers who earn high scores, can we conclude that they are doing an excellent job as managers and just let them continue along the same lines? No, it's not that simple. Again, it's important to put the results into context and reflect on the group of "good" managers as well.
I often encounter companies where the managers are given positive assessments by their teams, but the upper management is given negative assessments. But why? In many cases, the immediate superior always takes the employees' side and talks bad about the management. This manager is what we call a "local hero".
What makes a manager a local hero?
There are a variety of explanations for the local hero phenomenon. The manager may have advanced from employee to leader and can therefore be having difficulty with the new role. Unclear messages from top management cause ambiguity/uncertainty in the manager, who then fails in the role as ambassador for the top management. Another explanation could be that the manager simply thinks top management's decisions are bad or wrong, and this is being communicated to the employees.
Ambiguity weakens leadership
In Sweden, we are generally good about involving employees and delegating responsibility, which harmonizes well with our relation-oriented culture. However, we also tend to be less clear when it comes to the link between the employees' assignments and the overall objective and when giving constructive feedback to employees. This is generally due to vague expectations from management, resulting in ambiguous leadership and ultimately in erroneous expectations from the employees.
If the immediate superior is not a good ambassador for the top management, it can be difficult to explain what the employees are expected to contribute to the overall objective as well as to execute change. Employees' trust in top management is undermined as is their understanding of the direction the company is moving in and why. To help the employees understand and take responsibility for the process as a whole, it is crucial that top management, through the line managers, is able to communicate (in the right manner) the why, the what and the how.
Tell managers what is expected of them
We all have different preferences, behaviors and attitudes. We all see the world from our own points of view, regardless of whether we are a member of management or the rank and file. Management/HR therefore need to work more systematically with the development of leadership skills by clearly communicating expectations, providing support and developing the managers. Communicating expectations clearly sets the framework for specifying what is expected of the employees. Local heroes already have the trust of the employees, which makes it somewhat easier to develop these leaders into mouthpieces and ambassadors for top management. However, this is only if they are willing to change their attitudes towards their leadership role.
The next time you assess leadership quality from the perspective of the employees, you should therefore think about whether the manager is only good for the employees or is also good for the company. Are there local heroes in your company? | https://www.ennova.com/en/employee-experience-insights/are-there-local-heroes-in-your-company |
What does it sound like?:
It’s odd that I still think of Andy Summers as being ‘that guitarist from The Police’, even though said band called it a day over thirty years ago now. This solo effort, the final instalment in a trilogy that began in 2015 with Metal Dog and continued with 2017’s Triboluminescence, was created as a soundtrack to Summers’ latest photographic exhibition, about to launch in London. It seems that at previous exhibitions of his work, he has felt that the in house music provided by galleries has been rather at odds with the artwork on display – hence his decision to create his own musical installation this time around, a looped piece that would provide a continuous musical counterpoint to the visual offerings. Thus we have a dozen wholly instrumental pieces that flow seamlessly into each other, ranging from African beats to ambient minimalism, but with an overall quite passive and subdued vibe permeating proceedings, which I suppose would indeed work well as a background while your main focus and attention is on the actual exhibits in the gallery.
What does it all *mean*?
There are some interesting ideas and themes in this somewhat low key showcase for Summers’ subtle skilful playing.
Goes well with…
Attending the exhibition.
Release Date:
15 October
Might suit people who like…
Ambient/instrumental music. | https://theafterword.co.uk/andy-summers-harmonics-of-the-night/ |
When the fantastic world of Sci-Fi meets the hurly-burly automation of the cyclical fashion machine, magical (and not-so-magical) manifestations can be conjured. It’s not to say that there aren’t aspects of the genre in everyday clothes, but when a prominent designer, or at least one with some press, chooses a subject with a selective, dare I say cult following, to show in the spotlight, the fashion press tends to glare over it as a mild flirtation for the season, and nothing more. Fashion is, after all, a cruel mistress, and genuinely doesn’t care about anything except your next collection, so it remains that the majority of these inspirations go unnoticed or have long been forgotten.
That’s where I come in.
I want to do a series of posts based on my understanding of the fashion world as it relates to the genre that we all know and love. I’m not sure how many of these I will get through; Heck, this might be the one and only, but I’ll try to crank them out on a semi-regular basis. Maybe once a month? I dunno.
I PROMISE NOTHING!!
This is not going to be a philosophical treatise on the merit of the clothes/collections, nor will it be a love letter to the designer. These posts will simply be expressing an opinion and explain (within reason) maybe what the designer was trying to accomplish at that particular season. Any and all opinions are welcome, and I’d be happy to explain anything about cut or construction, as much as I can.
Having said all that, I am not claiming to be an expert on all of the given genre inspirations; Hell, it was only last year that I watched all six of the first Star Wars movies, but I do understand researching a collection. It goes well beyond just copying a costume for cosplay. It involves dissecting a subject and filtering the found references through your eyes, and reinterpreting them into a workable line of clothing.
So, if I miss a fact about why the model’s ponytail should have been on the right side and not the left, or a point about which Dr. Who character spoke with a Cockney accent that one time in episode 5 of series 4, please inform me in the comments section.
Questions? Problems? Hysteria?
Please let me know what you think of this piece.
Now, on with the show.
For this first go-round, I thought we should look at one of the more prominent examples of genre-spiration (yeah, I’m still working on a catchy bon mot): Alexander McQueen for Givenchy fall 1998 ready to wear.
You really don’t have to look too far to understand that the reference point for this particular season was Blade Runner, in particular, Sean Young’s character, Rachael.
Since his installation at the house a year earlier, McQueen’s collections for both the ready to wear and the haute couture had been an ever-maddening roller coaster ride of inconsistency. His spring ’98 collection, a tribute to Dolly Parton, was met with mixed, if not less than excited reviews, so it was up to him to knock it out of the park with a collection that blended both his own sensibilities and that of the storied history of the house of Givenchy. Not an easy task, especially since, at the time, McQueen was pretty much a rebel and rejected anything that resembled cohesion and marketability.
Fashion houses need to make money to justify the expense of both production and presentation, so If McQueen couldn’t deliver the cash, he’d be out of a job.
Consider it a testament to the production and costume design of the movie, because he didn’t stray too far off the established, sartorial path. The cuts were, as they were in the movie, inspired by a strict take on 1940’s suitings. This was a good jumping off point for McQueen because both he and Givenchy built their foundations on marvelous tailoring. The color story, as dark and mysterious as Blade Runner’s cityscape, was punched with bright shots of near day-glow colors – much like the light shining through a darkened skyscraper’s window.
Where McQueen excelled with this collection were the little details that defined his bucking of (if not utter respect for) Saville Row traditions: Soft draped lapels, geometric insets (that drove production insane), beautiful fabrics and above all, the rigid structure of the silhouette.
He enlisted Philip Treacy to design the reflective, fishbowl hats, and set to the beat of Michael Jackson’s “Don’t Stop Til You Get Enough,” the models stomped their way on to a disco-floor catwalk after winding their way down a series of ramps lit like building skyways.
This is one of my favorite collections from McQueen during his tenure at Givenchy, and the reviews spoke to his attempt at navigating the treacherous waters where creativity and marketability collide:
“…the fall collection he showed here Wednesday brought the trophy within reach. He managed to produce enough clothes in the classic Givenchy tradition to please longtime customers, at least those who are willing to be updated for the late 1990's. And he provided sharp-edged aggressive clothes to attract a more daring woman. And he did both with great style.” - By Anne-Marie Schiro, NY Times
Here is a clip from the collection: | https://observationdeck.kinja.com/sci-fashion-blade-runner-at-givenchy-1769462559 |
New Martial Arts Class on Molokai
Modern arnis being taught in Kaunakakai.
By Léo Azambuja
One of the most underground types of martial arts in the United States is being taught right here on Molokai. The practice known as modern arnis is being taught by instructor Mark Crumpton. He recently moved from Los Angeles, and has started teaching a class at Home Pumehana.
Modern arnis is mostly known to be a martial arts practice that originated in the Philippines, and to be practiced with sticks. But this is just part of the story. “Most people don’t understand that modern arnis is a blade fight,” Crumpton said. “But it is actually a blade art.”
The martial art was created by Filipino Grandmaster Remy Presas. “It’s a combination of balintawak, arnis, karate, judo and wing tzun,” Crumpton said. Presas learned all those martial arts from different masters in the Philippines and started teaching them on a linear format, according to Crumpton.
But when modern arnis arrived in the United States, Presas switched the blades to sticks using similar moves. “Teaching the blade was so violent,” Crumpton said. “So they used sticks in place of blades.”
Over time, the martial art evolved and gained popularity as a stick martial art. “A lot of people forgot it was a blade art,” Crumpton said. Today, he said there are not many people training with the blades. Crumpton is one of the very few.
Although the stick and the blade portions of modern arnis are similar, there are some differences. “When you train with the stick you hit the hand, we hit the arm,” Crumpton said. “When you train with the blade you train closer.” Blade orientation also makes part of the differences between the two modern arnis variations.
Presas passed away in 2001. But not before handing over his knowledge to Bram Frank, who also became a modern arnis grandmaster. Crumpton was still training Brazilian jiu-jitsu in Los Angeles when he met Frank. “I’m pretty comfortable with my ground skills,” Crumpton said. “But I realized I had to have some stand up skills.”
After being introduced to modern arnis by Frank, Crumpton was hooked on it. “This made a lot of sense to me,” Crumpton said. It has been six years now, and three years since he got his license to teach modern arnis.
Proving modern arnis is not just a fighting style, but an art in itself, Crumpton said the two main factors in the martial art are flow and counter for counter.
“Everything is about the flow,” Crumpton said. “The flow is how the body moves naturally.”
Countering moves is equally important in modern arnis. “If I throw a punch and you counter, and I don’t know how to respond then I’m done,” Crumpton said. “I need to learn how to counter from here.”
But for those who think the modern arnis is complicated, there is hope. “It’s all about keeping it simple,” Crumpton said. “We can have fun doing it.”
Before moving to Molokai, Crumpton used to teach modern arnis in Hermosa Beach, Los Angeles. Some of the surrounding gyms were run by some of the biggest legends in martial arts. But he is still a humble person. “I come from a place of respect and humility,” he said.
Crumpton heard there are a lot of Filipinos who are experts in modern arnis on Molokai. “Most of the guys are teaching in their backyard,” he said. “It’s really secretive.” He acknowledged there are probably martial artists on Molokai more experienced than him. He says he is excited to train and learn with others an hopes to meet other martial artists on Molokai. “I know there are some good teachers on this island,” Crumpton said.
The versatile Crumpton has been training for over 20 years in several styles of martial arts, including tang soo do, tae kwon do, wing tzun and Brazilian jiu-jitsu. His teacher in this last art was Carlson Gracie Jr., son of the late Carlson Gracie Sr., who many in the jiu-jitsu community say was the best teacher the sport ever had.
Anyone who is skeptical or afraid about practicing modern arnis should give it a try. “I make a serious subject fun,” Crumpton said. The first class is free. He said he is still trying to figure out a fair price, but it won’t be expensive.
The outgoing instructor with movie-star looks is already in love with Molokai. And it doesn’t look like it’s a passing thing. Crumpton moved here to be with his girlfriend, a local girl with whom he has maintained a long-distance relationship for a year. “I’m not going anywhere,” he said. “I’m here to stay.”
Classes are held at Home Pumehana, at the Hale Maha`olu Senior Center, on Tuesdays and Wednesdays from 5-7 p.m., and on Saturdays from 12-3 p.m. For more information please contact Crumpton at 808-336-0936. | https://themolokaidispatch.com/new-martial-arts-class-molokai/ |
Okinawan Goju Ryu karate-do is a cultural treasure which has been passed down from one generation to the next since its roots in the Chinese martial arts. Training in the dojo involves the hard work required to develop the mind and body, but in the pursuit of preserving this traditional art form for future generations, the etiquette and protocols should not be overlooked. As an Asian martial art, much of the etiquette is simply an extension of Eastern values. The rules of the dojo are frequently paralleled with how you should behave in a temple, or other place of spiritual significance.
Good etiquette starts before you even enter the dojo. Being respectful of others is a cornerstone of society, religion and the martial arts. It is important to show respect to your seniors, those that have gone before you, respect to your training partners and respect to the man or woman that made your uniform. You should always start your training session wearing a clean, neat uniform and adhere to simple practises of good personal hygiene. Remove jewellery to protect yourself and others from injury, although exceptions can be made for items of personal significance with the permission of your instructor.
Removing your footwear before entering the dojo is a common practice, immediately familiar to anyone that has entered a religious temple. Those that follow religions in colder climates may be more likely to instead remove their hat. In practical terms, removal of footwear is simply an act of showing respect for others by not bringing dirt into the place in which you are about to train. This practice is not always possible in many Western dojo, so instead you should remove your footwear as soon as possible and certainly never walk on matted floors with heeled shoes as these can damage the soft surface.
Bow on entering the dojo. This simple gesture marks your respect for the dojo but also serves as a transition point as you leave the outside world behind in order to commit yourself to your time to practice. Bow again as you leave the dojo, offering your thanks for the time spent in the dojo.
The instructor, or a senior student, will call “shugo”, which translates as “gather together” and signifies the time for the students to line up. In principle, this simply means that the class is going to start; the students must pay attention to the instructor. Modern karate has been influenced by the military importance of orderly lines and standing in rank and thus the senior grade will stand at the front of the class to the right. This has a practical benefit of similar graded students training together and the junior grades knowing where to look for guidance.
The class will start with everyone facing “shomen”, the front of the dojo. The instruction “shomen ni rei” will be called, asking students to bow towards the front of the dojo, which may have a shrine or a photo of the Chojun Miyagi Sensei, the founder of Goju Ryu. The instructor and students will then turn to face each other and the instruction “sensei ni rei” will be called. While bowing to the instructor the students should clearly say “onegaishimasu”, which is simply an act of courtesy translating in the dojo as “please teach me”. This short ceremony is often performed in a kneeling position, seiza, and includes a brief period of meditation with eyes closed, mokosu. In the IOGKF Honbu dojo, and elsewhere, the Dojo Kun is also repeated out loud. This is the dojo oath and whilst it can be found in your licence book it is rarely spoken in Western dojo.
During the class there will often be times when you will practice with a partner. Before beginning you should bow to each other and say “onegaishimasu” and once your time together is finished you should bow again and thank each other by saying “arigato gozaimashita”.
Once the training time has finished, keiko arimasu, the closing ceremony is performed. As you started the class with a neat and tidy uniform you should make the effort to straighten your gi before the class finishes. The closing ceremony differs from the start of the class with the words “arigato gozaimashita” being spoken during the bow to the instructor to offer a sincere thank you. This is followed by an additional bow facing towards your training partner (the person kneeling next to you) “otagai ni rei”, accompanied by the words of thank you, “arigato gozaimashita”.
The club has now been running for five years and to celebrate we invited Sensei George Andrews, 8th Dan, to teach a two day course or mini gasshuku. The course was well supported by our own students and visitors from Essex, Reading, Southampton and Milton Keynes. Over the six hours of training we covered the important basics of karate, effective self defence exercises, essential impact work and kata.
A gasshuku is a time of staying together - in karate this principally means training together but such an event isn't really complete without eating together also, so on Saturday evening we met at the Orchid oriental restaurant in central Cambridge. Everyone enjoyed the food and many of our students plan to return for more.
Thanks to the students and instructors that supported this event and of course many thanks to Sensei George for his unparalleled instruction and sharing his experience and knowledge with us. | http://www.cambridge-gojuryu.co.uk/news/archives/02-2015 |
The Pali Canon: its role in Buddhism as a whole.
The Pali Canon (Tipitaka) is a collection of scriptures containing the teachings the Buddha made while alive. Theravada and some Tibetan schools place the most value on them.
Tripitaka means ‘three baskets’:
Vinaya – the rules for the sangha.
Sutta – The Buddha’s teachings and storys, including his life.
Abhidhamma – Philosophical discussion by Buddhist monks held after the death of the Buddha attempting to interpret, understand and elaborate on the Buddha’s teachings.
The authority of the Vinaya for the Theravada sangha
Vinaya means ‘discipline’. It contains the Patimokka, the rules governing the behaviour and discipline of the monks and nuns.
227 rules for monks and 311 for nuns. The rules trace back to the Buddha but some were added or developed later. Upali was one of the 10 chief disciples of the Buddha who recalled from memory all of the Vinaya rules, reciting them to the arhats at the council who agreed with their accuracy.
The rules therefore gain their authority by coming from the Buddha. They were first recorded by oral tradition and eventually written down.
The Buddha created rules to deal with misconduct and disagreement and minimise conflict. Breaking the code of conduct would disrupt the goal of Nirvana.
The Suttavibhanga contains the Patimokkha
The dasa sila (10 rules). They were expanded into the 227/311 rules.
Eight categories of wrongdoing, including four parajikas (disrobing offenses)- sex, stealing, murder and falsely claiming spiritual abilities.
Second section of the Vanaya – Khandhaka. The Buddha’s life after enlightenment and his disciples and the first two Buddhist councils.
Guidance on etiquette and manners
Third secion: Paravara – rules and guidance on how to follow the Vinaya. Used in the training for becoming a monk/nun.
The wider authority and significance of the Sutta Pitaka,
Collections of teachings attributed to the Buddha and some of his disciples. Recited at the First Council by Ananda, the buddha’s most dedicated disciple.
Contains the four noble truths. Intended for lay Buddhists, not just the monastics.
Five sections:
Digha Nikaya
the relevance of the Abidhamma for the commentarial
development of Buddhism. The importance of the Pali Canon as a source of wisdom.
The relative importance of the Pali Canon in Buddhism.
• The significance of the Vinaya for the sangha. | https://alevelphilosophyandreligion.com/eduqas-wjec-religious-studies/eduqas-wjec-buddhism/the-pali-canon/ |
Published On: June 29, 2020 09:58 AM NPT By: Rajindra Napit
Nepal has been under lockdown for more than three month now due to the ongoing pandemic of Covid-19. Nepal has taken lockdown as a major strategy to control pandemic due to lack of resources and test kits. The government of Nepal has been trying to get enough test kits required to control the pandemic from taking root in the country. As an effort to fulfill that demand, the government initiated procurement effort as well first via the Health Ministry directly through a contract that was awarded to Omni group and recently to Nepal army via government-to-government model. Both procurement done by the government has not been without controversies.
Let us talk more about recent procurement of kits and consumables procured by Nepal army. The RNA extraction kits with 1mL VTM instead of 3mL VTM have been talked about a lot lately.
Background of RT qPCR
Before making comments on kits and its incompatibility along with existing machines as well as labs in Nepal, we should know of RT qPCR detection of the virus SARS-CoV2. RT qPCR stands for ‘Reverse Transcriptase quantitative Polymerase Chain Reaction,’ an assay that detects RNA via PCR that involves conversion of RNA into DNA in real time. However, the test involves multiple steps before it gives a result on whether the sample has SARS CoV2 or not. The very first step, of course, is sample collection, in this case swab of either nasopharyngeal area or oropharyngeal area or sputum. As Covid-19 is a disease caused by RNA virus, it needs to be transported/stored in VTM.
What is VTM?
VTM stands for Viral Transport Medium. It is a liquid medium used to transport viruses that has a property to keep the virus intact during transportation. One may ask, why do we need VTM then? We need VTM to keep the virus intact till we get it to the lab for further processing, including PCR detection or culture. This means VTM is there to keep samples stable till extraction of the sample’s RNA.
1mL and 3mL VTM controversy
Most of the news reports state that VTM being 1mL makes it incompatible, and that we are using 3ml VTM. What kind of impact will it have if we use 1ml VTM instead of 3ml VTM? It is simple math: Samples in 3ml VTM will be 3 times diluted compared to 1ml VTM. This leads to a bit of late detection in RT qPCR as samples have been diluted, but they do get detected. Does this mean 1ml VTM is better than 3ml VTM? Not necessarily, but in terms of viral detection and VTM utilization less VTM is used per sample and viruses are more concentrated. However, in Nepal, we have collected samples in 3mL VTM, out of which only 0.1mL or 0.3mL is used for RNA extraction.
What is the 1ml VTM that was procured recently? Those are not the regular VTM, it is a sample storage buffer designed as a part of RNA-release technology by Sansure Biotech. However, this 1mL buffer should not compromise with the quality of the RNA in the sample as it is designed to specifically keep the virus RNA preserved.
What happens in RNA extraction?
Now the second step is RNA extraction, which means viruses are lysed (destroyed/ opened up) using different chemicals to release RNA that it contains inside of it and is then subsequently purified to get all the impurities out. Normally, almost all different RNA extraction uses 0.1ml to 0.3ml of VTM containing the possible virus sample. What this means is that out of all the VTM that is used to collect samples, only a very small portion is used to extract RNA out of it. The WHO guidelines also say 1mL VTM or normal 3mL VTM can be used to collect samples for Covid-19.
What happens in RT qPCR?
Then comes the final detection step RT qPCR, where RNA belonging to SARS CoV2 is detected via PCR. The PCR assay can be different based on the manufacturer that makes it. There are many kits and manufacturers that make and sell Covid-19 detection kits. But not all are open systems, and some are closed systems.
Closed and open system
Open systems generally refer to kits being compatible and applicable to be used in all different platforms (labs/kits) and machines, while closed means only selected instruments will support it. What makes kits a closed system and which component can be made so that it gets locked to a single machine or platform. RNA extraction kits that are made of a closed system need an automated RNA extraction machine for the sample to be processed. From the online manual of the Novel Coronavirus Nucleic Acid Diagnostic Kit of Sansure Biotech, the nucleic acid extraction protocol does not indicate a closed system. In the final step of RT qPCR, the reaction can be designed in a way to be compatible in selected PCR machines only.
According to the online manual of Sansure Biotech, the nucleic acid extraction kits seem to be based on “advanced RNA fast-releasing technology”. This was what NPHL had found to be not useful when the same kits were donated to Nepal previously. The manufacturer has made it clear in the protocol that kits come with a ‘sample storage buffer’ (different from Viral Transport Medium) and RNA fast-releasing technology or reagent is not compatible with VTM used traditionally. However, this is not a closed system: if samples collected in VTM then commercial kits such as Qiagen QIAamp Viral RNA Mini Kit extraction can be used with their PCR kit.
In the final step of RT qPCR, the reaction can be designed in a way to be compatible in selected PCR machines only. We have learned that the PCR kits from Sansure Biotech are open systems, and that can be used in any real-time PCR machines.
Wrong results from new RNA extraction kits
Why are new RNA extraction kits or VTM found to give negative results while tested? This would make sense that false negative results may occur from samples stored in VTM, as stated in the manufacturer’s protocol. However it is not due to the VTM volume of 1mL, instead it is due to the RNA extraction kit being compatible with the ‘sample storage buffer’ provided by the company. However, the samples in VTM can be used with another company’s extraction kit and Sansure Biotech’s PCR kits can still be used. Likewise, the extraction kit from Sansure Biotech can be used with another company’s PCR kit. New samples can be collected in the sample storage buffer and the new RNA extraction kits can be used, the quality should not be compromised.
Solution
There are tens of thousands more PCR tests to be conducted in Nepal, new specimens can be collected in these sample storage buffers and used with the RNA extraction and PCR kits from Sansure Biotech in any real time PCR machines in Nepal.
First question we should ask is: Do those who tested the kits have the experience and knowledge to address all the issues? Did the responsible department/s contact the company who manufactured the kits for technical support before announcing that the VTM volume was the reason to not work in the extraction kits or the PCR machines?
New samples can still be used with these RNA extraction kits and PCR kits. | https://myrepublica.nagariknetwork.com/news/can-the-new-pcr-kits-purchased-by-the-army-still-be-used-yes/?categoryId=opinion |
How much DNA/RNA is there in a worm?
Using FR3 protocols, we estimate the following:
Total RNA: 500 L3s yields 2.5-5 ug RNA => 5-10 ng RNA/L3
500 L4s yields 15-20 ug RNA => 30-40 ng RNA/L4
1 million mf yield 22 ug RNA => 2 ng RNA/100 mf
160 immature females yield 65 ug RNA => 400 ng RNA/female
8 adult males yield 14 ug RNA => 1.8 ug RNA/male
DNA: 500 L3s yield ~3 ug DNA => 6 ng DNA/L3
500 L4s yield ~6 ug DNA => 12 ng DNA/L4
5 adult females yield ~5 ug DNA => 1 ug DNA/adult female
How do I handle worms without damaging them?
This depends on your system, but camel hair brushes are the best for manipulating live or preserved worms outside of the host. Trying to get them from the peritoneal cavity? Flushing out the cavity using a plastic transfer pipet is a great way to get large numbers of undamaged worms. For those that are 'stuck', a small Jameson muscle hook works, or you can make your own by bending a tuberculin needle and placing it on the end of a cotton tip applicator (be careful not to slice worms with the bevel).
How do I preserve worms?
This depends on your purpose. For morphology work, live worms should be fixed in 50 degree C ethanol/glycerol fixative, or in cold 3% formalin. If using ethanol/glycerol, place the dish in an airy place to let the ethanol slowly evaporate, then the worms can be stored as they are in straight glycerine. The worms can later be cleared in lactophenol for examination. Whatever the method, store the worms loose in a vial.
For immunohistochemistry place live worms in 70% ethanol or 4% buffered formalin (paraformaldehyde may also work). For in situ hybridization, formalin or paraformaldehyde may be used. Samples may be maintained at room temperature or at 4 degrees C.
For RNA or DNA isolation, worms can be flash frozen (with or without buffer) in liquid nitrogen, then stored at -80 degrees C until use. Storing filarial worms in RNALater is NOT recommended, however to simplify downstream RNA isolation they can be frozen in Trizol and stored at -80. Storage in 100% alcohol may be feasible in the short term, but is not advisable for long term storage because DNA damage can occur. Where possible, DNA isolation should be performed as soon as possible on ethanol-preserved samples to avoid problems with PCR amplification. In cases where samples have been stored long term in ethanol, it may be possible to rescue them for PCR using a commercially available kit.
How do I preserve mosquitoes? Submitted by Sandra Laney, Smith College
To preserve filarial infected mosquitoes for DNA extraction, dry the mosquitoes using any available method. For example, place them in open tubes in direct sunlight for ~1-2 hours, place them in open tubes in a heat block at 90C for 15 - 30 minutes, or place them in an oven at 90C for 15-30 min. To keep dried mosquitoes for long term in humid climates, place them in a container and add drierite (example, put closed mosquito tubes in a box, put the box in a ziplock bag and add drierite to the bag and seal it). They can be stored at room temperature or at 4C or -20C.
To preserve filarial infected mosquitoes for RNA extraction use RNA later (Ambion, Inc.). The mosquitoes should be submerged in RNAlater as quickly as possible after knockdown. They will tend to float, so centrifuge, shake or manually push them down into the solution so that they all come in contact with the solution. When you are going to extract RNA from the mosquitoes it is critical to remove the RNAlater (the high salt concentration inhibits the efficient extraction of RNA). You can do this by removing the mosquitoes with forceps, blotting them on kimwipes and putting them in a new tube for RNA extraction, or pipette off all of the RNAlater, rinse with H2O and remove it before adding Trizol for RNA extraction. | http://www.filariasiscenter.org/protocols/helpful-tips-for-filariasis-researchers |
The time of summer festivals was here again. With Flevo festival and all its descendants gone this year it was empty in the Dutch ‘Christian’ summer festival season. Luckily we can depend on yet another year of Freakstock in Germany not far over the border. For us the fifth time we attend. Yet again this year brings a great line-up with music, art, seminars and more. Freakstock always feels like coming home.
It has been a little over two months since Borknagar toured Europe together with four other bands, including In Vain. They did not have a concert in the Netherlands unfortunately. They did however perform just across the border in Oberhausen, Germany. When I arrived, it took me a while to get used to club Helvete. It looks like a large English pub that is transformed into a metal café rather than the typical music venues one sees in the Netherlands. The stage is rather small, but that comes with the advantage that you can get so close to the band members that you can almost touch them.
My phone display shows it’s 20 minutes to nine, perfectly acceptable given that I had to have a 2-hour ride (I don’t live that close to the border). Unfortunately though, Shade Empire, the first act of the evening, starts playing their last song just when I enter the venue. Since one song is obviously way too little for me to make a valuable comment about them, I won’t. way too little for me to make a valuable comment about them, I won’t. It’s about 8 o’ clock when Ereb Altor starts playing. You can’t help but notice that this Swedish band brought their face paint, which makes their appearance somewhat similar to the Dutch band Slechtvalk. Continue reading »
After years without receiving concerts with large scale bands of the underground level, the city of Campos dos Goytacazes/Rio de Janeiro receive’s on a rainy Saturday 3 of the most popular Christian Brazilian.
Since the beginning of the day, it is raining over our heads, and because this a delay happen, but nothing exaggerated, nearly 35 minutes.
The first band to play are a native band, called Metal Alpha, that plays a mix of the modern genres of Metal and put the crowd to jump with their songs especially with their best song called “Revolução”.
The next band to play are Saint Spirit, that unfortunately are impaired with the rain and technical problems which resulted in cutting some songs from their set list (including a new track called “Nameless”). But even with these mishaps the band make a good and energic concert with a lot of stage divings and mosh pits. Courtesy from the fanatic crowd present. Highlights were “Prostitute”, “Release The Kraken”, “Territory (Sepultura Cover)” and “The Unknow God”. Continue reading »
31 July 2013 and it was time again for this year’s edition of Freakstock a festival organized by the German JesusFreaks and held in Borgentreich Germany. Freakstock started in 1995 and was held in Wiesbaden but since 2009 in some old barracks in Borgentreich. The festival presents many varieties of music, workshops and seminars. But the festival has more activities to offer including a soccer competition, tattoo artist, different shops, art exhibition and more. When we arrived I saw a sign with the text ‘Welcome Home’ and I have to agree Freakstock always feels like home. | http://mauce.nl/site/category/concertreviews/page/2/ |
Almost every business or startup created starts at the ground level. It begins with an idea or concept that needs to be created and shared with the world. There are a multitude of strategies for doing this, but a similarity between almost all companies is that they normally utilize a database of contacts in one form or another for the purpose of reaching out to other companies or those interested/potentially interested in their product or service. But how do new and emerging companies get a hold of a list of contacts?
This is a question that many people managing companies or startups ask themselves, as the answer to this question isn’t very straight forward unless you have some background knowledge on the nature of acquiring large amounts of useful data. In this article, we will be exploring why your business should acquire and maintain a contact database, why this is important, and how to go about acquiring these contacts in four different ways depending on what makes the most sense to your business. Lets explore this topic together.
The Importance of Maintaining A Database of Contacts
The most basic answer to this question is that it is always good to maintain a list of individuals with whom you had made contact with in the past, along with any contact information you come across online that you may want to utilize in the future. Any good business thrives on keeping information organized in a way that can easily be found by anyone who needs to access it, so creating a database of information such as this will only benefit a business going forward. Some of the primary benefits are that a contact database can
- Keep all your contacts organized (Preferably in one place)
- Allows you to more easily maintain customer relationships with those you have previously had contact with.
- Increased productivity overall due to the time saved searching for information
- Allow separate teams to more easily unify data
Any good business can find numerous benefits by simply organizing their contact in a way that anyone within the company can easily access and utilize it for whatever use case where it is needed.
Good Data Versus Bad Data
Having as much contact data can only benefit your company. But it’s important to distinct data that is helpful for your company between data that is unnecessary to keep as it only will add to the clutter of your database and increase your overall storage usage (which can add to maintenance costs if you have too much bloat). What I define as ‘Good data’ in this context is
- Contact information of those you have worked with in the past
- Contact information of those who you haven’t made contact with, but either work within an industry or business that would potentially be interested in your offerings
These are contacts that you already either have a history with, or can potentially be converted into customers/clients based upon their background. As for what bad data means in this context, I essentially define it as
- Contact Information that you would never need to utilize (non connected personal emails, role emails not specific to an individual, things of this nature)
- Contact information of individuals or businesses that are outside of your target audience
- Incorrect or out of data contact information
Discovering Your Audience
Every business should have some type of idea who ideally would need/get use out of what you offer. This is a critical aspect of having a well performing business and resources should be utilized for zoning in on knowing which people have the highest potential of being converted to customers. This is especially true when acquiring a contact list for your business.
There are a multitude of ways to figure out which businesses or individuals are your ideal audience. Usually this is pretty straight forward as any business offering some type of product or service would be aware of who uses what they offer, but you can always hone in further to get this precise information. So manners of this include
- Breaking down all your current/past customers and gathering metrics on who they are, what they do, and any other relevant information you can gather.
- Utilizing a market research service such as Market Joy or Durkan Group that can assist your efforts in figuring out the right audience
- Utilizing analytic services to see who is searching/visiting for your business site. Defining the ideal audience for your business can be done in a multitude of ways. As each industry and business can vary wildly based upon what they do, there is not one method that works best for everyone. This CoSchedule blog post is a great reference for those really looking to dig more into performing this.
Approaches for Acquiring Data
Once you know what your ideal audience is and what you are looking for with a contact list, now is the time to plan out how you are going to go about acquiring this data. I have broken down this process into 4 separate methods, as each approach is dependent on what your needs are specifically. I’ll specify which of these methods are the most quick or straight forward approach as I explore each area further, but the primary dependent on which tactic you choose to follow comes down to how much money you want to spend and how quickly you wish to acquire this data. Sometimes time or money isn’t an issue, but for many businesses and startups, having excess funds to pursue this task isn’t always a reality. The bright side is that each of these methods will essentially yield the same results as long as you take the proper steps beforehand. You can also utilize all these methods in conjunction with one another in order to rapidly build up your database with the information you need. Let's explore these methods.
1: Purchase A Contact List
This is the most straightforward and quickest method of acquiring the initial data you need. The biggest downside of this method is that depending on your budget, this potentially might not make sense. The brightside however is that we at Companywell specialize in exactly this type of service, offering quick and accurate people and company data at extremely low costs per request compared to our competition. The biggest advantage of simply just utilizing a service to buy a list is that you know exactly what you are getting from the start and do not need to spend the time attempting to gather these contacts yourself.
The types of services you will primarily want to utilize are lead generation services or platforms. As I stated above, we specialize primarily as a platform for easily allowing users to just create an account, search through our database for the exact type of contacts they need using all the filters we have set in order to hone in on your audience, and simply just export it. The entire process can be completed in about 5 to 10 minutes if you already know exactly what you need, which can really save time in the long run if you want to hit the ground running with an email campaign or want to get your CRM filled up from the start. Sometimes however, you may want to go even further with your focus on a contact list, so sometimes a lead generation service might be the better option if you want to really ensure that you are not mistakenly targeting the wrong audience.
2: Manually Research/Assemble a Contact List
This method is usually the cheapest option for new companies or startups looking to acquire contact information. Unless you are utilizing the time of employees, you normally will not need to pay outside of dedicating manual time towards this pursuit.
Going about performing manual research on building a contact list can vary depending on the industry and your needs, but generally there are plenty of resources available online that can assist you with finding the names, emails, and phone numbers of those you are looking to hold onto for the future. Some of the best sources I have utilized in the past are
These are free resources with plenty of information to pick through and accumulate in order to build up a contact list by hand. One of the biggest advantages to gathering data this way is that you can be 100% confident in the data you are saving, as most likely you will be able to grab additional information such as past roles, current roles, businesses they work for or have worked for in the past, and any additional information on their backgrounds. Many professionals tend to link contact information somewhere on public facing profiles for people to reach out to them. Even if they do not list their contact information, there are manners in which you can acquire this information that I will cover later down this section.
Whenever I have taken the time to manually gather contact information, I followed a basic workflow to streamline the amount of time that I am taking towards acquiring such information. This is a rough outline of what I usually will do.
- Identify the types of contacts I need.
- Perform a force search through Google to find profiles on Linkedin of those who match what I need.
- As an example, say if I were looking for contact information of Chief Marketing Officers in Philadelphia, I would search “Chief Marketing Officer” “Philadelphia” “Linkedin” , This will yield profile pages on Linkedin that contain these 2 phrases
- Begin going through Linkedin profiles and organizing this information in an excel/Google sheet file.
- Go through related profiles on Linkedin as I find them.
- Repeat from step 2 except replacing “Linkedin” with “Facebook”
This is generally what I will normally do in the past and it works very well as long as you are verifying that each of these profiles fit into what you are looking for. Going back to Linkedin, if you have a premium membership on the site you can also utilize Linkedin Sales Navigator If you want to make this process much more straightforward, as this feature allows you precisely search through Linkedin profiles while setting extremely specific search criteria to narrow your results. There are also additional services you can use in conjunction with sales navigator such as Dux Soup or GetProspect to further expedite your efficiency in gathering this information, but we want to stress that these tools go against Linkedin’s terms of service so use them at your own discretion since it can result in your profile getting banned. If you are paying for Linkedin and one of these crawler tools for the platform, this can make manually looking up contacts a more costly endeavor, but for some businesses they prefer to do the leg work themselves in this manner. In general, utilizing a lead generation platform is cheaper in the long run if you are going with a service such as Companywell so it comes down to what you prefer to do.
3: Utilize a Lead Generation Service
Services such as Leadroot will work closely with you in order to get the exact type of contacts you need at the cost of overall time, as many of these services are manually gathering this information themselves. The factor of time in this method is only referenced as being slower due to it not being something that can be completed as fast as lead platform. For some businesses it might make more sense to do this as opposed to another approach but this route will not require you to put in any work outside of communicating with these service providers, unlike the manual research method I discussed before.
The primary benefit of this approach is that overall, lead generation services are extremely thorough about what data they provide back to you when the job is done. They can include a lot of additional information about the business of the contacts, provide additional services to work with you to expedite your outreach efforts if you are choosing to use this information for a campaign, and clean up this data in a way that can allow for easy importing into whatever database you currently have set up.
4: Develop an Inbound Lead Generation Strategy
An inbound lead generation strategy is by far the least time efficient process for most new businesses and startups gathering inbound leads, but can benefit you in other ways outside of assisting you with building up a contact list. An inbound lead generation strategy essentially consists of creating some type of content that will drive users to your website that can be indexed by google so it will show up in search results or through sharing this content through social media to drive traffic. I personally consider this to be more of a search engine optimization strategy, but you can easily adapt this to potentially gather a large amount of contacts as well as boost the exposure of your business.
The type of content you can create can be anything that can exist on either your site, a blogging site paired with your main site, or through other social media platforms. The primary thing this content must incite in those who view it is some type of call to action to visit your business website and either provide their email address or fill out some information to submit to you. This can be quite a difficult task as it is difficult to win the attention of those viewing your content and take the time to find out more, but overtime due to the nature of creating content this can compound into consistently acquiring new contacts to add to your database with no additional effort past creating more content. This is normally referred to as evergreen content, where once something exists has some type of use or appeal that will always be there it will continue to generate traffic and results.
One of my favorite aspects of gathering contacts through this manner is that there is no question about if these individuals are interested in your product or services, since they would not have given you their information if they weren’t. Sometimes these users might not be a good fit, but generally they will be. The amount of time and effort to takes to yield results from this strategy might seem daunting at first, but in the long term I feel that this is a strategy that almost every business should utilize to build up an initial database.
To Wrap Up
Obtaining a contact list when you are a small business or startup can seem incredibly daunting at first. There is a lot of preparation and information you need to get in order before setting out on acquiring this data, but know that almost every other business has started out in the same place where they had a vision and no one to share it with. The effort needed to put into this is well worth it long term and thankfully, you have many avenues for acquiring such information depending on how much time and money you have to spare. With all the different manners of acquiring this information, there is no excuse to take the initiative and get started on building up that database. | https://blog.companywell.co/building-a-contact-list-from-scratch-4-different-approaches/ |
5 Signs Your School Nutrition P.O.S. Hardware Is Too Old
When is the last time you took a good, long, objective look at how your School Nutrition P.O.S. hardware — which you depend on for hundreds of transactions each day — is holding up?
If you’re like many of your Child Nutrition program counterparts, it probably has been a while, which means your hardware could be costing you valuable time and money.
Let’s find out. Below are 5 signs that your School Lunch point-of-sale hardware is too old and should be replaced in order to speed up your lunch line and ultimately save your program money.
1. The hardware is physically worn out.
Are your buttons or keys loose? Do they stick? Are the symbols worn off the face? Does that number 6 key no longer work? If so, this may be forcing your team to waste time by working more slowly to make sure the information they enter is registering correctly with each keystroke, or else it could be compromising your data with information that’s been entered inaccurately.
HSS Recommendation
Look into available touchscreen hardware. Not only is it faster and more accurate because the team member entering information is looking right at the screen as the information goes in, but also touchscreens last longer than traditional buttons and keys because the screen won’t wear out as easily as would a physical button. This will save your program money in the long run.
2. You’re stuck in one place.
Older hardware forces you to operate from a single computer in a single spot. Not only are there wires tethering you to that spot, getting in the way, and just waiting to be accidentally unplugged, but even without the wires, your hardware probably is too big to physically take anywhere (it’s not like you’re going to lug that monitor from room to room).
It’s easy to view this as not that big of a deal, but it’s very likely costing you time through the inconvenience of having to go to that one computer every time you want to enter information.
Maybe you’re used to it, but it’s important to realize that you could be getting more done if your work could physically come with you to the different rooms and sites where you have to go.
HSS Recommendation
This problem actually only seems like a hardware problem. In fact, the solution here is to look at your software.
In order to be able to use smaller hardware, like tablets, that let you stay mobile while working, you need to find software that lets you operate from the cloud. Even if you don’t feel you need to be “on the go” while working, the cloud-based software will work across all your hardware simultaneously. This not only is more convenient and saves time, it also keeps your numbers accurate while multiple team members are entering data in real time.
3. Bulky computers take up valuable space.
Step back and take a look at how much room your Point of Sale (POS) hardware actually takes up. Try to imagine how much space there would be if you removed the hardware from the picture. How much more efficient would your serving line be if the cashier’s view of approaching students wasn’t obstructed by a bulk relic from the past?
Every bit of space is important. The amount of available room dictates how your line flows through the serving station and the register. If you waste space on oversized hardware, you’re missing opportunities. Maybe you could even use that space to sell cookies or other small items to increase revenue.
HSS Recommendation
This problem is easy to solve because hardware continues to get smaller and more compact basically each year. Depending on how old your current hardware is, you might be surprised at how much room a new solution will add around your register.
Here again, a touchscreen comes in handy because it would eliminate the keyboard and free up more space.
Having even a little extra room can help speed up the flow of your line, saving time and creating happier students (and staff). Plus, as mentioned above, it also allows you to sell more food and increase revenue.
4. For once, “long ago” was NOT a simpler time.
People like to remember the past as “a simpler time.” But, when it comes to hardware, the opposite is true. Older hardware — even from just a decade ago — was more complicated because they didn’t have the technology we have now. That’s why a lot of older equipment adds steps to the process of accepting payment from each student, which is costly because each additional keystroke steals time from your team. As we pointed out in an earlier School Nutrition article, wasting even two seconds per student, in a school of, say, 800 students, could cost you nearly half an hour each day.
Does this sound like a challenge your School Nutrition program faces?
HSS Recommendation
As long as you purchase the new hardware from a good company, you’ll easily find a big improvement in how “user friendly” it is. That’s because some hardware providers will focus on either performance or UX (shorthand for “user experience”). So the hardware either will be capable of doing what you want it to do, or it will feel intuitive and easy to use… but not both. If, however, you find a company with designers and engineers who understand what it takes to run a successful School Nutrition program, you’ll be able to have your cake and eat it too (excuse the food-service pun) because they know that both are equally crucial. Performance obviously is important; but ease of use isn’t just a luxury. It’s critical for your team to feel comfortable using the hardware in order to work more effectively. Remember, the faster your team can work, the faster your line can move.
5. Your hardware is slow.
Staying on the point of speed, another sign that your School Lunch hardware is too old is if it is slow in processing. You’ll hear a lot about how different software solutions are faster — it’s true, some are faster than others — but what people don’t always realize is that the physical hardware plays a huge role in how fast the software moves and the screens load. Your software can only move as fast as the hardware’s internal processor.
Think of hardware like a TV, and the software like the shows you watch. If a show is broadcast in a high resolution, but you’re watching it on an old, boxy TV from the 80’s with rabbit-ear antennas, then the broadcast resolution is irrelevant because you’re not going to get that quality resolution on your outdated TV set.
HSS Recommendation
When assessing new hardware, be sure to ask what the processor speed is like. Better yet, be sure to have your technology director ask what the processor speed is like. She’ll be able to tell you how it compares to other speeds — whether it’s faster or slower — which is important because without the context of comparison, a product’s processor speed is just a random number.
Take another look.
Now that we’ve run through the telltale signs of outdated hardware, where does your system land? Is it definitely outdated? Is it “not bad” or maybe “good enough for now”? You may think your hardware is fine, but making an investment in order to improve your team’s efficiency could save you more money than you think.
Plus, the great thing about hardware is that it generally is “budget friendly” because implementation can be done in stages as your budget allows.
But even if it were expensive, it still likely would be worth it.
To look at just one way you could save: newer hardware is much more energy efficient than older solutions because it uses less electricity. Older-style CRT monitors, for example, use about 80 watts of electricity, whereas new LCD monitors use about 20 watts. If you use the monitor for, say, 4 hours each day at the U.S. average of 12 cents per kilowatt, you’d spend $3.00 per year on the new LCD monitor compared to $14.00 per year with the older monitor. That means you’re spending four times as much by not updating your hardware. And, while that’s a savings of $11.00 per monitor, ask yourself: how many monitors is your school running?
Harris School Solutions’ own School Nutrition P.O.S. hardware can help your program overcome all of these challenges. | https://harrisschoolsolutions.com/blogposts/5-signs-your-school-nutrition-p-o-s-hardware-is-too-old/ |
What is a Death March Project and Why Do They Happen?
Happiness lies in being privileged to work hard for long hours in doing whatever you think is worth doing. One man may find happiness in supporting a wife and children. And another may find it in robbing banks. Still another may labor mightily for years in pursuing pure research with no discernible results.
Note the individual and subjective nature of each case. No two are alike and there is no reason to expect them to be. Each man or woman must find for himself or herself that occupation in which hard work and long hours make him or her happy. Contrariwise, if you are looking for shorter hours and longer vacations and early retirement, you are in the wrong job. Perhaps you need to take up bank robbing. Or geeking in a sideshow. Or even politics.
—Jubal Harshaw, in To Sail Beyond the Sunset
by Robert Heinlein (Ace Books, reprint edition, 1996)
What is a death march project? What makes IT organizations create such things? Why would anyone in his right mind agree to participate in such a project?
To many grizzled IT veterans, these are rhetorical questions. Everything, in their experience, is a death march project. Why do they happen? Because corporations are insane and, as consultant Richard Sargent commented to me, "Corporate insanity is doing the same thing again and again, and each time expecting different results." And why do we participate in such projects? Because, as consultant Dave Kleist observed in an e-mail note, "Death march projects are rarely billed as such, and it takes a lot of work when being hired from the outside to discover if your hiring company is prone to creating death march projects."
If you think the answers to these questions are obvious, feel free to jump to the next chapter. I'm sometimes think they are obvious, since most people never ask me what I mean by "death march." But if you're one of the people who has no idea what I'm talking about, or wonder if this is a book about military campaigns from World War II, it may be worth the effort to pause for a moment and contemplate what this is all about.
Death March Defined
Quite simply, a death march project is one whose "project parameters" exceed the norm by at least 50 percent. In most projects, this means one or more of the following constraints have been imposed upon the project:
-
The schedule has been compressed to less than half the amount estimated by a rational estimating process; thus, the project that would normally be expected to take 12 calendar months is now required to deliver its results in six months or less. Because of the competitive pressures of business competition in today's global marketplace, along with the concept of "Internet time" from the dot-com era of the computer industry, this is probably the most common form of death march project.
-
The staff has been reduced to less than half the number that would normally be assigned to a project of this size and scope; thus, instead of being given a project team of 10 people, the project manager has been told that only five people are available. This may have come about as a result of someone's naive belief that a new programming language or application development environment will magically double the team's productivity—despite the fact that the team was given no training or practice with the new technology and probably wasn't even consulted about the decision to use the technology in the first place. Unfortunately, it's happening far more often, as this edition of Death March is being written in the spring of 2003, because of the ongoing economic recession and the associated cutbacks in IT budgets.
-
The budget and associated resources have been cut in half. Again, this is often the result of downsizing and other cost-cutting measures, but it can also result from competitive bidding on a fixed-price contract, where the project manager in a consulting firm is informed by the marketing department that, "the good news is that we won the contract; the bad news is that we had to cut your budget in half in order to beat out the competitors." This kind of constraint often has an immediate impact on the number of project team personnel that can be hired, but the consequences are sometimes a little more subtle—e.g., it may lead to a decision to hire relatively inexpensive, inexperienced junior software developers, rather than higher-cost veterans. And it can lead to a pervasive atmosphere of penny-pinching that makes it impossible for the project manager to order pizza for the project team when they spend the entire weekend in the office working overtime.
-
The functionality, features, performance requirements, or other technical aspects of the project are twice what they would be under normal circumstances. Thus, the project team may have been told that it needs to squeeze twice as many features into a fixed amount of RAM or disk space as its competitor; or it may have been told its system has to handle twice the volume of transactions that any comparable system has ever accomplished. The performance constraints may or may not lead to a death march project; after all, we can always take advantage of cheaper, faster hardware, and we can always search for a more clever algorithm or design approach to accomplish the improved performance. But doubling the functionality—i.e., the available features—usually means doubling the amount of work that has to be carried out; that does lead to a death march project.
The immediate consequence of these constraints, in most organizations, is to ask the project team to work twice as hard and/or twice as many hours per week as would be expected in a "normal" project. Thus, if the normal work-week is 40 hours, then a death march project team is often found working 14-hour days, six days a week. Naturally, the tension and pressure escalate in such environments, so that the death march team operates as if it is on a steady diet of Jolt cola.
Another way to characterize such projects is as follows:
A death march project is one for which an unbiased, objective risk assessment (which includes an assessment of technical risks, personnel risks, legal risks, political risks, etc.) determines that the likelihood of failure is Š 50 percent.
Of course, even a project without the schedule, staff, budget, or functionality constraints described above could have a high risk of failure—e.g., because of hostile politics between the IT department and the user community. But most commonly, the reason for the high risk assessment is a combination of the constraints described above. | https://www.informit.com/articles/article.aspx?p=169512&seqNum=4 |
Diarrhea for a Week – Causes and How Long Should It Last
Most of the time diarrhea is acute. This means that it arises suddenly, is often intense and resolves quickly within a few days. Sometimes no treatment is necessary for it to ease and eventually stop. However, when diarrhea continues for longer than a few days and persists up to a week or more then it becomes a cause for concern for most people. Diarrhea for a week or longer usually indicates a more serious cause and there is also a higher risk of complications like dehydration setting in.
How long should diarrhea last?
There is no definitive period for how long diarrhea should last. It is only a symptom of some underlying disorder, usually involving the bowels. Depending on the duration, it may be classified as acute, subacute or chronic.
- Acute diarrhea lasts for up to 2 weeks.
- Subacute diarrhea persists for 2 to 4 weeks.
- Chronic diarrhea continues for more than 4 weeks.
While most of us expect sudden and severe diarrhea to ease and possibly fully resolve within a few days, it can persist for a week or more and still be considered acute. The duration that diarrhea lasts depends on a host of factors such as the cause of the diarrhea, the individual’s immune defenses and overall health status, dietary and lifestyle factors, medication and other treatments, the normal intestinal flora (normal “good” bacteria in the bowels) and rehydration.
Read more on uncontrollable diarrhea.
For example, a person with AIDS may experience chronic diarrhea due to their weakened immune system while a person who takes antibiotics for diarrhea may then experience secondary antibiotic-associated diarrhea. Even rehydrating incorrectly with beverages that contain too much or too little electrolytes may further aggravate existing diarrhea. Therefore the time for which diarrhea lasts may be variable.
Diarrhea that Lasts for a Week
Diarrhea that lasts for a few days can lead to serious complications even in such a short period of time. Death is even a possibility. However, most of the time diarrhea that lasts for a few days is not as serious. When the diarrhea persists, then the chances of complications increases. The main complication that is often the leading cause of death from diarrhea is dehydration.
In this case, the loss of water and electrolytes causes a host of disruptions throughout the body. Most significantly it can affect the heart, kidney and respiratory activity. Dehydration can be prevented and treated with adequate rehydration, be it oral or intravenous. However, sometimes rehydration therapy is not sufficient to prevent and treat dehydration thereby leading to serious complications and even death.
The longer diarrhea lasts the more likely that dehydration will be severe. Furthermore there are also disturbances to the normal intestinal flora which may not be able to recover spontaneously if the diarrhea has been too prolonged. This can then cause a continuation of diarrhea even though the initial cause has been treated, eradicated and resolved. Once again this may lead to dehydration.
Causes of Diarrhea for a Week
The causes of diarrhea that lasts for a week or more is largely the same as diarrhea that lasts for even a few days. Even with common causes of diarrhea, some people may only experience a problem for a few days while for others the diarrhea may persist for longer periods of time. Diarrhea should always be investigated by a medical professional to identify the exact cause so that the correct treatment can be prescribed.
Read more on causes of sudden diarrhea.
Infections
Infections are one of the most common causes of diarrhea. It affects every person at some point in their life, often occurring yearly particularly in children. In most of these cases the diarrhea is due to a viral infection. For example rotaviruses that causes outbreaks of viral gastroenteritis (“stomach flu”). Bacteria are another common infectious cause of diarrheal illnesses as is seen with food poisoning. Protozoa, like Giardia lamblia, may also cause diarrhea but viruses and bacteria are more common causes of infectious diarrhea.
Autoimmune
In autoimmune diseases, the immune system attacks specific tissues and causes inflammation. With inflammatory bowel disease (IBD), there is inflammation of the bowels and sometimes of other parts of digestive tract. The exact cause of IBD is unclear. Celiac disease is a condition where the bowel becomes inflamed as a result of contact with gluten. It arises due to a combination of genetic and environmental factors. Diarrhea is one of the main symptoms in these autoimmune conditions of the bowels.
Foods and Drinks
Foods can also cause diarrhea for various reasons. Sometimes foods and beverages are contaminated with infectious agents like viruses or bacteria that can cause diarrhea, or contain toxins of these agents that may then lead to diarrhea. In other conditions, certain foods trigger bowel inflammation which can lead to diarrhea as in celiac disease.
Food intolerances are where the body cannot digest certain nutrients and these residual nutrients lead to bowel irritation resulting in symptoms like diarrhea. Lactose intolerance is an example. In malabsorption syndromes, the body is not able to absorb certain nutrients which can lead to bowel symptoms like diarrhea. Fructose malabsorption is one such case.
Medication and Surgery
Several drugs may cause diarrhea as a side effect. Laxatives can lead to diarrhea if used in excess and for prolonged periods for time. Antibiotics may cause a condition known as antibiotic-associated diarrhea. In these instances the diarrhea should resolve onc the causative drug is discontinued.
Diarrhea may also occur in certain situations following surgery. This is seen with abdominal surgery. In particular in may occur when there is a removal of a section of the digestive tract, as may be the case for cancer. It can also occur with gallbladder removal especially when fatty foods are consumed.
Functional
Functional bowel conditions occur for no clearly identifiable reason. These are conditions where there is an abnormality in the bowel physiology but it is not due to any disease. Irritable bowel syndrome (IBS) is one such type of functional bowel disoder. In IBS with diarrhea, the change in bowel habit causes frequent bowel movements and even diarrhea along with the characteristic abdominal pain and cramps. | https://www.healthhype.com/diarrhea-for-a-week-causes-and-how-long-should-it-last.html |
Boehringer Ingelheim Bacterial Research Scientist Job Vacancy 2022
Performs customary scientific/lab duties with minimal supervision. Participates/assists in the design and execution of non-routine experiments. Performs all work in conformance with applicable regulations. Performs all work in a safe manner. The scope of responsibility is primarily within the scientific/laboratory environment and immediate discipline.
Job Title: US_Scientist II, Bacterial Research-225882
Eligibility Criteria:
- Bachelor’s Degree from an accredited institution with a minimum of two (2) years of experience in a related scientific discipline; or a Master’s Degree from an accredited institution in a related scientific discipline with no experience.
- Hands-on experiences in the science of bacteriology and the control of bacterial infections including structural biology, cultivation of and analysis of microbes is essential.
- Hands-on experience with microbiology techniques.
- Ability to function in multi-disciplinary teams is required.
- Apply knowledge of basic theory and scientific principles
- Able to draft portions of technical reports
- Ability to learn new technology and concepts and apply them appropriately with minimal supervision
- Concise and accurate reporting of technical data and information
- The appropriate level of understanding of applicable regulations
- Requires highly motivated, dependable, and well-organized individual who is able to operate with minimal supervision.
Eligibility Requirements:
- Must be legally authorized to work in the United States without restriction.
- Must be willing to take a drug test and post-offer physical (if required).
- Must be 18 years of age or older.
Description:
As an employee of Boehringer Ingelheim, you will actively contribute to the discovery, development and delivery of our products to our patients and customers. Our global presence provides an opportunity for all employees to collaborate internationally, offering visibility and the opportunity to directly contribute to the company’s success. We realize that our strength and competitive advantage lie with our people. We support our employees in a number of ways to foster a healthy working environment, meaningful work, diversity and inclusion, mobility, networking, and work-life balance. Our competitive compensation and benefits programs reflect Boehringer Ingelheim’s high regard for our employees.
Duties & Responsibilities:
- Initiates and completes customary procedures in an independent and efficient manner, with minimal supervision; Independently operates and is responsible for scientific/lab equipment; Troubleshoots effectively.
- Demonstrates technical ability to assist in the design and execution of non-routine experiments with supervision.
- Applies basic scientific principles with minimal guidance; Performs literature searches and extracts relevant information from published protocols.
- Demonstrates the ability to correctly analyze data/results and interpret the outcome of experiments and to propose appropriate follow-up.
Communicates own work effectively orally and in writing; Contributes to writing protocols, procedures, and technical reports; provide input for scientific reports.
- Reports and treats data with a high level of integrity and ethics.
- Complies with applicable regulations, performing all work in a safe manner; Maintains proper records in accordance with SOPs and policies.
- Ensure laboratory facility and equipment are well maintained.
- Stay current with policies and SOPs regarding safe operations in the laboratory. Ensure for being clear and up-to-date with respect to the safety and handling of infectious agents.
- Ensure compliance with all relevant corporate, national, and local authority regulations. | https://www.biotecnika.com/boehringer-ingelheim-bacterial-research-scientist-job-vacancy-2022/ |
Macron said he would hold an international conference in Paris in October to coordinate aid and mobilize international support for the reform agenda
On September 1, 2020, French President Emmanuel Macron visited a crisis laden Lebanon battling an unprecedented financial meltdown, economic collapse and the aftermath of last month’s massive explosion in Beirut’s port that ripped through the capital. Macron laid out a road map for the economic reconstruction as well as the restoration of political stability in Lebanon.
Macron’s road map for Lebanon comprises of four major elements. First, the road map calls upon the Lebanese Government for preparing and disseminating a pandemic control plan in the light of the COVID-19 crisis, that includes support for the most vulnerable and marginalised people. Second, the Lebanese Government should work for the reconstruction of Beirut in the aftermath of the Beirut explosions that occurred on August 4. The French plan calls on the Lebanese Cabinet to facilitate the execution and delivery of humanitarian aid provided by the international community in an urgent, transparent and effective executive plan. For the governance of international aid, specific governance should be put in place for the delivery of international humanitarian aid – both that is given in response to the Beirut explosion, as well as aid in support of structural reforms – to ensure its delivery to the people in a transparent and traceable manner under the auspices of the United Nations. For the rehabilitation of the Beirut port, the French road map calls for launching tenders for proposals immediately in accordance with impartial procedures.
Third, the road map calls for the implementation of economic reforms in Lebanon. These entail an immediate resumption of negotiations with the International Monetary Fund and a rapid approval of the preventive measures requested by the International Monetary Fund. This includes legislation related to capital control and the auditing of Banque du Liban’s accounts. The reforms also call for fixing the irregularities in the electricity sector and regulating the transfer of capital.
For ensuring proper governance along with judicial and financial regulations, the road map calls for organising a second meeting of the local follow-up commission for the CEDRE conference (an international conference which pledged to release 11 billion U.S. dollars in loans and donations for Lebanon on condition that the country makes serious reforms), actual launch of a full audit of Banque du Liban accounts, executing judicial appointments (judges of Supreme Judicial Council), financial appointments (members of the Capital Markets Authority), and sectoral appointments (the regulatory bodies of the electricity, telecommunications and civil aviation sectors), Parliament’s approval of a proposed law on the independence of the judiciary and launching a study on public administration by an independent international institution (the World Bank or the Organisation for Economic Co-operation and Development) with a specialised office. Such measures need to be carried out within a month.
For combating corruption, the French plans calls for appointing the members of the National Anti-Corruption Commission and giving it the necessary capabilities to carry out the tasks entrusted to it and actually launching its work, launching the process of acceding to the treaty on fighting corruption worldwide issued by the Organisation for Economic Co-operation and Development in 1997 and the immediate application of customs reforms within one month.
The road map also stipulates a three-month period for establishing control gates and strengthening supervision at Beirut and Tripoli ports, Beirut airport and at other border checkpoints, and reduce transactions according to the deadlines followed by the administration. The French road map also calls for sound public finance management and, in this respect, calls for preparing and voting on a corrective finance bill that explicitly clarifies the status of accounts for the year 2020 within one month and approving a harmonised budget for the year 2021 (before the end of 2020).
Fourth, the road map calls to organise new legislative elections within a maximum period of one year and the reformation of electoral law to fully include civil society and allowing the Parliament to be more representative of the aspirations of the civil society.
“Going back to business as usual would be madness,” Macron told reporters at the end of his visit. “It is now up to the political forces in Lebanon to agree on the implementation of this road map.” Macron said he would hold an international conference in Paris in October to coordinate aid and mobilize international support for the reform agenda. He also said he would return to Lebanon in December to follow up on progress. “If by the end of October, it appears that the things that your leaders have committed to have not been achieved, this will lead to a reaction,” Macron said, adding that he would tell the international community that it cannot provide aid to Lebanon under these conditions. “This isn’t a blank check,” he said.
There is a broad perception that the failure of the French initiative would lead to sanctions against leading politicians, including anti-Hezbollah figures typically aligned with the West, giving President Macron significant leverage to enforce change. | https://www.newdelhitimes.com/france-proposes-road-map-for-lebanons-reconstruction/ |
Libya No-Fly Zone: The Problems With Interventionism
One day after a coalition led by the U.S., France and the UK launched a sweeping air assault on targets in Libya – including a volley of cruise missiles fired at defenses in and around the densely packed capital – Amr Moussa, the Secretary General of the Arab League said in a statement that, "what is happening in Libya differs from the aim of imposing a no-fly zone."
“What we want,” he continued, “is the protection of civilians and not the shelling of more civilians." According to the Washington Post, he pledged to “call a new league meeting to reconsider Arab approval of the Western military intervention
He may not be the only one questioning the wisdom of the policy. The United States finds itself suddenly thrust into war, with little public debate. The administration and military leaders insist that the U.S. will take a supporting role, and promise that the mission will be brief and focused on modest goals. But when Joint Chiefs of Staff Chairman Michael Mullen made the rounds on the Sunday political shows this week, he made it clear that, in the words of the Huffington Post's Amanda Terkel, “right now, there just aren't many answers: how long the U.S. will stay involved, how long a no-fly zone will stay in place, and how much capacity the U.S. military has to sustain another conflict.”
Back home, the attacks have divided a public wary of yet another entanglement. Unlike Iraq, which was sold to the public as a necessary act of collective security, the Libya no-fly zone is a multilateral humanitarian intervention intended to prevent the slaughter of those trying to depose the Gaddafi regime. Yet there is also good reason to be skeptical about where it will lead.
Conceptually, humanitarian intervention is a rather beautiful thing. State sovereignty had been seen as absolute for 350 years, but then the universal human rights regime emerged and the idea took hold that a state's responsibility to defend its people trumped its right to territorial sovereignty. When a state massacres its people rather than protecting them, the human family, working through broadly legitimate international institutions, would intervene, militarily if need be, to spare the vulnerable. This has become known as the "responsibility to protect," and you can read all about it here (PDF).
Those who believe in this principle will find it difficult to say they "oppose" the no-fly zone established over Libya. The country offers a rather clear-cut example of a despotic government poised to massacre thousands of its own, and here is the international community responding forcefully to spare their lives. Perhaps it will be a textbook example of the "responsibility to protect" in action.
I imagine that most of those who oppose the action would like nothing more than to have their skepticism proven to be unfounded. At the same time, there is every reason to be deeply cynical about the prospects of success. Because while the principles underlying humanitarian intervention are well developed, the institutions charged with implementing them are certainly not.
For those of us who have long argued to develop those institutions more fully, this no-fly zone leads to distinctly mixed feelings. Under the circumstances, doing nothing would not only be profoundly irresponsible, it would also violate our core belief in the imperative of respecting essential human rights. Yet, having studied our history, we also know that the potential for unintended consequences -- for a bad situation to be turned into something worse -- are real, and shouldn't be dismissed out of hand, or due to wishful thinking.
Books have been written about the challenges of humanitarian intervention, but here's a very quick-and-dirty summary of three of the most daunting.
1) Mission creep
Last week, I wrote that limited interventions -- with promises that the goals will be limited and, in the case of no-fly zones and naval embargoes, that no ground troops will be deployed -- are like a "gateway drug" leading all too easily to expanded conflict. This is an institutional reality; the Security Council states are now invested in this conflict, but there is no reason to be confident
Gaddafi's regime will fall quickly. As the saying goes, in for a penny, in for a pound. Having entered the conflict, the temptation to escalate our involvement -- to add "regime change" and "state-building" to the agenda -- is going to be difficult for the Security Council to resist.
You can go through the history of multilateral interventions -- from Korea through Somalia (but not in Rwanda so soon after getting humiliated in Mogadishu) -- and what you'll find in virtually every case is not a single Security Council resolution authorizing the use of force, but a series of them authorizing ever-greater military involvement in the conflict. This reality cannot be ignored.
As Amanda Terkel noted, when Mullen "was asked whether, at some point, forces will be ordered to take out Libyan leader Moammar Gaddafi, he said, 'I wouldn't speculate what the mission might be in the future.'"
2) Insufficient resources
If the mission creeps -- or, if it drags on -- then history also suggests we're likely to end up with the worst of both worlds: a broad mandate coupled with insufficient resources to do the job right.
This is almost always the case in the UN system, which has no independent source of funding and must rely on the dues and pledges of its member states to undertake any action. It's the same whether you want to talk about humanitarian intervention or relief from famine, drought or natural disaster. At the beginning, with shocking footage of rebel forces being massacred, children starving or tsunamis hitting the beach flashing across the world's TV screens, it's easy to commit all kinds of resources to help. But these actions are costly, and those resources have to be authorized by domestic legislatures. And it's not just the money at stake -- national governments also have to deal with all manner of domestic and international political calculations.
In the case of military interventions, under-funding can lead to disastrous results, with the most obvious example being the horrific failure of UNAMIR leading up to and during the Rwanda genocide. Afterward, Canadian
Lieutenant-General Romeo Dallaire, commander of the UN mission, famously claimed that with 5,000 more troops he could have halted the killing.
3) Politicization
Finally, the nature of the UN decision-making process itself is a huge challenge to these kinds of interventions being viewed as legitimate. Central to the "responsibility to protect" concept is that it is based on an imperative to uphold certain basic human rights, and not on international political (or economic) considerations. So the entire venture rests on the decision of when and where to intervene being made in some relatively apolitical fashion. In the real world, of course, given that the power of the Security Council, and thus the entire United Nations system, rests in the hands of the five permanent, veto-wielding members -- the most powerful states, each with its own internal and external politics to manage -- this is impossible to achieve.
That an intervention be widely perceived as legitimate is not just some abstract academic issue. Combatants are far less likely to engage in the political process that must always accompany such actions if they view them as prettied-up acts of neo-colonialism or cover for other, more powerful states' agendas. It is an almost surreal inconsistency that the West is intervening against a despot in Libya even as its closest allies in the region intervene to support another in neighboring Bahrain.
So, again, many who oppose -- or are at least skeptical of humanitarian intervention -- support it in theory, and have long argued for reforms that might address these issues. That they're frequently portrayed as "isolationists" is a bitter irony.
Security Council reform -- gradually phasing out the veto power enjoyed by "permanent five," or providing a mechanism to override a veto -- has been a long-time goal of human rights activists. But, as you might imagine, the P-5 have fought it tooth-and-nail.
There have also long been calls for a dedicated and independent UN intervention force, which wouldn't rest on the ad-hoc pledges of UN member states. Similarly, reformers have long argued that an independent funding mechanism for UN actions -- both military and humanitarian -- must be created through some variation of the "Lula Fund" or "Tobin tax."
A final but important note: anyone who holds an idealized view of "clean" and "precise" modern warfare is simply deluded. Despite being widely portrayed by the media as a UN air patrol designed to deny the regime's forces the capacity to wipe out their enemies from above, Western powers are dropping tons of munitions on Libya. Make no mistake: innocent people will die. There will be "collateral damage" -- it's the nature of the game, and that can't be ignored. Whether one ultimately supports or opposes this "no-fly zone," those who find themselves conflicted about this sudden war should, at a minimum, oppose its escalation into a broader conflict.
Hopefully, it will work exactly as promised -- lives will be spared, opposition forces will be emboldened and the Libyan regime will crumble under the pressure of international isolation. Hopefully, the skeptics among us will be proven wrong. But it's important to understand that the history of these adventures, no matter how well intentioned, doesn't provide much cause for optimism. And one doesn't have to be an "isolationist" to see that. | https://www.alternet.org/2011/03/libya_no-fly_zone_the_problems_with_interventionism/ |
Evaluation of advanced laparoscopic skills tasks for validity evidence.
Since fundamentals of laparoscopic surgery (FLS) represents a minimum proficiency standard for laparoscopic surgery, more advanced proficiency standards are required to address the needs of current surgical training. We wanted to evaluate the acceptance and discriminative ability of a novel set of skills building on the FLS model that could represent a more advanced proficiency standard-advanced laparoscopic surgery (ALS). Qualitative and quantitative analyses were employed. Quantitative analysis involved comparison of expert (PGY 5+), intermediate (PGY 3-4) and novice (PGY 1-2) surgeons on FLS and ALS tasks. Composite scores included time and errors. Standard FLS errors were added to task time to create the composite score. Qualitative analysis involved thematic review of open-ended questions provided to experts participating in the study. Out of 48 participants, there were 15 (31 %) attendings, 3 (6 %) fellows and 30 (63 %) residents. By specialty, 54 % were general/MIS/bariatric/colorectal (GMBC) and 46 % were other (urology and gynecology). There was no difference between experience level and performance on FLS and ALS tasks for the entire cohort. However, looking at the GMBC subgroup, experts performed better than novices (p = 0.012) and intermediates performed better than novices (p = 0.057) on ALS tasks. There was no difference for the same group in FLS performance. Also, GMBC subgroup performed significantly better on FLS (p = 0.0035) and ALS (p = 0.0027) than the other subgroup. Thematic analysis revealed that the majority of experts felt that ALS was more realistic, challenging and clinically relevant for specific situations compared to FLS. For GMBC surgeons, we were able to show evidence of validity for a series of advanced laparoscopic tasks and their relationship to surgeon skill level. This study may represent the first step in the development of an advanced laparoscopic skills curriculum. Given the high degree of specialization in surgery, different advanced skills curricula will need to be developed for each specialty.
| |
The sticking coefficient of H2, α, on the surface of polycrystalline Nb containing 0.1 at% of O was examined by means of permeation experiments in a wide temperature range between 510 and 1260 K. The temperature dependence of surface coverage of O was measured by Auger electron spectroscopy. Arrhenius plots of α showed a clear bend at around 900 K. The activation energy was estimated to be 5 kJ mol-1 in the low temperature region and 44 kJ mol-1 in the high temperature region. On the other hand, the surface coverage of O, θOX, was almost independent of the temperature below 900 K, but it decreased with increasing temperature above 900 K. Therefore, it was concluded that the activation energy of 5 kJ mol -1, obtained in the lower temperature region at constant θOX, corresponded to the potential barrier against H 2 dissociation, EC, while the value of 44 kJ mol -1, obtained in the higher temperature region, was an apparent activation energy determined by the combination of EC and the heat of segregation of O controlling the temperature dependence of θ OX. The obtained value of EC was comparable to that on a clean Nb surface, although the dissociation of H2 was radically impeded by the presence of O. These observations indicate that the surface of the polycrystalline Nb covered by O was not homogeneous: a majority of surface sites was poisoned by O, while a small portion kept the intrinsic activity for H2 dissociation. | https://kyushu-u.pure.elsevier.com/en/publications/kinetics-of-dissociative-absorption-of-hydrogen-through-nb-surfac |
I have a soft spot for orchids. The first house plant I ever bought was a small Paphiopedilum Henryanum. It has a gorgeous dappled “slipper” flower and it’s still growing happily to this day. Though many people complain about trouble with growing orchids, I’ve always been fortunate that none of mine have died.
There’s a common misperception that orchids are difficult to grow, particularly when it comes to bringing them to flower, but the truth is that they’re actually quite adaptable and trouble-free as long as some basic conditions are met. They require nutrition, for example, when they’re growing (when new leaves and flower stalks start to appear) but will do very well with just watering during “dormancy”.
Orchids’ Nutrient Needs
Orchids are like any other plant in their need for 17 essential nutrients (listed below). Generally speaking, it’s safer to err on the side of too little than too much feeding. Orchids can happily survive for months without any extra nutrition and feed should only really be applied during growth and flowering, which occurs through the warmer months. When watering with feed added, it’s also important that you “flush” with fresh water on at least a monthly basis.
In the wild, orchids are mostly epiphytes or lithophytes, which means that they cling to tree branches or rocks for their support and get their nutrients from air and water. Rotten leaves, animal droppings and decomposing bark can also provide small amounts of nutrients.
Overfeeding can be detrimental to orchids. Whilst in extreme cases death can occur, the more likely result will be flimsy leaves, scant amounts of flowers and little to no growth. If you feel that you may be overfeeding, just flush the roots thoroughly with water and resume with a lighter regimen. In more extreme cases repotting will also help.
Macronutrients:
- Nitrogen
- Phosphorus
- Potassium
- Magnesium
- Sulfur
- Calcium
- Boron
- Chlorine
- Manganese
- Iron
- Nickel
Micronutrients:
- Copper
- Zinc
- Molybdenum
- Hydrogen
- Carbon
- Oxygen
How to Pick the Best orchid Food
When you’re evaluating feed, you don’t need to worry too much about finding an ideal nutrient balance. Epiphytes will get hydrogen, carbon and oxygen from the air, for example, whilst many trace elements are found in normal tap water.
It is important, however, that you do go for orchid-specific feed. Many commercial plant feeds only contain nitrogen, phosphorous and potassium (NPK), which on their own aren’t ideal for maintaining plant health. If you do want to go for generic fertilizer then make sure that it has micronutrients added.
Our 5 “Best Orchid Food” Picks
All of the products listed here are readily available and inexpensive. I’ve linked through to respective Amazon pages where appropriate.
Baby Bio Orchid Food
Baby Bio is one of the better-known plant food brands and their standard NPK (5.3-2.2-0.85) orchid fertilizer is a good-quality, inexpensive go-to. If you just looking for an easy feeding solution then my advice is to pick up a few of these little pink bottles. The label advises to feed with every watering (which should be spaced out over at least weekly intervals) at a rate of 1 – 2 drops per half-litre/pint during the growing season.
If you really want a hands-off approach, you can also opt for Baby Bio Orchid, which will keep your plants well-fed over a period of a month. All you need to do is water.
Orchid Myst Spray
Though orchids have a reputation for being delicate and difficult-to-manage, they constitute one of the hardiest of all plant families. When you keep in mind that these beautifully-flowered perennials have variants on all major continents barring Antarctica, you get a good sense of their adaptability. One such adaptation that many overlook is the strong ability of orchids to absorb nutrients through their leaves as well as their roots.
The great thing about Orchid Mist Spray is that it is ready to use and contains trace micro-nutrients, along with growth enhancers and organic insect repellent. Many have reported success with this product where others have failed and one bottle will last for months, so there’s no need to worry about running out. Spraying should be done on both the foliage and the surface of the bark potting mix, where it will trickle down to the roots. Spraying should be done alongside normal regular watering.
It’s available in two sizes – 100ml and 300ml.
Miracle-Gro Orchid Spikes
This product is more widely used in the US but is also available online to UK buyers. The idea behind orchid “spikes” is a fantastic one and I expect more gardeners will be taking advantage of them in the future. All you need to do is split a single spike in half and pop both ends into your potting mix. They’ll sit there happily, feeding your orchids, for two months. As with all the mixes on this list, fertilizer should only be used during active growth.
The nutrient profile is a balanced ratio (10-10-10) of NPK, so if you’re after a feed with micronutrients added then you’re better off with something like Orchid Mist Spray. If, on the other hand, you only want to worry about watering (and not fertilizing) for the next two months, then spikes are the way to go! There are lots of glowing reviews from people whose orchids have sent up new flower stalks after the fertilizer spikes have been applied. There’s also a 6-month money back guarantee!
Orchid Focus (UK Only)
There are three different types of Orchid Focus feed and all contain the 14 essential nutrients that plants need. Ideally all three should be used together, with each being appropriate to a specific growing phase – growth and blooming. The feed is recommended by The Eric Young Orchid Foundation, one of the leading orchid nurseries in the UK. It comes in liquid form which needs to be diluted when watering.
Orchid Focus Bloom – Orchid Focus Bloom should be used in the leafy growth phase, when no flowering is occurring. It is high in nitrogen, the main nutrient required for maintaining and replenishing healthy foliage.
Orchid Focus Grow – As it is high in phosphorous and potassium, Orchid Focus Grow is meant to be used from the onset of flowering to encourage lush growth.
Orchid Focus Ultra – High in growth-promoting acids, Orchid Focus Ultra is meant to be used in conjunction with either of the previous two products.
Grow More Premium Orchid Feed (USA Only)
Grow More’s premium feed is urea-free (which can be damaging to orchid roots) and heavy on both nitrogen and potassium (NPK: 20-10-20), so will provide good nutrition through both the leafy growth and flowering phase. The 1.25 jar lasts for a long time and a measuring spoon is included.
Whilst this product is completely sufficient on its own, you can buy different types of feed in the Grow More range that are suited to specific stages of growth.
What are your thoughts?
So there you have it – our pick of the best orchid feeds on the market. What are your thoughts? Drop me an email with your own experiences.
But before you go, here’s one last tidbit of horticultural trivia: orchid flowers have what are called bilateral symmetry, which means that each half of the bloom is an exact mirror reflection. Happy growing! | https://www.urbanturnip.org/best-orchid-food/ |
Using the statements, can you work out how many of each type of rabbit there are in these pens?
This magic square has operations written in it, to make it into a maze. Start wherever you like, go through every cell and go out a total of 15!
This task follows on from Build it Up and takes the ideas into three dimensions!
Find the sum and difference between a pair of two-digit numbers. Now find the sum and difference between the sum and difference! What happens?
Zumf makes spectacles for the residents of the planet Zargon, who have either 3 eyes or 4 eyes. How many lenses will Zumf need to make all the different orders for 9 families?
Arrange eight of the numbers between 1 and 9 in the Polo Square below so that each side adds to the same total.
This challenge focuses on finding the sum and difference of pairs of two-digit numbers.
Winifred Wytsh bought a box each of jelly babies, milk jelly bears, yellow jelly bees and jelly belly beans. In how many different ways could she make a jolly jelly feast with 32 legs?
Cherri, Saxon, Mel and Paul are friends. They are all different ages. Can you find out the age of each friend using the information?
You have 5 darts and your target score is 44. How many different ways could you score 44?
Can you arrange 5 different digits (from 0 - 9) in the cross in the way described?
This task, written for the National Young Mathematicians' Award 2016, invites you to explore the different combinations of scores that you might get on these dart boards.
What do the digits in the number fifteen add up to? How many other numbers have digits with the same total but no zeros?
There are 44 people coming to a dinner party. There are 15 square tables that seat 4 people. Find a way to seat the 44 people using all 15 tables, with no empty places.
You have two egg timers. One takes 4 minutes exactly to empty and the other takes 7 minutes. What times in whole minutes can you measure and how?
In the multiplication calculation, some of the digits have been replaced by letters and others by asterisks. Can you reconstruct the original multiplication?
There are 78 prisoners in a square cell block of twelve cells. The clever prison warder arranged them so there were 25 along each wall of the prison block. How did he do it?
How could you put eight beanbags in the hoops so that there are four in the blue hoop, five in the red and six in the yellow? Can you find all the ways of doing this?
This problem is based on the story of the Pied Piper of Hamelin. Investigate the different numbers of people and rats there could have been if you know how many legs there are altogether!
There are 4 jugs which hold 9 litres, 7 litres, 4 litres and 2 litres. Find a way to pour 9 litres of drink from one jug to another until you are left with exactly 3 litres in three of the jugs.
Can you put plus signs in so this is true? 1 2 3 4 5 6 7 8 9 = 99 How many ways can you do it?
Tim's class collected data about all their pets. Can you put the animal names under each column in the block graph using the information?
Can you substitute numbers for the letters in these sums?
What is the largest 'ribbon square' you can make? And the smallest? How many different squares can you make altogether?
This multiplication uses each of the digits 0 - 9 once and once only. Using the information given, can you replace the stars in the calculation with figures?
There is a clock-face where the numbers have become all mixed up. Can you find out where all the numbers have got to from these ten statements?
Can you find the chosen number from the grid using the clues?
There are seven pots of plants in a greenhouse. They have lost their labels. Perhaps you can help re-label them.
Can you put the numbers 1 to 8 into the circles so that the four calculations are correct?
Find the product of the numbers on the routes from A to B. Which route has the smallest product? Which the largest?
Add the sum of the squares of four numbers between 10 and 20 to the sum of the squares of three numbers less than 6 to make the square of another, larger, number.
My briefcase has a three-number combination lock, but I have forgotten the combination. I remember that there's a 3, a 5 and an 8. How many possible combinations are there to try?
Nina must cook some pasta for 15 minutes but she only has a 7-minute sand-timer and an 11-minute sand-timer. How can she use these timers to measure exactly 15 minutes?
Chandra, Jane, Terry and Harry ordered their lunches from the sandwich shop. Use the information below to find out who ordered each sandwich.
In how many ways could Mrs Beeswax put ten coins into her three puddings so that each pudding ended up with at least two coins?
These are the faces of Will, Lil, Bill, Phil and Jill. Use the clues to work out which name goes with each face.
In the planet system of Octa the planets are arranged in the shape of an octahedron. How many different routes could be taken to get from Planet A to Planet Zargon?
A merchant brings four bars of gold to a jeweller. How can the jeweller use the scales just twice to identify the lighter, fake bar?
Place eight queens on an chessboard (an 8 by 8 grid) so that none can capture any of the others.
Place the numbers 1 to 8 in the circles so that no consecutive numbers are joined by a line.
Alice and Brian are snails who live on a wall and can only travel along the cracks. Alice wants to go to see Brian. How far is the shortest route along the cracks? Is there more than one way to go?
Make a pair of cubes that can be moved to show all the days of the month from the 1st to the 31st.
Investigate the different ways you could split up these rooms so that you have double the number.
Suppose we allow ourselves to use three numbers less than 10 and multiply them together. How many different products can you find? How do you know you've got them all?
Lolla bought a balloon at the circus. She gave the clown six coins to pay for it. What could Lolla have paid for the balloon?
The Vikings communicated in writing by making simple scratches on wood or stones called runes. Can you work out how their code works using the table of the alphabet?
You cannot choose a selection of ice cream flavours that includes totally what someone has already chosen. Have a go and find all the different ways in which seven children can have ice cream.
If we had 16 light bars which digital numbers could we make? How will you know you've found them all?
El Crico the cricket has to cross a square patio to get home. He can jump the length of one tile, two tiles and three tiles. Can you find a path that would get El Crico home in three jumps?
Use the numbers and symbols to make this number sentence correct. How many different ways can you find? | https://nrich.maths.org/public/topic.php?code=-99&cl=1&cldcmpid=55 |
The Tibetan community of Switzerland and Liechtenstein organised a peace march on Friday from the UN Office of High Commissioner for Human Rights to the building of the UN Human Rights Council in protest against China over the deteriorating human rights situation in Tibet.
The members of the community appealed to the High Commissioner to hold China accountable for the continued violations of human rights in Tibet, and to raise the issue of gross human rights violations in Tibet during the UNHRC sessions.
In a letter addressed to the High Commissioner, members of the community expressed serious concerns over the intensification of assimilatory policy in Tibet by China, compulsory military Summer camp for Tibetan children, the deteriorating situation in Dza Wonpo, Karze Tibetan area incorporated into China’s Sichuan Province, continued disappearance of 11th Panchen Lama Gedhun Choekyi Nyima, and persistent violations of the right to freedom of religion in Tibet.
In view of the deteriorating situation in Tibet, the community appealed to the High Commissioner to call upon China to:
- Respect the rights of Tibetan children to receive education in their own mother tongue Tibetan language.
- Immediately cease military camps forcing Tibetan children to undergo military-style training during school holidays.
- Release 11th Panchen Lama Gedhun Choekyi Nyima, his entire family, Chadrel Rinpoche, and all Tibetan political prisoners.
- Stop meddling in the religious practices of the Tibetan people, and
- Give unfettered access to Tibet, allowing an independent fact-finding mission to assess the situation on the ground in Tibet.
https://www.tibetswiss.ch/home
Follow EU Today on Social media: | https://eutoday.net/news/security-defence/2021/tibetans-protest-chinas-continued-human-rights-violations-at-48th-unhrc-sessions |
OBJECTIVE: To determine medication use and adherence among community-dwelling patients with heart failure (HF). PATIENTS AND METHODS: Residents of Olmsted County, Minnesota, with HF were recruited from October 10, 2007, through February 25, 2009. Pharmacy records were obtained for the 6 months after enrollment. Medication adherence was measured by the proportion of days covered (PDC). A PDC of less than 80% was classified as poor adherence. Factors associated with medication adherence were investigated. RESULTS: Among the 209 study patients with HF, 123 (59%) were male, and the mean ± SD age was 73.7±13.5 years. The median (interquartile range) number of unique medications filled during the 6-month study period was 11 (8-17). Patients with a documented medication allergy were excluded from eligibility for medication use within that medication class. Most patients received conventional HF therapy: 70% (147/209) were treated with β-blockers and 75% (149/200) with angiotensin-converting enzyme inhibitors or angiotensin II receptor blockers. Most patients (62%; 127/205) also took statins. After exclusion of patients with missing dosage information, the proportion of those with poor adherence was 19% (27/140), 19% (28/144), and 13% (16/121) for β-blockers, angiotensin-converting enzyme inhibitors or angiotensin II receptor blockers, and statins, respectively. Self-reported data indicated that those with poor adherence experienced more cost-related medication issues. For example, those who adhered poorly to statin therapy more frequently reported stopping a prescription because of cost than those with good adherence (46% vs 6%; P<.001), skipping doses to save money (23% vs 3%; P=.03), and not filling a new prescription because of cost (46% vs 6%; P<.001). CONCLUSION: Community-dwelling patients with HF take a large number of medications. Medication adherence was suboptimal in many patients, often because of cost. | https://mayoclinic.pure.elsevier.com/en/publications/medication-adherence-among-community-dwelling-patients-with-heart |
Short-term exposure to sulfur dioxide can cause harm to the human respiratory system and make breathing difficult. People with asthma, particularly children, are sensitive to these effects of SO2.
Sulfur dioxide and other sulfur oxides also contribute to acid rain. They can react with other compounds in the atmosphere to form fine particles that reduce visibility, and stain and damage stone and other materials.
Elemental Instruments, a division of Ohio Lumex, offers a range of sulfur dioxide analyzers that provide online, real-time measurements to control and monitor emissions and processes.
Sulfur dioxide (SO2) is a toxic gas released naturally by volcanic activity. It is also produced as a by-product of copper extraction and the burning of fossil fuels contaminated with sulfur compounds, primarily for sulfuric acid manufacturers.
The largest source of SO2 in the atmosphere is the burning of fossil fuels by power plants and other industrial facilities. Smaller sources of SO2 emissions include industrial processes such as extracting metal from ore, natural sources such as volcanoes, locomotives, ships, and other vehicles and heavy equipment that burn fuel with high sulfur content. | https://www.ohiolumex.com/measurements/so2-analyzers |
The movable shelving device comprises rows of shelves in a warehouse or small-parts cupboard which can be rotated in a circular manner and concentrically with respect to one another and about the common axis, and is intended to be integrated with robot and computer work units. The device operates as a self-supporting, independent system unit in a highly space-saving manner as a result of the storage capacity of the rows of shelves, is served by the robot units and controlled and monitored by the computer work units and is steered freely towards target destinations by its own drives and sensor systems and, when equipped only with computers, becomes a computer work unit with free access to the rows of shelves. This is achieved in that there are provided on the top sides of the rows of shelves (1) rotary connections (3) having attached work units which are arranged vertically offset with respect to one another and have a central passage opening, so that the nearest inner rows of shelves (1) can be freely swung in independently of one another and relative to one another and to the common central axis by the attached rotary connections (3) having work units, consisting of work plates (26, 26'), robots (25), computers having programming terminals and radio-signal receiving units (7), telescope tables (31), an outer covering (19, 19') having robot-sensor rings (7') and cover hoods (9). <IMAGE> | |
For this edition of collectors tip we prepared ten exceptional abstract artworks which you can add to your collection as you read this article.
If you are a fan of abstract art and urban art, we bring a selection of works by urban artists who are redefining this traditional art genre.
Jonathan Levin Projects will present two concurring exhibitions - a solo show by Jeremy Fish and a group show featuring fourteen international artists.
Augustine Kofie art exhibition explores the muscle memory of painting on the streets while investigating the ideas of space at the Galerie Openspace
After relocating to Jersey City, the latest Jonathan LeVine group show will now open as their inaugural exhibition in the city.
The artworks of renowned urban contemporary artists this autumn on display at Openspace Gallery in Paris, in an exhibition entitled Please Don’t Touch.
The David Bloch Gallery will highlight themes of letter and calligraphy, abstraction and imaginary and kinetic and optic art in a new group exhibition.
In celebration of Rammellzee, exhibition at Magda Danysz Gallery will display a series of music tracks and visual works inspired by the late artist. | https://www.widewalls.ch/artists/augustine-kofie/articles |
Please join the Indy Rainbow Chamber of Commerce and Salesforce for our virtual speaker series. This month's guests will feature speakers from Trans Solutions Center. Their mission is to bring appropriate empowerment to TGNC disenfranchised communities through a multi-tiered approach accessing resources to Comprehensive Health and Social Services.
Trans Solutions offers practical solutions through a distribution of services via online and networked resources that focus directly to address the social determinants of health, empower TGNC marginalized populations through education, equity and mentorship, and to promote safety and foster leadership opportunities.
The organization provides training in the following areas: Professional, Health & Wellness, and Community (Housing).
Visit https://www.transsolutionscenter.org/ for more info.
Copyright 2017 - 2022 - Indy Rainbow Chamber. This site is maintained by Indy Rainbow Chamber.
For questions or support on site functionality please email our Communications Director. | https://www.indyrainbowchamber.org/event-4427752 |
Q:
Practice amount and habits for time constrained individuals
I am not a professional musician.
Three years ago I began to play electric guitar.
I have tried to practice systematically and seriously for approximately
1 hour to 1.5 hours a day which is divided up into three areas of focus:
1) Sightreading
2) Technical excercises
3) Improvisation and playing for fun
I mention this as an example situation. I am happy with the progress made given the time and effort I was able to invest.
It is very hard to muster the energy at the end of a busy day and practice seriously, but at the end of each session there is a sense of achievement and satisfaction.
Given this, I was recently presented with an opinion that a 'measly' 1 - 1.5 hours a day would be nowhere near enough to achieve serious results.
I know this topic might be very broad and undefined but I am hoping to sample
the range of opinions on this topic from anyone willing to share their view and experience.
So to be clear, this is not about the kind of practice time a motivated youngster or aspiring professional musician ( without other conflicting commitments ) could or should afford to dedicate.
Rather I am after the experiences of non-professional BUT serious musicians who aspire nevertheless to improve their performance and musicianship on their chosen instrument and in their chosen genre.
My own view is that when faced with time constraints one should hunker down, take a longer term view BUT make sure that
i) practice happens regularly for whatever length of time one is able to afford..(...given one's priorities..children, family, careers...e.t.c. )
ii) practice time is structured in a way to make the best use of the time available
In summary when time is scarce, one might be able to make up for it by dedicated, focused and efficient practice habits
A:
These are all good points, and the question of appropriateness of practice here is valid.
I'm going to share some views here that hopefully yourself and other amateur (that is, non-professional, not lacking in skill) musicians can adopt in their attitude and approach to their instrument.
Be Patient. Any musician worth their weight in salt will agree that part of the zen of practicing is to rejoice in the small goals achieved over time. No one will be a virtuoso in one practice session, and for some, not being a virtuoso may not be a desired goal, which is perfectly acceptable. So if you miss a practice session because your children had a soccer game or shopping or etc etc, don't beat yourself up - there is always time to make your way back to the instrument.
Be Realistic. Think about what you're trying to achieve, and tailor your practice sessions to meet that goal. A very good pianist friend of mine told me he used to practice 7+ hours a day when he was young, but now, he hardly has to warm up because his needs have changed and the technique is developed. Similarly, if you're goal in playing guitar is to have fun and play with your friends, there is no reason to pressure yourself to practice several hours a day. Think about it like exercising: people training for the Olympics have a different exercise schedule than people who go for a walk or ride a bike just to maintain their well-being. Olympics workouts aren't best for everyone, and neither is practicing a million hours a day.
Break Up Your Session. If you're crunched for time and have a lot of commitments, it doesn't make sense to try and block out a solid hour-and-a-half. Instead, a suggestion would be to practicing your most cognitively demanding exercises in the morning while you are fresh and can focus, that way you can save the fun stuff for the afternoon / evening. Having three, fifteen-minute sessions throughout the day will be more beneficial than a single long session.
Make Clear Goals. Have clearly defined weaknesses you want to address every day and have a clear plan of how to address them. By knowing what you want out of your practice session and how to achieve it before hand you'll save time and won't need to spend as much time practicing.
Have Fun. Above all else, remember why you're playing. In some ways I actually have more respect and admiration for amateur musicians because they carve out time during their day to pursue something that they love, instead of career musicians looking for gigs. You're time for music is so limited, it would be a shame to spend all of it worrying about technical exercises and whether or not you're getting "good enough."
As an aside to the person who mentioned your "measly" practice time wouldn't be enough - it all depends on what you're trying to do. If you're trying to get into a top orchestra, then I'd be inclined to agree. If your goal is trying to learn a song so you can play for friends, family, or yourself, then they are being foolish. I have friends that practice for 5+ hours a day and complained about it - I practiced an hour a day and achieved the same skill level. There is no substitute for effective time management, clearly defined goals, and a passionate, enthusiastic disposition for hard work.
Hope that helps.
A:
Given this, I was recently presented with an opinion that a 'measly' 1 - 1.5 hours a day would be nowhere near enough to achieve serious results.
The guy that told you this is either misguided or thinks you want to become some form of a professional.
For someone in your scenario, that's essentially just playing for fun (but still taking it seriously) I'd say that length of practice time was more than enough, and if you push yourself to much longer than that you run the risk of becoming bored and frustrated with the instrument, which is never a good thing. To give you an idea, I play piano and violin, and reached a reasonable standard (grade 8 on both) practising both for, generally speaking, no longer than half an hour a day. Many friends in the same ballpark as me have practised for similar times, so I don't think you need to worry unless you're really planning to reach a very high level very quickly.
A:
I would add a fourth area of focus which I think will help you greatly in the other three: theory. And the best part about studying music theory is, you don't have to do it in the same timeframe as the rest of your practice; what I mean by this is, a limitation to practice is not just the time, but also that you have to be with your instrument (or have your instrument with you) - if you go away for the weekend and you can't bring your guitar with you, or if you spend too much time at work, etc then really sometimes you can't practice because even if you have an hour to spare, you don't have your guitar with you. BUT you can study theory because that only means reading (and understanding obviously), and you can do that anywhere: on the way to/from work (unless you're driving), during lunchtime, late at night, etc.
I'm also very constrained with my time to practice (I play bass and Stick), and really what I often do when I can't play is review the theory I know, learn some more, and figure out how I can apply this knowledge into my playing; if you're already familiar with your instrument, you can visualize for example how to play a major scale in different keys, how many ways can you play a major/minor/7th/whatever chord in different positions, open strings/barred chords etc etc. Then you have something to look forward to when you can actually spend some time on the instrument.
| |
More than just Healthcare
We live in unprecedented times. As the population continues to soar, people are becoming more socially and geographically mobile with urbanisation and our cities growing rapidly in a way never seen before throughout history. Human ingenuity and technological developments are driving profound change and it is happening at breakneck pace. The world is also becoming more competitive with more people studying harder and longer than ever before, just to join a more competitive job market which demands ever greater contributions and productivity, such that the days of the safe 9-5 job for life can seem like something from a bygone era.
We also live in the modern digital age of the internet and social media, which means that we are better connected than ever before and constantly “on”. It is also an age where we are increasingly able to get credit and easily borrow money for anything we desire, so nothing is beyond our budget and reach. For most people, most of the time, the frenetic pace of the modern world, the opportunities and challenges it presents and the pleasures we are able to take from it, make these exciting and interesting times to live in.
Modern life is however also becoming more hectic, complex and demanding, with time in increasingly shorter supply. For some, and perhaps all of us to an extent at some point, the rate of change, the constant stress and pressure, from work and / or maybe in our personal lives, can weigh heavily and sometimes it can all start to feel like too much. Furthermore, instead of feeling more connected, the constant interaction with screens instead of people can leave us feeling isolated and alone. Add to this the number of people feeling trapped by or struggling with debt, or those who are not eating healthily and taking regular exercise, those pushing too hard and burning out, or the many struggling to balance family life and a career, or even those who are just not getting enough proper sleep… and now on top of it all we are also in the midst of a global pandemic.
At times the pressures, expectations and demands placed on people will start to take their toll on anyone’s well-being and mental health, and this can adversely affect their performance at work. It might not be obvious, as the way a person is feeling is something inside themselves, but the impacts can be long-lasting and significant.
The Problem for Employers
The poor well-being of employees, and poor levels of support from their employers, will adversely affect their performance and work and in turn the performance of any business, mainly through:
- High Turnover – as a result of an organisation’s culture and attitude towards its employees.
- Absenteeism – it is estimated that 78% of employees will miss work at some stage due to emotional problems or mental health.
- Lost Productivity – if a person’s mind not fully on the job, perhaps worrying about their issues.
All these hours and days, across an entire workforce, can quickly add up to be a significant and alarming hidden cost for any business.
The Solution for Employers and Employees
A person’s mental well-being is just as important as their physical health and that is why an Employee Assistance Program (EAP) is available through our partnership with Lifeworks, a world-leading EAP, to all persons insured through the HanseMerkur Medical Insurance Plans, globally, 24 hours a day, to help deal with a wide range of issues related to Family, Health, Life, Money and Work.
Our EAP covers:
Member Support for emotional issues such as anxiety, depression, stress management, bereavement, personal relationship issues, addictive behaviours, anger management and sleep hygiene.
Member Support for practical issues such as eldercare, childcare, nutritional & weight management, education, relocation, parenting, mid-life & retirement, career and everyday issues.
Legal Support Services:
- Legal issues include Family, Criminal, Civil, Tenant-Landlord and more
Financial Support Services:
- Help for any financial issues including Debt / Credit Management, Retirement Planning and more
- Referrals to experts based on your needs
- Resources to help with everyday issues
Family Support Services:
- Resources to help with childcare issues like day-care, education support or maternity / parenting
- Resources to help with elderly-care issues
- Consultations with caring professionals
- Resources to help with everyday issues
Manager Consultations:
- Support for managers dealing with performance issues, conflict, leadership, communication or mental health concerns
Manager Referrals:
- Managers can contact support services regarding employee-related workplace concerns and refer employees for counselling
This support is delivered via the following modalities;
- 24/7 Counselling – immediate telephone support from specialised professionals in counselling, social work, psychology or human services.
- Virtual Counselling – immediate access to an EAP counsellor through video & phone for confidential and secure virtual sessions.
- Fact to Face, In Person Counselling – Referrals to the Lifeworks extensive network of master’s level clinical counsellors and affiliates.
- Digital EAP Content via the LifeWorks online Platform or Mobile App – Articles, podcasts, infographics, toolkits in relation to all of the above topics including online resources for managers.
For some there is unfortunately still a stigma attached to getting help, as if it is somehow an unacceptable sign of weakness and for others some misconceptions about the type of issues help is available for. Counselling and talk therapy can in fact be for anyone and can help in ways people might not expect or have imagined. That is why the EAP we offer is so relevant and also innovative in the way it’s delivered. Unlike traditional EAPs which can be reactive and only used by a small few, our approach is to try and engage with everyone.
Firstly, by giving all members a platform or interface where they can log in and simply see articles and information that they may find useful without the bigger and more daunting effort of making a call and explaining what is wrong, which can be big step into the unknown. This way they can find support but also become comfortable with the service and the type of help available. When surveyed more than 81% of members logging in to the service admitted finding articles useful and relevant to them even if they were not specifically looking for help.
This technology also enables us to take a proactive approach to members’ emotional wellbeing and mental health. For example, COVID-19 will have caused some levels anxiety for almost everyone, particularly many employees must return to their workplaces, even if they might not admit it or actively seek help and advice. We have the ability however to reach everyone via email and pop-up messages in their phones through the App inviting them to check out interesting and useful help articles about this very concerning and relevant topic.
Finally, there is always the freephone number that members can call at any time to access free counselling sessions in total confidence if they feel they need more help with the issues they are facing.
Summary
It is hard to accurately measure the impact of mental health and emotional wellbeing on people and the businesses they work for. It is though undoubtedly a real and significant problem, but the good news is it can be managed and reduced for the benefit of both the employees and the employer through the use of a proper Employee Assistance Program. It also says a lot about a company’s culture and its attitude towards its employees’ well-being which helps to attract and retain the best talent as well as taking care of them and their dependants on all levels making it a must-have win-win feature for the smart and forward-thinking businesses of today. | https://www.hansemerkurintl.com/more-than-just-healthcare/ |
FIELD
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
The field relates generally to point of sale (POS) systems, and more particularly to protecting such systems from information theft attacks such as random access memory (RAM) scraping attacks.
A large number of merchants and retail companies (including large, medium and small sized merchants and retailers) are losing millions of dollars (both directly and indirectly) as a result of POS system breaches caused by POS malware (malicious software) which is using the RAM scraping technique to siphon credit card data from compromised devices. RAM scraping involves extracting credit card information from the volatile (RAM) memory of the POS system.
Currently the problem is addressed by various vendors of security and anti-fraud (AF) solutions. Some security vendors are offering standard anti-virus (AV) and anti-malware (AM) solutions. However, most of the merchants and retailers do not install these solutions because of performance (e.g., these solutions are very resource demanding and degrade the ability of POS systems to process high amounts of transactions per day) and reliability (e.g., the most successful AV and AM solutions can detect, on average, less than 40% of current threats) issues.
Most of the AF solutions vendors are offering post breach services in the form of providing lists of compromised credit card numbers (e.g., collected by intelligence agents from the underground forums and stolen credit cards marketplaces) to the issuing financial institutions so they can blacklist and block them.
These solutions are evidently not good enough as the number of credit card breach related incidents are constantly on the rise (e.g., especially in the U.S.).
Embodiments of the invention provide techniques for protecting POS systems from information theft attacks.
For example, in one embodiment, a method comprises selectively implementing, via a component resident and executing on a point of sale system, one or more of a set of proactive operations to counter an information theft attack against the point of sale system. The set of proactive operations comprises: generating false information that appears to be actual information and creating at least one process executable in the point of sale system that comprises the false information; injecting false information that appears to be actual information into at least one process executing in the point of sale system; replacing actual information with false information that appears to be actual information; and blocking at least one process in the point of sale system to prevent actual information from being taken from the point of sale system.
Advantageously, illustrative embodiments provide techniques to protect POS systems from targeted and opportunistic information theft attacks such as RAM scraping attacks (usually carried out by POS malware) in real time. For example, in one illustrative embodiment, a lightweight agent, installed on a POS system (i.e., a component resident and executing on the POS system) that processes credit card data, protects the data using delusion and/or blocking techniques.
These and other features and advantages of the invention will become more readily apparent from the accompanying drawings and the following detailed description.
Illustrative embodiments may be described herein with reference to exemplary cloud infrastructure, data centers, data processing systems, computing systems, data storage systems and associated servers, computers, storage units and devices and other processing devices. It is to be appreciated, however, that embodiments of the invention are not restricted to use with the particular illustrative system and device configurations shown. Moreover, the phrases “cloud infrastructure,” “data center,” “data processing system,” “computing system,” “data storage system,” and the like as used herein are intended to be broadly construed, so as to encompass, for example, private or public cloud computing or storage systems, as well as other types of systems comprising distributed virtual infrastructure. However, a given embodiment may more generally comprise any arrangement of one or more processing devices.
As used herein, a POS system refers to any device which processes payment methods. By way of non-limiting examples only, a POS system can be a sales register machine in a local grocery store or any other retail store, or a personal computer or mobile device (e.g., smart phone) when providing it with a credit card number (or other payment information) to buy some goods or services online.
It is important to note that most POS systems are running common, outdated and unpatched operating systems practically without any protection, anti-malware or network monitoring solutions in place.
Because of the high volume of money transfers in commercial cash registers and stores, most of the fraudsters, i.e., cyber-criminals, are focusing and targeting them. However, POS malware may infect a home or corporate computer as well.
As used herein, a regular expression refers to a sequence of characters that forms a search pattern. One can use a regular expression to find different words, number combinations and patterns. In the case of POS malware, regular expressions can be used to find the different credit card track information, such as credit card number, expiration date, and the name of the card holder, in the RAM memory of the POS system.
As used herein, RAM scraping refers to extracting plain text data from a system's volatile (RAM) memory. When a credit card number or any other sensitive information is entered into a device without first encrypting or tokenizing the information, anyone who dumps the system's RAM memory will be able to find and see this data using simple strings and regular expressions search.
As mentioned above, existing AF, AV and AM techniques for countering information theft attacks such as RAM scraping to defraud POS systems are inadequate, as evidenced by the rise of credit card data breaches that retailers are reporting today.
Embodiments of the invention address the above and other drawbacks associated with such information theft attacks. By adding the ability to block RAM scraping attempts while generating alternative (false) credit card numbers (delusion) in real time (using a lightweight agent installed on the client POS system), illustrative embodiments are able to protect POS systems against this prevalent threat (without degrading the performance or reliability of the working system).
FIG. 1
100
110
1
110
2
110
120
120
illustrates a point of sale system environment with information theft protection according to an embodiment of the invention. As shown, a plurality of POS (systems) devices -, -, . . . , -N are operatively coupled to a merchant/retailer server . The POS devices could be, by way of example only and as mentioned above, sales registers in one or more retail stores, or laptops or smart phones used to make e-commerce purchases. In each case, it is to be appreciated that the POS device is the point in the sales transaction where a purchaser's sensitive information, such as credit card numbers or other payment information, is entered. The server is a backend server that hosts the retailer's purchasing system (and e-commerce application in the case of an online retailer). The POS devices transmit the entered payment information to the server. Thus, the POS devices are considered client devices. However, it is to be understood that embodiments of the invention are not limited to any particular POS device/server arrangement.
110
1
110
2
110
112
1
112
2
112
130
132
130
132
134
130
132
134
130
132
134
130
132
134
110
1
110
2
110
120
In accordance with illustrative embodiments of the invention, each POS device -, -, . . . , -N has resident thereon, in the form of a software component loaded thereon, a POS proactive protection (PPP) agent, respectively denoted as -, -, . . . , -N. The PPP agents are operatively coupled to a PPP agent controller via a PPP agent interface (dashboard) . The controller and dashboard can be a computer system with a graphical user interface that is responsive to selections and entries made by information technology (IT) personnel and/or security operations personnel . In one embodiment, the controller and dashboard provide a centralized controlling and monitoring web-based interface for the personnel . The PPP agent controller controls modes of operation that can be enabled/disabled through the dashboard (by the personnel ) that cause the PPP agent to execute certain programmed steps, as will be further explained below. It is to be understood that each mode can work independently or combined with any of the other modes. The controller and dashboard also allow the personnel to monitor RAM scraping attacks within the network (e.g., client-server arrangement formed by POS devices -, -, . . . , -N and server ).
FIG. 2
FIG. 1
FIG. 2
202
110
1
202
110
1
204
illustrates the point of sale system environment with information theft protection of (using the same reference numerals) but with POS malware loaded on POS device -. In this example, POS malware is assumed to be configured to perform a RAM scraping attack whereby the malware attempts to extract credit card information from the RAM of POS device - and send the credit card information to a remote malware server for further cyber-criminal activities as will be illustrated below in exemplary use cases. While shows such malware loaded only on one POS device, it is to be understood that such malware could be resident on one or more other POS devices.
110
1
112
1
FIG. 2
Embodiments of the invention provide a methodology for generating, injecting and/or replacing credit card data while effectively blocking RAM scraping attempts on compromised POS systems, such as POS device -. These operations are performed by the PPP agents; in this example of , by PPP agent -.
134
130
132
More particularly, the PPP agent is configured to selectively implement one or more operational modes. These operational modes are selected by personnel via controller and dashboard , as explained above. In an illustrative embodiment, the PPP agent supports the following (four) operational modes which can work independently or combined with any of the other modes. It is also to be understood that one or more of the operational modes can be initiated before or after the malware is detected, or even absent detection of the malware.
Generation Mode.
112
1
130
In this operational mode, the PPP agent - generates false information in the form of fake credit card (CC) records (e.g., numbers, expiration dates and additional information as required). The rate of fake records generation is adjustable and can be configured by the controller (e.g., 1 record per minute, 10 records per minute, 100 records per minute, 1000 records per minute, etc.).
During the generation process, the fake CC records are being validated by the same methods the fraudsters are using to validate stolen CC records, e.g., Real BIN (Bank Identifier) numbers, Luhn-10 algorithm, valid expiration date, etc.
110
1
130
The generator in the PPP agent creates a new process on the POS device -. The process name will be provided by the controller or alternatively will be chosen from a predefined pool of real POS device process names (for delusion purposes).
202
110
1
204
The POS malware running on POS device - will extract (siphon) the fake CC records from RAM memory of the POS device and send them to the malware server .
Injection Mode.
112
1
110
1
In this operational mode, the PPP agent - injects the stream of fake CC records (generated as described above) into a running process on the POS device - to make it seem even more reliable (from the fraudster's point of view) for better delusion.
202
110
1
204
Again, here, the POS malware running on the POS device - will siphon the fake CC records from RAM memory and send them to the malware server .
Replacement Mode.
112
1
112
1
202
204
In this operational mode, the PPP agent - detects illegal attempts to steal CC records in real time and replaces the targeted records (while in transit) with fake ones (delusion). More specifically, the PPP agent - detects the RAM scraping attempts, identifies real (actual) credit card numbers while they are being scraped by the POS malware and replaces them in transit, i.e., before the malware can collect, save and transmit them to the malware server .
202
110
1
204
Again, here, the POS malware running on the POS device - will siphon the fake CC records from RAM memory and send them to the malware server .
Blocking Mode.
112
1
202
112
1
In this mode, the PPP agent - blocks the RAM scraping attempts by restricting and eliminating access to specific operating system (OS) functions which are required to complete this task. It is to be appreciated that there are a variety of OS functions which may be abused by the malware for RAM scraping and RAM scraping related functionality, e.g., ReadProcessMemory( ), OpenProcess( ), CreateToolhelp32Snapshot( ), CreateRemoteThread( ), and LookupPrivilegeName( ). One or more of these and additional functions can be blocked or filtered by the PPP agent - using code hooking techniques.
202
110
1
In this mode, the POS malware running on the POS device - will fail to perform RAM scraping attempts, consequently failing to siphon CC records.
Given the operational modes described above, some non-limiting exemplary use cases are now described.
110
1
202
Assume that a POS system (device -) located in a branch of a large retail company in the U.S. is infected with a POS malware (), e.g., “Backoff” Trojan, controlled by a financially motivated attacker (aka “fraudster”).
202
1
2
3
202
204
The malware starts to enumerate all the running processes on the compromised device, then reads the device's volatile (RAM) memory (RAM scraping) and uses several predefined regular expressions to find CC related data (e.g., CC Track , CC Track and CC Track ). Once the malware finds CC data records, it transmits them to its command and control server (server ), controlled and monitored by the fraudster.
Upon receiving stolen CC data records to its server, the fraudster will use the data to clone credit cards (write the stolen details on top of the magnetic stripe of empty plastic cards) or just upload the stolen information to underground forums and CC marketplaces with the intention to sell them to other fraudsters. The fraudster cannot tell whether the CC numbers are actually valid before trying to pay using them, which may trigger the CC issuing company to block the CC number in question; not to mention the high amounts of CC data records involved in typical CC breaches (e.g., thousands to millions of data records), those are the reasons why the fraudsters are selling the stolen records on an “as-is” basis.
Without the PPP agent and corresponding PPP controller/dashboard, the fraudster would receive many real and valid CC data records, causing the targeted company (merchant/retailer) heavy money losses (direct and indirect) due to fraud and significant damage to its reputation and brand.
In case the company is using the PPP techniques (installed on targeted POS systems), the fraudster will not receive any CC data records in case the blocking mode has been enabled or alternatively he will receive many fake CC data records (the fraudster cannot tell they are fake) in case one of the delusion modes have been enabled (generation, injection and replacement).
In any of the above scenarios, the fraudster will not be able to cause any damage to the targeted organization, since he does not have CC data records or all/most of the data records he has are fake.
Moreover, use of the delusion mode will lower the fraudster's reputation in the underground forum (for selling fake CC data records), causing the fraudster to abandon any further attacks against the merchant/retailer company protected by the PPP agent(s) and maybe even to get them out of this illegal business.
FIG. 3
300
110
1
illustrates a point of sale information theft protection methodology performed in a POS system (e.g., device -) according to an embodiment of the invention.
310
130
112
1
202
320
330
340
350
In step , in response to instruction from a PPP controller (e.g., controller ), a PPP agent (agent -) selectively implements one or more operational modes to counter a malware (e.g., malware ) attack. The modes are executed via steps , , and .
320
In step , the PPP agent generates false information that appears to be actual information and creates at least one process executable in the POS system that comprises the false information.
330
In step , the PPP agent injects false information that appears to be actual information into at least one process executing in the POS system.
340
In step , the PPP agent replaces actual information with false information that appears to be actual information.
350
In step , the PPP agent blocks at least one process in the POS system to prevent actual information from being taken from the point of sale system.
100
400
400
402
1
402
2
402
3
402
404
402
402
402
FIG. 1
FIG. 4
FIG. 4
As an example of a processing platform on which a POS system environment with information theft protection (e.g., in ) may be implemented is processing platform shown in . The processing platform in this embodiment comprises a plurality of processing devices, denoted -, -, -, . . . -N, which communicate with one another over a network . It is to be appreciated that the information theft protection methodologies described herein may be executed in one such processing device , or executed in a distributed manner across two or more such processing devices . The data storage system may be implemented in a cloud infrastructure environment which may also be executed in a distributed manner across two or more such processing devices . The information theft protection functionality described herein may be executed on the same processing devices, separate processing devices, or some combination of separate and the same (overlapping) processing devices. It is to be further appreciated that a server, a client device, a computing device or any other processing platform element may be viewed as an example of what is more generally referred to herein as a “processing device.” As illustrated in , such a device generally comprises at least one processor and an associated memory, and implements one or more functional modules for instantiating and/or controlling features of systems and methodologies described herein. Multiple elements or modules may be implemented by a single processing device in a given embodiment.
402
1
400
410
412
410
410
412
The processing device - in the processing platform comprises a processor coupled to a memory . The processor may comprise a microprocessor, a microcontroller, an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other type of processing circuitry, as well as portions or combinations of such circuitry elements. Components of systems as disclosed herein can be implemented at least in part in the form of one or more software programs stored in memory and executed by a processor of a processing device such as processor . Memory (or other storage device) having such program code embodied therein is an example of what is more generally referred to herein as a processor-readable storage medium. Articles of manufacture comprising such processor-readable storage media are considered embodiments of the invention. A given such article of manufacture may comprise, for example, a storage device such as a storage disk, a storage array or an integrated circuit containing memory. The term “article of manufacture” as used herein should be understood to exclude transitory, propagating signals.
412
402
1
FIGS. 1-3
Furthermore, memory may comprise electronic memory such as random access memory (RAM), read-only memory (ROM) or other types of memory, in any combination. The one or more software programs when executed by a processing device such as the processing device - cause the device to perform functions associated with one or more of the components/steps of system/methodologies in . One skilled in the art would be readily able to implement such software given the teachings provided herein. Other examples of processor-readable storage media embodying embodiments of the invention may include, for example, optical or magnetic disks.
402
1
414
404
Processing device - also includes network interface circuitry , which is used to interface the device with the network and other system components. Such circuitry may comprise conventional transceivers of a type well known in the art.
402
402
2
402
3
402
400
402
1
The other processing devices (-, -, . . . -N) of the processing platform are assumed to be configured in a manner similar to that shown for processing device - in the figure.
400
100
FIG. 4
FIG. 1
The processing platform shown in may comprise additional known components such as batch processing systems, parallel processing systems, physical machines, virtual machines, virtual switches, storage volumes, etc. Again, the particular processing platform shown in this figure is presented by way of example only, and the system environment shown as in may include additional or alternative processing platforms, as well as numerous distinct processing platforms in any combination.
400
400
Also, numerous other arrangements of servers, clients, computers, storage devices or other components are possible in processing platform . Such components can communicate with other elements of the processing platform over any type of network, such as a wide area network (WAN), a local area network (LAN), a satellite network, a telephone or cable network, or various portions or combinations of these and other types of networks.
400
400
FIG. 4
Furthermore, it is to be appreciated that the processing platform of can comprise virtual machines (VMs) implemented using a hypervisor. A hypervisor is an example of what is more generally referred to herein as “virtualization infrastructure.” The hypervisor runs on physical infrastructure. Processing platform may also include multiple hypervisors, each running on its own physical infrastructure. Portions of that physical infrastructure might be virtualized.
It should again be emphasized that the above-described embodiments of the invention are presented for purposes of illustration only. Many variations may be made in the particular arrangements shown. For example, although described in the context of particular system and device configurations, the techniques are applicable to a wide variety of other types of data processing systems, processing devices and distributed virtual infrastructure arrangements. In addition, any simplifying assumptions made above in the course of describing the illustrative embodiments should also be viewed as exemplary rather than as requirements or limitations of the invention. Numerous other alternative embodiments within the scope of the appended claims will be readily apparent to those skilled in the art.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
illustrates a point of sale system environment with information theft protection according to an embodiment of the invention.
FIG. 2
FIG. 1
illustrates the point of sale system environment with information theft protection of with malware operative to perform an information theft attack.
FIG. 3
illustrates a point of sale information theft protection methodology according to an embodiment of the invention.
FIG. 4
illustrates a processing platform used to implement a point of sale system environment with information theft protection according to an embodiment of the invention. | |
The modernization of the electric power grid can be viewed as a digital upgrade of the existing electricity infrastructure with the vision to lower the cost of energy delivered with improved reliability, resilience, efficiency and sustainability. There exist numerous challenges, known and unknown, to realizing this vision. Real-time sensing and monitoring is the gateway to evolve intelligent grid operations. A vast amount of spatial and temporal data has to be processed, so that the pertinent information is communicated to the appropriate near real time-planning and control centers in a timely manner for necessary decisions to be made and adaptations to take place. ‘Big Data’ initiative worldwide has provided a unique window of opportunity for improving the analytical methods in smart grid operations. Creating information and knowledge from cause-effect understanding and dynamic models is an emerging technology to provide situational awareness and intelligence in control centers. New real-time (and faster than real-time) data analytics is a promising development that will enhance future energy management system solutions. The monitoring, optimization and control systems for utility power systems and micro-grids will require real-time situational intelligence enabled by computational systems thinking machines (CSTMs) to handle the ‘Big Data’, increased variability and uncertainties caused by high-levels of penetration of variable renewable energy resources. What principles will govern the design of such systems and where do we find them? Such CSTMs will require three basic capabilities: sense-making, decision-making and adaptation. Realization of those capabilities will depend in turn on subsystems that continuously improve their knowledge on the dynamics of the electric power grid and not just gather data/information. This talk will provide insight into the research, development and innovation of real-time situational intelligence for enabling improved power system and micro-grid operations.
G. Kumar Venayagamoorthy (S’91-M’97-SM’02) is the Duke Energy Distinguished Professor of Power Engineering and a Professor of Electrical and Computer Engineering and Automotive Engineering at Clemson University. Prior to that, he was a Professor of Electrical and Computer Engineering at the Missouri University of Science and Technology (Missouri S&T), Rolla, USA from 2002 to 2011. Dr. Venayagamoorthy is the Founder (2004) and Director of the Real-Time Power and Intelligent Systems Laboratory (http://rtpis.org). He holds an Honorary Professor position in the School of Engineering at the University of Kwazulu-Natal, Durban, South Africa. Dr. Venayagamoorthy’s interests are in the research, development and innovation of advanced computational methods for smart grid operations, including intelligent sensing and monitoring, power system optimization, stability and control, and signal processing. He has published ~ 500 refereed technical articles. His publications are cited over 10,000 times with a h-index of 51. Dr. Venayagamoorthy has been involved in over 65 sponsored projects in excess of $10 million. Dr. Venayagamoorthy is involved in the leadership and organization of many conferences including the General Chair of the Annual Power System Conference (Clemson, SC, USA) since 2013, and Pioneer and Chair/co-Chair of the IEEE Symposium of Computational Intelligence Applications in Smart Grid (CIASG) since 2011. He is currently the Chair of the IEEE PES Working Group on Intelligent Control Systems, and the Founder and Chair of IEEE Computational Intelligence Society (CIS) Task Force on Smart Grid. Dr. Venayagamoorthy is a Senior Member of the IEEE, and a Fellow of the IET, UK, and the SAIEE. | http://a3lab.dii.univpm.it/news/seminar2016 |
With an overall population of 17,299 and a student population of 1,178, approximately 1,178 of Takoma Park students attend one of Takoma Park's schools that offer human services programs.
The largest human services school in Takoma Park, by student population, is Washington Adventist University. In 2010, Washington Adventist University graduated approximately 0 students with credentials in human services.
If you decide to attend a human services school in Takoma Park, you can expect to pay an average yearly tuition of $19,480.
In addition to tuition costs, plan on spending an average of $1,200 for human services related books and supplies each year. And if you live on campus at one of the Takoma Park-based human services schools, you will have an added expense of $7,200 per year, on average, for room and board. Students who live at home can cut this cost down to approximately $21,780.
Many human services graduates choose to work as human services professionals after graduation. If you choose to follow that path and remain in Takoma Park, your job prospects are good. In 2010, of the 6,840 human services professionals in Maryland, 1,380 were working in the greater Takoma Park area. The number of human services professionals in Takoma Park is expected to increase by 22% by the year 2018. This anticipated change is faster than the projected nationwide trend for human services professionals.
The average salary you can expect to earn as a human services professional in Takoma Park is $38,860 per year, which is higher than the average for human services professionals state-wide.
Address:
7600 Flower Ave, Takoma Park, Maryland 20912
Awards Offered: | https://www.hackcollege.com/school-finder/schools/maryland/takoma-park/human-services/ |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
DETAIL DESCRIPTIONS OF THE INVENTION
The present invention relates generally to an apparatus and method for recording, processing, and assembling an immersive experience through the use of cameras, microphones, and sensors.
Video cameras are used for a variety of low-end and high-end purposes, whether creating a home view or producing a blockbuster film. While camera technology has advanced significantly since its inception, recently providing three-dimensional filming capabilities, the videos filmed are generally stand-alone products, with little integration to other videos and media. Initially, three-dimensional cameras were large and bulky, but improvements in technology have resulted in size reductions. The size of three-dimensional cameras has been reduced to the point where they can be mounted on headgear and similar accessories. Inversely related to the size, as time has progressed the resolution available with three-dimensional cameras has increased. Overall, the three-dimensional cameras offered today offer much smaller sizes and better resolutions than were available when three-dimensional camera systems were first introduced.
While there are many services for viewing videos, whether amateur or professional, these serves merely act as hosts and provide little additional value, perhaps provided a list of recommended videos. While this may be helpful in researching a topic, such as a person's next vacation destination, recommended videos are still completely separate from the source video. The switch between videos is abrupt, and linked videos aren't always relevant; while the city may be the same, one video may cover a street while a linked video may discuss a shop on the opposite side of town.
In addition, videos are non-interactive. While videos are used for a number of professional purposes, such as education videos, there remains room for improvement by introducing an element of user interaction. This interactive element can be used to enhance numerous projects, such as policy analysis, polls, and lab instructions for students.
There exists a need for a product that is able to record, process, sort, and link videos based on geographic location. There also exists a need for a video system that incorporates user interaction.
It is therefore an object of the present invention to provide an immersive capture system capable of recording video, audio, and data. It is a further object of the present invention to provide a method for creating a multimedia clip by combining recorded video and audio. It is a further object of the present invention to sort a large number of multimedia clips into geographic regions and to link together clips in each geographic region. It is a further object of the present invention to provide a number of audio-visual cues in the aggregate multimedia clip to introduce an element of user interaction.
All illustrations of the drawings are for the purpose of describing selected versions of the present invention and are not intended to limit the scope of the present invention.
1
2
3
4
4
6
7
8
9
4
2
3
4
4
6
2
3
4
6
1
The present invention is an immersive capture system that enables the recording, processing, and assembly of an immersive multimedia experience. The immersive capture system comprises a headgear , a video system , a binaural audio system , a portable power source , a global positioning system (GPS) tracking device , a chipset , an accelerometer , a gyroscope , and a compass . The portable power source provides the energy to run the video system , the binaural audio system , the portable power source , the GPS tracking device , and the chipset . The video system is mounted to the front of the headset, while the binaural audio system is mounted on each side of the headset. The GPS tracking device and the chipset are housed within the structure of the headgear .
1
3
11
12
14
13
15
11
12
1
14
11
13
1
14
141
142
143
144
145
13
131
141
11
1
14
1
15
12
1
14
FIG. 1-FIG
The headgear , as illustrated in . , comprises a front section , a rear section , a camera mount , a chinstrap , and a rear shelf . The front section and rear section form opposite parts of the headgear , with the camera mount being adjacent to the front section . The chinstrap is connected across the headgear , to a left side and a right side. The camera mount itself comprises a vertical track , a cart , a horizontal track , a first housing socket , and a second housing socket while the chinstrap comprises a buckle . The vertical track is connected to the front section of the headgear , securing the camera mount to the headgear . The rear shelf is connected to the rear section of the headgear , opposite the camera mount .
141
142
141
142
141
2
142
141
143
143
141
144
145
144
145
143
143
131
13
131
1
1
1
2
FIG. 1
FIG. 2
Engaged with the vertical track is the cart , which is capable of sliding up and down along the vertical track . The interaction of the cart and the vertical track allow the video system to be adjusted in the vertical direction. Centrally connected to the cart , on the opposite side of the vertical track , is the horizontal track . The horizontal track is oriented to be perpendicular to the vertical track , and serves as a mounting point for the first housing socket and the second housing socket . The first housing socket and the second housing socket are slidably engaged with the horizontal track , enabling lateral motion along the horizontal track . The buckle of the chinstrap is centrally positioned; by engaging or disengaging the buckle the headgear may be secured to or released from a user's chin. The components of the headgear serve to secure the headgear to a user's chin as well as provide vertical and horizontal motion for a connected video system . These arrangements are visible in and .
15
151
152
153
151
12
15
12
151
152
1
1
153
1
15
153
151
152
15
FIG. 3
The rear shelf comprises a wall , a floor , and a plurality of inputs . The wall is connected to the rear section , securing the rear shelf to the rear section . Connected perpendicular to the wall is the floor , forming a support for accessory devices which may be connected to the headgear . These accessory devices, which can enable a number of functions such as additional audio capabilities, removable storage, and auxiliary batteries, interface with the headgear through the plurality of inputs . For example, digital audio recording could be secured and connected to the headgear by means of the rear shelf . The plurality of inputs are positioned on the wall , providing a proximal connection point for any accessories that are secured to the floor . The rear shelf is visible in .
2
21
22
23
24
21
22
14
23
24
1
21
144
22
145
21
22
144
145
141
141
21
22
The video system comprises a first camera , a second camera , a data storage device , and a wireless transmitter . The first camera and the second camera are secured to the camera mount while the data storage device and the wireless transmitter are housed within the headgear . The first camera is placed in the first housing socket while the second camera is placed in the second housing socket . The first camera and second camera are provided with two degrees of freedom in the rotational element; that is, they are capable of tilting and pivoting in relation to the first housing socket and the second housing socket . The tilt capability allows for looking up and down, while the pivot capability is allows for convergence (e.g. refocusing as an object moves closer). Potentially, a swivel capability can be added, enabling looking left and right. With the swivel function added, the present invention would then have 3 degrees of freedom in the rotational element. In combination with the first vertical track and the second vertical track , the first camera and the second camera are provided with two translational degrees of freedom and two rotational degrees of freedom.
3
31
32
31
32
33
34
35
1
32
1
31
32
1
11
12
1
31
1
32
33
1
34
33
35
The binaural audio system comprises an identical left subsystem and a right subsystem . The left subsystem and the right subsystem each comprise a low volume microphone , a high volume microphone , and a windsock . The left system subsystem is positioned on the left side of the headgear , which is mirrored by the right subsystem on the right side of the headgear . The left subsystem and the right subsystem , positioned on opposite sides of the headgear , are located at the junction between the front section and the rear section of the headgear . The left subsystem is ideally positioned to be directly above the left ear of a person wearing the headgear , just as the right subsystem is ideally positioned above a user's right ear. The low volume microphone is specialized to best record proximal sounds, where less sensitivity is needed to cleanly record audio. For sounds that originate further away from the headgear , the high volume microphone provides more sensitivity that helps cleanly record distal sounds which might be, at best, faintly audible through the low volume microphone . Covering each pair of microphones is the windsock , intended to minimize the amount of noise picked up, especially from wind.
4
1
4
2
3
4
6
7
8
9
153
1
6
6
21
22
23
24
34
33
4
7
8
9
6
1
21
22
23
To power the present invention, the portable power source is installed in the headgear . The portable power source is connected to multiple components of the present invention, supplying power to the video system , the binaural audio system , the GPS tracking device , the chipset , the accelerometer , the gyroscope , the compass , and the plurality of inputs . To enable communication and data transfer between the systems of the headgear , the chipset is included as a central hub. The chipset is electronically coupled to the first camera , the second camera , the data storage device , the wireless transmitter , the high volume microphone , the low volume microphone , the GPS tracking device , the accelerometer , the gyroscope , and the compass . The chipset enables the various components of the headgear to communicate with each other, e.g. saving video recorded by the first camera and the second camera to the data storage device .
1
23
24
4
7
8
9
4
7
1
21
22
8
1
9
1
23
1
23
24
2
4
7
8
9
23
6
4
1
1
FIG. 4
While the cameras and microphones allow the headgear to record video and audio, the data storage device , the wireless transmitter , GPS tracking device , accelerometer , gyroscope , and compass provide additional capabilities that are especially helpful when processing the recorded video and audio. The GPS tracking device continuously records position coordinates including altitude during filming, allowing the recorded video to be matched to a geographic location. The accelerometer measures the pitch of the headgear , allowing rapid changes in tilt to be accommodated for by the first camera and the second camera . Similarly, the gyroscope tracks orientation of the headgear , enabling camera shake and similar undesired effects to be smoothed out during video processing. The compass tracks the directional heading of the headgear , which can be added to the recorded video. The data storage device provides local storage, allowing the headgear to add the recorded media to the data storage device . The wireless transmitter allows for remote viewing of the live feeds generated from the video system , audio system, and accessory devices like the GPS tracking device , accelerometer , gyroscope , and compass . For example, a producer in a studio room could view the real time video and audio being captured by the present invention, along with the positional, motion, orientation, and directional data being recorded by the accessory devices. Potentially, the live-streamed data could be saved to a remote location, providing a producer or other viewer with a local copy separate from that saved to the data storage device . These connections between the chipset , portable power source , and other components of the present invention are shown in . The headgear of the present invention is designed to allow for the capture of an immersive experience, as well as the subsequent processing and assembly of the immersive experience. Creating the immersive experience requires two core processes, with the material for said processes being generated by the headgear of the present invention.
1
21
22
3
34
33
34
33
23
The first process is the capture and processing of the immersive experience. The ability to capture the experience is provided by the headgear . The first camera and the second camera are used to generate a first video feed and a second video feed. The binaural audio system generates four separate feeds; a first high volume audio feed from a first high volume microphone , a first low volume audio feed from a first low volume microphone , a second high volume audio feed from a second high volume microphone , and a second low volume audio feed from a second low volume microphone . In addition to generating these video and audio feeds, a timestamp is embedded throughout the entirety of each feed; a first video timestamp for the first video feed, a second video timestamp for the second video feed, a first high volume timestamp for the first high volume audio feed, a first low volume timestamp for the first low volume audio feed, a second high volume timestamp for the second high volume audio feed, and a second low volume timestamp for the second low volume audio feed. These generated feeds and timestamps are saved to the local data storage device , allowing them to be accessed for later steps in the editing process.
4
7
8
4
7
8
9
23
7
21
22
1
21
22
In addition to the audio-visual feeds, data streams are provided by the GPS tracking device , the accelerometer , and the gyroscope . More specifically, the GPS tracking device generates a location data stream, the accelerometer generates a motion data stream, and the gyroscope generates an orientation data stream. A directional facing data stream is also generated by the compass . Along with the audio-visual feeds, these data streams are saved to the data storage device . The audio-video feeds and the data streams provided the starting material for the immersive experience, which must next be processed and finally assembled into the desired finished product. The motion data stream from the accelerometer can be used to make real time adjustments to the first camera and the second camera during filming; movements such as tilting of the headgear can be accommodated for with corresponding changes to the tilt of the first camera and the second camera .
1
Once the raw data has been recorded by the headgear , the processing stage can begin. To do this, the audio-visual feeds first need to be combined into tracks. The first video feed and the second video feed are merged to create a stereoscopic three-dimensional track, the first high volume audio feed and first low volume audio feed are merged to create a first audio track, and the second high volume feed, and second low volume audio feed are merged to create a second audio track. To ensure that the feeds of the combined components are synchronized, each feed is matched to its partner using the embedded timestamp. For example, the first video timestamp and the second video timestamp are referenced when creating the stereoscopic three-dimensional video track. The result is that the first video feed and second video feed are completely synchronized with each other, starting and stopping at the same time to provide a smooth stereoscopic three-dimensional video track. In the same way, the first high volume timestamp and first low volume timestamp are used to synchronize the first high volume audio feed and first low volume audio feed, thus generating the first audio track. Likewise, the second audio track is generated by using the second high volume timestamp and second low volume timestamp to synchronize the second high volume audio feed to the second low volume audio feed.
23
2
21
22
After synchronizing the generated feeds to create the stereoscopic three-dimensional video track, first audio track, and second audio track, the three tracks are saved together as a multimedia clip, added to the local data storage device . The same process that is used to create the tracks is used to create the multimedia clip. By matching the timestamps of the component tracks, the multimedia clip is assembled such that the stereoscopic three-dimensional video track, first audio track, and second audio track are in sync with each other. Since synchronizing by timestamps is not perfect, it is necessary to fine-tune the synchronization. To fine tune the synchronization of the first audio track and the second audio track to the stereoscopic three-dimensional video track, waveforms generated by the video system and audio system are used. As the first camera and second camera generate the first video feed and the second video feed, a first video waveform and second video waveform are also produced. Similarly, a first high volume waveform, first low volume waveform, second high volume waveform, and second low volume waveform are produced along with the first high volume audio feed, first low volume audio feed, second high volume audio feed, and second low volume audio feed, respectively. After synchronizing the timestamps of the audio-video feeds, the waveforms of each feed can be matched to each other to produce an exact match.
To provide various information about the multimedia clip, a metadata tag is inserted into the multimedia clip. The metadata tag is formed from the location data stream, the orientation data stream, and the motion data stream. As a result, information regarding the coordinates, camera orientation, and camera motions is readily available; this is especially important in the processing of the multimedia clip, where such information is used to make adjustments and corrections to imperfections or errors in the multimedia clip.
With the multimedia clip having been fully prepared, processing of the multimedia clip can proceed. Processing of the multimedia clip involves numerous adjustments, corrections, and accommodations to the multimedia clip. By referencing the orientation data stream and the motion data stream (accessed through the metadata tag), the stereoscopic three-dimension video track can be stabilized, eliminating a plurality of jitters that would otherwise detract from the viewing experience. The multimedia clip is reviewed for other unwanted events, which are removed or adjusted through editing. Processing can also be used to add elements to the multimedia clip, or alter existing element for artistic purposes. Processing the multimedia clip may involve a number of steps, such as rotoscoping, color correction, adjusting convergence, focus, fisheye, and zoom, as well as depth mapping.
1
Once the multimedia clip has been captured and processed, the assembly of the immersive experience can begin. Creating the immersive experience requires a plurality of immersive capture systems, such as the headgear , generating a plurality of multimedia clips. The first step in assembling the immersive experience is grouping the plurality of multimedia clips into geographic group of multimedia clips, wherein each geographic group of multimedia clip is formed by a minimum of two multimedia clips. The creation of the geographic group of multimedia clips is done by comparing the metadata tag of each of the plurality of multimedia clips. By looking at coordinates in the location data stream from each metadata tag, multimedia clips which are from proximal locations (as indicated by their respective location data streams) can be combined in the geographic group of multimedia clips. Alternatively, instead of having the present invention automatically link together multimedia clips in a geographic region, a producer can create a playlist of multimedia clips. For example, in order to create a fine dining tour of Paris, a producer might create a playlist of video clips that explore a number of restaurants in Paris, even if the sequential videos are not immediately geographically adjacent. Creating a playlist is not limited to a producer; a user or anyone with access to a plurality of multimedia clips can selectively arrange, remove, and otherwise edit them to create a playlist.
Potentially, the geographic group of multimedia clips can be grouped by time as well as or instead of location. For example, by accessing the timestamps from the metadata tags, time variants of geographic groups of multimedia clips can be formed. Multimedia clips generated in one year, e.g. 2000, would be arranged into one geographic group of multimedia clips for a region. Multimedia clips for that same region, but with different capture dates such as 2010, are then grouped into a separate geographic group of multimedia clips for the region. Alternatively, a group of multimedia clips can be combined to form highlights of a 2010 multimedia experience, for example. By providing multimedia clips that are sorted not only by location, but also time, the present invention allows a user to experience different eras as well as different locations.
To improve the immersive experience, an accessory data stream can be incorporated as part of the metadata tag. This accessory data stream serves as a connection point for accessory devices. These accessory devices are added in order to provide accessory feedback to the multimedia clip. While the audio-video feeds address the senses of sight and sound, the accessory devices can target the other senses. For example, by including a vibrating device the sensation of touch can be incorporated into the immersive experience. As an example, a vibrating chair can be fed the information from the accessory data stream, shaking to add a tactile element to the accessory data stream. More specifically, if an earthquake occurs as part of the immersive experience, the vibrating chair will shake as the earthquake unfolds. Resultantly, a user will not only see and hear the effects of the earthquake, but feel them as well.
Subsequently, the individual clips from the geographic group of multimedia clips are linked to each other. This is done by comparing the location data stream of each of the component multimedia clips. When a reference multimedia clip and an adjacent multimedia clip have location data streams that show shared position coordinates, the reference multimedia clip and the adjacent multimedia clip can be linked together at or near those shared position coordinates. This linking of the reference multimedia clip and the adjacent multimedia clip effectively acts as an aggregate multimedia clip. For example, if the reference multimedia clip ends at an intersection and the adjacent multimedia clip begins at that same intersection, the two multimedia clips are linked. Since two adjacent multimedia clips will usually not have an exact match in shared position coordinates, a tolerance level is set to determine how close to an exact match the shared position coordinates need to be in order to link the two multimedia clips. This creates the aggregate multimedia clip, which switches from playing the reference multimedia clip to the adjacent multimedia clip at the junction, essentially acting as a single larger multimedia clip. These adjacent multimedia clips act as linked multimedia clips with regards to the reference multimedia clip. Ideally, the transition between the reference multimedia clip and adjacent multimedia clip is seamless, occurring exactly at the shared position coordinates. Potentially, a reference multimedia clip can be linked to multiple adjacent multimedia clips. For example, if the reference multimedia clip ends at a four-way intersection there are three potential adjacent multimedia clips to link to. These adjacent multimedia clips correspond to continuing straight, turning left, or turning right at the intersection. Provided enough initial multimedia clips, large areas such as districts and cities can be represented through the geographical group of multimedia clips. The plurality of multimedia clips from the geographical group is saved together to a central storage location as an aggregate multimedia clip Likewise, the metadata tags of the plurality of multimedia clips are combined to provide an aggregate metadata tag for the aggregate multimedia clip. This aggregate multimedia clip is named to indicate the captured geographical region. By looking through the metadata tags and location data streams of the component multimedia clips, the position coordinates can be converted to the appropriate geographic location, which is then used as the name for the aggregate multimedia clip. For example, given the coordinates of 48.87, 2.34 indicates that the aggregate metadata clip should be named Paris.
Beyond simply linking adjacent multimedia clips together to form the aggregate metadata clip, the present invention provides an element of user interaction. Defining a junction of shared position coordinates where a reference multimedia clip is linked to an adjacent multimedia clip, the present invention allows a user to make a choice at each junction. When a user watching the aggregate multimedia clips reaches a junction, they are prompted to choose a linked multimedia clip to continue to. The user interaction is enabled by an integrated user interface, which can be implemented in various designs depending on the playback machine of choice. Returning to the earlier example, at a four way intersection a user may choose between continuing straight, turning left, or turning right, with each choice linking the user to the appropriate linked multimedia clip. Provided a large enough database, this allows a user to take an immersive tour of a city, even entering individual stores or buildings when the relevant multimedia clips are available.
Expanding upon the user interaction, scenarios can be presented throughout the aggregate multimedia clip by utilizing a plurality of audio-visual cues. There are two variations; position-based audio-visual cues and temporal-based audio-visual cues. The position-based cues are tied to predetermined physical positions, a set of coordinates from the location data stream of the aggregate metadata tag. Parallel to the position-based cues, the temporal-based cues are tied to a specific timestamp from the aggregate metadata tag. This enables a specific position-based cue or a specific temporal-based cue to be triggered at a specific location or time in the aggregate multimedia clip. For example, a specific positioned-based cue can be triggered at a crosswalk while a specific temporal-based cue can be triggered two minutes into the aggregate multimedia clip. Once these audio-visual cues are triggered, a user is prompted for a response, which is saved to the central data storage. This allows a user's response to various scenarios and challenges to be presented in an immersive environment and saved for later analysis.
Further utilization of the aggregate metadata tag includes inserting a plurality of location-based advertisements throughout the aggregate multimedia clip. This is accomplished by providing a plurality of different advertisement coordinates, themselves selected from the coordinates provided in the location data stream. Specific location-based advertisements are then linked to specific advertisement coordinates. These location-based advertisements are triggered when the coordinates from the location data stream match the specific advertisement coordinates. This allows relevant advertising to be inserted into the aggregate multimedia clip. For example, a user may be previewing a trip to Paris by viewing an aggregate multimedia clip for the Paris region. During the aggregate multimedia clip, a local bakery is passed, triggering an advertisement for that specific bakery. This could influence the user to go to said bakery during a physical visit to Paris. This is just one example of many potential advertisements.
The immersive experience provided by the present invention can be used in a number of applications. For example, the aggregate multimedia clip can be used to provide an immersive experience from another person's point of view; a user could experience great cities, famous landscapes, and different cultures through the aggregate multimedia clip. Alternatively, in combination with the audio-visual cues, the aggregate multimedia clip can be used for more interactive tasks such as policy analysis or education. For example, by creating a specific plurality of audio-visual cues, a police department can see if their officer's responses are in line with official police policy. Or, in the education sector, the audio-visual cues can guide a student through the proper procedure in an experiment, testing their ability to follow guidelines without using up valuable physical lab space and materials. The educational application of the present invention is especially relevant to blended learning, where an immersive experience can be used to replicate real-time, hands-on, or practical experience, which are often requirements for completing a class. Traditionally, these requirements require an investment in time and money, either on the part of the instructor or the students (e.g. travelling to a lab for hands on experience). The immersive experience provided by the present invention is capable of imitating these practical experiences, thus improving the blended learning approach. These are just a few examples of applications that utilize the present invention; additional ways of integrating the aggregate multimedia clip and audio-visual cues can be implemented in sectors such as entertainment, healthcare, education, and business.
The immersive experience is designed to provide a stereoscopic three-dimensional experience; however, users may choose to use traditional two-dimensional displays as a more cost effective way of experiencing the aggregate multimedia clip. In the ideal situation, a user will be able to experience the aggregate multimedia clip through a closed environment, such as three-dimensional goggles with integrated headphones.
Although the invention has been explained in relation to its preferred embodiment, it is to be understood that many other possible modifications and variations can be made without departing from the spirit and scope of the invention as hereinafter claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
is a perspective view of the headgear of the present invention.
FIG. 2
is a front view of the headgear with part of the chinstrap omitted.
FIG. 3
is a rear view of the headgear with part of the chinstrap omitted.
FIG. 4
is a diagram showing the electrical and electronic connections of the headgear.
FIG. 5
is a flowchart illustrating the general capture process of the present invention.
FIG. 6
is a flowchart illustrating the synchronization process of the present invention.
FIG. 7
is a flowchart illustrating the correction process of the present invention.
FIG. 8
is a flowchart illustrating the general assembly process of the present invention.
FIG. 9
is a flowchart illustrating the aggregation process of the present invention.
FIG. 10
is a flowchart illustrating the interactive process of the present invention. | |
- Purchase/rental options available:
This study explored how 18 participants at four institutions formed Academic Affairs and Student Affairs partnerships for diversity initiatives. These participants were also involved in a national Project launched by the Association of American Colleges and Universities in the 1990s. Using grounded theory methods, a conceptual model emerged, the Cycle of Making Lifelong Commitments to Diversity and Inclusion, that identifies and explains three distinct types of partnerships: complementary, coordinated, and pervasive. The findings offer implications for researchers and practitioners regarding partnerships to achieve diversity and inclusion goals. | https://muse.jhu.edu/article/592488?ref=rc |
Iskender Dirik invites you to join his Masterclass, a hands-on guide to scaling your business. In this session, Iskender Dirik will deliver a transformational lecture fully packed with his most important learnings from over 20 years of experience as an entrepreneur and VC. He will also share best practices from Andreessen Horowitz, Sequoia Capital, First Round Capital, Y Combinator and more as part of a 360 degree view on all things crucial to scaling your company: Leadership, hiring, sales, marketing, productivity, pitching, and more.
Please be sure to register for hands-on best practices that will help you transform your company, scale your business, and improve your overall performance. | https://www.microsoftpartnercommunity.com/t5/Events/Reminder-Iskender-Dirik-s-ScaleUp-Masterclass/m-p/9255 |
In an irony unforeseen by effective-schools researchers, lawyers in a school-finance suit in New Jersey are using the concept to argue that poor districts can improve their schools at little or no extra cost to the state.
And in this and other developments, according to school-finance experts, research findings on effective schools are reopening an old debate over the extent to which money and resources affect student achievement.
The five-year-old New Jersey case, Abbott v. Burke, is thought to be the first legal use of effective-schools research as an argument against changing a state's school-finance formula to make it more equitable.
But to many, including Marilyn J. Morheuser, the lawyer representing the plaintiffs in the case, the use of such an argument by the state represents a dangerous diversion of attention away from basic equity concerns and toward the far murkier area of school efficiency. And, says Ms. Morheuser, if the argument prevails in New Jersey, it will be used in similar suits elsewhere.
For now, however, most school-finance experts consider that the flawed and incomplete nature of most effective-schools research will preclude its successful legal application. They note, for example, that the research has never really compared the effectiveness of schools in districts with differing financial bases, but has focused primarily on individual schools.
The long debate over the role of material resources in children's academic progress quickened in 1966, with the publication of a landmark report by James S. Coleman, Equality of Educational Opportunity. The most extensive study of student achievement ever conducted in this country, the Coleman report concluded that differences in school facilities and resources accounted for relatively little of the variation seen in students' test scores. What mattered more, said the report, was whether the pupils themselves were rich or poor.
In school-finance lawsuits since the report's publication, courts nonetheless have generally continued to accept the notion that money does affect students' access to equal educational opportunity. And some, in their decisions, have forced states to overhaul their financial systems to provide more equitable distribution of education funds.
The introduction of effective-schools research into the debate, however, represents a new challenge to those who argue that equity cannot be achieved without equal resources.
"It's basically a new wrinkle on an old argument," says David C. Long, a lawyer who has represented plaintiffs in many school-finance cases. "One of the defenses to justify inequitable school-finance systems has always been the argument that money doesn't make any difference. That's an argument the state has made in most school-finance cases. Interestingly enough, it has usually been rejected, even by those courts that have ruled against the plaintiffs."
"There is certainly no conflict between school effectiveness and school-finance reform in the minds of those that are seeking school-finance equity," Mr. Long asserts. "That conflict is pushed by the states that try to distort the research to preserve the status quo."
Lorraine M. McDonnell, a political scientist with the Rand Corporation and associate director of the new federally funded center for policy research in education, says states initially may have been anxious to use findings about effective schools as a substitute for putting new money into education, but that that is no longer true.
"I think in the short term what was happening was that people were assuming a lot of the school-improvement research wouldn't cost anything," she says. "It became a substitute for other kinds of initiatives that would cost money."
"Now most of the school-improvement initiatives are usually embodied in larger reform initiatives that have finance implications," Ms. McDonnell notes.
But to some observers, substituting effective-schools efforts for a substantial new influx of money may be exactly what the state is attempting in the New Jersey lawsuit.
The plaintiffs in Abbott v. Burke are low-income, black and Hispanic schoolchildren from New Jersey's property-poor urban districts. Their suit contends that the state's school-finance formula produces wide financial disparities between districts, which result in the denial to some of a "thorough and efficient education."
The suit grows out of a previous case, Robinson v. Cahill, in which the courts closed the New Jersey schools and forced the state to overhaul its school-finance system. Plaintiffs in the current case charge that financial disparities between districts have widened, not disappeared, since the Robinson decision.
The state, however, is arguing that educational achievement depends on factors that are not primarily financial in nature: the age, ability, and motivation of students; the amount and quality of instruction; and the nature of influences from the home and school environments.
State officials have devised a six-point program to eliminate inequities in the plaintiffs' school districts; the plan involves not additional revenues but aspects of effective-schools research.
"To the extent that these and other remedial programs cost money," noted Judge Samuel D. Lenox of the New Jersey Superior Court in a July 23 ruling, "defendants claim that plaintiffs' school districts have enough money available."
But Ms. Morheuser, who also directs the Education Law Center Inc. in New Jersey, says experts in the field will testify for the plaintiffs that effective schools actually do cost money--for training, technical assistance, and materials--and that the state's poor urban districts do not have such funds available.
In addition, she and a growing number of other school-finance experts say effective-schools research has never really addressed the question of resources.
Although Ms. Morheuser anticipates a "big fight" over the validity of effective-schools research in the Abbott case, she says there is little in the research "that would argue that equal resources aren't needed if you are to have effective schools."
"I think it's a question the research has never asked and therefore never answered," she says.
Arthur E. Wise, director of the Rand Corporation's Center for the Study of the Teaching Profession and author of Rich Schools, Poor Schools: The Promise of Equal Educational Opportunity, agrees.
"How well school systems spend their money is of course important," he says. "But the introduction of this issue--of a look at outcomes--into litigation forces the litigation to look into areas of education research that are hardly settled."
The introduction of educational outcomes into the New Jersey litigation, says Mr. Wise, has distorted the basic purpose of the lawsuit and stalled progress.
"If anything, the degrees of inequality of educational opportunity have increased in the years since the initial litigation," he says.
Allan Odden, professor of education at the University of Southern California and director of the Center for Policy Analysis for California Education, notes that effective-schools research has never systematically studied schools drawn from districts with low, medium, and high resources to see what difference those resources made.
"Such a study would show the degree to which effectiveness might vary by level of funding as well as by resource use and allocation," he says.
But even though the research has not clearly addressed resource disparities between schools, says Mr. Odden, it has encouraged experts to look more closely at how money is spent within individual schools.
"The effective-schools research begins to lay out the important characteristics of schools and how resources are used to improve student performance, teacher performance, and schools as organizations," he says.
Included in the American Educational Finance Association's last yearbook, he notes, was a series of articles on the relationship between school-finance systems and school-improvement efforts.
To Rand's Ms. McDonnell, a new, broader view of resource equality has replaced a school-finance mindset that "basically stopped at the school door." The older view, she says, "assumed that if you gave equal inputs, you would somehow get more equal outputs."
"Now," she says, "the question is, 'Are the resources being used more equitably within schools?' The definition has changed to include not just money but the quality of texts, the differences in curriculum."
In this respect, effective-schools research has become part of the broader education-reform movement, which is prompting school-finance experts generally to take a closer look at educational outcomes, says Susan Fuhrman, senior research associate at the Eagleton Institute for Politics at Rutgers University and director of the center for policy research in education.
The Connecticut Board of Education, for example, is scheduled to vote in February on a new definition of equal educational opportunity--one that would look at educational outcomes for subpopulations of students in much the same way that early effective-schools proponents Ronald Edmonds and Wilbur Brookover did in their research.
In Connecticut's proposed new definition, "evidence of equal educational opportunity is the participation of each student in programs appropriate to his or her needs and the achievement by each of the state's student subpopulations of educational outcomes at least equal to that of the state's student population as a whole."
Says the state's commissioner of education, Gerald N. Tirozzi: "If 80 percent of the kids in the state can multiply a two-digit number by a two-digit number--and I hope the average is that high--and we find in the poorer districts that only 40 percent of the kids can handle that scale, that's an unequal educational opportunity and something has to be done."
"If we make that statement, and that becomes policy," the commissioner adds, "that's a very strong direction for the state to take."
Although the proposed definition was not taken directly from effective-schools research, Mr. Tirozzi says, it is one way in which the state hopes to support instructionally effective schools.
Finance experts caution, however, that while effective-schools research may suggest how to make schools more productive, it cannot replace bottom-line concerns about money.
"I think effective-schools research can be fine," says Ms. Morheuser. "In fact, I think it should be used everywhere. But it's not a substitute for equity and can't ever be perceived as a substitute for equity."
Effective-schools research, says Ms. McDonnell, represents "one of the most valid bodies of research we have, and it provides solid, almost common-sensical guidance."
"The problem," she adds, "is that the people who worry about school-finance formulas are not trained in the dynamics of what happens in classrooms in schools. There has to be a lot of translation, and that's only beginning to happen." | https://www.edweek.org/ew/articles/1986/01/15/06160016.h05.html |
Email your librarian or administrator to recommend adding this journal to your organisation's collection.
You are leaving Cambridge Core and will be taken to this journal's article submission site.
To save this undefined to your undefined account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your undefined account.
Find out more about saving content to .
To save this article to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
You can save your searches here and later view and run them again in "My saved searches".
Page 1 of 2
Through the last millennium, Patagonia has been affected by changing climate conditions and successive volcanic eruptions. Lake Tonček is a high-altitude lake in the Southern Volcanic Zone in the northern Patagonian Andes. We documented the responses of the subfossil chironomid community to the effects of successive volcanic and different conditions in a sedimentary sequence from this lake comprising the last 900 years. The community composition and structure (abundance, diversity, and richness) and the development of morphological anomalies in the chironomid mouthparts were evaluated throughout the core. Both climatic conditions and volcanism affected the chironomid community differentially. The chironomid community changed following short-term climate change patterns, being affecting not only by temperature changes but also by variations in the regional precipitation regime. Decreases in abundance and diversity were only observed in coarse volcanic layers. In these samples, we recorded a high percentage of damaged chironomid mouthparts caused by mechanical wear, breakage or abrasion, possibly due to the increase of mineral particles. Our results represent important baseline data about the responses of chironomid communities to environmental disturbances in high-altitude lakes over long time frames.
Central Asia is highly vulnerable to large earthquakes, yet existing records of past seismic activity in this area are still insufficient to reliably assess regional earthquake hazard on longer timescales. Within this study, the sediments of Sary Chelek, a mountain lake in the western Kyrgyz Tian Shan, were investigated to explore its potential as a natural paleoseismic archive. The lacustrine deposits are characterized by a succession of annually laminated (varved) sediments overlying event deposits that consist of large-scale turbidites and distorted lake sediments, similar to earthquake-related deposits described from other lake sediment records. Microscopic sediment analysis furthermore revealed distorted varves in the laminated sequence that closely resemble earthquake-related soft-sediment deformation structures. Varve counting and radiometric dating determine the formation of the distorted varves and the emplacement of the large-scale event deposits to the early 1990s and mid-1940s, respectively. This is in good temporal agreement with the occurrence of two large earthquakes that struck western Kyrgyzstan in AD 1992 and AD 1946. These results and particularly the precise age control of the Sary Chelek sediment record highlight its potential for establishing a long and precisely dated record of regional earthquake activity.
This contribution discusses possible relationships between human populations and Holocene environmental deterioration phenomena (cold/arid pulses and volcanic eruptions) in the Fuegian Archipelago (South America), based on summed probability distributions of archaeological dates, paleoenvironmental information, geospatial data, and archaeological evidence. During the first millennia after peopling, only the Hudson (ca. 7700 cal yr BP) and the first Monte Burney (ca. 8600 cal yr BP) eruptions might have played a role in human dispersion. Particularly, a more intense human occupation around the Beagle Channel and long-distance interactions are proposed as risk-buffer strategies related to the Hudson eruption. A cooling phase and a demographic growth at ca. 5500 cal yr BP might have favored more dispersed spatial occupations and a subsistence diversification in the Beagle Channel. In the northern steppes, the second Monte Burney eruption (ca. 4300 cal yr BP) and an arid episode (ca. 2600 cal yr BP) are proposed as the main triggers for changes in land-use patterns, long-network interactions, and subsistence strategies. Even though occupation changes in the Fuegian Archipelago coexist with environmental deterioration episodes after 1500 cal yr BP, demographic processes and the European colonization most likely explain this trend. Similarities between the steppe/ecotone and forest occupation curves suggest common behavioral patterns across the Holocene.
The introduction of agriculture is known to have profoundly affected the ecological complexion of landscapes. In this study, a rapid transition from C3 to C4 vegetation is inferred from a shift to higher stable carbon (13C/12C) isotope ratios of soils and sediments in the Benoué River Valley and upland Fali Mountains in northern Cameroon. Landscape change is viewed from the perspective of two settlement mounds and adjacent floodplains, as well as a rock terrace agricultural field dating from 1100 cal yr BP to the recent past (<400 cal yr BP). Nitrogen (15N/14N) isotope ratios and soil micromorphology demonstrate variable uses of land adjacent to the mound sites. These results indicate that Early Iron Age settlement practices involved exploitation of C3 plants on soils with low δ15N values, indicating wetter soils. Conversely, from the Late Iron Age (>700 cal yr BP) until recent times, high soil and sediment δ13C and δ15N values reflect more C4 biomass and anthropogenic organic matter in open, dry environments. The results suggest that Iron Age settlement practices profoundly changed landscapes in this part of West Africa through land clearance and/or utilization of C4 plants.
High-resolution climate archives of the Late Holocene are essential in the study of paleoclimatic dynamics and for understanding the importance of natural and anthropogenic influences on past and future climate changes. Here, we present well-dated X-ray fluorescence scanning records retrieved from a varved sediment core from Lake Kusai. These records show the decadal- to centennial-scale paleoclimatic variability of the northern Qinghai-Tibetan Plateau over the last 2000 yr. Ca is mainly related to the precipitation of authigenic carbonates and is a proxy for temperature changes. The Ca record of Lake Kusai is well-correlated with the variations and periodicities of solar activity. Therefore, solar output can be suggested as being the predominant forcing mechanism of decadal- to centennial-scale temperature fluctuations over the last 2000 yr. The evolution of effective moisture was inferred from the log-ratios of Rb/Sr, which demonstrated synchronous changes with the typical Indian summer monsoon record from Dongge Cave. These results indicate that the decadal- to centennial-scale effective moisture evolution of the northern Qinghai-Tibetan Plateau is mainly influenced by the Indian summer monsoon. Additionally, we have not found the evident periodicities of solar activity in our effective moisture record over the last 2000 yr.
We present a continuous, sediment core-based record of paleohydroclimate spanning ~5800 cal yr BP to recent from Lower Pahranagat Lake (LPAH), a shallow, alkaline lake in southern Nevada. We apply stable isotopes (δ18O and δ13C) from fine-fraction authigenic carbonate, which are sensitive recorders of hydroclimatic variability in this highly evaporative region. Additional geochemical proxies (total organic carbon, C/N, and total inorganic carbon) provide supporting information on paleoecological change in and around the lake. Our data suggest progressively wetter conditions starting at the later part of the middle Holocene and extending into the late Holocene (~5500–3350 cal yr BP) followed by a millennial-scale dry period from ~3150 to 1700 cal yr BP. This latter interval encompasses the ‘Late Holocene dry period’ (LHDP) reported by other investigators, and our data help refine the area affected in this episode. Our data also show evidence for a series of century-scale fluctuations in regional hydroclimate, including wet and dry intervals between 2350 and 1600 cal yr BP, and drier conditions over the past few centuries. Paleohydroclimate trends in the LPAH record show correspondence with those from the central Great Basin to the north, suggesting that both areas were subject to similar climatic forcings.
The postglacial vegetation and fire history of the Greater Yellowstone Ecosystem is known from low and middle elevations, but little is known about high elevations. Paleoecologic data from Fairy Lake in the Bridger Range, southwestern Montana, provide a new high-elevation record that spans the last 15,000 yr. The records suggest a period of tundra-steppe vegetation prior to ca. 13,700 cal yr BP was followed by open Picea forest at ca. 11,200 cal yr BP. Pinus-Pseudotsuga parkland was present after ca. 9200 cal yr BP, when conditions were warmer/drier than present. It was replaced by mixed-conifer parkland at ca. 5000 cal yr BP. Present-day subalpine forest established at ca. 2800 cal yr BP. Increased avalanche or mass-wasting activity during the early late-glacial period, the Younger Dryas chronozone, and Neoglaciation suggest cool, wet periods. Sites at different elevations in the region show (1) synchronous vegetation responses to late-glacial warming; (2) widespread xerothermic forests and frequent fires in the early-to-middle Holocene; and (3) a trend to forest closure during late-Holocene cooling. Conditions in the Bridger Range were, however, wetter than other areas during the early Holocene. Across the Northern Rockies, postglacial warming progressed from west to east, reflecting range-specific responses to insolation-driven changes in climate.
Remains of the North American water vole (Microtus richardsoni) have previously been recovered from late Pleistocene and Holocene deposits in southwestern Alberta, western Montana, and north-central Wyoming. All are within the historically documented modern range of the metapopulation occupying the Rocky Mountains; no ancient remains of this large microtine have previously been reported from the metapopulation occupying the Cascade Range. Four lower first molar specimens from the late Holocene Stemilt Creek Village archaeological site in central Washington here identified as water vole are from the eastern slope of the Cascade Range and are extralimital to the metapopulation found in those mountains. There is no taphonomic evidence indicating long-distance transport of the teeth, and modern trapping records suggest the local absence of water voles from the site area today is not a function of sampling error. The precise age of the Stemilt Creek Village water voles is obscure but climate change producing well-documented late Holocene advances of nearby alpine glaciers could have created habitat conditions conducive to the apparent modest shift in the range of the species represented by the remains.
The Upper Gunnison Basin (UGB), Colorado, is a montane region characterized by unusual physiography and topographic isolation. Excavations of three caves in the UGB provide one of the most diverse records of high-elevation late Quaternary vertebrates in North America. The localities, Haystack Cave (2450 m above sea level [m asl]), Cement Creek Cave (2860 m asl), and Signature Cave (3055 m asl), together provide a near-continuous record of vertebrate communities that extends from before the last glacial maximum to the present. These communities largely represent a sagebrush (Artemisia spp.) steppe-tundra environment that prevailed throughout the UGB in the late Pleistocene. At least five taxa of extinct large mammals disappear from the UGB by the Early Holocene; one small mammal (the short-faced skunk Brachyprotoma cf. B. brevimala) also became extinct. The fossil record further indicates that only four small extant mammals (Sorex preblei, Dicrostonyx sp., Lemmiscus curtatus, and Urocitellus elegans) were extirpated from the UGB by the Early Holocene, in part because of community restructuring and loss of open habitats with expansion of forests to higher elevations. An analysis of taxonomic richness and evenness at Cement Creek Cave indicates high resilience in the small mammal community despite major climate shifts over the past 40,000+ yr.
Many mammalian populations conform spatially and temporally to Bergmann's rule. This ecogeographic pattern is driven by selection for larger body masses by cooler temperatures and smaller ones by warming temperatures. However, it is unclear whether the response to warming or cooling temperatures is (a)symmetrical. Studies of the evolutionary record suggest that mammals evolve smaller body sizes more rapidly than larger ones, suggesting that it may be “easier” to adapt to warming climates than cooling ones. Here, we examine the potential asymmetrical response of mammals to past temperature fluctuations. We use the fossil midden record of the bushy-tailed woodrat, Neotoma cinerea, a well-studied animal that generally conforms to Bergmann's rule, to test the ability of populations to respond to warming versus cooling climate throughout its modern range in western North America over the late Quaternary. We quantified the response to temperature change, as characterized by the Greenland Ice Sheet Project 2 temperature record, using N. cinerea presence/absence and “darwins.” Our results show that populations within the modern range of N. cinerea show little difference between warming and cooling events. However, northern, peripheral populations are absent during older, cooler periods, possibly due to climate or taphonomy. Our study suggests adaptation in situ may be an underestimated response to future climate change.
Arid central Asia plays an important role in global climate dynamics, but large uncertainties remain in our understanding of the region's hydroclimate variability during the Late Quaternary. Here we present a new, high-resolution record of lacustrine sediment grain-size and element chemistry from Ebinur Lake, which was used to infer lake conditions and related climate changes in the study region between ca. 39.2 and 3.6 ka. End-member modeling analysis of grain-size data and PCA of elemental data show that lake level fluctuated dramatically from 39.2 to 34.0 ka. Subsequently, Ebinur Lake experienced a high stand from 34.0 to 28.0 ka, under humid climate conditions. The subsequent period, from 28.0 to 12.0 ka, was characterized by lake regression under dry climate conditions, whereas afterward (12.0–3.6 ka), considerably higher lake levels and humid conditions again prevailed. Millennial-scale abrupt climate changes, such as Heinrich events (H3 and H1) and the Younger Dryas, which are documented in the North Atlantic region, are also detected in the sediment record from Ebinur Lake. Comparisons with other sediment records from arid central Asia generally support the claim that climate change in this region was influenced mainly by variations in North Atlantic sea surface temperatures, through the westerlies.
The Barents Sea offers a suitable location for documenting advection of warm and saline Atlantic Water (AW) into the Arctic and its impact on deglaciation and postglacial conditions. We investigate the timing, succession, and mechanisms of the transition from proximal glaciomarine to marine environment in the northwestern Barents Sea. Two studied sediment cores demonstrate diachronous retreat of the grounded ice sheet from the Kvitøya Trough (core S2528) to Erik Eriksen Trough (core S2519). Oxygen isotope records from core S2528 depict a two-step pattern, with lower δ18O values prior to the Younger Dryas (YD), and higher values afterward because of advection of the more saline, 18O-enriched AW. At this location, subsurface AW penetration increased during the Allerød and YD/Preboreal transition. In the study area, foraminiferal and dinocyst data from the YD interval suggest cold conditions, extensive sea-ice cover, and brine formation, along with the flow of chilled AW at subsurface and the development of a high-productivity polynya in the Erik Eriksen Trough. Dense winter sea-ice cover with seasonal productivity persisted in the Kvitøya Trough area during the early Holocene, whereas surface warming seems to have occurred during the middle Holocene interval.
The continental shelf strata provide information regarding sea-level fluctuation and climate changes in the Quaternary period. A 5831.47-km-long high-resolution seismic profile and borehole core (YS01) were acquired to reconstruct the evolutionary history of the strata in South Yellow Sea (SYS) during the late Pleistocene. The strata recorded three transgression events (HI, HII, and HIII) and three stages of paleochannel development (LI, LII, and LIII). Based on the distribution, thickness, and volume of the strata formed in the three transgressions, we concluded that the scale of the three transgressions during the late Pleistocene was HIII, HI, and HII, in descending order. In addition, our data show that the Yellow River extended to the Yellow Sea Trough during the last glacial maximum. The influence of the tectonic framework on sedimentation in the SYS was completely concealed by sea-level changes and sediment supply in the late Pleistocene (~Marine Isotope Stage 5). Since then, the accommodation space, a crucial prerequisite for sedimentation, has been controlled solely by sea-level changes in the SYS. Furthermore, two “source to sink” models of the neritic shelf in the marine and terrestrial environments were established, including high sea-level and shelf-exposure models.
The Foothills Erratics Train consists of large quartzite blocks of Rocky Mountains origin deposited on the eastern slopes of the Rocky Mountain Foothills in Alberta between ~53.5°N and 49°N. The blocks were deposited in their present locations when the western margin of the Laurentide Ice Sheet (LIS) detached from the local ice masses of the Rocky Mountains, which initiated the opening of the southern end of the ice-free corridor between the Cordilleran Ice Sheet and the LIS. We use 10Be exposure dating to constrain the beginning of this decoupling. Based on a group of 12 samples well-clustered in time, we date the detachment of the western LIS margin from the Rocky Mountain front to ~14.9 ± 0.9 ka. This is ~1000 years later than previously assumed, but a lack of a latitudinal trend in the ages over a distance of ~500 km is consistent with the rapid opening of a long wedge of unglaciated terrain portrayed in existing ice-retreat reconstructions. A later separation of the western LIS margin from the mountain front implies higher ice margin–retreat rates in order to meet the Younger Dryas ice margin position near the boundary of the Canadian Shield ~2000 years later.
Understanding the properties of time averaging (age mixing) in a stratigraphic layer is essential for properly interpreting the paleofauna preserved in the geologic record. This work assesses the age and quantifies the scale and structure of time averaging of land snail-rich colluvial sediments from the Madeira Archipelago (Portugal) by dating individual shells using amino acid racemization calibrated with graphite-target and carbonate-target accelerator mass spectrometry radiocarbon methods. Gastropod shells of Actinella nitidiuscula were collected from seven sites on the volcanic islands of Bugio and Deserta Grande (Desertas Islands), where snail shells are abundant and well preserved in Quaternary colluvial deposits. Results show that the shells ranged in age from modern to ~48 cal ka BP (calibrated radiocarbon age), covering the last glacial and present interglacial periods. Snail shells retrieved from two of the colluvial sites exhibit multimillennial age mixing (>6 ka), which significantly exceeds the analytical error from dating methods and calibration. The observed multimillennial mixing of these assemblages should be taking into consideration in upcoming paleoenvironmental and paleoecological studies in the region. The extent of age mixing may also inform about the time span of colluvial deposition, which can be useful in future geomorphological studies. In addition, this study presents the first carbonate-target radiocarbon results for land snail shells and suggests that this novel, rapid, and more affordable dating method offers reliable age estimates for small land snail shells younger than ~20 cal ka BP.
Pollen, spores, phytoliths, and microscopic charcoal from a sedimentary column in Hall's Cave, south-central Texas, provide information for local and regional vegetation change during the last deglaciation and the Holocene in the context of broader regional and global climatic changes. The combination of paleoenvironmental proxy data from the cave indicates that between about 18,000 and 16,500 cal yr BP the cave area was dominated by an open plant community consisting of herbaceous vegetation, dominated by C3 grasses, and scattered trees, primarily Quercus and Pinus species. After about 16,500 cal yr BP, the arboreal component fluctuated, attaining a peak between 14,000 and 13,000 cal yr BP with relatively equal proportions of C3 and C4 grasses, including a sizable proportion of Panicoideae grasses. The Younger Dryas is marked by a conspicuous decrease in arboreal pollen with an apparent increase of C4 grasses toward its termination. Early Holocene recovery of arboreal vegetation is followed by a drying trend marked by the increasing dominance of C4 drought-tolerant Chloridoideae grasses. Increasing human use of the cave in middle to late Holocene times creates noise in the climatic significance of pollen, phytolith, and other proxies, a factor to consider when interpreting paleoenvironmental proxies in other cave sedimentary records.
We investigated climate niches of grasses at regional scales and quantitatively reconstruct Asian monsoon precipitation at the sand-loess transitional zone in northern China. Our results provide direct evidence that certain grass lineages have been specialized in specific habitats: Pooideae grasses stand out and occupy a much cooler environment than all other subfamilies; Pooideae, Aristidoideae, and Chloridoieae occupy dry environments. Pooideae grasses occupy the coldest and driest environments compared to all other subfamilies, with a mean annual temperature (MAT) and precipitation (MAP) of ~13.6 to ~15.3°C and 224 to ~1674 mm, respectively, at a regional scale. We built a database for grasses and their corresponding climate parameters. Based on this database, past climate parameters at the margin of the Asian summer monsoon since ~70 ka were quantitatively reconstructed by phytolith assemblages. They show that this area was dominated by cold- and dry-adapted grasses since ~70 ka with a MAT and MAP of ~3.3 to ~11.0 °C and ~442 to ~900 mm, respectively, generally consistent with the results of phytolith-based transfer function reconstructions and with the results of previous nearby pollen-based quantitative reconstructions. With the improvement of the species-climate and ecosystem dataset, our database-based method is a promising quantitative reconstruction approach to past climatic change in the monsoon region.
Late Quaternary landscapes of unglaciated Beringia were largely shaped by ice-wedge polygon tundra. Ice Complex (IC) strata preserve such ancient polygon formations. Here we report on the Yukagir IC from Bol'shoy Lyakhovsky Island in northeastern Siberia and suggest that new radioisotope disequilibria (230Th/U) dates of the Yukagir IC peat confirm its formation during the Marine Oxygen Isotope Stage (MIS) 7a–c interglacial period. The preservation of the ice-rich Yukagir IC proves its resilience to last interglacial and late glacial–Holocene warming. This study compares the Yukagir IC to IC strata of MIS 5, MIS 3, and MIS 2 ages exposed on Bol'shoy Lyakhovsky Island. Besides high intrasedimental ice content and syngenetic ice wedges intersecting silts, sandy silts, the Yukagir IC is characterized by high organic matter (OM) accumulation and low OM decomposition of a distinctive Drepanocladus moss-peat. The Yukagir IC pollen data reveal grass-shrub-moss tundra indicating rather wet summer conditions similar to modern ones. The stable isotope composition of Yukagir IC wedge ice is similar to those of the MIS 5 and MIS 3 ICs pointing to similar atmospheric moisture generation and transport patterns in winter. IC data from glacial and interglacial periods provide insights into permafrost and climate dynamics since about 200 ka.
The Arda and Stirone marine successions (Italy) represent key sections for the early Pleistocene; they were deposited continuously within a frame of climate change, recording the Calabrian cooling as testified by the occurrence of the “northern guests,” such as the bivalve Arctica islandica. In addition, although the first occurrence of A. islandica in the Mediterranean Sea was used as the main criterion to mark the former Pliocene-Pleistocene boundary, the age of this bioevent was never well constrained. Here, we describe the Stirone depositional environment and constrain for the first time the section age using calcareous nannofossil and foraminifera biostratigraphy. We also correlate the Arda and Stirone sections using complementary biostratigraphic and magnetostratigraphic data. Our results indicate that A. islandica first occurred in both the successions slightly below the top of the CNPL7 biozone (dated at 1.71 Ma). Comparisons with other lower Pleistocene Mediterranean marine successions indicate that the stratigraphically lowest level where A. islandica first occurred in the Mediterranean Sea is in the Arda and Stirone sections; these environments satisfied the ecological requirements for the establishment and the proliferation of the species, which only subsequently (late Calabrian) has been retrieved in southern Italy and other areas of the Mediterranean Sea.
Schmidt-hammer exposure-age dating (SHD) was applied at 15 sites with glacially-transported granite boulders in parts of northern and western Ireland and southwest Scotland that had been exposed by retreat of the last British-Irish Ice Sheet (BIIS) or Younger Dryas (YD) ice masses. Seven of these surfaces had previously been dated using terrestrial cosmogenic nuclide (TCN) exposure-age dating. Application of the granite calibration equation of Tomkins et al. (2018c) indicated a close correspondence between the SHD ages and the TCN ages (within 1σ or 2σ uncertainties). These findings demonstrate that SHD ages can be of comparable accuracy, precision, and reliability to TCN ages and are a strong argument for the more extensive use of SHD in some Quaternary dating projects. However, surface ages obtained by both SHD and TCN dating should not be accepted uncritically; they must be assessed in relation to the wider geological, geomorphological, and geochronological evidence. Evaluation of eight SHD ages, for which corresponding TCN ages are not available, indicate that most are consistent with current theory and field evidence, but some anomalous age estimates occur. | https://core-cms.prod.aop.cambridge.org/core/journals/quaternary-research/issue/6150B36081AD646206DB5573D50DEA77 |
The goal of this thread is to elaborate and update the way Threefold share and create informational content.
Ultimately, we could have every guides presented in different ways, in order to reach as many different audiences as possible. For example, many people prefer videos over written documentation. Some people would rather have open discussions of a subject and thus prefer podcasts over audiobooks.
There is also mainly two ways to share information, in general, and specifically:
- General and accessible information
- Examples:
- General twitter posts
- TF News/announcements
- Examples:
- Specific information
- Examples:
- Documentation
- DIY guides
- Examples:
It would also be efficient to have a place to document all the available content and make sure it is available in all the media platforms and also all the types of media.
This project can clearly be aligned with the thread Project Management by @FLnelson.
Proposition: Interactive Spreadsheet
We could have a public spreadsheet where we could keep track of all the different informations. The spreadsheet could be organized in a multi-dimensional fashion (see below: media platforms, types of media, etc.). The spreadsheet acts as a general way to organize the information, but many other ways are possible.
In short, the goal is to develop a structure to ease collaboration and content creation among the TF Community, as well as providing clear documentation on the documentation itself: what information is out there on Threefold? Where is it available? How does the audience react? Are we reaching all the audience possible? Can a complete beginner come onboard and build the New Internet?
Concrete example
For example, say @hannahcordes writes a new blog article. Then she can put the article in the appropriate section of the spreadsheet.
Then someone could come up there, see the blog and then publish it on Threefold’s reddit, once it’s done the person would add that information to the spreadsheet. This could go on and on, and finally the post would be shared on different platforms.
Here’s another example. Someone makes a TF video on how to build a DIY 3node. He publishes it on youtube and add it to the spreadsheet. Then, another TFolder sees this and adds a video link to the Threefold subreddit.
Then another person takes this video and make a picture guide out of it and publish it on the TF Forum. This goes on and on.
Then finally the DIY 3node guide is available on different platforms and in different media type. And the TF community know where the content has been posted and can track and get feedback from the audience.
Another example, someone publishes a TF meme, we could upload it to Twitter, to Pinterest and to Instagram.
A knowledge-based meme (informational poster) could be very powerful when shared this way.
The final (or most up-to-date) version of that spreadsheet would be the summation of all Threefold’s available and up-to-date content. Indeed, when information is outdated, it could be stated and we could open queries for the TF community to update the content.
Documentation to Help the TF Community Members
We could have an easier to digest presentation of such information instead of the spreadsheet for everyday users, share it on the TF Forum or on the TF website. This would be the frontend version of the project, while the spreadsheet would be used for the TF community, as the backend version of the project.
Basically, it’s like a Threefold Video Gallery, but for every Threefold content. It would be akin to the mind map of Threefold. Once we have the spreadsheet, we can publish the information in diverse ways, graphically as a literal mind map would be an option for example.
Note that with the spreadsheet’s macros, we could then reorganize at will the information gathered. For example, it could be queried over the TF Grid, via the NLP bot, and users ask (for example):
How can I deploy a Presearch node on TF Grid?
Then the NLP bot would give the basic FAQ answer and categorized links to the available documentation, e.g. picture guide, DIY videos.
Of course, a more complex version of this project would be building a library of Threefold in object-oriented programming.
Threefold’s Categories of Information
The following is the different dimensions/categories to take into perspective and can/should be expanded. Ideas and suggestions are welcome!
Media Platforms
- Telegram
- Threefold website
- Substack
- Threefold blog
- Medium
- Discord
Types of Media
- Audio
- podcast
- Threefold Podcast
- audio version of e-book, written documentation
- possible project to turn into audio:
- e.g Litepaper
- e.g Liquidity pool paper
- possible project to turn into audio:
- audio version of substack/TF blog articles
- podcast
- Visual
- meme/poster
- knowledge-base: for educational purpose
- entertainment-base: to generate interest and attract different audiences
- Diapositive Presentation (powerpoint style)
- e.g. Deep Dive presentations turned into stand-alone readable diapo
- content-rich, aesthetically-driven presentations
- e.g. Deep Dive presentations turned into stand-alone readable diapo
- Picture Guide
- e.g DIY 3node picture guide
- rack server
- tower server
- mini-pc
- etc.
- e.g DIY 3node picture guide
- meme/poster
- Audio-visual
- videos
- short: à la Tiktok DIY
- videos under 1 minute
- short and efficient
- useful for short attention span public
- e.g boot Zero-OS in 1 minute video!
- useful for short attention span public
- short and efficient
- videos under 1 minute
- long: à la Youtube DIY
- e.g. Nelson’s videos (Threefold Video Gallery)
- short: à la Tiktok DIY
- videos
- Written
- FAQ
- quickest and simplest way to get the raw information
- Written guide (long form)
- build up the basic information
- Farming Guide
- build up the basic information
- Article (short form)
- Substack/Medium/Threefold blog
- article on a TF news, on new DIY guide, on general information, etc.
- Substack/Medium/Threefold blog
- Reddit post
- Twitter/Telegram/Discord news announcement
- FAQ
Type of Threefold Users
- Grid User
- Grid Developer
- Farmer
- Validator
Specific Content
The specific content can be literally anything Threefold-related.
- Farming Guide
- DIY 3nodes
- Deploy a blockchain node
- Presearch node
- etc.
A particular content can then be shared and expanded on different platforms and in different formats (audio, visual, audio-visual, written, etc.).
EDIT: The sum of all specific contents, in all available formats, could constitute the total Threefold documentation, from basic to advanced farming, to using and developing on the TF Grid, etc.
For the TF Community and for the general public
On the frontend, the audience would see this as a very detailed post such as this one from @gosam : https://t.me/threefold/94, which is really amazing and contains a lot of information and resources. Much in line with this, the proposed project would be constantly updated and, being open to audiences’ feedbacks, TF could grow even more organically.
On the backend, this project would really help the TF community to be efficient in organizing projects and it would also ease contributions between members.
What do you guys think?
Do you have other idea of media platforms?
Other idea of type of media?
Any suggestion to expand the concept of the project?
Clearly a LONG post. | https://forum.threefold.io/t/threefold-content-everywhere-for-everyone/3111 |
Exam dates could be brought forward or ‘compressed’ to allow for extra time to process university applications under new proposals for post-qualification admissions (PQA).
The Department for Education opened its consultation into the proposed changes for a PQA system into higher education today.
One model would see pupils apply to university after receiving their A-level results, while a second model would allow pupils to make ‘pre-qualification’ applications but would likewise only receive offers after results are announced.
Under the first model there would be the need for a longer application window which would be created by moving A-level results day forward from mid-August to the end of July and pushing back university term start dates to “no earlier than the first week of October”.
This would allow “at least six weeks” for the processing of applications and the making of offers.
The DfE explains it is exploring different options which would allow it to move results day earlier with the preferred route being “to compress the exam timetable, the marking period and the requirement for UCAS to receive results data well in advance of results day”.
Another option could include exams being held earlier “but the feasibility and impact of this” will be explored through the consultation.
Under this model it is noted students may require support in choosing courses and completing applications but if teachers were expected to provide this support it could have implications for their statutory terms and conditions.
The consultation states: “Our preference would be to avoid affecting teachers’ conditions or workloads as much as possible.”
Under the second model, applications would be made during term-time, as they are now, but offers would come after results day.
A benefit of this model would be students “require significantly less support over the summer with their applications” – which would have less impact on teachers.
The DfE states this route could be implemented with smaller changes to results day – only bringing it forward by a week or two – and term start dates and “could create a longer window of approximately 9-10 weeks for the making and accepting of offers”.
Pupils would apply in the normal way at around the same time as they currently do. However applications would be held in the system until results day and offers are only made once results are known.
In order to ensure no offers are made in advance a third party, such as UCAS, would hold the full application until results day – with headline data released to providers to enable the planning on intakes.
Gavin Williamson explained the proposal has come about as it “is becoming increasingly evident that the current system of admissions to higher education is preventing some students from reaching their full potential at the first hurdle” and PQA could “level-up” admissions for disadvantaged students.
Last year a study by the Sutton Trust into reforming university admissions 66 per cent of just over 500 students surveyed in September felt a post-qualification approach would be fairer than the current system of predicted grades, with 30 per cent saying it would be “much fairer”.
In the equality analysis accompanying the consultation it finds that PQA “is likely to have a positive impact on high attaining but disadvantaged students”.
While some evidence suggests “students from a white background are more likely to be positively impacted by moving to a system no longer based on predicted grade . .. in any case, it is likely that White and Black students will benefit most from the implementation of post qualification admissions.”
The consultation closes on May 13. | https://schoolsweek.co.uk/compressed-exams-and-early-results-day-post-qualification-admissions-proposals-revealed/ |
Repetitive transcranial magnetic stimulation, or rTMS, which delivers brief but intense magnetic pulses to the brain, may be as effective as traditional electroconvulsive therapy in treating severe depression, according to a University of Illinois at Chicago study.
That's good news, said Dr. Philip Janicak, medical director of UIC's Psychiatric Clinical Research Center and head of the clinical trial, because rTMS appears to produce fewer harmful side effects than electroconvulsive therapy, better known as shock treatment.
The preliminary results of the UIC trial will be published in a forthcoming issue of Biological Psychiatry. An abstract of the paper is currently available online at http://www.elsevier.com/locate/biopsych.
In rTMS, a physician uses a hand-held wire coil to produce a controlled, rapidly fluctuating magnetic field with a strength of 1.5 to 2 Tesla, about the same strength used in magnetic resonance imaging but more focused. The coil is placed over the left prefrontal cortex, an area of the brain behind the forehead that in depressed patients typically shows abnormal electrical activity and decreased blood flow. The magnetic pulses pass through the skull into this targeted area. The procedure lasts about 10 to 15 minutes, during which about 1,000 stimulations occur.
Compared with electroconvulsive therapy, which works by inducing a seizure, rTMS is relatively benign, according to Janicak. Sedation is not required, and patients do not appear to experience deterioration in memory or cognition, standard side effects of shock treatment. However, there is a very small risk of an inadvertent seizure.
"Patients might feel their facial muscles contract at the time of treatment and may have a mild headache afterward, but that's all," Janicak said. | http://news.bio-medicine.org/medicine-news-2/Magnetic-stimulation-may-be-as-effective-as-electroconvulsive-therapy-in-treating-severe-depression-8940-1/ |
As Fashion Revolution gets bigger each year, so do the high profile events. This year’s Fashion Question Time event on 24 April had a panel discussion about the future of fashion. I was lucky enough to score a ticket to go to the event at the Victoria and Albert Museum (what a fantastic location for such an event!) to hear it. The panel discussed questions submitted in advance by attendees and it was chaired by Baroness Lola Young of Hornsey, known for her work on modern slavery. These were the speakers:
- Mary Creagh, MP and Chair of the Environment Audit Committee
- Laura Balmond, Project Manager for Make Fashion Circular, Ellen MacArthur Foundation
- Mark Sumner, Lecturer in Sustainability, Fashion & Retail, University of Leeds
- Hendrik Alpen, Sustainability Engagement Manager, H&M Group
Before I dig into the discussion, a brief mention of diversity. Having been to a few sustainable fashion events in London in the past year, I do notice the crowd is a bit of a bubble with a lot of familiar faces to say hi to. Whilst this is no bad thing given a lot of people work extremely hard within the fashion industry to effect change, I do wonder when (or if) these events will start to see more diverse attendance? The demographic is 95% women, all quite well dressed, mostly white. Age wise there are many in my age group. The next biggest group seemed to be those in their 20’s (students maybe?) and there was a scattering of people from my mother’s generation. Whilst it didn’t feel like an exclusive event, the narrow demographic was noticeable (my views on sustainability and inclusion can be found on the Sewcialists blog here)
Back to the talk, here are 3 key messages I got out of the session:
1. We know and acknowledge our overconsumption problem … and that it will continue
Fashion is here to stay as long as there is demand. What H&M want to do is to figure out how to still serve the desire that consumers have to buy stuff, but do it better than now. For example, could waste be seen as an unexplored business opportunity that just needs a business model around it? Hendrik Alpen from H&M also highlighted some of the different programs that H&M have implemented in their bid to do things better. For example the textile recycling scheme in stores (which ironically encourages you to buy more by giving you a discount voucher). And H&M’s newly launched product transparency tool where you should be able to see which factory made your garment.
For me, the elephant in the room remains that we measure economic growth via consumption. I wrote about buying culture awhile back and I don’t feel we’ve moved on much. At the session, I kind of felt that the panel was accepting that we had to keep working within the current economic system. And instead of reinventing (which is a ginormous mammoth task), the workaround is to look at circular economy type initiatives. In fashion, this might be putting back clothing waste into the system and turning it into new clothes. There was a mention of people buying better quality and less, but the overarching vibe was that people would still want to buy so we need to find ways of dealing with that.
(Just by the way, overconsumption doesn’t just apply to fashion, it is everywhere. Flying, for example, is one such area which is bad for the environment and can be addressed on a personal level. But for those of us privileged enough to take advantage of cheap air travel, realistically how much are you going to limit your air travel? Climate change activist schoolgirl Greta Thunberg made a point of coming to London from Sweden via train and it took 2 days, but I’m not sure the rest of us are that dedicated).
2. There must be a multi-pronged approach to tackling fashion
Mary Creagh acknowledged that fashion is too cheap, and the true cost of production (i.e. the value of materials, labour, carbon emission, water etc.) is externalised to developing countries. It was great to hear this being acknowledged and it reminded me of a recent interview with Kathryn Hamnett where she thought that we should only allow imports that were made to the same standards as there would be in the UK. As you’d expect this would push up the price of fashion. I think Kathryn is right that this wouldn’t happen without some kind of legislation, but I’m not convinced there is political will for that anyway. Mary mentioned the proposed penny tax on each garment to be paid by producers but I wonder whether that might even be a bit too much to stomach.
The idea from Laura Balmond from the Ellen Macarthur Foundation that change and innovation in fashion would likely be business led (rather than regulatory led) was an interesting one. Her theory is that organisations needed to unite behind a common purpose and work together to innovate. I’m not sure I agree with this unless there starts to be a trend for business to start declaring climate emergencies. It has been pretty clear that voluntarily looking at sustainability hasn’t been effective enough. Also thinking about the logistics of this – how do you define a common purpose (who is going to lead?) Who is accountable for funding research and development? I know that some of the big brands have charitable foundations attached to them, and there is also academic research and government funding. But will having no (or very little) government incentivisation really lead to significant change that brings all fashion brands on board?
The panel agreed that regulation would help to level the playing field, particularly when there are many high street fast fashion brands who appear to be ignoring climate change altogether. Mark Sumner pointed out that some fast fashion factories demonstrate best practice in their operations, with some places generating only around 1% in waste material. But there are also factories producing for luxury brands who are quite the opposite, showing yet again that pricing is not reflective of cost.
Finally, there was a question about whether synthetic fibres should be banned. According to Mark Sumner, scientific evidence shows that from a life cycle perspective, polyester is much more sustainable than poorly grown cotton. He also emphasised that when it comes to dyes, natural isn’t always best (arsenic in green dye anyone?) just because it might have been around for hundreds of years. I hope to catch up with Mark at some point to talk more about fibres and to share it with you.
3. Consumers need to come for the sustainability ride
All the panel members mentioned social justice and were at pains to emphasise that fashion should be accessible to everyone. Fashion must be fashionable and still be able to do all those good things for the individual. Self-esteem, identity, and self-expression etc. If it can’t, then will fashion even exist … or will we just have clothes?
The concern for H&M, and I’m guessing for all brands, is that if you can’t satisfy that consumer demand for new cool things then consumers go elsewhere. This is a rock and a hard place and goes back to the point about consumption and the desire to buy. Not to mention the juxtaposition that is the marketing of sustainable fashion.
But as long as sustainability remains a thing that consumers have to “look for” in clothing, and still continue to desire new and novel items, sustainability as a normalised mainstream thing will continue to be a challenge.
—
There was lots more discussion in the 1.5hours that I’m not covering in this whistle-stop tour but we’ll be here all day if I keep writing! I’m not sure if there was an official recording; if I can find one I will certainly share the link.
It was a good discussion but there wasn’t anything earth-shattering I haven’t heard before. Or maybe I’m just feeling the frustration of things moving at snail speed, and not only in fashion. When I read the news of the climate protests in London last week I know I’m not alone. Whatever you think of the actions of the protestors, public pressure worked to a point. They got the attention of the government and are meeting the Environment Secretary next week as well as the London mayor. Even if Greta Thunberg rightfully points out that the rising emissions curve is the only thing that really matters (it’s not about the beautiful words and promises), my 13+ years in finance tells me that there’s no such thing as wholesale change overnight unless there’s a trigger. If the increase in incidents of wild weather causing devastation to humans isn’t enough of a trigger, I don’t know what will be.
But let me go back to fashion and leave you with the 4Ps that Baroness Young referenced at the start and the end of the session. Quoting lawyer-turned-fashion designer Paul Van Zyl about what we need to do to fix fashion, she said we need to: Protest, Protect, Prohibit, Propose. Mark Sumner added a fifth one which I think is by far the most important: Participate.
Easy, right?
—
PIN FOR LATER: | https://timetosew.uk/big-issues-fashion-revolution-2019/ |
Policies regarding who may borrow materials from the Oxford College Library.
Oxford Library Code of Conduct
Oxford College Library welcomes you to an environment conducive to a variety of study needs and intellectual pursuits. We strive to provide quality services, excellence resources, comprehensive collections and a comfortable and safe environment.
Policy on the Collection, Use, and Disclosure of Personal Information
Emory Libraries recognize the importance of protecting the personal privacy of all its users, whether in person or online.
Emory Libraries strives to protect the privacy and dignity of all patrons, in person and online, by protecting confidentiality of users of library materials and not revealing personally identifiable information.
Subpoena and Warrant Procedures
Procedures have been established to ensure that library staff at all levels respond appropriately in the event of a request by law enforcement to produce library records
Lending Policy
Policy regarding which items accrue fines, how you are notified, and replacement costs.
Public Screening Policy
Information regarding public film screenings on the Oxford campus.
Digital Collections Copyright and Content Policy
This policy covers the digital collections housed on the Emory Libraries website and in digital collections spaces.
Digital Collections Takedown Request Form
This form allows individuals to object to Emory Libraries sharing of materials.
Harmful Language in the Library Catalog
If you discover harmful or offensive language in Emory University Libraries catalog records please let us know. | https://oxford.library.emory.edu/about/privacy-and-related-policies |
The purpose of study was to research the buffering effect of mindfulness between the stressors and perceived stress in faith-based university students. Literature suggests that as mindfulness increases, stress decreases. This study attempts to provide information on college students’ perceived stress levels, stressors they face, and mindfulness awareness. A multiple linear regression was conducted to examine the association between perceived stress, stressors, and mindfulness levels. A sample of 91 students in the Spring of 2018 at a faith-based university in Texas were asked to participate in an online survey. Some findings were not congruent with the literature. The results of this study found that the significant factors of perceived stress were: overwhelming responsibilities, class attendance, being female, sleep, and course load. The top stressors of students were course load and responsibility. It also showed how female students showed to be more stressed and overall students at this private university showed to be more stressed then in other studies. Though mindfulness did not buffer the effect of stressors and perceived stress, the results of this study informed the university and counseling center of the stressors of college students on campus, mindfulness levels, and perceived stress levels. Prevention is key to student success, and college counseling centers can provide prevention for students by offering one-on-one counseling, group counseling, workshops, and skills training for students.
Glantz, Amber, "The Buffering Effect of Mindfulness Between the Stressors and Perceived Stress in Faith-Based University Students" (2018). Digital Commons @ ACU, Electronic Theses and Dissertations. Paper 108. | https://digitalcommons.acu.edu/etd/108/ |
A growth in the demand for ceramic vessels from the mid-17th century onwards, stimulated by a decline in the popularity of pewter tableware and the high price of glass vessels, encouraged local potteries across the North West to produce a range of relatively cheap and durable earthenware for the table, food preparation and storage. Prior to the ‘industrialisation’ of pottery manufacturing in the 18th century, it was very much a domestic industry, which usually involved the whole of the potter’s family. It was frequently carried out in buildings alongside the family dwelling, and often ancillary to farming or other craft occupations. Potters of yeoman status were able to establish a potworks as a part of their farmsteads, either using existing agricultural buildings or erecting purpose-built structures (Baker 1991, 8).
The market for pottery continued to thrive during the 18th century, with a corresponding rise in the number of small-scale country potteries. These were often located in the rural hinterlands to expanding urban centres, with potting typically forming a part-time, seasonal activity. Despite the widespread occurrence of these potworks in the Post-Medieval landscape, however, very few production sites have been subject to archaeological excavation in the North West, hampering attempts to identify the provenance of pottery fragments from excavations as the product of a specific production centre.
Establishing the exact provenance of pottery in the absence of data for the production centres and their products is particularly challenging with fragments of utilitarian, dark-glazed earthenware, which have formed a large proportion of assemblages recovered from the excavation of Post-Medieval sites across the region. An excavation of the Grimshaw Pottery at Grimshaw Park, Blackburn (L), in 2010 provided a large assemblage of dark-glazed earthenware, allowing a type series to be identified that can be linked to a specific kiln (Plummer 2011). Whilst historical documents indicate that the pottery was in production before the late 18th century, the excavated kiln and outbuildings dated to the early 19th century after a fire reportedly destroyed the original buildings. Nevertheless, the excavated kiln is likely to be of a form that had been used widely during the late Post-Medieval period, and its products characteristic of the utilitarian wares that were prevalent across the region.
Several settlements in the North West emerged as important production centres during the Post-Medieval period, where potting was a skilled, full-time occupation. Amongst the best-known of these regional manufacturing centres are Rainford and Prescot (M), where the production of pottery and clay tobacco pipes became an important cottage industry from the 17th century. Particularly valuable information pertaining to these industries has derived from the series of archaeological excavations in Rainford (M). Carried out as part of the Rainford’s Roots Community Archaeology Project in 2011-14, the excavations produced regionally significant groups of 16th– and 17th-century pottery, although no kilns were uncovered. The project culminated with the publication of a monograph that presents the results of the archaeological and meticulous historical research into the area’s pottery industry (Philpott (ed) 2015).
Archaeological work has also been carried out in nearby Prescot (M), situated some 10km to the south, where excavation in advance of construction work for the Shakespeare North Playhouse in 2017-18 yielded a large and regionally important assemblage of pottery with a date range spanning the 16th to 19th centuries. A large component of this assemblage comprised fragments of dark-glazed earthenware, although slipware vessels of a probable 17th-century date with distinctive decoration were also discovered, together with dark-glazed finewares, red earthenware, mottled ware and sugar moulds (Rowe forthcoming a). The assemblage also contained numerous fragments of waste pottery and kiln furniture that included saggars of various fabrics and sizes, and whilst firm evidence for a kiln structure was not identified during the excavation, the remains of a stone-built structure that was revealed beneath the floors of 19th-century houses may have been associated with pottery production (Miller et al 2018).
Another important pottery-manufacturing settlement from the 17th century onwards was Buckley in Flintshire. Whilst the town lies just beyond the boundary of the North West region, its products served Post-Medieval markets in Chester and the surrounding area, and ‘Buckley ware’ is a term often attributed, and in many cases erroneously, to earthenware recovered from excavations in the North West. A valuable synthesis of archaeological fieldwork carried out in the town between 2013 and 2017, coupled with an overview of earlier studies, documentary research, and a comprehensive gazetteer of the Buckley potteries, was published in 2019 and makes an important contribution to the growing corpus of published material on the region’s pottery industry (Jones 2019).
Large groups of Post-Medieval pottery have been recovered from several excavations across the region in both rural and urban environments since 2006, shedding new light on the distribution of patterns of particular ware types and the material culture of different social groups. In particular, excavations in the centre of Salford (GM) have produced one of the largest assemblages of Post-Medieval ceramics recovered from an urban context (Mottershead and Garratt 2008; Mottershead 2017; Rowe forthcoming b), whilst excavation at Cuerden provided an insight into ceramic traditions in rural central Lancashire between the 15th and 18th centuries (Cook et al 2019). The latter excavation yielded fragments of Midlands Purple-type vessels that, uniquely in the context or rural Lancashire, were found in association with late Medieval Reduced Greenware and Cistercian wares in well-stratified 15th-century deposits (Cook and Miller in press). The source of the pottery to these sites, however, remains unknown, underlining the large gaps in the current knowledge of the location and distribution of the region’s Post-Medieval potworks.
A type of pottery that is often recovered from early 18th-century levels in archaeological excavations is tin-glazed earthenware. Liverpool emerged as the principal centre of the production of tin-glazed earthenware in the North West, although a few manufacturing sites existed elsewhere. The Pot House on St George’s Quay in Lancaster provides a very rare example of one such site. This 18th-century kiln has been subject to archaeological excavation, which yielded another regionally significant assemblage of pottery, together with an important group of kiln furniture fragments. However, this assemblage has yet to be published (Town 2009). | https://researchframeworks.org/nwrf/research-assessments-continued/post-medieval/technology-and-production/pottery/ |
Institute of Objective Studies (IOS) was established in the year 1986 with a view to promote empirical and conceptual research. Research is carried out on ideologies and problems relevant to Indian polity, society, economy, religion and culture. Attention has been focused on the problems of Muslims and other minority groups. The studies include the problems of development processes, community relations, social tensions, status of women etc. Within the said period the Institute has established itself as a Centre of research and intellectual activities, which is known for its objectivity in the academic world.
Its achievements and programme have received recognition from the Economic and Social Council (ECOSOC) of the United Nations. The IOS is in Consultative Status (Roster) with ECOSOC of UN.
The Institute has tried to fill the academic vacuum in approaching societal issues faced by Indian people in general and Muslims in particular. It has provided a platform for serious intellectual endeavor in the areas of Social Sciences and Humanities, and became a trendsetter in the fields of conceptual and investigative research on the Qur'anic approach to human problems and the problems of Muslims in India. Various survey projects, which focus on the problems of Muslims and other weaker sections of Indian society, are fulfilling a long felt need for statistical information and analysis in different areas.
Institute of objective studies functions in a structured manner through three types of set-ups. These set ups are as follows:
1. Governing Structure
Institute of Objective Studies is registered under Societies Registration Act, 1860 as a society for promotion of knowledge. The governing structure of the Institute as per its Memorandum of Association consists of two bodies: The General Assembly and the Governing Council.
General Assembly
The General Assembly is the supreme body of the Institute. It elects members of the Governing Council, passes the budget and annual report and recommends suitable programmes to the Governing Council. The General Assembly consists of 138 members.
Governing Council
Governing Council is the executive body of the Institute. It is responsible for administration and control of the affairs and efforts for the fulfillment of aims and objectives of the Institute and submits report of activities and progress to the General Assembly.
2. Academic Structure
The Academic Structure of the IOS consists of the following bodies:
Academic Committees
Chapters
Review and Publication Committee
Scholarship Committee
Academic Committees
The academic committees formed for the different disciplines of the social sciences, humanities and law supervise academic activities of IOS. The functions assigned to the academic committees are as follow:
To advise the Institute about the activities and programmes to be undertaken by it in different areas;
To plan various long-term and short-term research and other related activities such as seminars, workshops, orientation programmes etc.; and To monitor and evaluate the projects and activities sponsored and undertaken by the Institute.
Presently 22 academic committees are functioning to help IOS advance its objects.
Committee on Geography
Committee on Language and Literature
Committee of Education
Committee on Sociology
Committee on Environmental Studies
Committee on Revealed Knowledge
Committee on History
Committee on Psychology
Committee on Women's Studies
Committee on Economics
Committee on Law
Committee on Interaction
Committee on Human Rights
Committee on Policy Studies
Committee on Political Science
Committee on Philosophy
Committee on Labour Studies
Committee on Current Issues
Committee on South & South East Asian Studies
Committee on Waqf Studies
Committee on Non Governmental Organisations (NGOs)
Committee on Central Asia, Middle East and Balkan
Chapters
The Chapters of the IOS have been established in the six important cities in India to concentrate on their respective region to actively pursue advancement of the objectives of the IOS. The objectives of these Chapters are:
Holding of seminars, workshops, symposia, lectures, discussions and other special programmes;
Recommendation of students for award of scholarships and fellowships;
To arrange for the orientation of the scholarship awardees and other research scholars;
Developing liaison with educational and research institutions located in their respective regions;
Maintenance of research libraries for the benefit of scholars;
Undertaking of research projects assigned by the IOS; and
Introduction and promotion of objectives of the IOS
The list of chapters along with the co-ordinaters is given below:
Review and Publication Committee
The functions of the committee are to evaluate the research proposals received
from the academic committees in the light of aims and objects of the IOS.
Scholarship Committee
The scholarship committee has been entrusted an important task of implementation of scholarship scheme.
The committee formulates policies for award of scholarships under the scheme.Besides it also arranges for orientation of awardees through regular meetings and other means so that they may be able to contribute in advancement of the IOS mission.
Finance Committee
The finance committee takes care of the financial matters of the Institute.
3. Administrative Structure
Administrative set up of the Institute is headed by Director(Administration) who works under the supervision and control of the Chairman and Secretary General.
Public Relation Officer , Accountant , Programme Officer, Record officer, and other subordinate staff support the Director(Administration). Administrative control of the reseach staff vests with the Director(Administration).
The administrative aspect of the chapters are taken care of by the respective co-ordinators. The support staff assists the co-ordinators.The co-ordinators also exercise administrative control over the research staff of the chapter.
Office bearers of the Institute are as follows: | http://www.iosworld.org/content.aspx?id=368 |
Morality is at the heart of all religion but, “Is religious faith necessary to live a moral life?” This question has been debated in many circles especially among those involved in the field of moral education. Can a person who does not practice any form of religious faith still be moral in his/her way of life? Therefore, is religious faith a prerequisite for moral living? In Christian morality, God is acknowledged as the centre of all moral life. It is from Him that we draw our values and also our motivation for living a moral life. According to Richard Gula, a moral theologian, the belief in God as the centre of value gives Christians a reason for being moral… The Christian is moral because God is good, and because the goodness of God, always and everywhere present to us, enables and requires us to be responsible for the goodness of the world … Morality for the religious believer is not authorised merely by social conventions, or merely by the desire of self-fulfilment, or merely by the requirements of general rules of conduct which reason demands … From a theological point of view, God authorises and requires morality.
From a religious point of view, it is easy to locate the reason and motivation for being moral. On the other hand, it is also possible that one does not need to be religious in order to be moral. Religious faith is not a pre-requisite for being moral because a person can be moral even if he/she does not have a religious faith. Built within the structure of society there is a certain amount of expectation that all persons be moral. The basis of this expectation is not in religion but more fundamentally, it is in humanity. Nevertheless, this does not exclude religion from also being the basis for this fundamental expectation. Vincent McNamara, in his book Love, Law and Christian Life: Basic Attitudes of Christian Morality says clearly that one does not need to know God before becoming aware of moral distinctions or moral demands: morality does not immediately need religion. It is true that a religious tradition, like any other group, may have arrived at certain conclusions about how one is to be moral, may give support to the whole enterprise of morality, may have its own understanding of the ultimate significance of it. But even if religion is abandoned, a person is still left with the morality question unless being human is also to be abandoned.
The purpose of bringing this to our attention is neither to develop nor promote a theory of autonomous morality but because we need to acknowledge that moral education can also be discussed outside the context of a religious faith as much as within a religious faith. Human experience demonstrates to us that there have been many people who may not profess a particular religion but live a morally upright and just life. For them, being virtuous has its own reward, that is, the knowledge that they are living in a way in which they believe that persons should live.
Marciano Vidal, a Spanish moral theologian, even though acknowledging that there is no absolute connection between morality and religion, sees the existence of a mutual relation between a morality that is faith based and that which is non-faith based. According to him, it is when one understands the other that they both can co-exist. These two options – faith based and non-faith based – converge in a far greater unity. This unity is based neither in religious beliefs nor in unbelief; rather it is based on humanity. As we mentioned earlier, for morality to maintain its universal and objective character, it has to be based on humanity. However, Josef Fuchs asserts that Christian morality and human morality are one and the same: [Human morality] participates in some way in Christian morality, and in this sense is not simply non-Christian … Ideally, a non-Christian moral doctrine is of natural moral law – i.e., it is, according to Thomas Aquinas, recta ratio in the area of morality … non-Christian morality becomes the question of human morality, or of the natural moral law.
Morality is a phenomenon that is independent of religion. It is my own experience that human persons can arrive at moral positions and make credible moral choices even while not professing any religious faith. Whatever the motivations maybe for a person to act in a morally upright way, we cannot deny the fact that human persons, whether religiously inclined or not, as far as they are endowed with the gift of reason, they will try to live in harmony with others. We can conclude that religious faith is not a prerequirement for being moral. Since morality belongs to the realm of humanity, all persons, with religious faith or without, are asked to be moral if they are to be truly human. For a Christian, morality can be a place where one meets God and responds to his immense and gratuitous love: “The Christian then might see God as the ultimate context, significance and end of moral living without compromising the notion of morality as an autonomous human experience.
So, why Be Moral? When dealing with morality and moral education, an important question that frequently arises with regard to motivation is, “Why should I be moral?” In the book Morality: Its Nature and Justification, Bernard Gert clarifies that “when people ask, why should I be moral, they may be asking why they should act morally on a particular occasion but usually they are asking why they should obey the moral rules in general.” In practical terms, people want to know why they should act in a particular way and not in another. For example, why should I be just? Why should I be honest? Why should I not harm others in society? Answers to these questions are sometimes difficult to come by and they often do not satisfy an inquiring mind.
There have been many ways in which scholars, philosophers, and also common people have tried to explain the necessity of being moral. For example, it is in one’s self interest to be moral and that people who are moral are generally happier than those who are not. One could also point out that the recognition of the human person’s vulnerability and fallibility makes acting morally the best option. The one who has a religious faith could say that God wanted his people to be moral (“God commands it”) and will reward those who live morally good lives. Others have pointed out that since all human persons want others to behave morally, especially towards one, it would be hypocritical if one does not do the same. Avoiding guilt, shame, and remorse could be another reason for being moral. Parents often encourage their children to be moral because of their concern and care for their children. The above are only some of the ways in which people have tried to reason out the necessity for being moral.
Within the Christian context, religious answers such as “You will suffer the flames of hell if you do not live a moral life” have been invoked, especially in the past, to command people to lead a moral life. In recent times, when belief in God and affiliation to a particular religious faith seems scarce, such an answer would not satisfy many. What is it that truly motivates a person to be moral? It will be almost impossible to arrive at an answer that satisfies every single person and which incorporates all motivations for being moral. But we can broadly categorise two reasons why a person chooses to be moral or to rephrase the question, what motivates a person to be moral?
The first possible reason why a person decides to be moral is because of self-interest. It is because there is something to be gained that a person chooses to live morally. For example, in a Christian context, a person chooses to be moral because of the hope of salvation. In a secular context, a person lives a moral life so as to stay out of trouble with the law. In both examples, there is something to be gained by the individual and that motivates the person to be moral.
The second possible reason is to avoid or decrease the likelihood of causing harm or injuries to other people in society. This reason seems to be a more altruistic one. A person chooses to avoid immoral actions because others may suffer in the process of carrying out the action. This reason is not based on self- interest; rather it is based on the very nature of morality itself. This reason would seem more universal because it transcends religious limitations and cultural barriers.
We cannot negate the fact that people often act in their own interest before thinking of others, self-interest cannot be the only motive for choosing to be moral. I believe that the reason for being moral has to incorporate both the categories. It cannot be one or the other but one with the other.
We need to acknowledge that religious answers also have elements of self- interest for the purpose of being moral. In a religious contest, the motivation for being moral can easily be outside of the person, for example, God commands it. This sort of motivation ceases to be an inner conviction but rather is seen as “pressure” from an external source which is often associated with fear – fear of judgment and punishment. It is also possible that an inner conviction be the source of being moral, for example, the love of God. A person who is appreciative of God’s love for him/her, can choose to reciprocate by living a moral life. Whether it is an internal conviction or pressure from an external source, I believe that the task of finding an answer for those who have a religious faith is much easier as compared to those who have no religious faith because the task is made even harder. To a person who has a religious faith, religious appeals can be made to motivate the person to be moral. On the other hand, for someone who has no religious faith, then the appeal has to be based on humanity – an appeal to what it means to be a human person and to live in a human community. This is also possible because morality certainly has a universal nature which is based on humanity.
The Distinctiveness of Christian Morality: If religious faith is not an absolute prerequisite for living a moral life, what then is the uniqueness or distinctiveness of Christian morality? What is so specific or distinct in Christian morality? Despite the fact that many authors trace the distinctiveness of Christian morality to the centrality of Jesus, Sacred Scripture and tradition, the teaching of the Magisterium, grace, humanity, commandment of love, human experience, etc.,”? (it is not that I am negating that’ these are indeed characteristics of Christian morality) but I find that Josef Fuchs provides us with a more comprehensive, accurate, and maybe even an original description of the distinctiveness of Christian morality: (1) The Christian Intentionality of Christian morality; (2) The humanum of Christian categorical morality; (3) The Christianum of Christian categorical morality.
The first characteristic deals with the aspect of intentionality. The believer makes a conscious decision and effort to live this moral life as a response to God’s abounding love. This decision to respond is both full and personal and it is also an enduring decision in each particular situation. It is in concrete situations that the believer encounters God.
The second characteristic lies in the fact that Christian morality is in its categorical orientation and materiality, basically and substantially a humanum, that is, a morality of genuinely being-human: “This means that truthfulness, uprightness and faithfulness are not specifically Christian, but generally human values.
The third and final characteristic is the Christianum of Christian categorical morality. For J. Fuchs, it is in the Christianum that the intentionality and humanum come together. The Christian reality is expressed and lived within this context. The coming together of all three characteristics is known as the humanum Christian: “The realities that constitute the Christianum of the humanum Christianum are those such as the person of Christ, the Spirit at work, the Christian community, the hierarchical Church, the sacraments, Christian anthropology.” It is in the motivating power to act in a Christian that we find the meaning of the Christianum. Otherwise, our acts may only remain in the realm of the humanum (e.g., almsgiving motivated by love of neighbour and not merely philanthropy).
Even though some theologians conclude that there is no such thing as a distinctive Christian morality since it is based on human morality, I disagree that there isn’t a distinctive character to Christian morality. The very fact that Jesus is the norm of Christian moral life makes clear that there is an element of distinctiveness that is not present in other definitions. This is foundational since Jesus characterises the Christian understanding of morality. Christian morality is human morality since the universal character of Christian morality is seen when we acknowledge that others who have never adhered to Jesus Christ or have not even heard speak of him, not only can arrive at the same moral decisions in particular areas but are even capable of having the same disposition and same attitudes, such as hope, freedom, and love for others even the sacrifice of self. But there is an interior dimension that makes morality distinctively Christian and this interior dimension in the moral subject comes from one’s relationship with the person of Jesus.
In short, the distinctiveness of Christian morality, in the words of the theologian Servais Pinckaers: it is a response to the aspirations of the human heart for truth and goodness. As such, it offers guidelines that, when followed, makes these aspirations grow and become strong under the warm light of the Gospel. Catholic morality is not by nature oppressive; nor is it in principle conservative. It seeks to educate toward growth. This is its true mission. | https://clarence.my/morality-religious-faith/ |
The loss of connectivity within battery electrodes due to mechanical failure by decohesion and fracture between primary grains that form spheroidal secondary particles is one of the principal mechanisms responsible for the widely observed and reported capacity fading. In this study we focus our attention on the elucidation, via combined analytical and numerical modeling, of the coupled electrochemical and mechanical processes that occur during lithiation and delithiation. We run sequential diffusion and deformation analyses of polycrystalline aggregate, formulate conditions for crack initiation at the interfaces between primary particles, and obtain predictions for the distributed damage within the secondary particle. The discrete element method with cohesive crack modeling is employed as the simulation tool. The conclusions that can be drawn from the analysis can be summarized as follows: (1) anisotropic expansion of primary particle crystallites due to Li+ ion diffusion causes cracks to form at the interfaces and grain boundaries when stresses reach the cohesive strength limit; (2) Li+ ion concentration and its gradients have influence on crack formation, distribution and density, with high charging and steep gradients promoting rupture; (3) anisotropic particle expansion/contraction promotes interfacial fracture; (4) new crack appear and existing cracks extend under cyclic charging conditions. | https://pure.skoltech.ru/en/publications/on-the-fragmentation-of-active-material-secondary-particles-in-li-3 |
Kirwan, J (2021) MECHANICAL PROPERTIES AND CRACK RETARDATION OF GLASS FIBRE MICROASPHALT. Doctoral thesis, Liverpool John Moores University.
|
Text
|
2021kirwanphd.pdf - Published Version
Restricted to Repository staff only until 20 September 2026.
Available under License Creative Commons Attribution Non-commercial.
Download (10MB)
|
Text
|
2021kirwanphdinternal.pdf - Submitted Version
Restricted to Repository staff only
Download (10MB)
|
Text
|
2021kirwanphdpermissions.pdf - Supplemental Material
Restricted to Repository staff only
Download (8MB)
Abstract
A project was undertaken in conjunction with Colas, a UK road design, maintenance and surfacing company with the use of pavement laboratory facilities provided by Liverpool John Moores University (LJMU). The focus of the project was to assess Colas’ conventional microasphalt surfacing product Ralumac 2000 with the inclusion of glass fibres with the aim of increasing the material’s resistance to reflective cracking. Ralumac is typically applied on top of an existing defective road surface in two consecutive courses. It was for the lower of these courses that the glass fibre was introduced to provide a reinforcing layer or SAMI (stress absorbing membrane interlayer). To achieve the project goal, it was necessary to collate previously unknown mechanical properties of conventional microasphalt (CM) and glass fibre microasphalt (GFM) in order to compare their attributes. An experimental and quantitative research approach was adopted, and a series of laboratory tests were carried out to determine stiffness, resistance to permanent deformation and fracture toughness by crack propagation. Due to the slurry nature of microasphalt an optimum curing technique was adopted to allow the material to gain adequate strength to undergo testing by Hot Mix Asphalt (HMA) standards. Optimum fibre quantity was also examined and 0.25 % provided the most favourable outcome. Further laboratory tests were carried out on CM and GFM, as a composite overlay to match site conditions, to determine wheel rutting resistance and its ability to resist reflective cracking by simulating crack extension by thermal cycling. Finite element modelling (FEM) of the composite GFM over a simulated crack was undertaken to determine the magnitude of displacement, stress and tensile strain at the crack tip whilst under wheel loading at varying temperatures (10 °C and 20 °C). Findings revealed that GFM exhibited lower stiffness but greater flexibility before failure and provided greater resistance in terms of permanent deformation, with wheel tracking rate and rut depth showing a 6 % improvement over CM. Under crack extension GFM demonstrated absorption of tensile strain with bottom-up cracks being delayed and dispersed away from the vertical crack propagation path. FEM corroborated the findings observed in the laboratory and revealed that the absorption of stress and strain in the GFM layer led to the reduction of stresses in the surface course by 21 % and 28 % at temperatures of 20 °C and 10 °C respectively. | https://researchonline.ljmu.ac.uk/id/eprint/15370/ |
N.J. pets in need: Nov. 12, 2018
Facts on animal shelters from the American Society for the Prevention of Cruelty to Animals (ASPCA):
* Approximately 6.5 million companion animals enter U.S. animal shelters nationwide every year. The number is evenly split between dogs and cats. A positive note is that the number of dogs and cats entering U.S. shelters annually has declined from approximately 7.2 million in 2011.
* Approximately 3.2 million shelter animals are adopted each year, again with an even split between cats and dogs.
* About 710,000 animals who enter shelters as strays are returned to their owners. In this, we don't find so even a split; 620,000 of the returned animals are dogs and only 90,000 are cats.
* Each year, approximately 1.5 million shelter animals are euthanized (670,000 dogs and 860,000 cats). The number of dogs and cats euthanized in U.S. shelters annually has declined from approximately 2.6 million in 2011. This decline can be partially explained by an increase in the percentage of animals adopted and an increase in the number of stray animals successfully returned to their owners.
These are the most common sources from which primary methods cats and dogs are obtained as pets (this information was based on a multiple response question, which results in the total percentage exceeding 100% individually for cats and dogs. In addition, the 'other' category includes all source categories that were reported by less than 10% of both dog and cat owners): | |
Liv Complex contains a combination of herbal extracts, including globe artichoke and milk thistle, to help to support normal liver function. Milk thistle (Silybum marianum) seed extracts contain silymarin, which helps to maintain liver cell health through a variety of mechanisms including inhibiting free radical formation, enhancing formation of the antioxidant enzyme glutathione in liver cells and supporting hepatocyte protein synthesis. Research demonstrates that artichoke extracts enhance bile production and minimize liver damage following exposure to the hepatotoxin carbon tetrachloride.
Adults: Take one Genestra Liv Complex capsule three times daily, or as recommended by your health care practitioner. Use for a minimum of three weeks to see beneficial effects. | https://www.vitamart.ca/genestra-brands-liv-complex.html |
About Kelaniya Raja Maha Vihara
Kelaniya Raja Maha Vihara is a Buddhist temple in Kelaniya, a suburb in the western region of Colombo, Sri Lanka. This temple is both a perfect combination of historical significance and architectural aesthetics. Over the years, this site has come to be associated with the flourishing of Sri Lanka.
It is often considered that the rise and fall of this temple were highly associated with the rise and fall of Ceylon.This Buddhist temple was developed during the rise of Ceylon and had a lot to offer in terms of the stored artefacts historical figures within it. Apart from being a prominent Buddhist temple, it is also a significant tourist attraction of Sri Lanka.
Kelaniya Raja Maha Vihara has not only become a popular tourist spot in Sri Lanka but has also developed as an educational institution, especially for students of history and architecture. You would often find schools and colleges conducting excursions here. A lot of research activity is carried out here too. Located on the banks of the Kelani River this temple is often considered to be a site of worship for the popular Ramayana character, Vibhisana.
Be it the elaborate architecture, or the beauty of the surroundings, this place is sure to keep your eyes fixed to it in terms of the enriching history and beauty. If you are fond of history, architecture and aesthetics, this temple provides for a perfect conglomeration of all these which is sure to be etched in your heart forever.
How to Reach Kelaniya Raja Maha Vihara
Kelaniya Raja Maha Vihara is located at a distance of around 39 km from Colombo Airport. There are various means of transport through which you can reach Kelaniya Raja Maha Vihara.
1. Fly: you can take a flight from Colombo Airport to Diyawanna Oya followed by a taxi to reach Kelaniya Raja Maha Vihara. Flight charges- 7500. Taxi charges- 600. This would take you around 15 minutes through flight, followed by 12 minutes via taxi.
2. Cabs: you can directly reach Kelaniya Raja Maha Vihara from Colombo Airport by road through local cabs. This would cost you around 1000 and you would reach in half an hour.
You can additionally take a town car which frequently runs between Kelaniya Raja Maha Vihara and Colombo Airport and reach the spot within 25 minutes.
Best Time to Visit Kelaniya Raja Maha Vihara
You can visit Kelaniya Raja Maha Vihara anytime of the year. However, it is advised that you visit Kelaniya Raja Maha Vihara during January to witness one of the largest Buddhist processions which start from this temple.
The procession is known to be one of the most elaborate processions of Sri Lanka consisting of hundreds of elephants. The best time of the day to visit Kelaniya Raja Maha Vihara is during the evenings so that you can see the walls and ceilings of the temple all lit up which help you to witness the murals and frescoes intricately.
What Not to Miss at Kelaniya Raja Maha Vihara
There are a lot of places that you can visit besides Kelaniya Raja Maha Vihara.
1. Viharamahadevi park- this is one of the most popular sites people visit after visiting Kelaniya Raja Maha Vihara. This beautiful park is a home to a number of flowering plants that bloom during March- May. You can also find a number of elephants which are often used as a part of various processions in Sri Lanka. The park also offers you boating activities to explore it while you sail along the lake.
2. Water world Lanka- this place offers quite a few aquatic fun activities. Starting from a number of water rides to springs, this place is a perfect one to spend some time with your family and children. If you want to organize a short picnic post your visit to Kelaniya Raja Maha Vihara, water world Lanka is definitely the best choice.
3. Gangaramaya temple- located on the banks of Beira Lake, this temple is one of the most important and popularly visited temples in Colombo. Built during the late 19th century, this temple is a perfect conglomeration of ancient architecture and modern aesthetics.
The beautifully carved walls along with eye catching paintings depicting various stages of Hinduism and Hindu Gods and Goddesses, Gangaramaya temple is a must watch if you visit Sri Lanka. Once you visit Kelaniya Raja Maha Vihara and Gangaramaya temple, you also get to compare the distinct historical and architectural facts within both the temples showing the difference in Hindu and Buddhist cultures.
Other Essential Information About Kelaniya Raja Maha Vihara
1. Location- Kelaniya Raja Maha Vihara is located 7 miles from Colombo in Peliyagoda in Sri Lanka.
2. Entry fee- the temple has no entry fee and is open 24 hours a day.
3. Facilities- Kelaniya Raja Maha Vihara provide the following facilities-
- Academic facilities
- Guide for tourists
- Toilets for tourists
- Waste disposal bins
- Parking area
- Wifi
History of Kelaniya Raja Maha Vihara
Kelaniya Raja Maha Vihara temple is known to have emerged during 500 BC when Gautama Buddha visited Sri Lanka for the third and final time. It is said that the original Stupa at Kelaniya comprised of a throne studded with gems where Buddha preached. Thus, the history of the temple dates back to centuries.
The Temple was built during the Kotte Empire which was later confiscated by the Portuguese invaders. The renovation of the temple from its ruins by a popular King Sri Rajasingha further deposits more historical and cultural value to it. However, with the emergence of the Dutch Empire in Sri Lanka this temple was rebuilt and renovated from the ruins.
The temple now comprises paintings depicting various stages of Buddha. The temple also comprises a clear depiction of the stories in Jataka Tales that we often read in our childhood. Each representation of the paintings has a definite moral that coincides with Buddha’s principles on the eightfold path.
This temple is also known to have been built when Buddha was enlightened, which further increased its historical value. Kelaniya Raja Maha Vihara is also used as the venue for a famous procession in Sri Lanka conducted in January every year.
Murals in Kelaniya Raja Maha Vihara
Kelaniya Raja Maha Vihara comprises paintings dating back to the 17th and 20 centuries. The temple is divided into various sections consisting of murals of different eras, each one of them having a distinct significance.
1. Kandyan era murals- kandyan era was the last empire of Sri Lanka. This section of Kelaniya Raja Maha Vihara comprises murals and frescoes of artists belonging to this era. These murals mainly depict the stories of Jataka Tales along with murals of Kandyan kings and queens.
One of the most distinctive features of the Kandyan era murals is its use of raw materials and style of murals. Most of the artists used naturally extracted colours from trees, flowers and vegetables. Thus the paintings on the walls of Kelaniya Raja Maha Vihara in this section are solely made of natural pigments.
Not only that, the depiction of Jataka tales conveys their morals which Buddha preached. This section also depicts Buddha’s struggles in his life against various social factors. This section is sure to have your eyes fixed on it because of the perfection it exhibits in all of its depiction and is undoubtedly a must-watch if you are at Kelaniya Raja Maha Vihara.
2. Modern murals- this section of Kelaniya Raja Maha Vihara carefully depicts various changes that took place in Sri Lanka between 1927-1946. The paintings depict the flourishing of Buddhism and the internal changes it went through in Sri Lanka.
Not only that, but these murals also depict the Buddhist Tripitaka, the congregation of monks and various other significant events in the history of Sri Lanka. This section has also gained popularity as it not only depicts and exhibits Buddhist doctrines but also commentaries of various scholars of different origins on these doctrines. The attractive yet straightforward depictions have attracted tourists further. Thus, even if you are not well acquainted with Buddhism in general, these murals would let you explore religion more and also instil a sense of interest in historical minds.
3. Modern murals on the ceiling- you would find paintings done on the Kelaniya Raja Maha Vihara, a sporadic feature in most Buddhist temples. These ceilings depict beautiful decorations on the nine planets revolving around the sun along with the 12 zodiac signs. Each zodiac sign is pictured based on its positioning with the moon.
It also depicts each of its significance concerning a planet’s position. The ceiling murals are something worth watching because of its incredible craftsmanship. Further, it provides an important source of knowledge on how dates were calculated in ancient times with regard to the position of the planets with the moon.
The murals in all the three sections of Kelaniya Raja Maha Vihara have its own significance with regard to Buddhism and the preachings of Gautama Buddha. It is mostly the murals which have gained significant popularity even as a part of academic research on the various empires in Sri Lanka, apart from flourishing as an important tourist spot.
Tips for visiting Kelaniya Raja Maha Vihara
1. Since Kelaniya Raja Maha Vihara is solely dedicated to Buddhism, Buddhist doctrines and Buddha’s preaching, it is better that you read about its history, historical and cultural heritage to get the true essence of it.
2. You should visit the temple during the day time and at least spend a few hours if you want to explore each section carefully.
3. It is advised that you either switch off your mobile phones or keep them in silent mode because Kelaniya Raja Maha Vihara maintains a peaceful and calm environment.
4. Be careful not to litter at the place as it is well equipped with garbage bins and you might be fined heavily if you are caught littering around. | https://www.thrillophilia.com/attractions/kelaniya-raja-maha-vihara |
There are plenty of Positive and the Negative Radicals in the Chemistry. Some of the Important Positive and the Negative Radicals are written below. Radicals are the Positive and the Negative ions which have at least one unpaired electrons. Radicals or ions are formed by losing or gaining electrons.
Download List Of Positive And Negative Radicals In Chemistry Pdf
In chemistry , a radical is an atom , molecule , or ion that has an unpaired valence electron. Many radicals spontaneously dimerize. Most organic radicals have short lifetimes. Two other examples are triplet oxygen and triplet carbene : CH 2 which have two unpaired electrons. Radicals may be generated in a number of ways, but typical methods involve redox reactions. Ionizing radiation , heat, electrical discharges, and electrolysis are known to produce radicals. Radicals are intermediates in many chemical reactions, more so than is apparent from the balanced equations.
These solutions for Measurement Of Matter are extremely popular among Class 9 students for Science Measurement Of Matter Solutions come handy for quickly completing your homework and preparing for exams. Give examples. Positive radicals b. Basic radicals c. Composite radicals d. Metals with variable valency e. Bivalent acidic radicals f.
Service Unavailable in EU region
John Dalton was the first to enunciate matter to be composed of invisible particles called atoms. Atoms means which cannot be cut uncut. So, an atom may be defined as the smallest particle of an element or chemical substance which generally participates in the chemical reaction but it may or may not have an independent existence. This means an atom is unstable. For example- Hydrogen gas is the smallest molecule which is composed of two atoms of hydrogen. Similarly, Helium, Neon, Argon, etc. Molecules A molecule can be defined as the smallest particle of an element or a compound, which does not generally participate in a chemical reaction but has an independent existence.
In a chemical reaction, the molecular composition changes and it is represented by a chemical equation. In a chemical equation, the various substances involved as reactants or products are written in the form of symbols and formulae. Symbol of an Element:. A symbol is a representation of an atom of an element. These are unique 1,2, and 3 letter symbols.
Element Valency PDF
Search this site. This is why most metals are good conductors of electricity. Cl Do this for both. Subpages 1 : Online test for valency.
In chemistry , the valence or valency of an element is the measure of its combining capacity with other atoms when it forms chemical compounds or molecules. The combining capacity, or affinity of an atom of a given element is determined by the number of hydrogen atoms that it combines with. In methane , carbon has a valence of 4; in ammonia , nitrogen has a valence of 3; in water, oxygen has a valence of 2; and in hydrogen chloride, chlorine has a valence of 1. Chlorine, as it has a valence of one, can be substituted for hydrogen. Phosphorus has a valence of 5 in phosphorus pentachloride , PCl 5.
List of ebooks and manuels about List of radicals and their valencies pdf. The list of Table 1 is expected to Law, the Modern Periodic Table. Constituents of the compounds. Learn the valencies of element and radicals thoroughly.
Это шанс всей вашей жизни.
How to Calculate Valency of Radicals
- Какая правда. Стратмор тяжело дышал. - ТРАНСТЕКСТ. Правда о ТРАНСТЕКСТЕ. Сьюзан понимающе кивнула. Это звучало вполне логично: Танкадо хотел заставить АНБ рассказать о ТРАНСТЕКСТЕ всему миру. По сути, это был самый настоящий шантаж.
Отключите ТРАНСТЕКСТ, - взмолилась Сьюзан. - Мы нашли Северную Дакоту. Вызовите службу безопасности.
Телефонистка нервно проглотила слюну. - На этой машине нет автоматического определителя номера, сэр. Я позвоню в телефонную компанию. Я уверена, что они смогут сказать. Нуматака тоже был уверен, что компания это сделает.
С тех пор как сообщения стали передаваться по подземным волоконно-оптическим линиям, а не с помощью радиоволн, они оказались полностью защищенными от перехвата - таков по крайней мере был замысел. В действительности перехват электронных писем, передвигаемых по Интернету, был детской забавой для технических гуру из АНБ. Интернет не был создан, как считали многие, в эру домашних персональных компьютеров. Он появился тремя десятилетиями ранее благодаря усилиям специалистов из министерства обороны и представлял собой громадную сеть компьютеров, призванных обеспечить безопасность правительственной связи на случай ядерной войны. Профессионалы Интернета стали глазами и ушами АНБ.
Ничего подобного ему никогда не приходилось видеть. На каждой руке всего по три пальца, скрюченных, искривленных. Но Беккера интересовало отнюдь не это уродство.
Это девушка. Она стояла у второй входной двери, что была в некотором отдалении, прижимая сумку к груди. Она казалось напуганной еще сильнее, чем раньше. | https://tmeastafrica.org/and-pdf/1594-list-of-radicals-and-their-valencies-pdf-876-318.php |
CHAMPAIGN, Ill.
— Five prize-winning
writers of fiction, nonfiction and poetry will read from their works
this semester at the University of Illinois at Urbana-Champaign.
The writers are taking part in the Carr Visiting Authors Reading Series, an event of the English department’s MFA Creative Writing Program.
All of the readings are free and open to the public and will begin at 4:30 p.m., except as noted below, in the Authors Corner of the Illini Union Bookstore, 809 S. Wright St., Champaign.
Robin Hemley, director of the nonfiction-writing program at the University of Iowa, leads off the series with a reading on Thursday (Feb. 9).
Hemley is the author of seven books of nonfiction and fiction. His latest, “Invented Eden, The Elusive, Disputed History of the Tasaday,” deals with a purported anthropological hoax in the Philippines. The book was an American Library Association’s Editors Choice book for 2003.
Hemley co-edited “Extreme Fiction: Fabulists and Formalists” with Michael Martone. Hemley is the author of the memoir, “Nola: A Memoir of Faith, Art and Madness.” His popular craft book, “Turning Life Into Fiction,” was a Book-of-the-Month Club selection; more than 40,000 copies of it have been sold.
Awards for his fiction include the Nelson Algren Award from the Chicago Tribune and two Pushcart Prizes. His work has been published in many literary magazines, and his fiction has been widely anthologized.
Also scheduled to read during the series:
Feb. 22, Ruth Ellen Kocher, a poet who teaches literature and writing at the University of Missouri at St. Louis. Kocher is the author of “One Girl Babylon, When the Moon Knows You’re Wandering,” winner of the Green Rose Prize in Poetry.
Kocher also wrote “Desdemona’s Fire,” the winner of the Naomi Long Madgett Poetry Award. Her work has appeared in many literary journals, including African American Review, Antioch and Ploughshares.
April 3, Chris Abani, a novelist, poet and the author of “GraceLand” and “Master of the Board,” among other novels. His poetry collections are “Hands Washing Water,” “Dog Woman,” “Daphne’s Lot” and “Kalakuta Republic.” Abani teaches at the University of California at Riverside and in the MFA Program at Antioch University in Los Angeles. He is the recipient of the PEN USA Freedom-to-Write Award, the Prince Claus Award, a Lannan Literary Fellowship, a California Book Award, a Hurston/Wright Legacy Award and the PEN Hemingway Book Prize in 2005.
April 5, William Wenthe, who teaches creative writing and 20th-century poetry at Texas Tech University. Two of his poems have won Pushcart prizes, and his collection of poetry titled “Not Till We Are Lost” was nominated for 10 awards, including a Pulitzer Prize, National Book Award, William Carlos Williams Award and Lenore Marshall Poetry Prize.
April 11, (5 p.m.), Susan B. Anthony Somers-Willett, a poet and Mellon Postdoctoral Fellow at Illinois, where she teaches poetry and poetics.
Somers-Willett’s first book of poetry, “Roam,” won inclusion in the Crab Orchard Award Series this year. Her poems have appeared in numerous journals including the Virginia Quarterly Review, RATTLE, Painted Bride Quarterly and Hayden’s Ferry Review. Somers-Willett’s awards include the Ann Stanford Poetry Prize, the Robert Frost Poetry Award and a fellowship from the Millay Colony for the Arts. She has just completed a book of criticism titled “The Cultural Politics of Slam Poetry.”
The MFA program began at Illinois in fall 2002. | https://news.illinois.edu/news/06/0208carr.html |
Worries over declining training scheme for artisans
The challenge of adequate manpower has continued to worsen the woes of the housing sector due to declining state of technical schools and artisans’ certification process.
With the absence of skilled artisans, most property developers had been forced to rely on either the incompetent ones or cough out thousands of naira to hire foreigners from neighbouring countries like, Togo, Benin Republic and Ghana.
This development had increased the cost of housing delivery and affordability for majority of low-income earners. The artisans are one of the critical manpower required for the construction sector. They are specialists in masonry/bricklayers, fabrication/metal works, electrical work, carpentry and joinery, plumbing, and house painting and decoration.
While experts say the sector needs about 40 per cent of these group of artisans, investigations by The Guardian reveal that there is growing reduction in enrolment by pupils in technical colleges for the training of the needed manpower. What is now prevalent is the acute shortage of competent tilers, bricklayers, carpenters, electricians and plumbers.
In the past, the likes of ‘City and Guilds’ and other technical schools were reputed for producing the highly skilled artisans as programme certification from City and Guild of Nigeria, in particular became a yardstick to be engaged as competent artisan for housing development. However, with the passage of time, the reputation and recognition has waned.
Specifically, there were efforts by the then Federal Ministry of Power, Works and Housing in 2016, to establish Building Craft Training Schools in the six geo-political zones of the country for the training of artisans and craftsmen in addition to those in Abuja, Lagos and Imo State and over 100 of such college spread across the country.
Other private sector bodies like, Julius Berger Nigeria Plc, Dangote Group of Companies, Lafarge Cement Plc and Sparklight Group had embarked on the training of artisans but such moves haven’t transformed to the much desired result.
The President, Nigerian Institute of Building (NIOB), Kunle Awobodu, said the government had not provided adequate support for technical education. He observed that in most of the technical colleges, the machine devices that are supposed to be used for training the students are already obsolete.
Awobodu expressed concerns that the society has developed a negative attitude towards handiwork as some parents feel that handiworks are for children who are not academically brilliant, adding that the perception is that those who go to technical colleges won’t be opportune for white-collar jobs and are automatically relegated in life.
“Every student now strives to go to university and pursue academic work and so the technical colleges are not well patronised. Most of the machines that are used, consume a lot of energy but there is erratic power supply and low voltage.
He said there was the need to update the skill sets of those who are training the students in the technical schools.
According to him, the once popular ‘City and Guilds’ certification for artisans contributed to poor state of building artisans. He said the certification has now become too foreign, hence, the reason for its going into oblivion.
Awobodu stated that the examination, which is more like a trade test has been replaced with National Skills Qualification Framework (NSQF), developed by National Business and Technical Examination Board (NABTEB) as a way of assessing students’ level of knowledge, deficiency and areas for further development.
He told The Guardian that NIOB is one of the bodies for the certification of artisans while its regulation arm – Council of Registered Builders of Nigeria (CORBON) is a skill sector council for building construction.
The NIOB president said through such model, competent artisans and craftsmen would be produced for the country’s built sector. For him, it has become crucial for Nigerians, especially the youths to show more interest in technical education and for government to invest more on skill acquisition.
He observed that Lagos State Government plans to revive technical education in five of its technical colleges as skills acquisition is important for Small and Medium Scale businesses (SMEs).
The President, Association of Building Artisans of Nigeria (ASBAN), Mr. Jimi Oshinubi, told The Guardian that the influx of foreign artisans contributed to the sorry state of training for artisans and the technical colleges.
He noted that there is no perfect control in the nation’s borders, which gives room for people to come into the country and take up jobs that ordinarily should have been done by local artisans. This, Oshinubi said is unlike what was obtainable in Ghana, where artisanship jobs are strictly meant for their citizens.
He also stated that the world is changing, majority of the technical colleges that should train the manpower requirement, still rely on obsolete equipment amid the short supply of such tools.
“Those who are responsible for equipping the technical schools are not doing so. The monies are allocated but the schools are left as they were. Technical schools are 100 per cent practical but what we believe in Nigeria is the theoretical aspect of it. You don’t train an artisan with theory, it has to be practical but the equipment is not there.
“We need modern equipment in all our technical colleges and there should be control over influx of foreign artisans as well as substandard building materials.”
Speaking on the issue, a Verifier with the ‘City and Guilds’ of London in Nigeria, Dr. Adeshina Emmanuel Aladeloba, explained that the challenge is not absence of full fledge technical schools in the country, but appropriate policy and localisation of a system that fit the nation’s educational system.
Aladeloba, who is also the Head of Department of Building Technology, Yabatech, said, “The challenge is how are the technical schools been run? Do we have the right people there? If you have square peg in a round hole, it won’t fit in, it can never work.
“The situation now is adhering to what we are set out to do. Every period, we keep changing the educational system, at a time we had form five now we have the 6-3-3-4 and the 6-3-3-4 is not well practiced. Even the semester system in the university is not run in the appropriate way.”
“The focus in Nigeria now is different as everybody wants to go to the University. If not for ruggedness, by now polytechnics in Nigeria would have closed down. Even those who went to Polytechnics, there is discrimination before government removed that. Nobody wants to go into an area where they won’t be able to get to the peak.”
Adeshina said the problem with City and Guilds begun when it closed its offices in Nigeria, Ghana and now operates from South Africa. This, he stated made the administrative capacity not to be as open as it used to be.
Although, he said the body still accredit qualified programmes in Nigeria. He blamed the dwindling fortunes of artisan’s certification body on the society, which no longer shows interest in them. | |
Joint replacements should be firmly anchored in vital bone to avoid early implant subsidence and late aseptic loosening. We investigated whether the fixation of orthopedic implants could be improved by adding an osteoinductive extract of lyophilized equine bone matrix proteins (Colloss E, Ossacur AG, Germany), between the implant and the surrounding bone. Eighteen uncemented HA-coated implants were inserted pairwise in the proximal tibia of nine dogs. All implants were surrounded by a 2 mm concentric defect. In each dog, the intervention implant was added 20 mg protein lyophilisate. The contralateral control implant was inserted untreated. After four weeks, the treated HA-coated implants had better mechanical fixation than the untreated control implants. The treated implants were better osseointegrated, there was more newly formed bone around these implants, and fibrous tissue was eliminated. The mechanical implant fixation had a strong positive correlation to new bone formation on and around the implant, and a strong negative correlation to fibrous tissue encapsulation. The results suggest that bone protein extracts such as the Colloss E device may augment early implant fixation of even HA-coated Ti implants and thereby reduce the risk of long-term failure. This may be particularly useful in revision arthroplasty with bone loss.
|Original language||English (US)|
|Pages (from-to)||188-194|
|Number of pages||7|
|Journal||Journal of Biomedical Materials Research - Part A|
|Volume||100 A|
|Issue number||1|
|DOIs|
|State||Published - Jan 2012|
Bibliographical noteCopyright:
Copyright 2012 Elsevier B.V., All rights reserved. | https://experts.umn.edu/en/publications/the-effect-of-adding-an-equine-bone-matrix-protein-lyophilisate-o |
This quarter we maintain our negative near-term view on the Saudi Arabian Autos Sector. We continue to target a 26.2% fall in sales over 2016, although certain luxury brands may outperform.
Key Views
• The commercial vehicle segment will under perform over the coming two years, as heavy vehicle demand is dampened by government cutbacks in infrastructure spending.
• We continue to believe that the planned introduction of VAT in 2018 may prompt consumers to buy greater numbers of new passenger cars in 2017 before the tax is implemented.
• Chinese brands Changan and Chery were launched in the country in May 2016, underlining our view that there remain opportunities in the lower priced car segment, despite the current market slowdown. | http://www.free-news-distribution.com/saudi-arabia-autos-report/ |
Cross-cultural research on university students' approaches to study has examined the possible cultural specificity of Biggs' Study Process Questionnaire, but the problem of the confounding effect of individual characteristics and contextual variables has received little empirical attention. The present study addressed this issue, by investigating cross-cultural differences in students' approaches to study when the academic course and context are the same for culturally distinct groups. Two matched groups of local Australian and South-east Asian students were compared at the beginning and the end of their first semester at university. The similarities in the patterns of change of the two groups support the view that study approaches are influenced by students' perceptions of course requirements rather than determined by stable personal characteristics of individuals or cultural differences. Although South-east Asian students scored higher on the surface measures than their western counterparts, finer analyses breaking down the surface construct into meaningful sub-components revealed no difference between the two groups in the ‘narrowness’ aspect of their study. South-east Asian students were adaptive to the demands of the new educational context and became more similar to local students by the end of their first semester of academic study in a western institution. | https://researchrepository.murdoch.edu.au/id/eprint/8376/ |
Abstract
The objective of this study is to determine the prevalence of psychological distress (PD) among cancer patients and to investigate the association of PD with various socio-demographic factors. We consider the 2013 National Health Interview Survey, which is a large survey of the US non-institutionalized civilian population. PD is determined with a standardized questionnaire (K6). Cancer diagnoses are determined on the basis of self-report. For the purpose of this study, four different types of cancer are selected based on the leading number of deaths caused by them. We fit three commonly used ordinal regression models to the ordinal response PD for overall cancer patients. According to the goodness of fit criterion, AIC, we select the adjacent category model as best model for PD. All the predictors along with affliction by cancer are found to be significant determinants of PD. Additional analysis shows that the psychological distress does not differ across the four subtypes of cancer, breast, colon, lung and prostate cancer. However, psychological distress differs across the race of the respondents.
Introduction
Cancer is a significant health dilemma in the US and in many countries worldwide. It is one of the leading causes of death around the world. Every year, nearly 10.9 million individuals are diagnosed with cancer worldwide and around 6.7 million individuals die from it. The World Health Organization (WHO) anticipates that death from this disease will continue to rise, with an estimated 11.5 million deaths in 2030 [1]. Cancer specialists and medical scientists believe that psychological matters affect the progression of cancer, but the evidence remains unconvincing. Many studies focusing on mental health of cancer patients investigated the psychological impact and stigma of affliction due to cancer [2-5]. Cancer patients naturally experience many kinds of psychological problems due to the physical and mental afflictions caused by the long-term adverse health due to cancer. A number of studies demonstrate a clear link between the affliction from cancer and psychological distress (PD) measured by the symptoms of depression and anxiety [5-15]. PD is a significant problem for patients with cancer at every stage of their disease. Assessment and management of psychological distress are imperative in order to ease the burden on patients and to help them cope with their diagnosis and treatment [16]. A review of the psychological distress literature concludes that there are no simply identifiable characteristics of patients that can readily predict who has the potential need for psychosocial assessment and intervention [5,6]. To explore the impact of PD, many research investigations have been carried out in many countries examining various factors that manipulate the psychological distress among cancer patients. A systematic review on PD among cancer patients conducted by Yeh M et al. [8] found that the majority of cancer patients face significant psychological and emotional distress at sometime during the course of the illness.
There are various risk factors that have been linked to mental illness. Numerous investigations were conducted to determine the factors that play a significant role on PD among cancer patients [4-13,17]. For example, studies conducted in order to identify the risk factors of PD in females with breast cancer revealed that age, marital status, and education of the patient were the significant factors associated to PD [11,18,19]. Based on prior studies, the socio-demographic and clinical factors of health (i.e., BMI, insurance status, physical activity, smoking, drinking alcohol, etc.) may enhance distress. A common factor that is found to affect PD and cancer was race/ethnicity [1,3,20]. Other studies showed there is correlation between all covariates under consideration and the PD being the response variable. In particular, older women with breast cancer had a significantly higher level of distress Sunderland M et al. [18]. These factors can be used to identify individuals who may be at risk of experiencing PD. In this study, our objectives are to determine the prevalence of psychological distress among cancer patients and to investigate the association of psychological distress with various socio-demographic factors.
Although a number of studies investigate PD among cancer patients, the risk factors of PD among the leading sub-types of cancers are not well studied. In this study, we selected sub-types of cancer according to the estimates of the leading new cancer cases and death since 2013 in the US. The most frequently diagnosed cancers that occurred in both males and females in 2013 were breast cancer (BC), colon cancer (CC), lung cancer (LC), and prostate cancer (PC) [4]. In particular, this study explores and compares the prevalence of overall cancer and that off our leading cancer subtypes namely, BC, CC, LC, and PC and the association with psychological distress among the black and white American adults.
Data and Research Methods
Data are obtained from the 2013 National Health Interview Survey(NHIS), which is a large annual survey conducted on a random sample of individuals living in the United States [21,22]. This survey is across-sectional household survey of the US population conducted annually by the National Center for Health Statistics (NCHS), Center for Disease Control and Prevention (CDC). Face-to-face interviews were carried out at respondents’ houses. But, for those who were not home a follow-up was performed over the telephone. This survey employed a randomly selected, stratified, and multistage area design that produced nationally representative sample of households. Data from the NHIS are organized into a number of different types of files. We consider the sample adult module, which contains health-related information on randomly selected adults in the households. According to National Center for Health Statistics during the data collection period in 2013, there were 42, 294 eligible individuals, of which 34, 557 (81.7%) were interviewed.
We consider Kessler6 (K6) [23-26] to measure psychological distress (PD) among cancer patients. This measure K6 contains a six-item instrument, for each part the respondents were asked how frequently they experienced symptoms of psychological distress (sad, nervous, restless, hopeless, everything was an effort, and worthless) during the past 30 days. Each question has a 5-point scale with ranges from 0= ‘none of the time’ to5=‘all of the time’ in the NHIS. Since K6 scores lie between 0 and 4 on the Likert scale, the total of the responses scores is ranged between 0 and 24. We collapsed these scores into three categories as: 0-7 indicating a low level of PD, 8-12 indicating a moderate level of PD, and 13-24 indicating high PD. The predictor variables are selected as those found to be relevant according to the literature review.
Statistical models for ordinal response PD
We consider the three ordinal regression models: cumulative odds (CO), continuation ratio (CR), and adjacent categories (AC) models for psychological distress (PD) [25-27,30]. The best-fit model among these three is used to report the statistically significant determinants of PD among cancer patients. The cumulative odds (CO) or the proportional odds (PO) model is appropriate when the response categories are based on one or more latent continuous response variable. A CO model with categories is divided to logit equations. We use the category ordering by forming logit s of cumulative probabilities,
The continuation ratio model provides the log odds of the response being in the category j. For our study, J=3, we can estimate the odds of the respondents PD as “Low” vs. “Moderate” and the odds of these levels are in “Low” and “Moderate” versus “High” using:
The CR may be easier than CO in terms of interpretation if we are interested in finding the probability for individual categories
πjMathType@MTEF@5@5@+=
feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn
hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr
4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9
vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x
fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa
aaa8qacqaHapaCpaWaaSbaaKqbGeaapeGaamOAaaqcfa4daeqaaaaa
@3A5C@
.
This model assumes that the effect of each independent variable to be the same for all adjacent pairs of categories. All computations are conducted using SAS version 9.3 (SAS Institute, Cary, NC, [31]) and the R computing environment (Version3.11, TheRProject). SAS isused to manage the data and create analysis variables. In R, we used the VIGAM package to fit all of the three models.
Results
The summary statistics and the prevalence of psychological distress cross classified by all the predictor variables are presented in Table 1. About 90% of the respondents fall in the low distress category, followed by 7%and3%in the moderate and high categories, respectively. About 36% of respondents is from the South region while 16%, 21% and 27% is from the Northeast, the Midwest, and the West respectively. Most of the participants (76%) are white American. There are 12086 (68%) respondents in the age range of 31-64 years old. More than 65% of the sample has a high school education or above. About 38% of the respondents are smokers while 71% of them are alcoholic. Approximately, 20% of the respondents do not have insurance. More than half of them have an annual income in the range of $0-$34,999. About 4% of the respondents with cancer have low distress level. The number of cancer patients in the high distress level is 44. More singles are found to be in high distress level (2%) compared to married people (0.73%). About 73% of the respondents with insurance have low distress level while 17% of people without insurance have low distress level. In terms of the income, people who have low income tend to have high distress compared to high-income people. Pre valence of four sub-types of cancer cases by gender are shown in Table 2.
Body Mass Index (BMI) is a simple index of weight-for-height that is commonly used to classify underweight, overweight and obesity in adults. It is defined as the weight in kilograms divided by the square of the height in meters (kg/m2).
Types of Cancer
Categories
Gender
N=17765
Male
Female
Breast cancer
Yes
4
144
148
No
357
413
769
Colon cancer
Yes
13
11
24
No
347
547
894
Lung cancer
Yes
6
5
11
No
353
554
907
prostate cancer
Yes
82
0
82
No
278
0
278
Other types
Yes
256
402
658
No
105
160
265
Table 2: Sub-type of cancer cases by gender.
Figure 1 shows the distribution of prevalence of cancer across the levels of psychological distress. In the high distress level proportion prevalence of cancer is higher. Figure 2 shows that the distribution of PD levels across gender. Females are prone to be susceptible to belong higher distress level. Figure 3 shows the distribution of PD levels across the sub-types of cancer. Breast and ‘other’ types have more prevalence of moderate and high distress levels.
Figure 1: The distribution of PD among Cancer patients.
Figure 2: The distribution of respondents’ gender and PD.
Figure 3: The Distribution of Cancer Types and PD.
Association between psychological distress and each predictor variable is determined using a chi-squared test. Results of the bi-variant analysis are presented in Table 3. It shows most of the predictors, except region and alcohol consumption, are significantly associated with the response variable PD. All the significant predictors are then included in the CO, CR and AC model. All three models are implemented to estimate the regression parameters (β) and p-values based on World statistics. The statistical computing software R issued to fit these three models. Based on the goodness of fit criterion as Information Criteria (AIC) (Table 4) we selected AC model as the best-fit model for PD and the included predictor variables.
d.f
Chi-square
p-value
Region
6
3.4235
0.7541
SEX
2
56.7093
<.0001
Race
6
29.4704
<.0001
Age (Group in years)
4
26.5571
<.0001
Marital Status
2
118.3031
<.0001
Cancer
2
26.3698
<.0001
Smoking status
2
105.0631
<.0001
Physical Activity
2
68.8511
<.0001
Alcohol consumption
2
0.1908
0.9090
BMI
6
43.7622
<.0001
Insurance
2
176.8340
<.0001
Education
2
68.8976
<.0001
Income
4
306.9797
<.0001
Table 3: The association between PD of the respondents and predictors for (the cancer sample).
Ordinal Logistic Regression Model
Cumulative Odds (CO)
Adjacent category log it model (AC)
Continuation ratio model (CR)
AIC
12800.63
12765.06
12806.01
Table 4: The adequacy tool for model selection.
Table 5 presents the results of AC model. All the predictors are found significant 5% level of significant. Male are 1.23 times more likely to have low or moderated stress level than female. In other words, females tend to be in high distress level. White Americans are more likely to have low or moderate distress level compare to other groups. Inexact, they are 28% more relaxed than other group where as Black/African American and Asians 42% and 26% more likely to have low or moderate distress level, respectively. Respondents of aged 18-30 years are 36% less likely to have low or moderate distress level compare to the respondents of aged 65+years. People who are at the age of 31-64 years are 46% less likely to have low or moderated stress level compare to the aged 65+. It is to be noted that older people are more relaxed than the younger people. If a person has a cancer, then he/she is more likely to be in high distress level. In fact, a person with cancer is 35% less likely to have low or moderate distress level. Married people are 42% more likely to have low or moderated I stress level than singles. Smokers are less likely to have lower distress level than nonsmokers. If a person does some physical activity at least once a week, then he/she is 1.17 times higher chance to have low or moderated I stress level. Obese people are more likely to have high distress level. People with insurance are more likely to have low or moderate distress than people without insurance. In other words, covered respondents tend to be 28% times higher to be in low or moderated I stress level. Persons having at least high school diploma are more likely to be in low or moderated I stress level. Low-income group is less likely to be in lower distress level.
The risk factors for psychological distress obtained in Table 5 are based on the entire population. We found that respondents with cancer are more likely to be in the high distress level. Figure 3 shows the distribution of psychological distress levels over all the types of cancer. In order to test is there is any heterogeneity in PD across different sub-types of cancer, that if the distress levels are same for all types of cancer, we perform a chi-squared homogeneity test. Out of 923 people who have at least one type of cancer, 148 have breast cancer, 24 have colon cancer, 11 have lung cancer, 82 have prostate cancer and rest of them have other types of cancer or they won’t disclose it. Based on the test (p-value = 0.4323), we fail to reject the hypothesis of homogeneity of the distress level among the different types of cancer. So we can conclude that there is no difference in distress level among different types of cancer.
We also conducted a heterogeneity test for the distress level across race. Most of the respondents in the study are white American (76%) followed by African American (14%). To test if the distress level is same for all people who have different race, we employ a contingency analysis and use chi-square statistic to investigate the homogeneity of the distress level. We reject (p-value <0.0001) the hypothesis of homogeneity of the distress level overall people who have different race at 5% significance level. So we conclude that there is difference in distress level for different race, which is supported by the findings in the literature [3,4].
Discussion
This study is conducted to determine the prevalence of psychological distress among cancer patients and to investigate the association of psychological distress with various socio-demo graphic factors. Clearly, in terms of mental health, this study has found that cancer patients suffer from higher level of psychological distress than the general population. That is, individuals with cancer diagnostics are more likely to experience higher psychological distress than those without cancer.
In general, the results suggest that psychological distress (PD) is a burden among participants with the cancer, however particular types of cancer is not associated with the level of PD. The results from the ordinal logistic regression models suggest that individuals with self-reported cancer are more likely to experience PD when compared with those without cancer. We found a number of socio-demographic factors that contribute PD other than cancer. These include age, sex, race, marital status, physical activity, BMI, insurance, education level and income. Thus our findings confirm those by the previous findings in the literature. Sub group analysis of PD among the sub types of cancer (breast, colon, lung, and prostate) does not demonstrate any significant determinants of PD.
Psychological distress among cancer patients adds extra burden on them. An important finding is that differential psychological distress level exists a cross different race of overall cancer patients. However, among the different sub types of cancer (breast, colon, lung, and prostate) PD is not found to be different across race.
The psychological distress of cancer patients is not a straight forward subject to study. Numerous factors must be taken into account. However, the main advantage of this study is the availability of all representative population based sample. The NHIS has been conducted every year since1957. However, there are some limitations of this study. One limitation is that the self-reported nature of the data. Another limitation is that a bulk of missing information. There is not enough data to assess the association between the risk factors and the PD across different subtypes of the cancer.
| |
In multifamily buildings, sound transmission between dwelling units is understandably a significant design issue. In an ideal setting, the only sound that we would hear inside buildings and spaces would be the intentional, desirable ones. But, we all know that is not automatically true since unwanted sound or background noise can readily penetrate between walls or floor/ceiling assemblies. Such sound intrusion can create a lack of privacy or disrupt the normal activities of the people inhabiting the dwelling units. A certain amount of background noise is certainly commonplace and sometimes preferable depending on the setting. However, excessive background noise can seriously degrade the ability to understand speech, listen to music, or most notably, to sleep. Based on all of this, architects and others have routinely sought out effective methods, materials, and assemblies that can reduce or control noise intrusions into dwelling units. As already noted, MgO panels offer a means to provide enhanced acoustical performance and improved living conditions.
Acoustics Principles
Sound is typically characterized both by loudness and frequency. Loudness is measured in decibels (dB) such that the higher the dB rating, the louder the sound. The commonly referenced range is 0 dB (threshold of hearing) to around 130 dB (threshold of pain) with human speech being in the middle around 50 to 65 dB. Sound frequency, meaning the time frequency of radiating waves of sound, is measured in Hertz (Hz). One Hz is equal to a frequency of one cycle per second. The human ear can typically hear frequencies or sound “pitch” between about 20 Hz (very low pitched, bass sounds) up to around 20,000 Hz (very high-pitched, piercing sounds). Sound exists above and below this range, but our ears do not hear it, unlike some animals such as dogs or bats that do indeed hear very high-pitched sounds (over 20,000 Hz) or elephants that can hear lower sounds (below 20 Hz).
To limit or reduce the amount of sound entering or leaving a space, the different materials and assemblies that enclose that space must be addressed. The goal is to control or attenuate the amount of sound passing through walls, ceilings, floors, etc. such that an acceptable level of background noise is achieved. Conversely, it may be equally important to contain the sound in a given space so it does not spill out to other areas. Either way, there are some common and useful means to measure sound transfer and attenuation.
- Transmission loss (TL) is a fundamental measurement of the ability of a material or building assembly to block or reduce sound. It is measured in decibels at different frequencies to determine how much sound transmission is lost at each measured frequency. Generally speaking, a TL of 10 means that the sound is 10 dB quieter on the listening side compared to the sound originating side.
- Sound transmission class (STC) is determined by ASTM E90: Standard Test Method for Laboratory Measurement of Airborne Sound Transmission Loss of Building Partitions and Elements. The results of this test determine the STC rating of the tested materials or assemblies. A higher STC rating (50–60 or above) means that more sound is abated while a lower STC rating (35 or less) means that more sound is transmitted through. The STC number is derived from values tested at sixteen different standard frequencies ranging from 125 Hz to 4000 Hz. Acoustical engineers fit these values to the appropriate Transmission Loss curve to determine a final STC rating. There is also an option to determine STC levels based on field measurements of a space, which may be appropriate for testing existing buildings. Note that the STC measurement is accurate for speech sounds but less so for amplified music, mechanical equipment noise, transportation noise or any sound with substantial low-frequency energy below 125 Hz.
- Impact insulation class (IIC) is a measure of the ability of a floor-ceiling assembly to absorb or deflect sound from impacts (such as people walking or objects dropping) and keep it from being transmitted to the space below. As such, IIC is a measure of structure borne sound, not a measure of airborne sound. It is determined by ASTM E492: Standard Test Method for Laboratory Measurement of Impact Sound Transmission Through Floor-Ceiling Assemblies Using the Tapping Machine. This test method prescribes a uniform procedure for reporting laboratory test data, that is, the normalized one-third octave band sound pressure levels transmitted by the floor-ceiling assembly created by a standard tapping machine. The results are based on the measured impact sounds in the space below and result in a numeric rating. A higher IIC rating means that more sound that is absorbed while a lower number means more structure borne sound is transmitted through.
Shown are magnesium oxide (MgO) subfloor panels being used on a multifamily construction project.
Building Codes and Sound
Building codes and other standards have long recognized the significance of acoustical control, particularly in dwelling units. Historically, Chapter 12 of the IBC dealing with interior environments has included a section on sound transmission. In the 2015 version of the code, these requirements were expanded to apply not only to dwelling units but to any sleeping rooms as well. That means that not only multifamily buildings, but other residential occupancies such as hotels, motels, dormitories, boarding houses, etc., all need to address the requirements of Section 1207 on sound transmission (changed to Section 1206 in the 2018 IBC).
The background for the development and updates to the code language can be found in a publication by the International Code Council (ICC) titled ICC G2 2010 – Guideline for Acoustics. Cited there is a 1995 British report titled “Building Regulation and Health” that, among other things, looked at the number of extremely severe health risks that are due to noise. Also cited is a Canadian study of over 600 families living in multifamily housing that concluded “Noise from neighbors in multi-unit buildings is a serious problem that degrades the quality of life of the residents.”
Based in part on this research, the IBC has consistently set the minimum threshold for airborne sound transfer in common interior walls, partitions, and floor/ceiling assemblies as no less than an STC rating of 50 for laboratory determined levels and 45 if field tested. Similarly, the IBC calls for a minimum structure borne sound transfer in floor/ceiling assemblies as no less than an IIC of 50 for laboratory-determined levels, 45 if field tested. The research cited above, however, suggests that these code minimums might fall short of satisfying many people when it comes to acoustical control in their spaces.
Based on all of the above, the ICC Guideline for Acoustics actually recommends acoustical performance beyond the current code minimum. While this higher performance is not mandated by the IBC, it does point to the common evidence-based need to exceed the code minimums to satisfy the greatest number of people and protect their health and welfare.
Achieving Acoustical Performance
To reach the STC and IIC levels that are either minimally required, acceptable, or preferred, especially in wood framed construction, attention to detail and material choices is required. In conventional terms, that can mean adding sound-deadening material, adding more sound reflective material, offsetting components, or using other extraordinary means to achieve the intended results.
One alternative to some of these conventional approaches is to consider the use of MgO panels in the floor/ceiling assembly as a primary or secondary subflooring material. There may be a misperception by some designers that adding a material such as MgO to a floor assembly will add mass and some sound deflection but not really increase STC or IIC values. In fact, MgO has been used as a subfloor material in a variety of different assembly types and has been tested according to the code requirements and guidelines. The results show that ratings of STC-60 are indeed readily achievable using MgO underlayment along with rather conventional methods and materials in the floor/ceiling assembly. Similarly, ratings of IIC 53–58 have been demonstrated in the same manner, thus exceeding code minimums in these cases.
MgO can be used in different flooring assemblies to help improve the acoustical performance of those assemblies.
Overall, MgO can be a significant acoustical contributor to floor/ceiling assemblies in multifamily buildings or other building types that contain sleeping rooms. It can help designs meet or exceed the code minimum or the preferred levels of sound control that is best suited for human health and wellness. | https://continuingeducation.bnpmedia.com/courses/exacor-mgo-board/magnesium-oxide-mgo-floor-and-wall-panels-for-multifamily-buildings/4/ |
The present invention relates to a thermosetting powder coating composition for preparing high gloss coatings with improved outdoor durability and flexibility, comprising as binder a bend of two carboxyl group containing resins of which one is an isophthalic acid rich polyester, containing neopentylglycol and linear chain aliphatic (poly)ether diols and/or linear chain diols, while the other one is a terephthalic acid rich polyester containing neopentylglycol, both in a mixture with at least one cross-linker having functional groups reactable with the polyesters carboxyl groups. The invention also relates to the use of said compositions for the preparation of powdered paints and varnishes for the making of coatings and to coatings obtained therewith. | |
I may not be a full time illustrator or graphic designer, but I think you could consider me kind of a creative person. I write full-time here at Gravitate; I dabble in photography; I’ve done work on the side as a graphic designer; I fully designed the look of my blog and continue to design graphics for it on a regular basis. And while the majority of what I do on a day-to-day basis doesn’t exactly require a heavy dose of creativity, I do come into contact with creative work enough that I’ve had to figure out the answer to this important question: can you nurture creativity? I see creatives ask themselves that question often. “How do I become a more creative person?” “How do I fuel my creativity?” “How do I get inspiration to come when it simply isn’t coming to me?”
Some people are definitely more innately creative than others, but I think that there is a lot that we can do to become all-around more creative people. Here are some of the things that I’ve seen help nurture my own creativity and make me an overall more creative person.
Surround yourself with creative people.
There was a time not too long ago when I was interning with a paper crafting magazine and simultaneously working for an extremely artistic blogger as a project assistant. I was learning a ton about the worlds of card making and scrapbooking, helping photograph some amazing projects for a blog, and even assisting in photo shoots for a kids’ crafting book. Looking back, I think that season was definitely the most creative season of my life thus far. I was surrounded by some incredibly talented people on a regular basis, and I could almost feel their creative spirits fueling my own creativity. It’s kinda neat how the right people can do that. So I would say that if you want to nurture your own creativity, surround yourself with people who have really harnessed their own.
Follow creatives on social media.
On a similar note, you can also surround yourself with creative people by means of social media. Find people who inspire you on Pinterest and Instagram, and follow them. Look at the things they post, and think about why they posted them. What beauty did that photographer find in that simple photo of a door? What is it about this magazine cover that that designer likes? I’ve found that following certain people who have a taste that is similar to my own has really helped me to develop my own unique style.
Collaborate.
Oh, the number of times you’ll hear the word “collaborate” in the blogging realm. But sick of it or not, there is power in collaboration. Collaborating with others who jive with you creatively really has a way of taking your own creativity and pushing it further. Just as teamwork is crucial in the world of business for furthering innovation (business’s word for creativity, in my book), collaboration works wonders on the creative mind. Sit down and toss around ideas with some other creative peeps like yourself and watch the magic happen.
Have a creative outlet.
You also need some sort of outlet that you can always go to for some “no pressure” creative work. Something fun. Something that will teach you design concepts along the way. Something that helps you develop your artistic edge without having to face the demands of deadlines or building your portfolio. Mine, for example, is blogging. I’d recommend this as a creative outlet to anyone because it’s so versatile. And then I have photography as well. It’s so nice to take my camera out sometimes and marvel at some of the shots I get—without feeling like everything I create has to be amazing.
Hone your artistic “eye.”
This one is hard to explain, but it relates to what I just said about photography. Look for hobbies and lifestyle changes you can make which will help you see the world in a more artistic way. With photography, for example, I find myself looking for things that would make good photos without even meaning to—a beautiful door or the ribbed shadow created by open blinds, for example. For you, that might mean reading more, listening to TED talks about creativity, or taking up painting. | https://gravitateone.com/can-you-nurture-creativity/ |
First-trimester combined screening for trisomy 21 at 7-14 weeks' gestation.
(2010-10)
OBJECTIVE: To establish an algorithm for first-trimester combined screening for trisomy 21 with biochemical testing from 7 to 14 weeks' gestation and ultrasound testing at 11-13 weeks. METHODS: This was a multicenter study ...
Prospective study evaluating performance of first-trimester combined screening for trisomy 21 using repeat sampling of maternal serum markers PAPP-A and free β-hCG.
(2012-09)
OBJECTIVE: To prospectively evaluate the performance of first-trimester combined screening for trisomy 21 using the biochemical markers pregnancy-associated plasma protein-A (PAPP-A) and free beta-human chorionic gonadotropin ...
Intraoperative aberrometry-based aphakia refraction in patients with cataract: status and options.
(2017-02)
AIM: To explore the application of intraoperative wavefront aberrometry (IWA) for aphakia-based biometry using three existing formulae derived from autorefractive retinoscopy and introducing new improved formulae. METHODS: ...
Intervention fidelity in the definitive cluster randomised controlled trial of the Healthy Lifestyles Programme (HeLP) trial: findings from the process evaluation.
(2017-11-28)
BACKGROUND: The Healthy Lifestyles Programme (HeLP) was a novel school-located intervention for 9-10 year olds, designed to prevent obesity by changing patterns of child behaviour through the creation of supportive school ...
Study protocol for a double blind, randomised, placebo-controlled trial of continuous subpectoral local anaesthetic infusion for pain and shoulder function following mastectomy: SUB-pectoral Local anaesthetic Infusion following MastEctomy (SUBLIME) study.
(2014-09-30)
INTRODUCTION: Over 16 000 mastectomies are performed in England and Wales annually. Acute postoperative pain and nausea are common. The most frequently occurring long-term complications are chronic pain (up to 50%) and ...
Patient-orientated longitudinal study of multiple sclerosis in south west England (The South West Impact of Multiple Sclerosis Project, SWIMS) 1: protocol and baseline characteristics of cohort.
(2010-10-07)
BACKGROUND: There is a need for greater understanding of the impact of multiple sclerosis (MS) from the perspective of individuals with the condition. The South West Impact of MS Project (SWIMS) has been designed to improve ...
Analysis and validation of a Parkinson's disease register as a recruitment tool for clinical studies.
(2012-06)
Promotion of research is a key strategy of the National Health Service (NHS). Currently, many patients are not afforded the opportunity to participate in clinical studies. A register of research-interested patients has the ...
Modelling the impact of improving screening and treatment of chronic hepatitis C virus infection on future hepatocellular carcinoma rates and liver-related mortality.
(2014-08-07)
BACKGROUND: The societal, clinical and economic burden imposed by the complications of chronic hepatitis C virus (HCV) infection - including cirrhosis and hepatocellular carcinoma (HCC) - is expected to increase over the ...
A tool to measure the attributes of receiving IV therapy in a home versus hospital setting: the Multiple Sclerosis Relapse Management Scale (MSRMS).
(2011-09-26)
BACKGROUND: Intravenous steroids are routinely used to treat disabling relapses in multiple sclerosis (MS). Theoretically, the infusion could take place at home, rather than in hospital. Findings from other patient populations ...
The feasibility of collecting information from people with Multiple Sclerosis for the UK MS Register via a web portal: characterising a cohort of people with MS.
(2012-07-18)
BACKGROUND: A UK Register of people with Multiple Sclerosis has been developed to address the need for an increased knowledge-base about MS. The Register is being populated via: a web-based portal; NHS neurology clinical ... | https://pearl.plymouth.ac.uk/handle/10026.1/11745/discover?filtertype_0=subject&filtertype_1=subject&filter_relational_operator_1=equals&filter_relational_operator_0=equals&filter_1=Humans&filter_0=Female&filtertype=dateIssued&filter_relational_operator=equals&filter=%5B2010+TO+2019%5D |
According to Judith Schalansky, author of Verzeichnis einiger Verluste, the book is like a close relationship to someone she’s known since childhood.
Judith Schalansky excels in the use of various linguistic styles, transforming details into stories based on deep research, exploring space and blurring the boundaries between reality and imagination, between reality and myth, and between fact and fiction.
An extinct tiger species, a forgotten island in the Pacific Ocean and other stories are among the twelve packed into Verzeichnis einiger Verluste, in which she addresses the theme of loss based on thorough research and a wealth of knowledge. | https://www.goethe.de/ins/id/en/kul/lit/22075457.html |
Open Discussion Forum: Integration and development of far right
We would like to invite community leaders, organisations and individuals to attend an open Forum to explore the subject of integration and development radical ideologies among the Eastern European (EE) community living in the UK. In the last 2 years we observed a growing number of incidents that are attached politically to the far-right ideology. This Forum is an initiative providing a platform to respond to the concerns that include a number of far- right public speakers invited to the UK, the reported radicalisations in education at Polish Saturday Schools and negative narratives present in the media, presence and influence of Polish far right groups.
The aim of this Forum is to bring together front-line activists, artistic practitioners, community leaders and public participants to exchange knowledge, experience and expertise as to promote positive cultural integration and counter the negative influences. This event will help us to gain a practical knowledge of what Far Right/Extreme Right groups are, how to recognise them, and how they affect the Central and Eastern European migrant community. We hope to raise awareness of ideologies that support their negative narratives and discuss methods of broadening engagement with migrant communities in the UK. | http://centrala-space.org.uk/event/open-discussion-forum-integration-and-development-of-far-right |
Boro is the ultimate slow stitching technique. This collection explores the history of the Japanese textile, boro, and its relevance to the contemporary sewer. Learn about the history of boro and the materials that were traditionally used such as cotton and hemp fabrics, kasuri ikat, indigo, silk mawata, raw cotton and hemp.
We also look at how boro is being revived for a new audience using contemporary fabrics including denim, linen and shibori tie dye as well as sashiko and embroidery threads. The techniques section includes a short stitch directory with traditional stitches (running stitch and applique) and contemporary stitches (herringbone stitch, blanket stitch, chain stitch and whipped running stitch).
Other techniques include: Instructions on improvisational patchwork Applique: raw and turned edges and reverse Darning Methods for distressing and ageing your finished boro
is backordered. We will ship it separately in 10 to 15 days. | https://petronella.co.nz/products/bookofboro |
Our Vision, Mission and Values
Quality schools are characterised by many things. Essentially, however, a clear vision for the future, a documented plan for achieving that vision, a deep and rich investment in the quality of teaching being offered and a focus on individual students is paramount.
Our Vision
To inspire and equip every student to discover, develop and use their gifts, embrace life’s challenges and follow Christ.
Our Mission
We provide a caring and dynamic learning community dedicated to the promotion of resilience, talents and the attributes of every individual in their quest for personal excellence.
Our Values
Excellence is a personal pursuit. It seeks the highest quality in our endeavours and places a strong value on personal engagement and persistent commitment. Excellence is linked to a positive attitude. It is something that happens when you make right choices over and over again, especially when no one is looking. Excellence in the little things always adds up to excellence in the big things – and the diametric is also true.
The value of courage lies not in any one act, but in the motivations and values behind it. Simply being brave does not constitute courage. Courage is a state of mind that enables a person to face difficulty and challenge in a positive manner and despite fear. Courage is acting in accordance with one’s convictions and values.
The Christian value of hope enables us to be patient and persevere knowing that despite difficulties, we do not need to conform to the world or be ‘perfect’. Hope is being assured of the promises of eternal life. Hope is more than just relying on your own wisdom and effort, it is finding your identity in Christ Jesus. With hope, we have reason to be optimistic, positive, face challenges, accept failure and to be confident not just in self, but in our future.
The core value of love has great significance and importance because God is love! God so loved the world that he gave his only son. Our response to this sacrifice is to provide a Godly love of unmerited favour to others. Our love of self, others and learning is expressed through our attitudes and actions.
We encourage you to learn more about Lutheran Education in South Australia by visiting Lutheran Education – South Australia, Northern Territory and Western Australia. | https://www.faith.sa.edu.au/about-us/our-vision-mission-and-values |
Craig Morris is a versatile performer well versed in all classical genres of music from Baroque to Contemporary. Regarded as a leading proponent for new music and original programming, Morris received a 2019 Grammy Nomination for Best Classical Instrumental Solo for his album Three Pieces in the Shape of a Square, featuring the music of Philip Glass. Craig Morris has also recently premiered major pieces by two leading American composers: a major new concerto by Joel Puckett titled The Fifteenth Night of the Moon and also The Lightning Fields, a major new work for trumpet and piano by Michael Daugherty. Morris is also featured in two solo recordings on the Naxos label: Concerto for Trumpet and Winds by Thom Sleeper on the album Reflections (another piece that was written for Morris), and his acclaimed debut solo album Permit Me Voyage, featuring his own original transcriptions of Debussy, Schumann, Brahms, and Barber.
Mr. Morris has an active recital touring schedule and has been featured as a soloist with ensembles and festivals around the world, including appearances with the Cabrillo Festival of Contemporary Music, the Chicago Symphony Orchestra, the San Francisco Symphony, the Miami Bach Society, and numerous university wind ensembles including the University of Texas Wind Ensemble, the University of North Texas Wind Ensemble, and the Frost School of Music Wind Ensemble. Morris performed his Carnegie Hall debut as a soloist with the University of Miami Wind Ensemble, performing Andre Jolivet’s demanding Concerto No. 2. In 2018 Morris was a featured concerto soloist at the National Trumpet Competition, performing Thom Sleeper’s Concerto for Trumpet and Winds with the University of North Texas Wind Ensemble. He has also appeared at leading international festivals including Instrumenta Oaxaca, in Oaxaca, Mexico, the Schagerl Brass Festival, in Melk, Austria, the Blekinge International Brass Institute, in Karlskrona, Sweden, and the Beijing Modern Music Festival in Beijing, China. Prior to his work as a soloist, Morris served as Associate Principal Trumpet of the San Francisco Symphony and Principal Trumpet of the Chicago Symphony Orchestra, following the legendary Adolph “Bud” Herseth in that chair. Still active as an orchestral performer, Mr. Morris has served as guest principal trumpet with the St. Louis Symphony, the Swedish Radio Orchestra, the Jacksonville Symphony, and the San Diego Symphony. Since 2007, Mr. Morris has been the principal trumpet of the Cabrillo Festival of Contemporary Music, the world’s leading orchestral new music festival, where he has worked closely with some of the leading composers of our time.
Currently based in Miami, Florida, Craig Morris is the Trumpet Professor at the Frost School of Music. He has been a Yamaha Artist since 2015. | https://www.craigmorristrumpet.com/about |
Disclosed is a geranium floating cottage method. According to the specific technical scheme, the geranium floating cottage method includes the steps that (1), a floating pool is built, wherein the height of a nutrient solution ranges from 8 cm to 15 cm; (2), media are poured into the floating pool, wherein floating disc holes are scraped flat after being filled with the media; the media are composed of, by percent by volume, 30-40% of turf, 30-40% of humus, 15-25% of perlite and 8-12% of vermiculite; the water content of the media is 45-50% when a disc is filled with the media; (3), cottage is carried out, wherein cutting slips with five to six strong terminal buds are reserved, a cutting is notched, dried in the shade for 24 hours and socked in an auxin solution for 1-1.5 hours, cutting seedlings are inserted into the media in the floating disc holes after the blade at the lowest section is removed, then the cutting seedlings are fixed through the media, and the floating disc is placed in the pool for planting the seedlings in shallow water. | |
” package, said Rep. Rob Kauffman (R-Franklin), chairman of the House Judiciary Committee, which first vetted the bills. The package also contains measures to support ex-offenders who have paid their debt to society and have demonstrated a commitment to rehabilitation.
“Smart justice is all about balance,” said Kauffman. “We are helping those individuals who have put in the effort to change their ways and giving them a second chance, while making sure those who continue to pose a threat remain behind bars. Earlier this year we focused on bills to help victims of crime, and now we are focusing on the other side of the equation.”
House Bill 1855
would preclude the Pennsylvania Board of Probation and Parole from paroling an inmate at the expiration of his or her minimum sentence if the inmate was convicted of a violent offense or an obstruction of justice while incarcerated.
The bill is known as Markie’s Law, named after an 8-year-old boy who was brutally stabbed to death by a man who was paroled at the end of his minimum sentence for homicide, even after committing two separate assaults of other inmates while behind bars.
“Convicted criminals who continue to commit violent acts while incarcerated should not be released on the streets after serving the bare minimum of their sentence,” said Kauffman. “These individuals are a danger to the public, and the tragic death of Markie Mason is a prime example of that.”
The House also approved legislation to better support the thousands of men and women who work in Pennsylvania’s correctional facilities.
House Bills 256
and
257
would strengthen penalties against inmates who commit an assault on a corrections officers or staff member.
“Our correctional employees face unpredictable danger every day they go to work,” said Kauffman. “These measures, if passed into law, will help hold inmates who seek to harm them more accountable.
“Of course, we also need to recognize that there are those individuals who make a mistake and truly regret their actions and work hard to change their ways,” continued Kauffman. “We want to support their rehabilitation efforts and relieve the taxpayers from footing the bill for these men and women by getting them out of the state penal system and back with their families and into jobs as quickly as possible.”
House Bill 440
would mandate expungement of an individual’s record under limited circumstances and
House Bill 1477
would ensure ex-offenders are not automatically excluded from pursuing work in some of the state’s licensed professions.
Two Senate bills would also make needed enhancements to the current parole and probation system.
Senate Bill 500
would create an advisory committee on adult county probation, establish Justice Reinvestment grants, and reinvest cost savings into county probation and parole.
Senate Bill 501
would incorporate the county intermediate punishment program into county probation, provide reasonable parole for certain short-term minimum sentences in state correctional institutions, amend the duties of the PA Sentencing Commission and add other correctional system and sentencing changes. In addition, minimum mandatory sentencing guidelines would be imposed for crimes against children, and there would be a mandatory 12-month period of re-entry parole supervision for inmates who “max out” on their sentences and thus would otherwise be subject to release without any supervision.
“I gave my word that we would address criminal justice reform before the end of the year and we did,” said Kauffman. “This is an important aspect of our justice system, and I am pleased we were able to move these bills forward through the process so quickly.”
The bills now go to the state Senate for consideration. | https://www.repcutler.com/News-Print/16149/Latest-News/House-Approves-Smart-Justice-Package,-Says-Kauffman |
180 F.2d 837
UNITED STATES,
v.
SEAVEY.
No. 10076.
United States Court of Appeals, Third Circuit.
Argued Feb. 9, 1950.
Decided March 17, 1950.
Writ of Certiorari Denied June 5, 1950.
See 70 S.Ct. 1023.
Thomas D. McBride, Philadelphia, Pa. (John B. Martin, Philadelphia, Pa., on the brief), for appellant.
Thomas J. Curtin, Asst. U.S. Atty., Philadelphia, Pa. (Gerald A. Gleeson, U.S. Atty., Philadelphia, Pa., on the brief,) for appellee.
Before GOODRICH, McLAUGHLIN and KALODNER, Circuit Judges.
GOODRICH, Circuit Judge.
This appeal involves the sufficiency of the evidence in a perjury conviction under 18 U.S.C. § 231 (1946)1 and alleged errors in the trial court's instructions to the jury.
In July, 1946, a federal grand jury was investigating certain war fraud cases. According to stenographic notes of the testimony before the grand jury, the defendant said that he had never made any payments on behalf of his employer to any officers or employees of the War Shipping Administration or to one Frank Sales, an employee of that agency. That defendant made the statement is not disputed. The government charges that this testimony was false.
1. Did Defendant Testify Under Oath?
The defendant contends on appeal that there is no substantial evidence that the allegedly perjured testimony was given under oath, as it must be to constitute the crime under the statute. We do not agree. The grand jury foreman testified at the trial that he swore every witness who came into the room, that he could not personally recall the testimony of the defendant and that a court reporter was present throughout the investigation. The reporter testified that he had been present when the defendant appeared before the grand jury, that he had seen defendant take the oath but that the notes of the testimony did not show that the defendant had been sworn. Certainly a jury could find from all this that the oath had actually been administered. See United States v. Gardiner, C.C. Dist. Col. 1853, 25 Fed.Cas.pages 1245, 1246-1247, No. 15,186a.
Reversal is also urged on the ground that the trial judge failed to instruct the jury to acquit unless they found that defendant had been sworn. But the trial judge told the jury that 'Perjury, among other things, is false swearing in a material matter requiring affidavit or oath to be taken, with the knowledge on the part of the defendant that the false swearing is false.' If the defendant desired a more explicit instruction on this point, he could have presented a request for charge, but he offered none. The fact that the judge did not enlarge upon the point, in the absence of request for anything further, is not a ground for reversal.
2. Sufficiency of Testimony
The rule in perjury cases is that the falsehood must be proved by two witnesses or one witness and corroborating evidence. Weiler v. United States, 1945, 323 U.S. 606, 65 S.Ct. 548, 89 L.Ed. 495, 156 A.L.R. 496; Hammer v. United States, 1926, 271 U.S. 620, 46 S.Ct. 603, 70 L.Ed. 1118. The prosecution offered testimony in this case: (a) By Mrs. Wilhelmina Azzarano. She was the firm's bookkeeper and she stated that she had seen $50 pass from the defendant to Frank Sales, a Maritime Commission employee, at a Christmas party in 1944. (b) By Frank Sales. He said that upon another occasion he had received $125 from the defendant but that this was the only occasion on which he had ever received money from the defendant.2
Defendant says that this is sufficient because the two-witness rule must apply to each alleged passing of money. This very point was considered and decided by this Court in United States v. Palese, 3 Cir., 1943, 133 F.2d 600. Indeed, as to the point the instant case reads precisely upon the Palese set of facts and decision. It should be borne in mind that what the defendant is being prosecuted for here was not the giving or taking of bribes, but an alleged perjured statement that he had never made any payments on behalf of his employer to a given group of persons. Two witnesses testified, each to a different payment. The defendant has, therefore, been proved a perjurer by the testimony of two witnesses just as he was in Palese case to which we adhere.
Defendant's brief seeks to discredit the testimony of Mrs. Azzarano and Sales, because they are 'accomplices.' They are not 'accomplices' but even if they were it is not to the crime of perjury. There is nothing to this point.
As said above, perjury must be proved either by the testimony of two witnesses or one witness plus corroborating evidence. We have already pointed out that we have here sufficient testimony for two witnesses. We also have one witness plus corroborating testimony. Books of account of defendant's employer were received in evidence as government Exhibit No. 1. They show entries as follows:
1942 August 17, Commission, Maritime Commission cash $50.00 October 27, Commission-S 543.90 November 10, Chemical Cleaning, commission P and S 457.99 1943 March 4, Commissions-S 200.00
We think that the entries, as they stand, corroborate the direct testimony of payment by the defendant, who was the bookkeeper's 'boss.' In addition, the bookkeeper, Mrs. Azzarano, gave testimony explaining what the various 'commissions' were. The defendant says this will not do because it is allowing Mrs. Azzarano to corroborate her own testimony as a witness to the actual passing of a bribe. He cites to us an English case in which the defendant was charged with falsely swearing that he owed his landlord only one quarter's rent. At the trial for perjury, the landlord testified that five quarters were due at the time and refreshed his memory by referring to account books. It was held there that the rule requiring one witness and corroborating evidence was not satisfied,3 and rightly so, because writings used to refresh a witness' memory are not themselves evidence.4 But here the books were in evidence and we think constitute circumstantial corroboration even without Mrs. Azzarano's explanation. The sufficiency of the corroboration is, of course, a question for the jury. Weiler v. United States, supra.
3. Was the Jury Confused?
At the request of the defendant the judge charged the jury that 'Some one single payment to Sales must be proved either by two witnesses or by one witness and corroborating circumstances.' This charge, obviously, is directly contrary to this Court's decision in the Palese case. In giving it the trial judge gave the defendant more than he was entitled to according to our view of the law.
But the fact that the defendant by virtue of getting a charge too favorable to himself may have got a case submitted to the jury in an erroneous fashion does not show error of which he can complain. Defendant urges upon us that where two alternative theories of guilt are submitted, one correct and the other incorrect, the judgment must be reversed because it is impossible to tell which the jury followed. Willaims v. North Carolina, 1942, 63 S.Ct. 207, 87 L.Ed. 279, 143 A.L.R. 1273, 317 U.S. 287, is cited for the proposition. Of course, the proposition is true and applies when one of the alternatives incorrectly cuts down the protection given to the defendant's rights. But here the alternative was too favorable to the defendant. And a defendant who has received more than he is entitled to is in no position to complain.
The evidence is sufficient to support the verdict either on the theory of two witnesses to the charge of perjury or one witness plus the corroborating force of the account book.
The judgment will be affirmed. | https://openjurist.org/180/f2d/837 |
Figure 7.41.1 shows the approximate titration curve for the Fe2+/Ce4+ system in two sections. Section A proceeds from the top left to the equivalence point, and section B proceeds from the equivalence point down to the right.
In the following example, Fe2+ is a noxious chemical effluent of a plant, and Ce4+ is a reagent added to produce the less noxious or inert Fe3+ form. A set of ORP electrodes monitors the reaction. What value of ORP indicates that the reaction is complete? If the process operates to the end or equivalence point, the least amount of titrating reagent is used; however, a slight deficiency in the amount of Ce4+ reagent signifies that Fe2+ is still present. If the process operates to the ECe point, a large excess of Ce4+ reagent is required, which is costly and can require adding a substance to the treated wastewater that is just as adverse as the original waste.
The best operating potential for this process is about +0.400 V. Only a slight excess of reagent is required, but all of the Fe2+ is oxidized. For ORP applications, operation away from the equivalence point is advisable, insuring that the adverse species is completely eliminated.
FIG. 7.41.1 Approximate titration curve for the Fe2+/Ce4+ system. | https://www.ecologycenter.us/wastewater-treatment/titration-curve.html |
Managing Editor: Edward Venzke. Edited by Kadie L. Bennis. Research and preparation by Paul Berger.
Cleveland (United States) Explosion on 1 June 2020 produced an ash plume and destroyed the January 2019 lava dome
Please cite this report as:
Global Volcanism Program, 2020. Report on Cleveland (United States) (Bennis, K.L., and Venzke, E., eds.). Bulletin of the Global Volcanism Network, 45:8. Smithsonian Institution. https://doi.org/10.5479/si.GVP.BGVN202008-311240
Cleveland
United States
52.825°N, 169.944°W; summit elev. 1730 m
All times are local (unless otherwise noted)
Cleveland is located in the western portion of Chuginadak Island, a remote island that is part of the east central Aleutians. Recent activity has been dominated by small ash explosions, intermittent lava dome growth, gas-and-steam emissions, and occasional thermal anomalies. The previous report described an ash explosion on 9 January 2019 that was followed by lava dome growth; by February the lava dome had begun to slowly subside (BGVN 45:03). This report covers activity during February-July 2020 using information primarily from the Alaska Volcano Observatory (AVO) and satellite data. According to AVO, local seismic, infrasound, and web camera data were unavailable due to an ongoing equipment failure.
Activity during February-May 2020 was relatively low and mainly consisted of weak gas-and-steam emissions and elevated surface temperatures near the summit, according to AVO. Sentinel-2 thermal satellite imagery highlights both gas-and-steam emissions and these higher surface temperatures near the summit crater (figure 34).
According to AVO, infrasound sensors recorded a small explosion on 1 June at 2232 local time, producing an ash plume that rose to an altitude of 6.7 km and drifted S, though clouds prevented the detection of the ash plume at the time in satellite imagery. The explosion destroyed the January 2019 lava dome and ejected a large amount of material from the summit crater. AVO raised the Volcano Alert Level (VAL) to Watch (second highest of four) and the Aviation Color Code (ACC) to Orange (second highest of four). No significant volcanic activity was noted after the 1 June explosion, although a gas-and-steam plume was visible on 3 June rising from the ash-covered summit (figure 35). As a result, on 17 June AVO lowered the VAL to Advisory and the ACC to Yellow.
|Figure 35. Photograph of Cleveland on 3 June 2020 (0000 local time), showing gas-and-steam emissions and ash covering the summit. Photo by Burke Mees, courtesy of AVO.|
A comparison of images from before the 1 June event and afterwards showed initial ash deposits on the S flank on 4 June and ash and debris flow deposits on all flanks on 21 June (figure 36). Analysis of satellite imagery from 22 June revealed that ejecta had traveled as far as 1.4 km from the summit crater (figure 37). By that time volcanic debris flows had carried material 2.9 km down the E flank and more than 2.7 km down the N flank. This event also caused a thermal anomaly detected in the MIROVA (Middle InfraRed Observation of Volcanic Activity) analysis of MODIS satellite data.
Geological Summary. The beautifully symmetrical Mount Cleveland stratovolcano is situated at the western end of the uninhabited Chuginadak Island. It lies SE across Carlisle Pass strait from Carlisle volcano and NE across Chuginadak Pass strait from Herbert volcano. Joined to the rest of Chuginadak Island by a low isthmus, Cleveland is the highest of the Islands of the Four Mountains group and is one of the most active of the Aleutian Islands. The native name, Chuginadak, refers to the Aleut goddess of fire, who was thought to reside on the volcano. Numerous large lava flows descend the steep-sided flanks. It is possible that some 18th-to-19th century eruptions attributed to Carlisle should be ascribed to Cleveland (Miller et al., 1998). In 1944 it produced the only known fatality from an Aleutian eruption. Recent eruptions have been characterized by short-lived explosive ash emissions, at times accompanied by lava fountaining and lava flows down the flanks.
Information Contacts: Alaska Volcano Observatory (AVO), a cooperative program of a) U.S. Geological Survey, 4200 University Drive, Anchorage, AK 99508-4667 USA (URL: https://avo.alaska.edu/), b) Geophysical Institute, University of Alaska, PO Box 757320, Fairbanks, AK 99775-7320, USA, and c) Alaska Division of Geological & Geophysical Surveys, 794 University Ave., Suite 200, Fairbanks, AK 99709, USA (URL: http://dggs.alaska.gov/); MIROVA (Middle InfraRed Observation of Volcanic Activity), a collaborative project between the Universities of Turin and Florence (Italy) supported by the Centre for Volcanic Risk of the Italian Civil Protection Department (URL: http://www.mirovaweb.it/); Sentinel Hub Playground (URL: https://www.sentinel-hub.com/explore/sentinel-playground). | https://volcano.si.edu/showreport.cfm?doi=10.5479/si.GVP.BGVN202008-311240 |
Yukon Services Lda, is a specialist customs clearing agency. Our business is clearing your goods through customs. In business since 2007, we are market leaders and experts in our field. Covering permanent, temporary exemption, and turnkey projects.
Customer Satisfaction and Delight: To continuously improve our processes and offerings so as to enable us to deliver products and services that meet our customers' expectations. Accountability: To take responsibility to meet our commitments, individually collectively.
Our Vision is to become the best Clearing Agent Company in Mozambique.
To encourage, recognize and reward sustainable innovation that can help us service our clients better.
Whether you're an importer, wholesale or retail, a business with sites around the globe, courier company with regular shipments, or a private individual making an occasional overseas....
Yukon Services Lda., is specialized and there are heavy penalties for making false declarations. Where it could take the inexperienced person many long hours to complete the process, we can get most shipments ...
We offer tailored services to suit every requirement. We like challenges and look for creative ways to meet your needs. Our aim is to deliver an efficient, professional, timely service, specific to your individual .... | http://www.yukonservice.com/index.html |
Pieter from Liechtenstein worked with A.T. Kearney, focusing on growth strategies and private equity cases. He is now a freelance consultant at van Eck Business Advisors, and shares his best practices to avoid biases when conducting expert interviews.
Expert interviews are a great source of insights for due diligence and market assessment cases. They give you multiple individual perspectives on an industry, which you combine to superior market insights.
You must however be cautious not to introduce your personal biases in the process, and thereby adversely influencing your findings. During your case, there are four stages in which biases can creep in:
- Scoping the project/market definition
- Selecting experts
- Structuring the interview
- Summarizing the findings
By carefully planning each stage and using best practices, you can largely avoid biasing your findings.
Scoping the project/market definition
Sending out the request for experts is one of the first things that you do when starting a consulting project. You typically do not have a detailed view of the project at this stage, so you should allow for a wide industry definition. Share multiple examples of relevant companies and experts’ titles to help guide the expert networks (and make clear whether they should look for other similar companies or only the ones provided). If you do not correctly scope the project for the expert networks, you might end up with unequipped experts who will give you insufficient knowledge and prejudices instead of clear data points and well-founded expert advice.
Selecting experts
The project proceeds and you receive your first experts. Doing multiple expert interviews helps you triangulate the data points, so make sure to schedule calls with many experts relevant to each of your key questions. Your key questions obviously vary greatly between each case, but could relate to customers’ key buying factors, or sales persons’ thoughts on future sales channel strategies. You should also ensure to add a couple of unconventional interviewees: maybe former employees at an organization ensuring industry standards, regulatory bodies or even industry associations. This way, you are sure to get different perspectives and a holistic overview of the industry.
Structuring the interview
Be aware of the situation and tone of your conversation. You will typically be under time pressure, but you must not fall into the temptation of asking leading questions or otherwise you risk pushing the interviewee to merely confirm your assumptions.
A good solution is to clearly state your objectives with the interview at the start, without presenting any data points or assumptions that you may have. If you are unsure about the quality of the expert, feel free to ask probing questions to test his knowledge within the industry. Expert networks will often not charge you if you cancel the call after 10 minutes, so take that time to make sure that your expert really knows what he/she is taking about! However, make sure that you stay humble and polite during the whole process. A good introduction for a qualified expert could be: “I want to understand the market for X, including its size, development trends as well as the characteristics and behavior of different suppliers and customers within the market. I want to hear your thoughts on this for the first half hour, and then we can spend the remaining time on some specific questions that I have prepared”. You should allow the expert to speak freely, but feel free to nudge lightly in case you get clearly off topic.
So for the first part, go semi-structured with open questions. Be attentive to nuances or descriptions that contradict your assumptions and hypotheses and ask follow-ups accordingly. For the second part, run through all the shorter quantitative questions that are needed for your modelling.
After the first few interviews, you can revise your hypotheses, refine your quantitative part, and let it take a larger part of the interview hour.
Summarizing the findings
After you have completed your interviews you will frequently find that you have obtained some opposing views of some experts. In this case, it is crucial to separate the noise from the relevant data points. To form your own opinion, use some of the following procedures: First, check how many experts have stated the opposing view. Is it only one, or is it many? Second, check the profiles of the opposing experts. How many years of industry experience do they have? Who seems the more trustworthy and reliable expert to you? Third, if you are still undecided, call some of your top ranked experts from previous calls and ask them for their view on the issue at hand. This way you make sure that you will have an unbiased and differentiated view at the end of the case! | https://inex.one/news/avoid-biases-in-expert-interviews/ |
Marmara University, Faculty of Economics, Department of Econometrics, Goztepe Campus, 34722, Kadıkoy – Istanbul, Turkey. e-mail: [email protected].
ABSTRACT
This paper analyses the hedonic price model for Istanbul real estate market, in order to determine the relationship between house prices and housing features by using OLS. Since the OLS suffers from heteroscedasticity, non-normality and outliers, we estimate the hedonic price model by using robust regression which is called L1 and M regressions to get rid of these problems of OLS. For the purpose of investigating the relation between house prices and features of houses in Istanbul, the survey data of Ҫağlayan and Arikan’s work (Quality and Quantity, 2011) were used. Results of the study indicate that while having a central heating system, natural gas, a certain level of security, garage and four faces, have an effect that increase house prices, being located in a site or on a street have a decreasing effect on the same.
JEL Classification: C12; C13; R13.
Key Words: Outlier; Robust Regression; Hedonic Price Model. | http://jemp.org/volume-7-issue-3-14-20/ |
The IBM SAP Practice is seeking Practitioners with experience in implementing SAP Advanced Business Applications Programming (ABAP) on High Performance Analytic Appliance (HANA).
The SAP ABAP on HANA Practitioners would possess the knowledge of the following topics and apply them to bring in value and innovation to client engagements : SAP HANA Technical Concept and Architecture, Data Modelling using HANA Studio, ABAP Development Tools (ADT), Code Performance Rules and Guidelines for SAP HANA, ADBC, Native SQL, ABAP Core data Services, Data Base Procedures, Text Search, ALV on HANA, and HANA Live models consumption.
Experience with one or more of the following application components - C / 4 HANA, BW / 4 HANA, SAP Fiori, SAP MGD, IBP, Ariba, and SuccessFactors.
Responsible to provide high level designs and quick solutions for GAP’s. Need to come out with SAP development options for resolving the GAP’s and providing development efforts including complexity of the effort and estimates.
IBM and SAP work together to build customized solutions that increase customer value, enhance the customer experience and establish your presence in the digital economy.
As part of our team, you will lead one of our teams that is responsible for engineering SAP solutions for IBM’s core business processes.
This position requires strong collaboration and teamwork across team and organizational boundaries.
Working on key activities of Plant Maintenance (PM) to include inspection, notifications, corrective and preventive maintenance, repairs, and other measures to maintain an ideal technical system.
Superb communication skills with Client facing abilities at all levels.
Good to have SAP ECC (ERP Central Component) PM (Plant Maintenance).
Experience in SAP data load and integration tools : LSMW, BDC & IDOC's.
Excellent written and verbal interpersonal skills for coordinating across teams. | https://neuvoo.co.in/view/?id=c5a477564fc2&source=gfj |
We present an application for Android phones or tablets called “archAR” that uses augmented reality as an alternative, portable way of viewing archaeological information from UCSD’s Levantine Archaeology Laboratory. archAR provides a unique experience of flying through an archaeological dig site in the Levantine area and exploring the artifacts uncovered there. Using a Google Nexus tablet and Qualcomm’s Vuforia API, we use an image target as a map and overlay a three-dimensional model of the dig site onto it, augmenting reality such that we are able to interact with the plotted artifacts. The user can physically move the Android device around the image target and see the dig site model from any perspective. The user can also move the device closer to the model in order to “zoom” into the view of a particular section of the model and its associated artifacts. This is especially useful, as the dig site model and the collection of artifacts are very detailed. The artifacts are plotted as points, colored by type. The user can touch the virtual points to trigger a popup information window that contains details of the artifact, such as photographs, material descriptions, and more. | http://spie.org/Publications/Proceedings/Paper/10.1117/12.2083449 |
Exploring the modern opportunity for compelling and crafted employee communication that cuts through the noise was the aim of this roundtable
As we found out at last year's Learning at Work panel event with Google and Hyperisland, the context for learning at work has shifted enormously. Conventional approaches to workplace learning have been disrupted by things like the ubiquity of technology (which in theory can serve us the information and instruction at the point we need it), the expectation of personalised experiences, and the blurring line between when we are, and aren't at work. David James from Looop writes brilliantly about much of this here.
Over a series of roundtable sessions, we’ll be bringing small relevant groups together to share their experiences around learning, and take away learnings in relation to their own unique cultures and challenges. We’ll be exploring the various ways that learning is delivered in their places at work, what the modern appetite for it looks like, and what is and isn't working well.
And into each of the sessions, we’ll invite a friend of YCN with ripe and relevant learnings to share to inform and kick off the conversation. For our first session, over breakfast at Dishoom we've invited along Melissa Andrada, co-founder of Learnerbly. Melissa and her colleagues are on a mission to help every person be their best self at work; and as well as her insights, we pulled in the perspectives of others along from organisations like Getty Images, Oliver Bonas, Farfetch and Made by Many.
One book that came to us as highly recommended in conversation at breakfast was An Everyone Culture: Becoming a Deliberately Developmental Organization — a brilliant read on the things that smart organisations do to align learning and development investment with core business objectives.
Keeping that goal in mind, at our next roundtable session — on the morning of 22nd February here in the Library at YCN — we'll convene again as a group to share learnings around the idea of how we can be more creative when communincating internally to our employees, as well as how our internal communications style can affect both our internal and external brand experiences.
We'll look at some recent examples of considered, well-crafted internal marketing and communications campaigns, discussing how they are helping organisations to deliver better performance or customer experiences by aligning, coordinating, and motivating their teams. We'll share our individual stories of internal communications approaches we've put into practice, what we've tested and what we've learned. How are 'millenial mindsets' driving the way we communicate internally? And do our internal communications need to stack up against the content that our teams are engaging with outside of work?
Finally, it's worth considering the experience that we are creating for our employees with our internal communications style - and how this impacts our employer brand and our employee value proposition, and how these in turn impact on the external brand that our customers experience. Are we enabling our employees to be our brand ambassadors?
To share her expertise and kick-start the conversation around these questions, we'll be joined by Shelley Hoppe, Founder of Southerly – a small, specialist content marketing agency with experience in producing content strategy and delivery for both internal and external marketing initiatives. Shelley’s early career was spent in a variety of journalistic and marketing communication roles within large corporates, where she quickly realised that quality content is the key to engaging any audience. Today Shelley and her team apply share these learnings with clients like Google, Waitrose and Natwest.
If you'd like to come along to the roundtable to join the conversation, and share your own perspectives, please do drop us a line.
Event Details
-
Location:72 Rivington Street,
London, EC2A 3AY, | https://www.ycn.org/events/210-creative-employee-engagement |
Featured:
Étienne Geoffroy Saint-Hillaire (April 15,1772 - June 19, 1844) was a French naturalist who established the principle of "unity of composition". He was a colleague of Jean-Baptiste Lamarck and expanded and defended Lamarck's evolutionary theories. Geoffroy's scientific views had a transcendental flavor (unlike Lamarck's materialistic views) and were similar to those of German morphologists like Lorenz Oken. He believed in the underlying unity of organismal design, and the possibility of the transmutation of species in time, amassing evidence for his claims through research in comparative anatomy, paleontology, and embryology.
In Popular Culture
French author Honore de Balzac dedicated his novel Le Père Goriot to Saint-Hilaire, "as a tribute of admiration for his labors and his genius." | http://artandpopularculture.com/%C3%89tienne_Geoffroy_Saint-Hilaire |
The estate, built for the Guaty family, is 4,619 square feet under air with views overlooking the 14th hole of the Talis Park Golf Course. Designed by Joe McHarris of McHarris Planning and Design, the home features four bedrooms and four-and-a-half baths, as well as a spacious three-car garage. Inside, guests are greeted by a stunning foyer, with a wall of glass looking directly onto a remarkable view of the pool and outdoor foliage. From there, the floor plan flows smoothly into an open concept living room and dining area, with clean lines leading to the state-of-the-art kitchen. A stylish and fully climatized wine cellar is another highlight of note.
In the sleeping corridors are three comfortable guest bedrooms along with a magnificent master suite, complete with his and her closets and an expansive master bath. The outside living space hosts an abundance of amenities, including a full kitchen, bar and fireplace—all surrounding a truly incredible pool, which is visible from nearly every room of the home.
The Guatys acted as the primary interior designers of the home and also played an extremely integral role in the process of the build. Having vacationed in the Naples area for several years, when they finally decided to purchase a place of their own, they chose Harwick because of their work and their stellar reputation in the community.
The Guaty residence combines a contemporary, clean style with rich finishes to create a living experience immersed in comfort. | https://www.harwickhomes.com/harwick-homes-completes-impressive-new-home-in-talis-park/ |
Our client is a leading innovator in friction technology development and currently searching for a Quality Manager who is aggressive, results-oriented professional with a passion for the automotive industry. This is a fast-paced position for someone who wants to make a difference using their prior experiences, proven quality development tools, effective verbal and written skills as well as people skills and diplomacy tactics.
Ideal candidates will have IATF experience and be able to actively manage and participate in all aspects of product quality while contributing to continuous product improvements. By applying knowledge of quality engineering principles, you will work with a technology leader to develop and improve quality and process capability for a variety of products including Brake Pads, High-Performance Brake Calipers, Rotors, Hats and Caliper Brackets.
Responsibitlies include:
- Maintain current IATF certification.
- Promoting quality achievement and performance improvement throughout the organization.
- Develop, implement, communicate and maintain company Quality Policy.
- Effectively interact with Production and Development teams to maintain product supply and help introduce new products
- Working with purchasing staff to establish quality requirements for external suppliers.
- Ensuring compliance with national and international standards and legislation.
- Manage team members during the PPAP process and ensuring all documentation is complete and specifications are met for PPAP approval.
- Bringing together the staff of different disciplines and driving the group to plan, formulate and agree on comprehensive quality procedures.
- Manage and maintain the Company’s quality inspection and product release programs for incoming and in-process materials and components, processes, and finished goods.
- Formulate and manage the development and implementation of goals, objectives, policies, procedures, and systems pertaining to the QA/QC function.
- Setting QC compliance objectives and ensuring that targets are achieved.
- Assessing the product specifications of the company and its suppliers, and comparing with customer requirements.
- Defining and Enforcing quality procedures in conjunction with production staff.
- Work with customers’ auditors and ensuring the execution of corrective action and compliance with customers’ specifications.
- Organize and manage the quality assurance team in close co-operation with the customers and with the other members of the management team.
- Analyzing performance data and charts against defined parameters.
- Work closely with the process engineering team to ensure that root cause analysis is conducted and corrective action is implemented.
Requirements:
- Bachelor’s or 4 year Degree in Engineering or Quality Management or related field is required.
- 5+ years of Quality Assurance experience.
- Minimum of 3 years of Supervisory or Management Experience.
- Familiar with measurement systems, ISO/TS/IATF Quality Systems, and Problem Solving
- Microsoft Office and Minitab Computer skills
- ASQ Certifications (ie. CQE)
Hire Talent
We’ve developed a strong and diverse network of top industry talent which includes Sales, Engineering, and Product Management in the automotive and commercial vehicle segments.
Find Work
We provide a wide range of brake industry opportunities from clients searching for your specific expertise in the areas of friction, foundation brake, and advanced braking technologies.
Latest Insights
MEYLE AG designs, manufactures and markets premium-quality replacem...+
Fras-le, a Randon Company, is one of the largest friction materials manufacturers ...+
Ready to Work With Us?
If you'd like to find out more about our services or discuss a position, please complete the form and one of our team will be in touch ASAP. | https://www.hagmansearch.com/vacancies/vacancy/quality-manager-8525 |
In SORCERER, second in the ENCHANTER series, the fate of the kingdom is once again in your hands.
You are a gifted Enchanter, whose skillful and cunning use of magic enabled you to defeat the Evil Warlock, Krill. This Victory earned you a place in the elite Circle of Enchanters, where you sit next to your mentor, the great Belboz the Necromancer. During the past several years, you have become one of his favorite pupils, but over the last few days you've perceived certain subtle, sinister changes in his personality.
Now Belboz is vanished, leaving behind only a cryptic diary. You must search for him through mazes and mines and the treacherous mists of time. Only your cleverness and magical abilities can rescue Belboz from whatever evil has befallen him and save the Circle of Enchanters from destruction. | http://c64g.com/games/c64/sorcerer |
Experiencing research first hand
Studying Psychology for A-levels was simultaneously both dull and intriguing. I loved the content; learning about how drugs work and their potential pathways in the brain, how children learn and mental health among other things. Additionally, I found myself asking questions about human behaviour that I had never considered before. However, I was not satisfied with the application of psychology at A-levels. I learned so many theories just to “describe and evaluate x study,” and regurgitate authors and dates in exams.
Despite having some issues with A-level Psychology, I decided to study Psychology at University. Two years in, and I do not regret this decision. I love studying psychology! I do not feel like I am being spoon-fed information just to regurgitate it out on an exam script. I am encouraged to consider the implication and value of research in a scientific way. Additionally, theories and content are applied. For instance, starting from the first year, a lot of coursework entails collecting and analysing data.
A great thing about Warwick University is that they offer extra opportunities to research outside of the course. (See below). I decided to apply to be a research assistant for a Ph.D. student. My main motivation at the time was that I wanted something psychology relevant to my CV and the opportunity was available. She was trying to find a specific group – only children families with a teenager between the aged of 11 – 13 years old. I was to use certain that I would be a mediocre research assistant. I was unable to recruit any families. I quickly found that recruitment participants are very difficult. I made contact with potential participants through Facebook. However, after first contacting people, most stopped responding to messages.
However, the Ph.D. student who was supervising me assured me that it was okay. Sometimes it works, sometimes it doesn’t. She then offered me an opportunity to transcribe a couple of her interviews. I took up the opportunity eagerly – I had failed my first attempt, and I wanted to prove that I was not completely useless. Honestly, transcribing was tedious. However, I learned a lot of valuable skills. I had to manage my time seeing as I had coursework and other commitments. Additionally, I needed to pay a lot of attention to detail to make sure that the transcription was accurate. After completing this task, I felt a lot more confident – I didn’t do well in my first task but it didn’t mean that I was useless. This encouraged me to pursue another research project during the first year of my degree.
During my second year of university, I decided to continue to try to get research experience. My motivation was less for my CV but more out of enjoyment. I wanted to learn about other areas of psychology not covered in content. This time, I helped a Ph.D. student conduct an experiment, based on examining an alternative method to lie detectors. I put in a lot more effort compared to other projects. For instance, I: collected consent from participants; brief and debriefed participants about the study and attached heart rate and skin conductance electrodes to them. I learned many skills from taking part in the project. Additionally, I became more confident with research.
Recently, I have finished my second year and I now recognise how invaluable my researching experience has been. Having the ability to be a research assistant during term time encouraged me to pursue a project with a longer time scale. Currently, I am doing a developmental psychology URSS based on how children use language which is helping me develop and learn new skills. Additionally, I have enjoyed helping out with research so much, that I am considering applying for a research master’s in psychology. | https://our.warwick.ac.uk/experiencing-research-first-hand/ |
At Al Sheaily we advise on the full range of construction and real estate related transactions through the entire project life-cycle from tendering/initial acquisition/consortium structuring, permitting, construction and development, leasing, financing, operations through to disposal.
We work closely with project designers, engineers, management and planning experts to ensure that construction documents reflect and fit with the requirements of other infrastructure development obligations, for example, environmental issues, planning permissions and agreements with other interested parties. Our dedicated lawyers have unrivalled expertise in relation to all the standard and bespoke forms of construction and engineering contracts and have also provided in-house training and seminars on their interpretation and use for clients.
Our team also has the necessary experience in the resolution of disputes arising out of major development, construction and infrastructure engineering projects in Oman and the region. Such disputes require an understanding of complicated and complex contractual documentation and the inter-relationship between the parties; how construction and engineering projects run and the types of problems that can arise during such projects. They also require our construction lawyers to have a good grasp of the non-legal, technical side to transactions. Our lawyers can bring this additional, necessary level of expertise through having many years industry, inhouse construction experience, in addition to private practice. | https://alsheaily.com/expertise/construction.shtml |
1000 Goddesses Global Gathering | Auckland Event 19th October 2019 - New Ve...
Description
Ngā mihi nui ki a koutou Mana Wahine,
The 1000 Goddesses Gathering Global Grid will occur globally again on the 19th October 2019.
The 1000 Goddesses Gathering began in 2016, and was held again in 2018 With "over 300 people gathering and more than 1000 Goddesses invoking from the Spirit Planes on the Washington Mall, all gathered were supporting the fulfillment of the Tibetan Prophecy of shifting the tone of our Sacred Earth from Fear to Compassion. Priestesses flew in from California and other regions to lead ceremony honoring Isis, the Virgin Mary, Mary Magdalene and Osun. There was also a significant Divine Masculine ceremony inviting the men there to vow to commit to being a person committed to the Divine Masculine in partnership with the Divine Feminine, to begin to heal the Wounded Masculine - Wounded Feminine dynamics that have been at play for too long in our Western Culture." (Reference from: 2018 gathering)
The Global Grid is one of Wisdom and Compassion. A collective of sacred circles coming together globally in alignment with the Tibetan prophecy that when 1000 Taras gather, the Divine Feminine rebirths and the combined energies and that of the planet, shifts from fear to compassion.
Here in Auckland, a collective of Women have registered with the global network and will hold a gathering for and with other Women, at a new location St Columba Church Grey Lynn on the 19th October 6pm to 9pm. Our purpose and intention is to "come together in a circle of sacredness, holding all of our consciousness archetypes, ways of knowing being and doing, our soul and spirit gifts to powerfully awaken the New Earth: one of Sacred Balance, Union of the Divine Feminine and Divine Masculine and Oneness - serving the highest good for all beings. The Great Mother Gaia calls on us as Women to keep this energetic grid uplifted."
(Reference from: https://www.1000goddesses.net/)
The Auckland team for the 1000 Godesses Gathering Global Grid are:
Lisa Mullions, Sia Hu Heka, Rani Michelle, Corry Vander Geest, Jacqlin Richards, Natalie Barton Aroha Johnstone, Jessica Dawson, Katrin Franz Lara Cheadle and Milly Molly McMurdock.
We invite our Eldresses, Kuia, Goddesses, Priestesses, Light Workers, Wisdom Keepers, Mana Wahine, Visionaries, Oracles, Healers, Medicine Women, Embodied Practitioners et al - all of our Women across ages, ethnicities and cultures, who feel called to come and collectively be in circle on the 19th October 2019 at our new venue and location St Columba Church Grey Lynn Auckland, 6pm to 9pm. We will have a Divine Feminine ceremony planned for the three hours to powerfully support uplifting the energies of the Divine Feminine Grid for Love, Compassion and Wisdom.
This is a free event for our Women in spiritual communities, and our team are in service to you and this event, we are also graciously requesting koha (optional). Any koha will be gifted to fund some of the cost of our new venue location, a donation contribution to the Man Kind Project (Auckland) to sponsor a Brother into one of their men's retreats and also to forward any koha to the global lead for this event Mare Cromwell
Our team will keep everyone informed about how any koha received is gifted back to our wider community as outlined. We thank you in advance.
As we have now moved our event (previously we were to be at Blue Lotus Sanctuary) we are now at St Columba Church Grey Lynn Auckland, we have opened up the registrations for this event to 100 Women. Please do register and as we are Mothers we may need to bring our children and they are welcome, please do email [email protected] so our team know if any children will be present and so we can accomodate for our young ones. This is important and key for health and safety reasons. We will ask all attendees to sign into this event which includes our young ones.
We also know there will be other Women and Circles around Aotearoa New Zealand, holding space for this event also and will look to keep you updated with their information too either via this EventBrite page or via our Facebook posts for this event. We have Sistars in Glastonbury UK with Rebekah Mene Spirito leading the 1000 Goddesses Gathering Avalon.
We look forward to being together in this powerful meeting of the Divine Feminine on October 19 2019 and will be in those who register for this event, via email on 12th October with what to expect from our ceremony and logistics. Our team for now - send love compassion and wisdom.
Ngā mihi maioha o te wā
Lisa | On behalf of our Auckland Goddesses Gathering team; Sia, Rani, Corry, Jacqlin, Natalie, Aroha, Jessica, Katrin, Lara and Milly.
1000 Godesses Gathering Global Grid - Auckland event for Women
19th October 2019 - 6pm to 9pm. Arrival from 5.30pm.
Koha request (optional). Any koha will support funding the cost of our bigger venue and location, + a donation to ManKind project + love donation to Mare Cromwell Founder of the 1000 Goddesses Gathering Global Grid event.
Children are welcome however please email [email protected] so we can know and accomodate our young ones. Kia ora xx
FAQs
What are my transportation/parking options for getting to and from the event?
The venue: St Columba Church Grey Lynn- please park on the surrounding streets in the Grey Lynn area. There is limited onsite parking available for this event.
What can I bring into the event?
Your Divine Feminine self in all her forms, archetypes and with her gifts
How can I contact the organizer with any questions?
Yes - [email protected]
Do I have to bring my printed ticket to the event?
Yes please - this event absolutely requires a ticket for entry. So do bring your ticket either printed or more sustainably via the mobile device/email confirmation as our team will sign you in at the door.
Is my registration fee or ticket transferrable?
This event is free for Women however if you can not make the event after registering your free ticket then please pass this on to another Woman and/or email [email protected] who can manage the limited numbers. Thank you
Is it ok if the name on my ticket or registration doesn't match the person who attends? | https://www.eventbrite.com/e/1000-goddesses-global-gathering-auckland-event-19th-october-2019-new-venue-st-columba-church-grey-tickets-70089731273 |
White Ermine moth caterpillar. The White Ermine moth caterpillar grows to about 45mm and is widely distributed throughout much of the British Isles. It feeds on a variety of herbaceous plants and can sometimes be seen walking quickly across the ground looking for somewhere to pupate. Looked at closely the hairs are not as dense as on some hairy.
May 31, · There are several species of caterpillars all around you. A caterpillar identification chart will help you identify and distinguish one caterpillar from the other easily. It will also tell you which caterpillar is not to be tampered with since some of them are poisonous. Read on for enlightenment.
Oct 10, · PITTSBURGH - A venomous caterpillar from Canada has recently been spotted in parts of central Pennsylvania. If you see the white hickory tussock moth caterpillar, don't touch it. The insect's.
A few caterpillars, though, are worth celebrating. Among them is the woolly bear caterpillar, a familiar fall sight in cooler regions of North America. Another favorite is the caterpillar that becomes a monarch butterfly. That caterpillar is often reared in special cages as part of a school's science curriculum. | https://betterbasket.info/and09-2019-55/white-hairy-caterpillar-10.php |
Spain is characterized by a natural covering of mixed forests and shrub vegetation, and a generally Mediterranean climate.
Human development encroaches upon Northeastern Spain Mediterranean coastal forests in Barcelona Province.
The Kingdom of Spain is located on the Iberian Peninsula in the southwestern region of Europe, with several small territories along the North African coast and in the Atlantic Ocean. Spain’s mainland is bordered by Mediterranean Sea, France, Andorra, Portugal, and the Atlantic Ocean. Spain is the world’s 52nd largest country with a total area of 505,992 square kilometers, including islands such as Balearic and Canary Islands in Mediterranean and Atlantic Oceans respectively. The mainland is mountainous, dominated by mountain chains and high plateau. Spain has three climatic zones, with Mediterranean, Semi-Arid, and Oceanic climates, respectively. The country is further divided into several ecological zones, some of the most notable of which are looked at below.
Spain's Iberian Conifer Forests cover parts of several mountain ranges in the country, including the Gudar, Cazorla, Baza, Sierra Nevada, and Javalambre ranges. The ecoregion is characterized high annual rainfall of between 1,100 millimeters and 1,500 millimeters, accompanied by snow fall during winter. The temperature range is between -50 Celsius and 00 Celsius. Due to the high altitude of this ecoregion, the forest zones are divided into a conifer zone and a mixed broadleaf zone. Endemic Salzmann pine, Scotch pine, and Maritime pine dominate the canopy tree species of the conifer forest. Iberian Conifer Forests host diverse species of fauna including more than 150 species of birds, several endangered mammals such as the Gredos ibex and wolf, amphibians and reptile species. Road and railway construction and ski facilities are major threats to this ecoregion.
The Iberian Sclerophyllous and Semi-Deciduous Forests cover mainly the valleys, plateaus, and low plains of the Iberian Peninsula. The ecoregion experiences hot and dry summer, and mild and sub-humid winter with the northern plateau experiencing continental climate. The annual temperature for this region ranges from 10 Celsius to 150 Celsius and an annual rainfall of between 300 millimeters to 850 millimeters. The forest ecosystems are conifer canopy and broadleaf evergreen species. The rivers within the ecoregion contain species of endemic fish Anaecypris hispanica and are also a refuge for some mammals. The region hosts 220 species of vertebrates including birds and reptiles. Iberian Sclerophyllous and Semi-Deciduous Forests have been transformed into agricultural land for crops including wheat and olives. Intensive irrigation and greenhouse crops are the major threat to the ecosystem.
The Northeastern Spain and Southern France Mediterranean Forests cover parts of Southern France and the Valencia and Catalonia regions in Spain. Mesozoic and Quaternary sedimentary rocks dominate the ecoregion. The forests within this ecoregion are composed of mixed evergreen and deciduous broadleaf and conifer species. The average temperature ranges from 50 Celsius to 170 Celsius with an annual precipitation of 350 millimeters to 850 millimeters. The ecoregion hosts 1,450 species of plants of which 180 species are endemic while large mammals are very rare in this region. There are also 30,000 pairs of birds and several species of reptiles and amphibians in within this ecosystem. Northeastern Spain and Southern France Mediterranean Forests has suffered the effects of agriculture with large portions transformed to agricultural land. House construction, the building of quarries, and an increase in water consumption are also some of the threats to this ecoregion. | https://www.worldatlas.com/articles/ecological-regions-of-spain.html |
Worldwide, the prevalence of chronic diseases, such as obesity, diabetes, cardiovascular diseases, cancer, non-alcoholic fatty liver disease, inflammatory (autoimmune) and neurodegenerative diseases, has shown a sharp increase. In the last 20 years, developing countries and the young population have presented the largest augment in the incidence of these diseases, which evidences that they are not only limited to developed countries nor the adult population. These pathologies have in common a complex interaction between genetic, metabolic and environmental factors.
In this context, several basic and clinical researches have demonstrated the relevance of the expression and activity of the peroxisomal proliferator-activated receptors (PPARs) as fundamental elements in the prevention and treatment of chronic diseases. PPARs are a family of transcription factors that control many cellular metabolic processes. PPAR isoform expression and activity is regulated in different tissues according to physiological processes (growth, development, and aging) and to pathological conditions (cardiovascular diseases, inflammatory diseases, neurodegenerative diseases, hepatic diseases, among others). Also, different compounds such as drugs (fibrates), nutrients (long-chain polyunsaturated fatty acids), and several natural bioactive compounds (polyphenols) are molecular regulators of PPARs expression and activity. Recent research has established the importance of the regulation of PPARs activity and their role in cell and tissue protection against injury (i.e., oxidative stress, inflammation, endoplasmic reticulum stress).
This book is dedicated to reviewing the state of the art regarding PPARs regulation with an emphasis on molecular aspects underlying their effect in health and disease. Specifically, the participation of PPARs is discussed in insulin resistance, inflammation, NAFLD, DM2, cardiovascular disease, hypertension, obesity, gastrointestinal disease, and neurological health and disease. Moreover, this book reviews how different molecules regulate the expression and activity of PPARs. Finally, the scientific information presented in this book pretends to contribute to a greater understanding of PPAR role in the prevention and treatment of different pathologies and metabolic alterations.
Chapter 5. Cardiovascular Risk and PPARs: The Good Ones or the Bad Ones? | https://novapublishers.com/shop/peroxisome-profilerator-activated-receptors-ppars-structure-mechanisms-of-action-and-role-in-health-and-disease/ |
The master plan for Burnaby Lake Village aims to revitalize 19 acres of industrial space into a vibrant mixed-use community. Framed by the Lougheed Highway to the north, a 1000-acre park to the south, an escarpment to the east, and the Sperling-Burnaby Lake SkyTrain station to the west, the wedge-shaped site poses several design opportunities. Responding to the site’s conditions, a mix of building typologies were developed to achieve hierarchies in built form that will articulate the experience at street level. A plaza marks the entryway into the development, creating a direct connection between the community and local public transit. At this plaza, the Esplanade and Serpentine pathways merge, forming diverse, pedestrian-oriented, paths of travel through the site. The Esplanade is designed as an urban high street, formally lined by mixed use buildings, while the Serpentine is a meandering, pedestrian only, pathway that makes its way across the development, connecting to public amenities throughout the community.
The development will introduce 19 new buildings to establish a dynamic, high-density community complete with affordable housing and high-quality public spaces throughout. The master plan will set a precedent for future transit-oriented developments in the area and help to further define planning guidelines for the City of Burnaby.
The materiality for the site will be dictated by the overarching vision of creating an urban village with a lively and animated pedestrian realm. Particular attention will be given to the lower portions of the buildings, carefully considering how they affect the user experience and enhance a sense of a lower-scale development despite the height of the architecture. Robust and durable materials will ground the buildings, creating a strong ground plain – a palette that feels solid and comfortable at the pedestrian scale. As the buildings climb, the materiality will lighten to lessen the visual weight and minimize the impact of the height of the towers. The use of glass though-out the main floor retail will be carefully considered to allow for transparency through the site with views into and from the plaza and serpentine park. | https://hariripontarini.com/projects/burnaby-lake-village-sperling-master-plan-6800-lougheed/ |
The field of application of this invention, which will be styled hereinafter "Sensaflow", is the automatic control for the operation and stopping of electrical motorpumps that supply pressurized water or another liquid, according to a variable consumpution demand.
The on-off operation of an electrical motorpump to supply the demand for pressurized water or another liquid with variable consumption, demands the use of an automatic control system. Evidently, the cost of maintaining a motorpump operating permanently to supply a variable demand which goes from zero to a consumption equal or lower than the pumping volume of flow, is very high due to the excessive cost of energy and wear of the motorpump during the time when it is understand. Since the appearance of the electrical motorpump, various automatic control systems for its operation and stopping have been developed. The first one was the use of a high accumulation tank. In this case, the motorpump fills the tank and demand for consumption is supplied therefrom. Pressure is obtained by the height of water over the consumption. The on-off operation of the motorpump is achieved by an electrical level switch, installed in the tank, which activates the motorpump when the water reaches a lower level and stops it when it reaches a higher level. Both levels are prefixed and are detected either by floating buoys or by electrodes.
A control system that represents a substantial improvement is the hydropneumatic tank, since it eliminates the use of expensive structures necessary to support the elevated tank. The systems maintains water pressure, not by differences in elevation, but by the force of the compressed air. This system is comprised by the motorpump, the hydropneumatic tank with an air recovery apparatus and a pressure switch. The latter is an electrical switch activated by the pressure of the system. The system operates as follows: when water consumption exists, the pressure of the system goes down until reaching a point where the pressure switch is connected and activates the motorpump. The motorpump supplies the produced demand. If demand is greater that the volume of flow of the motorpump at cutoff pressure, the motorpump contains operating. But if the demand is lower, the pressure of the system increases up to the point when the pressure switch is disconnected, stopping the motorpump. If the consumption is steady, the pressure goes down once again and the pressure switch once again activates the motorpump, completing the cycle.
This cycle between two starts would be so brief and the frequency so high that the system would be damaged in a short term in the absence of a pressurized volume of water that maintains consumption supplied with a tolerable frequency between starts. The volume of pressurized water, designated as regulation volume, is dimensioned in order that a determined period of time prevails between the starting times of the motorpump and corresponds to the one accumulated by the hydropneumatic tank due to pressure differential, that is, between the connection pressure and the cutoff pressure: in the cutoff pressure, the air of the tank has bean compressed and the space has been occupied by water of the regulation volume. To the extent that said volume is being utilized to cover consumption, its pressure decreases until reaching the connection point. When the motorpump operates, it covers consumption and the surplus is accumulated in the tank until pressure reaches the cutoff point once again, completing the cycle. Now then, since the water is in contact with air and both are subject to pressure, air would finally be dissolved in the water if the system lacked an air recuperator. This may consist in a motorcompressor or an injector activated by the negative pressure of the motorpump suction. The connection in the tank for the air recuperator is placed just over the level reached by the water at cutoff pressure: if the water surpasses it, the air recuperator acts.
The hydropneumatic system was surpassed since 1970 by the introduction of the hydrosphere system. This system differs from the hydropneumatic one in that the tank contains a rubber cylinder that houses the regulation volume and leakage-proof air between the cylinder and the wall of the tank. Hydrosphere has three important advantages over the hydropneumatic tank: 1) it is smaller, since the air is preinjected at the system connection pressure, which eliminates the additional tank volume required to compress air from the atmospheric pressure to such pressure; 2) it requires no air injector and, since the air is separated from the water by the cylinder, the air is not dissolved by exhaustion, and 3) since the water is contained in a rubber cylinder, the tank is not corroded or rusted internally; however, that part of the metallic tank where the cylinder rests, is cooled by the absorption of heat towards the colder water inside the cylinder. The moisture of the external air is condensed on the surface, expediting the rusting of the metal.
1. Eliminates possible leaks of leakage-proof air, which is one of the greatest deficiencies of hydrosphere.
2. The regulation of the cutoff pressure is performed automatically, which avoids operating problems due to deficiencies in regulation or deregulation and, furthermore, it permits the use of motorpumps in pressure limits impossible with hydrosphere.
3. Has a much smaller accumulation tank, which makes it cheaper and permits its installation in smaller spaces.
4. Due to its smaller size, it may be manufactured with materials that have excellent resistance against the aggressiveness of the environment, principally against rusting and corrosion, which substantially increases its useful life.
The purpose of the invention is to provide an apparatus which has the following advantages over hydrosphere:
The above indicated objects are achieved by an apparatus as set forth in Claim 1. The Sensaflow appliance, covered by the invention, comprises interdependent functional components. Before describing the operation of the system as a whole, we shall analyze in the first place the operation of each component in particular, referred to the accompanying figure:
Flow Sensor Device: this component device is located in a "three-outlet connector" (11): a lower outlet connected to the "motorpump drive" (12); a lateral outlet connected to "consumption" (13) and an upper outlet attached to the "external body" (14) of the Sensaflow. The flow sensor element is the "sensor piston" (15) which is a gate that includes in its contour a fitted "split ring" (16). The sensor piston is displated along its "sensor shaft" (17) within the "protector cylinder" (18). This is of a basket type with longitudinal supports that permit the passage of the flow, through them and outwards and maintain the sensor piston in its shaft. The sensor piston in its lower point is inserted in the "bearing cylinder" (19), in such way that the split ring seals the space between the bearing cylinder and the sensor piston, except in the area that produces the breaking of the split ring which is a quite determined opening which is the means of passage of a volume of flow which we shall call "Qg", equivalent to what is consumed by a partially open consumption. Therefore, the section of the opening is critical in order that exactly such volume of flow may pass therethrough. When consumption is higher, the sensor piston is displaced upwards by the force of the flow pressure demanded in its area, and this flow passes to the place called "pressure zone of the system". The force required to displace the sensor piston upwards is negligible: it only needs to overcome the contrary force exercised by the "drive piston" (21) which forces the sensor piston downwards, which will be analyzed below.
Drive Device: This component is comprised of a "drive piston" (21) which is displaced along the "drive cylinder" (22) and is hermatically adjusted to said cylinder by means of the "drive V-seal" (23). This seal prevents the pressure of the system from entering the cylinder and, on the contrary, permits the displacement of the pressure front the cylinder to the system when it goes down in the second one. The drive piston is joined longitudinally with the sensor piston by the "sensor shaft" (16). When the motorpump flow pressure forces the sensor piston upwards, the upper limit is the "upper stop" (24). The section of the drive piston less the section of the sensor shaft, is added to the section of the sensor piston, and therefore, the pressure of the system exercises greater force on the upper part than on the lower part of the sensor piston, that is, the drive piston forces the sensor piston downwards against the motorpump drive. When the flow demanded by consumption decreases to the volume of flow equivalent to that of a partially open consumption (Qg), the sensor piston is located in the bearing cylinder, the lower limit imposed by the "lower stop" (25): with Qg, the force of the drive piston overcomes the impulsion force of the motorpump. This limit coincides with the point where the pressure of the system activates the pressure switch to stop the motorpump. This mechanism will be analyzed below.
Pressure Transfer Device: This component comprises the "transfer chamber" (31), the "piston collar" (32), the "piston cone" (33), the "transfer V-seal" (34) and the "pressure switch connection conduit" (35). When the sensor piston reaches its lower position, the piston collar, which is a segment with less diameter than the sensor shaft (16), appears outside the transfer V-seal and the pressure of the system comes in through this separation towards the transfer chamber.
The pressure is immediately communicated through the connection conduit to the pressure switch. On the other hand, the internal pressure of the transfer chamber can never exceed the pressure of the system, since any higher difference will be transferred towards the system through the transfer and drive V-seals. However, these seals will retain the higher pressure of the system outside the transfer chamber until, as explained, the piston collar has surpassed the transfer V-seal . When the motorpump is activated and displaces the sensor piston, the sensor shaft enters the transfer V-seal, expanding it softly by means of the piston cone until it is perfectly adjusted.
Pressure switch (not shown): Since this set is so widely known, the analysis and operation of its parts will not be studied. In its relation to the operation of the Sensaflow, the pressure switch will reach its cutoff pressure only when the pressure of the system enters the transfer chamber and, as discussed, this only happens when the sensor piston reaches its lower point. This function is most important since the pressure regulating the disconnecting of the pressure switch is not relevant, provided it is lower than the motorpump pressure when it drives a volume of flow as small as small as Qg. The connection pressure of the pressure switch is reached when the pressure of the system reaches such level, since the pressure partially open faucet. Only at this point, the pressure of the system is transmitted to the pressure switch which cuts off the motor pump.
Air-Pump Activator: This component comprises the "actuator piston" (61) which is longitudinally displaced by the "actuator cylinder" (62) which is hermetically adjusted in the actuator piston by means of the "actuator ring-seal" (63). The upper limit of this displacement is imposed by the "upper stop of the actuator cylinder" (64). The lower displacement limit is located in the "intake port" (74) which will be discussed below. The actuator piston is moved from the hydropneumatic tank by the force of the higher pressure of the liquid inside the tank, when the motorpump is turned off and a consumption exists which decreases the pressure of the system generating a difference. On the contrary, when the motorpump starts operating, the pressure in the system increases over that of the hydropneumatic tank and the difference in pressure forces the actuator piston to displace itself towards the hydropneumatic tank until reaching the upper stop of the actuator cylinder. The large relative area of the actuator piston makes it most sensible to the differences in pressure which are produced and permits the actuator to absorb great forces.
Air-injection Pump: The objective of this component is to replace air lost by dissolution in the pressurized water within the hydropneumatic tank. It comprises an "injector piston" (71) which travels inside the "injector cylinder" (72). The "injector V-seal" (73) adjusts the injector piston to the injector cylinder, preventing transmission of the pressure of the system inside the injector cylinder, but permitting the passage of compressed air upwards when the air pressure exceeds the system pressure. Injected air goes up towards the hydropneumatic tank due to its lower density. The actuator piston and the injector piston are joined by their shafts and the force of the first one activates the second. In its displacement downwards towards the lower stop imposed by the "intake port" (74) it compresses air which gradually enters the system as it acquires the same pressure. The importance that the lower displacement stop be the same intake port, is due to the fact that in this way no free air-containing volume remains, and air may be compressed at greater pressures than the highest pressure reached by the sytstem.
In its upwards displacement, the vacuum produced within the injector cylinder is filled in by external air which enters through the intake port. Air arrives at this point through a valve consisting in a "valve membrane" (75) which has a "passage port" (76). Normally the valve membrane obstructs the "closing cone" (77), intake port of external air, due to the drive exercised by the actuator piston when it goes down, helped by the "valve spring" (78). Only when a vacuum is produced due to the upwards displacement of the injector piston, the force of the valve spring and membrane is overcome; separated from the closing cone by the difference in pressure, it admits the entry of air from outside the system through the "intake conduit" (79), which is a tunnel that communicates the valve with the outside.
Transfer Device: The purpose of this component is to permit the entry of water to the hydropneumatic tank with no passage limitation and enable the limitation of its outflow pursuant to a determined volume of flow. For the entry of water to the hydropneumatic tank it has "intake ports" (81). In turn, for the outflow of water from the hydropneumatic tank it has a "flow regulator" (82) which is inserted within an "outlet conduit" (83) that discharges in the "outlet ports" (84). These last two components are part of the actuator piston. The intake ports are open only when the actuator piston reaches the upper limit of the actuator cylinder. This only happens when the motorpump is operating and demand for consumption does not increase in that phase: the higher pressure produced by the motorpump forces the actuator piston towards the upper stop of the actuator cylinder and water enters the hydropneumatic tank. Should consumption increase, the system pressure goes down and the actuator piston is displaced obstructing the outlets ports. This also happens when the motorpump is not operating: as soon as it stops, even though no consumption exists, the actuator piston goes down due to the vacuum that exists in the injector cylinder; the actuator piston obviously moves downwards when consumption exists, which generates differences in pressure between the hydropneumatic tank and the system. The reason for the intake ports to open only when the actuator piston reaches its maximum level is precisely to force the actuator piston to achieve such level in order that the injector pump may suction the greatest possible amount of air. The outlet of water from the hydropneumatic tank takes place by means of a system that forces the actuator piston to go down to its minimum level to compress air within the injector pump. The outgoing volume of flow must be higher than Qg to prevent the pressure of the system, with a consumption of approximately Qg, from decreasing to the connection pressure and producing a very high frequency between startings of the motorpump due to the impossibility of the regulation volume to supply this type of flow is regulated through the flow regulator for a lower consumption than that required by a totally open consumption, this second consumption is immediately supplied by the starting of the motorpump. In fact, the pressure of the system immediately goes down to the connection pressure due to the impossibility of the hydropneumatic tank to supply it through the flow regulator which is only sized to permit the passage of a smaller volume of flow, and the motorpump is immediately activated to supply this sudden increase in consumption. The reaction of the motorpump is so fast that the pressure decrease is practically not perceived in the consumption. Also, the pressure in this case is the one permitted by the motorpump and not the pressure that would be reached if the cutoff pressure were regulated too low. Since a sudden increase in consumption may be supplied by activating the motorpump and distending the connection pressure, its regulation may be as low as permitted by the difference in elevation between the pressure switch and the consumption with lower geodesical height. A low connection pressure has the following important advantages: 1) it virtually eliminates loss due to drips and leakages as such losses are subject to low pressure; and 2) it takes better advantage of the volume of the hydropneumatic tank due to increase in the regulation volume caused by higher pressure differentials between the connection and cutoff pressures. The flow regulator may also be regulated for greater volumes of flow. In this way, if consumption occurs, the motorpump will be driven only when the pressure of the system, including the pressure of the hydropneumatic tank, is reduced to the connection pressure.
1. Greater or equivalent consumption to that of an open faucet. In this case, the motorpump will operate continuously, the flow sensor will be in open position and the pressure switch will keep a pressure below the cutoff pressure, even if the pressure of the system increases: as seen above, the pressure of the system will only be communicated to the pressure switch when the flow sensor is inserted in the bearing cylinder, which condition only occurs when consumption goes down to Qg or less. On the other hand, the actuator piston will remain at its upper limit and the hydropneumatic tank will consume part of the volume of flow delivered by the motorpump when replacing its regulating volume in case the pressure of the system increases gradually due a reduction in consumption. Finally, the air-injection pump has already suctioned air from outside.
2. Consumption lower or equivalent to a partially open consumption. This consumption is usually produced by leakages or drips in the distribution system when a faucet has remained partially open. If the motorpump has been operating when such consumption is reached, the sensor piston is inserted in the bearing cylinder due to the lower volume of flow required, and the pressure of the system is transmitted to the pressure switch through the transfer system. Since the pressure has exceeded the cutoff pressure of the pressure switch, the motorpump stops. From that time, consumption is supplied through the flow regulator with the regulation volume stored in the hydropneumatic tank. The actuator piston goes down to its lower limit over the intake port of the air-injection pump and the air within this pump is compressed until it reaches the pressure of the system, leaving the system upwards until subsequently reaching the hydropneumatic tank. Consumption continues to be supplied by the regulation volume until the pressure of the system goes down to the connection point of the motorpump. It is possible that drips and leakages will absolutely stop when the pressure of the system reaches such a low level that it may be exceeded by, for example, the expansion force of the elastic seals of a faucet, which have been leaking at a higher pressure. If drips and leakages disappear before arriving at the connection pressure, the pump does not start if an additional consumption is not sensed. On the contrary, when the connection pressure is reached, the motorpump operates until replacing the regulation volume which has been used up, and stops when the pressure of the system increases to the one required to drive Qg. At this point, the motorpump remains shut down untile the next cycle or until a greater consumption occurs. Whenever the pressure of the system reaches the connection pressure, the pressure switch connects and activates the motorpump. The sensor piston is separated from the bearing cylinder and the sensor shaft obstructs the transfer V-seal, preventing the pressure to be transmitted to the pressure switch until the sensor piston is inserted once again in the bearing cylinder. The actuator piston goes up to its maximum point permitting the free entry of the flow to the hydropneumatic tank, only limited by its capacity. Vacuum is formed within the cylinder of the air-injection pump, which is filled in with outside air. The cycle is completed when the motorpump stops.
3. No consumption. The motorpump has already stopped and cannot operate again, the pressure of the system is maintained and no consumption of the regulation volume exists.
After separately analyzing the operation of the various functional components, the interdependent operation of these components must be analyzed. To this effect, the operation will be analyzed in relation to the type of consumption. Thus, it may be indicated that three possible consumption conditions may exist:
The first thing that must be pointed out in the interaction of the just analyzed components is that "Sensaflow" is distinguished from the hydropneumatic system, including the hydrosphere system, since in the first system, the motorpump starts and stops successively when consumption fluctuates between zero volume of flow and Qg. With consumption exceeding Qg, the motorpump continues operating. In the second system, this phenomenon occurs when consumption is between a volume of flow over zero and Qg, that is, the volume of flow of the motorpump at cutoff pressure. With consumptions exceeding Qg, the motorpump continues operating. In both cases, the motorpump remains inactive with zero consumption.
In the second place, the functioning of the flow regulator must be pointed out. It enables the passage from the hydropneumatic tank to consumption, of a lower volume of flow than the one equivalent to a completely open consumption. Thus, the motorpump is instantaneously activated when any consumption is higher than that permitted by the flow regulator. In this way, the connection pressure of the pressure switch may be regulated as low as the consumption pressure at the highest elevation. This type of regulation permits a decrease in consumption caused by possible and undesired losses due to drips and/or leakages.
The two indicated factors have incidence in the reduction in the size of the hydropneumatic tank and the consequent reduction in cost.
In the third place, the air-injection system is most beneficial, since it eliminates air leakages and keeps the air pressure at the connection pressure of the system.
Finally, the miniature size of the Sensaflow system permits its manufacture with low cost and corrosion and rust-resisting materials such as, for example, plastics.
Summing up, the device according to the invention comprises the following basic elements:
Flow Sensor Device: a set installed in the motorpump drive to detect the variation in consumption demand. Drive Device: a set which forces the flow sensor against the motorpump drive until the cutoff pressure is transmitted to the pressure switch.
Pressure Transfer Device: a set that communicates the pressure to the pressure switch only when the rising pressure reaches the one corresponding to Qg, but permanently permits the transmission of pressure from the pressure switch to the system with any decrease in the pressure of the system.
Pressure switch: pressure-activated electric switch. Hydropneumatic Tank: watertight tank.
Air-Pump Actuator: a set which uses the force of the liquid when entering and leaving the hydropneumatic tank. Air-Injection Pump: a set that received the force of the air-pump actuator to pump outside air to the hydropneumatic tank in every on-off operation cycle of the motorpump and replaces any air that is dissolved.
Transfer Device: a set which permits the entry of water to the hydropneumatic tank without limitation of passage, but which permits the limitation of its outflow pursuant to a determined volume of flow.
1. Eliminates one of the greatest deficiencies of the hydrosphere which are possible air leakages.
2. Expedites the regulation of the pressure switch.
3. Permits the use of motorpumps within its characteristic limits which are impossible for the other systems.
4. Enables the decrease in pressure of the system when no consumption exists, except that produced by leaks and/or filtrations, which extends the frequency between two startings of the motorpump: such undesired consumption may even disappear due to the lower pressure exercised thereupon.
5. Due to the greater difference in pressures the regulation volume increases. This enables the use of a quite reduced hydropneumatic tank, which represents a lower cost and allows the device to be installed in smaller spaces.
6. The smaller hydropneumatic tank may be manufactured with materials with high resistance against the aggressiveness of the environment, which substantially increases its useful life.
The above described arrangement thus solves the following technical problems: | |
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to a semiconductor integrated circuit composed of flip-flops, which receives data with the timing of a clock signal and retains it.
2. Description of the Related Art
Conventional data latch circuits are constructed as shown in FIG. 1A, for example. They are composed primarily of flip-flops using NOR gates. Specifically, the data latch circuit is made up of NOR gates G. sub.101 and G.sub.102 constituting a flip-flop, a NOR gate G.sub.201 serving as an input gate that transfers data D to one input terminal of the flip- flop under the control of clock CK supplied to one input terminal of this gate, and an inverter I.sub.101 that inverts clock CK and supplies it to the other input terminal of the flip-flop.
To increase the current driving capacity of the data latch, for example, an inverter buffer I.sub.102 is provided as an output buffer as shown FIG. 1B. In the FIG. 1B data latch circuit with the output buffer, data taken in on clock has to pass through three stages of gate G.sub. 101, gate G.sub.102, and inverter buffer I.sub.102 before it reaches the output terminal. This delays the data transfer between the input and output in the data latch circuit.
FIG. 1C shows another conventional flip-flop circuit, which is composed of NOR gates G.sub.101 and G.sub.102 constituting a flip-flop stage, AND gates G.sub.501 and G.sub.502 serving as input gates, and inverter buffers I.sub.103 and I.sub.104 serving as output buffers. Like the FIG. 1B data latch circuit, this flip-flop circuit also has a data delay due to three gate stages. Data delay will be explained, referring to the timing chart in FIG. 2. Assume that while data output Q is in the "1" state and the inverse data output of Q, /Q is in the "0" state, data consisting of A="0" and /A="1" is supplied. Here, to cause the input data to appear at the output Q, it is necessary for data /A to cause the output node N.sub.102 of NOR gate G.sub.102 to change from "1" to "0", which then causes the output node N.sub.101 of NOR gate G.sub.101 to change from "0" to "1", thereby changing the output of inverter buffer I. sub.103 from "1" to "0". Therefore, data must pass through three gates, NOR gates G.sub.102 and G.sub.101 , and inverter buffer I.sub.103.
The same is true for D flip-flop circuits and the slave stage of master-slave flip-flop circuits.
As noted above, in various types of conventional flip-flop and data latch circuits, there is a delay introduced by three stages of gates from when data is supplied to the flip-flop stage and when it appears at the output terminal of the output buffer. Such a delay has been an obstacle to faster data processing.
For technical literature related to the present invention, reference may be made to Steven I. Long et al., "High Speed GaAs Integrated Circuits," Proceeding of The IEEE, Vol. 70, No. 1, January 1982, pp. 20- 30 and Y. Kamatani et al.,"DIVIDE BY 128/129 5 mW 400 MHz BAND GaAs PRESCALER IC," IEEE, 1985, GaAs IC Symposium, pp. 179-182.
SUMMARY OF THE INVENTION
The object of the present invention is to provide an improved semiconductor integrated circuit, particularly a flip-flop-based semiconductor integrated circuit capable of high-speed operation.
The foregoing object is accomplished by providing a semiconductor integrated circuit comprising: a flip-flop having input terminal means and output terminal means; at least one input gate means having output terminal means connected to the input terminal means, which supplies data to this input terminal under the control of clock; and at least one output buffer means the input terminal means of which is connected to the output terminal means of the flip-flop to receive the output signal of the flip-flop and which is connected to the output terminal means of the input gate means to receive the data from the input gate means to provide an advance read function.
With this configuration, the output buffer is provided with an advance read function, thereby eliminating a delay due to two stages of gates of the flip-flop in transferring data to the output terminal. This approach has no adverse effect on the data retaining function of the flip- flop stage. Consequently, the present invention provides various types of flip- flop circuits and data latch circuits with very small data delays.
In this way, providing the output buffer with an advance read function eliminates the adverse effects of the internal delays in various types of flip-flop circuits and data latch circuits, which helps make semiconductor integrated circuits operate faster.
Additional objects and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objects and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate presently preferred embodiments of the invention, and together with the general description given above and the detailed description of the preferred embodiments given below, serve to explain the principles of the invention.
FIGS. 1A to 1C are circuit diagrams for various types of conventional semiconductor integrated circuits;
FIG. 2 is a timing chart for explaining the operation of the flip- flop of FIG. 1C;
FIG. 3 is a block diagram for a first embodiment of the RS flip- flop having an input gate according to the present invention;
FIG. 4 is a circuit diagram for the flip-flop circuit of FIG. 3;
FIG. 5 is a timing chart for explaining the operation of the flip- flop of FIG. 4;
FIG. 6 is a circuit diagram for a modification of the flip-flop of FIG. 4;
FIG. 7 is a block diagram for a second embodiment of the RS flip- flop having an input gate according to the present invention;
FIG. 8 is a circuit diagram for the flip-flop circuit of FIG. 7;
FIGS. 9A to 9C are circuit diagrams for the composite gates of FIG. 8;
FIG. 10 is a block diagram for a first embodiment of the data latch circuit according to the present invention;
FIG. 11 is a block diagram for a second embodiment of the data latch circuit according to the present invention;
FIG. 12 is a circuit diagram for a third embodiment of the data latch circuit according to the present invention;
FIG. 13 is a circuit diagram for a fourth embodiment of the data latch circuit according to the present invention;
FIG. 14 is a circuit diagram for a fifth embodiment of the data latch circuit according to the present invention;
FIG. 15 is a circuit diagram for a sixth embodiment of the data latch circuit according to the present invention;
FIG. 16 is a circuit diagram for a seventh embodiment of the data latch circuit according to the present invention;
FIG. 17 is a circuit diagram for a first embodiment of the master- slave flip-flop according to the present invention;
FIG. 18 is a circuit diagram for a second embodiment of the master- slave flip-flop according to the present invention;
FIG. 19 is a circuit diagram for a third embodiment of the master- slave flip-flop according to the present invention;
FIG. 20 is a circuit diagram for a fourth embodiment of the master- slave flip-flop according to the present invention; and
FIG. 21 is a circuit diagram for an embodiment of the D flip- flop according to the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring to the accompanying drawings, embodiments of the present invention will be explained.
FIG. 3 is a block diagram for a first embodiment of the RS flip- flop circuit having an input gate according to the present invention. The set input terminal S and reset input terminal R of an RS flip-flop 100 are provided respectively with input gates 200A and 200B, which transfer input data under the control of clock CK. The set output terminal Q and reset output terminal /Q are provided with output buffers 300B and 300A, respectively. The output buffer 300B is supplied with the data from the set output terminal Q and the data supplied to the set input terminal S. That is, the data to the set input terminal S is supplied to the output buffer 300B prior being transferred through the flip-flop 100, to provide the buffer with an advance read function. Similarly, the output buffer 300A, like the output buffer 300B, is supplied with the data from the reset output terminal /Q and the data supplied to the reset input terminal R.
FIG. 4 is a circuit diagram for the flip-flop circuit of FIG. 3. The RS flip-flop 100 is made up of two NOR gates G.sub.101 and G.sub.102. The input gates 200A and 200B are composed of NOR gates G.sub.201 and G. sub. 202, respectively. The output buffer 300A and 300B are composed of NOR gates G.sub.301 and G.sub.302. One NOR gate G.sub.301 of the output buffer stage is connected to the output node N.sub.3 of the flip-flop stage and the input node N.sub.2. The other NOR gate G.sub.302 of the output buffer stage is connected to the output node N.sub.4 of the flip- flop stage and the input node N.sub.1.
FIG. 5 is a timing chart for explaining the operation of the flip- flop circuit of FIG. 4. It is assumed that in the initial state, clock CK is a "1", data A is a "038 , data /A is a "1", nodes N.sub.1 and N. sub.2 are a "038 , N.sub.3 is a "1", N.sub.4 is a "038 , output Q. sub. 1 is a "1", and output /Q.sub.1 is a "0". The change of clock CK from "1" to "0" causes node N.sub.1 to change from "0" to "1". This change at node N.sub. 1 then causes the voltage at the output node N.sub. 3 of NOR gate G.sub. 101 to fall. This falling voltage at the output node N.sub.3 in turn causes the voltage at the output node N.sub.4 of NOR gate G.sub. 102 to rise. In conventional output buffers without an advance read function, as shown by broken lines in FIG. 5, as a result of the rising signal from the output node N.sub.4, the output Q.sub.1 of NOR gate G. sub.302 of the output buffer stage goes to "0". In the present embodiment, however, as shown by solid lines, a rise in the voltage at input node N.sub.1 is supplied directly to NOR gate G.sub.302 of the output buffer stage, which causes the output Q.sub.1 to fall. Therefore, the final output Q.sub.1 ="0" can be obtained without introducing a delay due to two NOR gates G. sub.101 and G.sub.102 constituting the RS flip-flop circuit 100. The same is true in a case where the input data of A="1" and /A="0" is taken in on clock CK and retained. Here, the final output /Q.sub.1 ="0" is obtained without a delay due to two NOR gates found in conventional circuits.
FIG. 6 is a circuit diagram for a modification of the flip-flop circuit of FIG. 4. In this circuit, AND gates G.sub.501 and G.sub.502 replace the NOR gates G.sub.201 and G.sub.202 constituting the input gate of FIG. 4. The AND gate G.sub.501 and G.sub.502 may be such as source- follower AND gates.
FIG. 7 is a block diagram for a second embodiment of the RS flip- flop circuit having an input gate according to the present invention. In this embodiment, in addition to the input gates 200A and 200B for transferring data to the RS flip-flop 100, input gates 200C and 200D are provided to give the output buffers 300A and 300B an advance read function. In this embodiment, the composite gate arrangement of the input gates 200A and 200B and RS flip-flop 100 is useful particularly in cases where the set input terminal S and reset input terminal R cannot be connected directly to the output buffers 300B and 300A.
FIG. 8 is a circuit diagram for the RS flip-flop circuit of FIG. 7. In this circuit, NOR gates G.sub.101 and G.sub.102 constitute the RS flip- flop circuit 100. In the input gates 200A and 200B, AND gates G.sub. 503 and G.sub.504 are combined with NOR gates G.sub.101 and G.sub.102, respectively, to form composite gates. AND gates G.sub.505 and G.sub.506, which provide an advance read function for NOR gates G.sub.301 and G. sub. 302 constituting the output buffers 300A and 300B, correspond to the input gates 200C and 200D, respectively. In this way, the output buffer section is also constructed to form a composite gate arrangement of AND and NOR elements.
Examples of the AND-to-NOR composite gate arrangement of FIG. 8 are shown in FIG. 9A to 9C. FIG. 9A illustrates an equivalent circuit of gate level, FIG. 9B shows a circuit diagram for the FIG. 9A circuit constructed of MESFETs, and FIG. 9C depicts a circuit diagram for FIG. 9A circuit constructed of CMOS circuits.
FIGS. 10 to 16 illustrate embodiments where the present invention is applied to a data latch circuit.
FIG. 10 is a block diagram for a first embodiment of the data latch circuit according to the present invention. A flip-flop 150 for latching data has the data input terminal D, the input terminal for clock CK.sub.2, and the output terminal Q. The data input terminal D is connected to an input gate 200 that transfers input data under the control of clock CK. sub.1. The data output terminal Q is connected to an output buffer 300. In this embodiment, like the above embodiment, the output buffer 300 is provided with an advance read function that allows the input data to be supplied directly to this buffer before the input passing through the data-latch flip-flop 150. Therefore, as with the above embodiment, the present embodiment provides the output without introducing a delay due to two stages of gates of the data-latch flip- flop 150.
FIG. 11 is a block diagram for a second embodiment of the data latch circuit according to the present invention. In this embodiment, another input gate 200B is provided in parallel with the input gate 200A to give the output buffer 300 an advance read function. The present embodiment, like the embodiment explained in FIG. 7, is useful for composite gate arrangements.
FIG. 12 is a block diagram for a third embodiment of the data latch circuit according to the present invention. The data latch circuit of FIG. 12 is made up of a NOR gate G.sub.211 forming the input gate stage 210, NOR gates G.sub.111 and G.sub.112 constituting a flip-flop stage 110, and a NOR gate G.sub.311 forming the output buffer stage 310. The clock CK is supplied directly to the NOR gate G.sub.211 of the input gate stage 210, and at the same time, is supplied via an inverter gate I. sub.111 to the NOR gate G.sub.112 of the flip-flop stage. Unlike ordinary data latch circuits, in the present embodiment, the signal at the output node of the input gate stage 210 is supplied to the NOR gate G.sub.311 of the output buffer 310 to provide an advance read function.
FIG. 13 is a block diagram for a fourth embodiment of the data latch circuit according to the present invention. The data latch circuit of FIG. 13 is composed of a NAND gate G.sub.441 forming the input gate stage 220, NAND gates G.sub.401 and G.sub.402 constituting the flip-flop stage 120, and a NAND gate G.sub.451 forming the output buffer stage 320. The clock CK is supplied directly to the NAND gate G.sub.441 of the input gate stage 220, and at the same time, is supplied via the inverter gate I. sub. 111 to the NOR gate G.sub.402 of the flip-flop stage. Unlike ordinary data latch circuits, the present embodiment allows the signal at the output node of the input gate stage 220 to be supplied to the NAND gate G. sub.451 of the output buffer 320 to provide an advance read function.
FIG. 14 is a block diagram for a fifth embodiment of the data latch circuit according to the present invention. In the data latch circuit of FIG. 14, the flip-flop stage 110 is made up of NOR gates G. sub.111 and G. sub.112. The NOR gate G.sub.111 and an AND gate G.sub.511 forming the input gate stage 230 are combined to form an AND-to-NOR composite gate arrangement. The output buffer stage 330 is made up of the NOR gate G.sub. 311. The NOR gate G.sub.311 and an AND gate G.sub.512 are combined to form a composite gate arrangement to provide the output buffer 330 with an advance read function.
FIG. 15 is a block diagram for a sixth embodiment of the data latch circuit according to the present invention. In the data latch circuit of FIG. 15, the input gate stage 220 of FIG. 13 is constructed of a CMOS transfer gate 240. The resistor 400 is designed to present enough resistance for the output node of the transfer gate 220 to go to the "1" level only when the transfer gate 240 turns off.
FIG. 16 is a block diagram for a seventh embodiment of the data latch circuit according to the present invention. In the data latch circuit of FIG. 16, the input gate stage 230 of FIG. 14 is constructed of a CMOS transfer gate 240. With this configuration, because the output node of the input gate 230 can be connected to the output buffer, this provides an advance read function without the AND gate G.sub.512 of FIG. 14. The resistor 400 is designed to present enough resistance for the output node of the transfer gate 240 to go to the "0" level only when the transfer gate turns off, and to maintain the node potential.
The data latch circuits shown in FIGS. 10 to 16, like the above- described embodiments, eliminate the effects of internal delay and enable high speed operation.
FIG. 17 is a circuit diagram for a first embodiment of the master- slave flip-flop circuit according to the present invention. The master flip-flop stage 130 is composed of NAND gates G.sub.421 and G.sub. 422 constituting a flip-flop and OR gates G.sub.351 and G.sub.352 forming transfer gates, all of which are integrated into an OR-to-NAND composite arrangement. The slave flip-flop stage 140 is composed of NOR gates G. sub.121 and G.sub.122 constituting a flip-flop and AND gates G. sub.521 and G.sub.522 forming transfer gates, all of which are integrated into a NAND-to-NOR composite arrangement. The output buffers 340A and 340B each consist of AND-to-NOR composite gates, into which NOR gates G.sub.321 and G.sub.322 and AND gates G.sub.523 and G.sub.524 for providing an advance read function are integrated, respectively.
In this embodiment, like the preceding embodiment, while data is still in the course of passing through the slave flip-flop stage 140, the AND gates G.sub.523 and G.sub.524 allow a change in the signal at the output node of the master flip-flop stage 130 to appear at the output buffers 340A and 340B as a change in the output, thereby shortening data delay.
FIG. 18 is a circuit diagram for a second embodiment of the master- slave flip-flop circuit according to the present invention. In the master- slave flip-flop circuit of FIG. 18, the master stage is composed of the master flip-flop 110 consisting of NOR gates G.sub.123 and G.sub.124 and a separate transfer gate 500 consisting of NOR gates G. sub.221 and G.sub. 222.
FIG. 19 is a circuit diagram for a third embodiment of the master- slave flip-flop circuit according to the present invention. In the master- slave flip-flop circuit of FIG. 19, the master-slave flip- flop circuit of FIG. 18 is modified in that the slave stage is also composed of the flip-flop 150 consisting of NOR gates G.sub.121 and G. sub.122 and a separate transfer gate 510 consisting Of NAND gates G.sub. 423 and G. sub. 424. Here, the output buffers 310A and 310B consist only of NOR gates G. sub.321 and G.sub.322, respectively. The output nodes of the NAND gates G. sub.423 and G.sub.424 of the transfer gate stage 510 are connected to the output buffers 310B and 310A, respectively, to provide these buffers with an advance read function.
FIG. 20 is a circuit diagram for a fourth embodiment of the master- slave flip-flop circuit according to the present invention. In the master- slave flip-flop circuit of FIG. 20, the NAND gates of the transfer gate stage 510 of the master-slave flip-flop circuit of FIG. 19 is replaced by NOR gates G.sub.125 and G.sub.126, which forms the transfer gate stage 520.
FIG. 21 is an embodiment of the D flip-flop according to the present invention. The input gate stage 240 is composed of NOR gates G. sub.231, G.sub.232, G.sub.234, and G.sub.235, the flip-flop stage 110 is made up of NOR gates G.sub.131 and G.sub.132, and the output buffers 310A and 310B consist of NOR gates G.sub.331 and G.sub.332, respectively. This D flip-flop differs from ordinary D flip-flops in that the output nodes of the input gate stage 240 are connected to the output buffers 310A and 310B to provide these buffers with an advance read function. Consequently, this embodiment also achieves shorter data delay.
Additional advantages and modifications will readily occur to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific details, and representative devices, shown and described herein. Accordingly, various modifications may be without departing from the spirit or scope of the general inventive concept as defined by the appended claims and their equivalents. | |
I A Howley, G S Smith and D J A Stewart
Over the past decade the role of dam ownership in Victoria, and indeed Australia, has changed from one of owners, constructors and operators of large civil assets, to managers of structures on behalf of owners of the entitlements to water. This is part of the key business focus to dams management in Victoria.
This position has been heavily influenced by regional water reform policies, such as the Murray Darling Cap, and its effects in Northern Victoria, and COAG Agreements.
Dam owners now run service driven businesses, with a clear separation of roles and responsibilities from the traditional, engineering focused organisations which were established in an environment of resource development. The environment is now one of maintenance, service delivery, structure maintenance and long term business viability for ultimate community benefit.
By using Goulburn-Murray Water as an example, the current model of dams management in Victoria is outlined, together with possible future directions for the rural water industry in Victoria.
$15.00
J. H. Green and P. I. Hill
Early Probable Maximum Flood (PMF) studies and spillway adequacy assessments for Hume Dam adopted the standards based approach of the time. Since then considerable work and thought has gone into the estimation of extreme floods – both the philosophy and the practice. These changes include the general change in emphasis away from a standards based approach and towards risk assessment; the move towards an AEP-neutral approach for the transformation of extreme rainfalls to extreme floods; and the redefinition of both the PMP and the PMF.
This paper details the effect these and other changes to extreme flood estimation techniques have had on the perceived adequacy of the Hume Dam spillway to pass extreme floods.
D.N.D. Hartford and R.A. Stewart
It seems perfectly logical, obviously desirable and apparently sensible to prioritise dam safety reviews, deficiency investigations and capitalised remediation projects in terms of risk. However, our experience in attempting to apply the various deterministic and risk- based approaches in prioritising dam safety activities has revealed that, while it may appear to be quite logical and desirable to prioritise in terms of risk, it is rather less feasible than it appears.
This paper explores why different prioritisation processes can lead to different priority rankings across the same portfolio of dams. B.C. Hydro’s Preliminary Risk Exposure Profile process, which utilises the best and most robust attributes of risk analysis process at the preliminary level but avoids the pitfalls associated with estimating risks which will often have little or even no basis is presented. The paper explains how this process provides a “fail-safe” backup which will identify non-conservative and erroneous facility risk estimates; thereby allowing for correction in a timely fashion. The paper also raises some awkward philosophical issues which the profession will have to address in order to permit confident dam safety decision-making on the basis of risk analyses. Not the least of these is the following issue – “If preliminary estimates of risk are reasonably good, then there should be little need for more detailed risk analysis for confident and defensible decisions concerning making or not making dam safety improvements”.
Richard I Herweynen
For concrete gravity dams, when the foundation’s value of cohesion is low, it is very difficult to meet the sliding criteria proposed by ANCOLD. Low cohesion is generally associated with serious foundation defects. This was the case for Meadowbank Dam, with a foundation having persistent horizontal seams containing material of a clayey silt size classification. By adopting the ANCOLD strength reduction factors, it was found that a large number of ground anchors would be required to meet the ANCOLD sliding criteria. During original design, extensive laboratory and insitu testing was performed on the seam material. This paper proposes a methodology for arriving at less severe strength reduction factors based upon a statistical analysis of the strength parameters measured in the Meadowbank Dam foundation.
Additionally, a probabilistic approach using a Monte Carlo simulation is used to give further weight to this argument. This paper concludes that the probability of Meadowbank Dam failing due to sliding is very low and within acceptable limits.
Leonard A McDonald and Chi Fai Wan
A risk assessment has been undertaken as part of a comprehensive review of the safety of Hume Dam. Use of risk assessment techniques, to assist in evaluating the safety of existing dams, is a relatively recent trend. Hume Dam was a particularly challenging subject for the application of risk assessment techniques at their present stage of development. The challenge lay in the number and diversity of dam elements to be analysed, in the number and complexity of the potential failure modes and in the fact that there were significant safety issues under normal operating conditions.
This paper outlines some of the key lessons learned from that phase of the risk assessment that was concerned with estimating the chance of dam failure. Some of the issues discussed have not previously been addressed in the literature and some demonstrate a clear need for improved analysis procedures.
David Watson and John Adem
For several years risk management has been promoted by the Victorian Department of Natural Resources and Environment – Water Agencies as the key mechanism for the effective and efficient business management of dams. As part of an extensive water reform program, the Victorian Government announced in October 1997, a financial assistance package for the water industry which included funding for dam improvements covering a majority of large dam owners in the State. One of the conditions for receipt of these improvement funds was the need for each water authority to undertake a Business Risk Assessment of all significant and high hazard dams under its responsibility.
This paper discusses the Business Risk Assessment document based on a framework developed by Water Agencies after consultation with the industry and expands on the following reasons why the document was produced: | https://www.ancold.org.au/?product=1998-from-dam-owners-to-water-managers-the-victorian-experience-2 |
Can the mass of a body change under any condition or not?
August 12th, 2022
mass
The value of one atomic mass unit
August 17th, 2022
metrology
si-units
homework-and-exercises
measurements
mass
If you double the mass of a moving object - is its kinetic energy quadrupled?
January 11th, 2020
energy
mass
How exactly does mass affect speed?
August 13th, 2020
newtonian-mechanics
forces
mass
speed
Is it possible to decrease the mass of the object?
May 27th, 2020
electrons
atoms
radioactivity
higgs
mass
Why are non-equally heavy objects falling at the same speed on the moon?
June 29th, 2020
free-fall
acceleration
mass
newtonian-gravity
newtonian-mechanics
What are the ideal centers of mass and rotation for a steadicam?
May 22nd, 2020
mass
stability
rotational-dynamics
Mass spring system, elongation of the spring
February 10th, 2020
spring
mass
newtonian-mechanics
Will mass distribution affect the motion of a rigid object?
May 22nd, 2020
newtonian-mechanics
mass
rotational-dynamics
Find the center of mass of a hemispherical shell
October 9th, 2020
volume
mass
homework-and-exercises
Clarification on infinite mass/momentum argument
January 24th, 2020
special-relativity
speed-of-light
momentum
mass
Conservation of momentum equation, how do I factor out v0Final and v1Final?
June 3rd, 2020
conservation-laws
velocity
mass
momentum
How does mass affect velocity of a skateboard?
September 3rd, 2020
forces
mass
kinematics
newtonian-mechanics
What is the mass distribution within the sun?
August 1st, 2022
newtonian-gravity
mass
sun
planets
Is my interpretation of how a gravitational wave is formed correct?
October 21st, 2020
general-relativity
mass
spacetime
gravitational-waves
Will centre of gravity coincide with centre of mass if density of object is non-uniform?
January 30th, 2020
newtonian-gravity
mass
definition
newtonian-mechanics
How much mass is typically ejected from a supernova?
March 23rd, 2020
mass
astrophysics
stars
supernova
stellar-evolution
Where does the majority of the mass of the usual matter come from?
August 1st, 2022
particle-physics
mass
energy-conservation
protons
matter
What is momentum?
August 1st, 2022
newtonian-mechanics
momentum
mass
velocity
definition
How can centre of mass be virtual?
August 13th, 2022
mass
newtonian-mechanics
reference-frames
Is most of the matter in the observable universe within galaxies?
August 11th, 2020
cosmology
mass
dark-matter
galaxies
Does a rotating object have more inertia, mass and gravitational pull?
November 24th, 2021
forces
energy
kinematics
mass
inertia
When is use of the 'effective mass' concept appropriate?
August 13th, 2022
condensed-matter
mass
solid-state-physics
Why isn't a meter defined from a kilogram of water?
August 8th, 2020
length
water
si-units
metrology
mass
Why is mass renormalization insufficient to explain electron mass?
March 13th, 2020
higgs
fermions
renormalization
standard-model
mass
Planck mass is about the mass of one eyebrow hair
August 1st, 2022
physical-constants
mass
scales
order-of-magnitude
Is a block of cotton heavier than a block of iron?
August 1st, 2022
weight
mass
Density of a proton
February 21st, 2020
homework-and-exercises
protons
density
mass
Why is Higgs Boson given the name "The God Particle"?
August 9th, 2022
inertia
higgs
terminology
mass
gravity
Where is Strong Equivalence Principle stronger than Weak Equivalence Principle? | https://9to5science.com/t/mass |
Meaning of Physical Capabilities
A capacity is a quality or a condition. The physical, for its part, is that linked to the material or the body.
Physical capacities are called the conditions that an organism presents, generally associated with the development of a certain activity or action. These physical abilities are determined by genetics, although they can be honed through training.
It is possible to differentiate between conditional physical abilities and coordinative physical abilities. The conditioning capacities are the velocity, the force, the strength and flexibility. This means that conditional physical capacities are linked to the possibility of carrying out a movement in the least amount of time possible, of overcoming a resistance thanks to tension, of maintaining an effort over time or of reaching the maximum possible distance of a joint.
According to DigoPaul, the coordinative physical capabilities, meanwhile, are those allowing the provision of actions in an orderly way to achieve a goal. The reaction, the rhythm, the balance, the orientation, the adaptation, the differentiation and synchronization or coupling part of this kind of physical abilities.
Ultimately, it can be said that physical abilities determine the motor performance of an individual. To improve performance in a sport, therefore, work should be done on optimizing physical capacities through specific exercises. In this way it is possible to improve speed, strength, balance, reaction, etc.
It is important to keep in mind, however, that physical capacities also establish a limit set by genes that cannot be overcome with training: no person can run at 200 kilometers per hour no matter how hard they train.
The limits of physical capacities are one of the most recurrent topics of debate among specialists in various fields in which the use of the body is essential to achieve the objectives, such as sports and artistic disciplines such as dance, singing and the execution of an instrument. On the one hand, there are those who say that we all have a limit, different in each individual, while others firmly believe that with effort and dedication we could all achieve the same goals.
The training and improvement of physical capacities make a huge difference between the possibilities that natural talent gives us and those that open up before us once we have access to technical knowledge. Let’s take the case of singers: in popular music, the common is that they use their natural gifts to sing their songs, applying their own style but without many technical foundations; in academic music, on the other hand, the display of skill that can take place in a recital is on a much higher plane.
This is where many of the points of confrontation and debate arise, as some people refuse to study technique for fear of conditioning their creativity, while others do not hesitate because they want to make the most of their physical abilities. As in many other similar topics, all opinions are valid as long as each one reaches its fullness.
For those who do recognize differences in the physical capacities of each individual, limits are not always understood as a measure to assess potential but as a series of data that can help us find the most appropriate path for us. For example, a person with a light, low-volume voice has a greater affinity for baroque music than a Wagner opera, just as someone with a large complexion and stature may be more comfortable playing rough sports than trying their luck at contortionism. | https://www.phonecations.com/meaning-of-physical-capabilities/ |
Scientists from NOAA’s National Centers for Coastal Ocean Science, in collaboration with biologists from the National Park Service (NPS) and with support from NOAA’s Coral Reef Conservation Program, successfully completed their bi-annual monitoring and characterization mission in and around the waters of Buck Island Reef National Monument (BIRNM), St. Croix, USVI, March 9th – 21st. Data on fish and invertebrate populations and benthic composition were collected at one hundred and twenty two locations, including sites in the northern part of the East End Marine Park (EEMP). The results of this long-term monitoring study will help BIRNM and EEMP establish the knowledge base necessary for enacting place-based management decisions and assessing the efficacy of USVI Marine Protected Areas (MPAs). As on all NOAA diving missions, safety remains paramount to data collection, and the mission was completed safely and incident-free. For more information, visit http://www.ccma.nos.noaa.gov/ecosystems/coralreef/reef_fish/ .
Significance: The results of this long-term monitoring study directly support local managers in assessing the efficacy of USVI Marine Protected Areas (MPAs).
| |
© hawx - 2022. All rights reserved
What Are Wolf Spiders and Are They Dangerous?
September 07, 2022
By Hawx Pest Control
Wolf spiders are known for their robust size and quick sprint, but these interesting arachnids play an important part in their ecosystems, too. There are thousands of species of wolf spiders, and they have adapted to live in a huge variety of regions across the world.
Learn where to find them in the U.S., what types of habitats they prefer, how to identify them, and what to do if you find them in your home or yard.
What Are Wolf Spiders?
Wolf spiders are named for their predatory hunting style and tendency to chase down and pounce on their prey like their namesake, the wolf. This speedy arachnid can be found on every continent (except for Antarctica) and female wolf spiders are known for their tendency to carry their babies on their backs.
What Do Wolf Spiders Look Like?
With variations from tan-brown to black, wolf spiders are most easily identified by their unusual sets of eyes, 8 in total. Wolf spiders sport two large eyes in the center, two posterior/lateral eyes on either side and a row of four smaller eyes that almost look like a mustache.
Perhaps the best way to tell the wolf spider apart from the brown recluse spider is by the wolf spider’s banding down its legs (the brown recluse does not have any bands). The wolf spider is a large, hairy spider that moves rapidly outside (typically). The recluse is much smaller, not hairy, and usually noticed indoors. So, if you see a spider moving quickly across the ground, it’s likely not a brown recluse. Recluse spiders try to stay within their webs, while wolf spiders do not spin webs and can mostly be found hunting insects on the ground.
How Big Are Wolf Spiders?
The bodies of wolf spiders can range from 1 to over 4 inches, including leg span. The larger species are generally found in warmer climates in Asia, South America, and Australia, with the largest at 4.7 inches.
Where Do Wolf Spiders Live?
Wolf spiders are found across the world, including the U.S. In the U.S., they prefer meadowlands, rocky gravel, sand, and areas with leafy ground cover. They can also climb trees and other objects if they need to, but generally prefer to stay on the ground.
What Do Wolf Spiders Eat?
These carnivores prefer to eat insects that live on the ground, like crickets and other spiders, since they do not spin webs. They stalk and hunt these insects instead of waiting for their prey to come to them. Large female wolf spiders might take on reptiles like lizards or even small birds, but these types of wolf spider species are less likely to be found in the U.S.
Are Wolf Spiders Dangerous?
Wolf spiders are not dangerous to humans. While they are venomous, their venom is used to immobilize and kill their prey. These nocturnal ground-dwellers are only likely to bite people in self-defense if they are handled or trapped. If you are bitten by a wolf spider, you may get symptoms such as a painful red mark at the site of the bite, but it will typically go away on its own. Always seek medical attention if you have concerns about any insect or spider bite or sting.
Why Shouldn’t You Squish a Wolf Spider?
Despite their potentially unnerving speed and appearance, these critters are not dangerous. They roam the ground, helping to control the populations of other insects that can be more meddlesome pests.
Squishing, or killing them in general, isn’t necessary as they aren’t generally considered to be harmful to humans and are beneficial to their ecosystems. Plus, if you try to squish a wolf spider, it may be tempted to bite you because it feels threatened.
How To Get Rid of Wolf Spiders
Wolf spiders are solitary arachnids that you’re not likely to find inside your home. If you do find a wolf spider in your home, it is most likely just wandered in through a crack or open door at ground level while in search of an insect snack. The best way to keep them out of your house is to make sure that all cracks and gaps around the home are sealed, and that all door sweeps and weather stripping are in good repair. Controlling other insects in your home will keep a wolf spider away—if there’s no food to be found, they have no incentive to come indoors.
You may find that you see them in your yard if there is a plentiful supply of food for them. These hunters are primarily nocturnal, roaming the ground in search of insects and spiders during the night. The more insects in your yard, the more likely you are to have wolf spiders passing through.
If you want to encourage them to hunt elsewhere, keep your yard free of areas that harbor insects, such as piles of leaves, unkempt shrubbery, and yard waste. However, as mentioned above, these critters stalk insects and other spiders along the ground, helping to keep other insect populations in check. Since wolf spiders provide natural pest control, it isn’t necessarily a bad thing to have them roaming your yard at night to keep other pests at bay. | https://hawxpestcontrol.com/what-are-wolf-spiders-and-are-they-dangerous/ |
BACKGROUND: About a third of patients undergoing haemodialysis have poorly controlled fluid status, which may affect survival. Clinical assessment is subjective and imprecise, which has led to the increasing use of devices based on bioimpedance spectroscopy (BIS). However, BIS cannot provide a simple target applicable to all patients. Our aim was to develop and validate a decision aid combining clinical assessment of fluid status with information from BIS in target weight determination.
METHODS: The decision aid was based on empirical experience and a literature review identifying physiological parameters already used in the clinical assessment of fluid status. Content validity was established by patient representatives, interdisciplinary stakeholders and external experts, who assessed item relevance and comprehensiveness. Reliability was assessed by inter-rater agreement analysis between nurses assessing typical patient cases.
RESULTS: The decision aid for Recognition and Correction of Volume Alterations (RECOVA) consists of three parts (1) a scoring system; (2) thresholds and triggers; (3) a decision aid algorithm. Agreement between raters in the assessment of symptoms was almost perfect, with Intraclass Correlation Coefficient > 0.90. Agreement in clinical response was only fair, but increased to moderate, with training and self-reported confidence.
CONCLUSION: RECOVA may enable systematic clinical assessment of fluid status, facilitating early recognition of fluid alterations, and incorporation of bioimpedance into target weight management. However, implementation into clinical practice will require training of staff. Clinical intervention studies are required to evaluate if RECOVA facilitates response to and correction of recognised fluid alterations. | http://hig.diva-portal.org/smash/record.jsf?pid=diva2:1371721 |
The following is an excerpt from the FDA's "Employee Health Personal Hygiene Handbook"
When hands are heavily contaminated, effective hand washing practices may not be enough to prevent the transmission of transient pathogens from the hands to RTE foods. The
2009 FDA Food Code does not allow bare hand contact with RTE food (i.e., food that is eaten without further washing or cooking) and requires the use of suitable utensils such as scoops, spoons, forks, spatulas, tongs, deli tissue, single-use gloves, or dispensing equipment when handling these food items.
Bare hand contact with RTE foods, such as sandwiches or salads, can result in contamination of food and contribute to foodborne illness outbreaks. Therefore, food employees should always use suitable utensils such as spatulas, tongs, single-use gloves, or dispensing equipment when handling RTE foods. Single-use gloves used along with hand washing can be an effective barrier to decrease the transfer of microorganisms from the hand to food. However, gloves are not total barriers to microbial transmission, and will not be an effective barrier alone for food workers without education on proper glove use and hand washing requirements.
Use the following cleaning method in the order stated to clean your hands and exposed portions of your arms: | https://www.mecknc.gov/HealthDepartment/EnvironmentalHealth/EducationalInfo/Pages/handwashing.aspx |
Hello!
We seek your help with our Arts Reemergence Research Project, funded by Hamilton County Community Foundation. We are seeking feedback from artists, art patrons, community members, and event attendees throughout Hamilton County to help us set our goals for the future. It will take approximately 8 minutes to complete the questionnaire.
Your participation in this study is completely voluntary. There are no foreseeable risks associated with this project. However, if you feel uncomfortable answering any questions, you can withdraw from the survey at any point. It is very important for us to learn your opinions.
Your survey responses will be strictly confidential and data from this research will be reported only in the aggregate. Your information will be coded and will remain confidential. If you have questions at any time about the survey or the procedures, you may contact Aili McGill at 317-452-3690 or [email protected].
Thank you very much for your time and support. Please start with the survey now by clicking on the Continue button below.
Start
Powered by
QuestionPro
Loading... | https://nickelplateartscommunitymemberreemergencesurvey.questionpro.com/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.