content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
The invention relates to a device for coating a substrate, preferably with aluminum oxide, using a direct current source and/or an alternating current source which is connected to an electrode disposed in an evacuable coating chamber. The electrode in turn is electrically connected to a target to be sputtered and the sputtered particles thereof are deposited on the substrate, for example, a plastic element. A process gas can be introduced into the coating chamber and toroidal magnetic fields penetrate the target and the flux lines exit from the surface of the target in the area of the magnetic poles.
A cathode sputtering device is known (German OS 27 07 144; Sloan Technology Corp.) including a cathode which has one surface to be sputtered, and a magnetic device at the side close to the cathode and at the side for generating magnetic flux lines opposite the surface to be sputtered. At least a few of these flux lines enter the surface to be sputtered to exit it again a intersections which are spaced apart and between which the flux lines form continuously archlike segments spaced from the surface to be sputtered. Together with the flux lines, the surface forms a boundary for a closed area thus forming a tunnel-like area which is located above a thus defined path on the surface to be sputtered. Charged particles show a tendency of being restrained in the tunnel-like area where they move along. The invention also includes an anode in the vicinity of the cathode and a connection of the cathode and the anode to a source of an electric potential whereby at least the surface to be sputtered is within an evacuable container.
This device includes a moving device for generating a relative movement between the magnetic field and the surface to be sputtered while maintaining the spatial relationship. The aforementioned defined path covers a surface area which is greater than the surface area occupied by the resting path.
Further, an arrangement is known for coating a substrate with a dielectric (P 38 21 207.2, Leybold AG) having a direct current source which is connected to an electrode which in turn is electrically connected to a target to be sputtered. The sputtered particles combine with a substance to be supplied so as to form a compound which is deposited on the substrate. Toroidal magnetic fields penetrate the target and the flux lines exit the surface of the target in the area of the magnetic pole. This arrangement is provided with an alternating current source the output voltage of which overrides direct voltage of the direct current source. The electric power of the alternating current source which is supplied to the electrode corresponds to 5% to 25% of the power supplied to the electrode from the direct current source.
Finally, a magnetron sputtering cathode for vacuum coating systems having a circular target plate made of the material to be sputtered was suggested (DE 36 19 194, to which U.S. Pat. No. 4,746,417 corresponds, Leybold AG) which includes at least one magnet system disposed behind the target plate. This magnet system includes two self-contained rows of permanent magnets nesting in one another and the magnets of each row have the sam pole position whereas the pole position of the magnets of the two rows is opposite with respect to one another such that above the target plate the magnetic field lines form at least one self-contained tunnel starting at the one row of magnets and returning to the other row of magnets. The invention further includes a driving device for continuously rotating the magnet system around the center axis of the target plate. A first magnet system for generating a first magnetic tunnel which is essentially concentric to the rotating axis is disposed at the edge of the target plate. An eccentrically offset second magnetic system is disposed between the rotating axis and the first magnet system. It generates a second magnetic tunnel covering only one sector of the target plate such that when both magnet systems perform one common rotation, the surface elements of the target plate are subject to the product of residence time and intensity in a way that in the center area the target plate is subject to a regular abrasion whereas the abrasion is stronger at the edge so that a substrate field opposite the target plate is uniformly coated.
| |
If you have never undertaken the process of creating a workflow from start to finish, it may feel like a complicated process.
While building a workflow can take time, especially when it comes to planning, processes, and testing, it isn’t as daunting as it seems if you know what you’re doing. The key is in knowing how to start.
You first need to know how complicated your workflow will need to be, which means you will have to understand the difference between a simple project workflow versus a complicated process workflow.
After that, it comes down to choosing the right visual representation of your workflow and then following a few basic steps.
Building a workflow for a single project is not the same as creating a workflow for a business process, which is why it’s important to understand the difference.
Projects are often completed using project management strategies and software (like Microsoft Project). Project management involves the initiation, planning, design, execution, monitoring, control, and closing of a team’s specific goal, usually involving a certain set of criteria that needs to be met.
The biggest difference between project management and process management is that project management has a temporary, constrained scope, quality, budget, and timeframe.
Creating a workflow for a process, on the other hand, involves defining processes that need to be managed throughout the organisation, which may include repeatable projects and grouped tasks. It also requires visualizing, measuring, controlling, reporting, and, improving that process over time, with the goal to increase productivity and/or decrease costs.
Flowcharts and other diagrams can be used for project planning, system mapping, process documentation, or creating almost any type of workflow. But, not all flowcharts are created equal in terms of helping you achieve your ultimate outcome.
There are a few different flowchart types, including your basic flowchart for project planning as well as those more suitable for organizing complex processes, like the swimlane diagram.
Step 3: Identify what is needed to perform the process. What tasks, documents, and actual materials (paper, pens, automation software, programs, etc.) are needed to complete the process?
Step 4: List any tasks and activities. What needs to be done to accomplish your outcome? State these in a verb/object format (e.g. approve the request, sign the paperwork, etc.). Each task may get its own box in your flowchart or diagram, so you can group minor tasks together if necessary.
Step 6: Identify roles. Who will be involved in what tasks or activities? Some tasks may involve simple automation tools and no human approval, while others will need a review and sign off. Identify who is responsible for which task and process in your workflow. Add a swim lane for each role in your swimlane diagram.
Step 7: Identify your flowchart type and draw it out. Again, swimlane diagrams are best for processes, while a simple flowchart may work for projects or other smaller workflows. You can either draw one out by hand or use a tool like Visio, gliffy.com or draw.io.
Step 8: Review and finalize. After you’ve set everything up, you will want to test your workflow and review it to ensure that all processes are efficient and achievable and that everything accomplishes what it needs to accomplish.
Step 9: Use a workflow automation tool to create your actual workflow. Once your workflow is finalized, you can use workflow automation software to set up your actual workflow and integrate it with other software. Don’t forget to test your systems to make sure there are no hiccups throughout the process.
For swim lane diagrams, more guidance may be needed to truly capture all the roles and responsibilities. Further tips for building an effective swimlane diagram can be found here and here.
Keep in mind that the more complicated the process, the more complicated the flowchart will be, which means that you may either need to create a large flowchart or break down the process into multiple diagrams.
The process isn’t necessarily complicated once you get the hang of it, but it can be time-consuming, especially during the planning stages. Make sure you involve key team members in the brainstorm and planning processes before you start building your workflow or designing your flowcharts.
The more preliminary work you can do before you put pen to paper (or processes into your automation tool) the easier and faster your implementation and testing will be.
WOW! concise helpful info! Thank you tons. | https://gravityflow.io/how-to-get-started-building-and-organizing-your-new-workflow/ |
The Science-Policy Forum provided a platform for scientists, forest managers and decision-makers from the Asia-Oceania region to share insights and experiences about forest and water interactions from different perspectives.
Among the significant challenges discussed by the forum panelists were the increasing competition for water resources, the positive and negative impacts of carbon sequestration due to large scale afforestation and reforestation, climate change-related shifts in rainfall patterns and capacity building requirements among civil groups at various levels to ensure competent engagement in forest and water management.
The online discussion was one of three science-policy forums organized for IUFRO World Day. (The other two – Forests and Fire and Forest-based Bioeconomy for All – will be covered in separate Spotlights.)
Further reading:
- View all IUFRO Spotlights at https://www.iufro.org/media/iufro-spotlights/
- Files: | https://www.iufro.org/publications/iufro-spotlights/article/2021/12/15/iufro-spotlight-91-forests-and-water/ |
Employee Type:
Contractor
-
Location:
Broussard, LA
-
Job Type:
Manufacturing
-
Experience:
Not Specified
-
Date Posted:
4/17/2018
Job Description
Title: Machine Operator III
Duration: 12+ months
Location: Broussard, LA
•
1st shift (7am-3:30pm) but may be asked to switch to swing shift in the future (~10am-7pm)
The CNC Machine Operator II supports manufacturing and engineering by producing production parts, new tools and fixtures. The position is a role with a strong initial focus on process simplification and improvement and must be able to work autonomously and within a team.
Required Qualifications:
Technical experience working in a machine shop, programming at the machine, and operating Haas and Mazak mills and lathes CNC machines and other metal working equipment.
Ability to perform machine tool math.
• Ability to read and understand detailed machine drawings.
• Ability to perform detail oriented work and complete projects on time.
• Basic computer knowledge.
• Ability to communicate, receive and understand instructions regarding duties to be performed.
Job Requirements
Key responsibilities/essential functions include:
Development of processes and programs to produce production parts and tools Schedule and track workflow, materials, and resources through the machine shop to satisfy requirements.
• Utilize Computer Numerical Control (CNC) equipment, specifically Haas and Mazak mills and lathes, to produce accurate parts in various quantities to meet development project needs.
• Program at the CNC machines using mazatrol and G code.
• Utilize precision measuring tools to ensure in-process or finished product matched specified tolerances.
• Strong ability to specify tools and machining processes to improve product or tool manufacturing capabilities.
• Complete documentation, in an ERP system, for tracking of time and cost related to development activities.
• Perform routine and/or corrective maintenance on machine shop equipment.
• Comply with HSE regulations and policies. Lead teams and projects to drive improvements in processes and documentation. | https://careers.disys.com/job/machine-operator-iii/J3W74363RFLD3V3JXH9/ |
The Whitehouse announced today that it would be canceling $10k in student debt, or $20k if the borrower ever received any money as a Pell Grant, for anyone making less than $125k per year ($250k per year for households) based on data that the Department of Education has or will be collecting in the coming weeks.
Biden is also extending the student loan payment pause to Dec. 31, 2022, meaning that no one will have to repay loans or accrue interest on federal student loans in 2022.
And possibly the single most compelling and surprising piece of this announcement is the fact that loan payments will be capped at 5% of borrower income, and if those payments are made, no interest will accrue.
It is somewhat difficult to state exactly how big of a deal this last part is. Income driven repayment had become a rat’s nest, useful on the surface to keep payments under control, but often done in such a way that the borrowers were not even making the full interest payments, leaving them with a larger loan to repay each month and trapping them in a cycle of a loan which becomes increasingly impossible to pay off. Out of everything announced today, this is likely to be the thing that gives the most relief to those who are in the most need.
But this, as well as the $10-20K forgiveness is based on your income. The way your income data is checked is different from the means-tested COVID relief checks that went out and were based on your tax returns, and seems to require that borrowers manually report their income to the Dept. of Education. Even if this application / reporting process is as easy as the federal government can make it, there will still be a non-insubstantial part of the population who does not engage with the system, just as there is for any federal program, and just like with any federal program the population that qualifies but does not engage will likely be lower income, less white, and with higher debt balances. But It is also likely that some portion of those making over $125k will simply not engage with the system, possibly making it a bimodal distribution, and making it difficult to do anything that targets just those who don’t report their income. What the Whitehouse decides to do with the population of debt holders who do not engage with the system will likely depend on how many of them there actually are, but it is difficult to imagine them getting more than 90% of the income data by borrow reporting before the end of 2022, when the loan repayment is scheduled to restart.
In total this will fully remove the student debt balances of around 9 million borrowers.
SoFi, one of the largest holders of student loans, seems to be doing well off this announcement, gaining some value in the market back after a trend of longer term decline.
This is an evolving story and we will continue to update you as the details of the plan are fleshed out.
More Stories
Blackboard’s LMS marketshare shrinks for another year as Canvas’ dominance grows
In recent years, the learning management industry has grown rapidly as technology and innovations continue to transform the way that...
3 Ways ChatGPT can help teachers and 5 reasons it won’t replace them
Ever since ChatGPT came on the scene there have been a lot of hysterical articles detailing why education will never...
ChatGPT and the Future of Education at FETC
The FETC conference is going on right now in New Orleans and sadly, the conference has a paltry online offering....
44% of Graduates Regret their College Majors
Although we have talked about the problems with higher education, there is no question that a college degree is becoming...
HMH is buying NWEA: The giants keep getting giant-er
There is further consolidation in the EdTech industry as a publishing giant, Houghton Mifflin Harcourt, is buying the Oregon-based assessment...
Universities endowments just keep growing
It has been said that these days top-tier universities are just hedge funds with admissions departments. Many US university endowments... | https://e3dnews.com/2022/08/24/biden-cancels-10k-in-student-debt-for-most-students/ |
comply with all the required policies.
“Lawyers write these policies, and no
one ever looks at them,” says Annie
Antón, a professor of computer science
at North Carolina State University. “It’s
a huge problem.” Formalizing rules
that were intended to be interpreted by
courts, rather than by programmers, is
also challenging. Whereas European
Union law grants its citizens ownership of their medical data—and thus
a great deal of control about what happens to it—U.S. laws are less clear-cut.
HIPAA doesn’t address data ownership,
and though it gives patients access to
their records in most situations, it also
grants doctors plenty of authority such
as the right to share data with insurance companies, for example, and with
other medical specialists.
A more basic privacy-related challenge stems from the complexity of
health-care delivery. How is it determined which providers can access patient data? In general, only individuals
with a direct medical need should be
able to access files. Yet in an emergency-room setting, dozens of people
may need to examine a single patient’s
record, from doctors to dieticians to
interns—and speed is often of the essence. At Partners HealthCare’s network of hospitals, emergency-room
doctors can only access the records of
patients who have already visited that
hospital, and only view (but not modify) them. “It’s an imperfect system,”
admits Cynthia Bero, CIO at Partners
Community Healthcare, “but we have
to balance providing the best care with
preserving patient privacy.” Other EMR
systems enable hospitals to grant and
revoke patient data access on a daily,
and sometimes hourly, basis.
From a technological perspective,
there are three different architectures:
centralized models, where data is stored
and held in a single database; federated
models, where it is distributed across a
network; and a hybrid of the two. Each
model has advantages and disadvantages. Centralized systems are generally regarded as more secure and easy to
manage—and hence better for research
purposes. Federated systems, however,
may be easier for small practices to deploy, and to facilitate the aggregation of
data across different networks. But they
also force healthcare providers to rely
on a third party to guard against data
loss and breaches of privacy. It’s not yet
clear, experts say, exactly how architectures will evolve in the future.
clinicians’ Daily Workflow
To be truly useful, of course, EMRs
must fit seamlessly into clinicians’
daily workflow. Yet this, too, presents
a challenge. From a physician’s perspective, it’s faster to scribble a prescription on a piece of paper than it is
to log onto an EMR system and electronically enter the data. (Renewing
a prescription, on the other hand, is
much quicker with an EMR system.)
HCI specialists like Jason Saleem, an
investigator at the Regenstrief Institute, are therefore working to develop
systems that are easier and more efficient to use. “By understanding doctors’ workflow, we can design better
EMRs,” he explains. One lesson is that
it may not be possible, or even desirable, for EMRs to fully replace paper.
In a study published in the
International Journal of Medical Informatics,
Saleem observed that index cards and
Post-It notes often serve as important
extensions of EMRs when it comes to
tasks such as remembering an impor-
The John d. and Catherine T.
Macarthur Foundation and other
organizations recently honored
members of the computer
science community for their
innovative research.
macaRthuR founDation
“Genius” a WaRD
Maneesh agrawala, associate
professor in the department
of electrical engineering and
computer sciences at the
university of California, Berkeley,
was among the 24 fellows for
2009 selected by the Macarthur
Foundation. agrawala will
receive $500,000 over the next
five years. in announcing his
selection, the foundation noted
that agrawala is working “at the
intersection of visualization,
human-computer interaction,
and computers graphics” and
is “designing visual interfaces
that enhance our ability to
understand large quantities of
complex information.”
nsf caReeR a WaRDNational science Foundationawarded Fengyan Li, assistantprofessor of mathematicalsciences at rensselaerPolytechnic institute, a Facultyearly Career development award.Li will use the five-year, $582, 112award to design, analyze,and implement computeralgorithms for solving complexmathematical problems arisingin sciences and engineering.
comPuteR-aiDeD
VeRification a WaRD
The 2009 Computer-aided
Verification (CaV) award, which
includes a $10,000 prize and
citation, was presented at the
21st annual CaV conference
in grenoble, France, to seven
individuals who have made
major advances in creating
high-performance Boolean
satisfiability solvers. They are
Conor F. Madigan, Kateeva,
inc.; sharad Malik, Princeton
university; Joao P. Marques-silva, university College dublin,
ireland; Matthew W. Moskewicz,
university of California,
Berkeley; Karem a. sakallah,
university of Michigan; Lintao
Zhang, Microsoft research; and
Ying Zhao, Wuxi Capital group. | http://mags.acm.org/communications/200911/?pg=21 |
Full-text links:
Download:
(license)
Current browse context:
physics.chem-ph
Change to browse by:
References & Citations
Bookmark(what is this?)
Physics > Chemical Physics
Title: Water Density Fluctuations Relevant to Hydrophobic Hydration are Unaltered by Attractions
(Submitted on 7 Oct 2014 (v1), last revised 18 Feb 2015 (this version, v2))
Abstract: An understanding of density fluctuations in bulk water has made significant contributions to our understanding of the hydration and interactions of idealized, purely repulsive hydrophobic solutes. To similarly inform the hydration of realistic hydrophobic solutes that have dispersive interactions with water, here we characterize water density fluctuations in the presence of attractive fields that correspond to solute-water attractions. We find that when the attractive field acts only in the solute hydration shell, but not in the solute core, it does not significantly alter water density fluctuations in the solute core region. We further find that for a wide range of solute sizes and attraction strengths, the free energetics of turning on the attractive fields in bulk water are accurately captured by linear response theory. Our results also suggest strategies for more efficiently estimating hydration free energies of realistic solutes in bulk water and at interfaces.
Submission historyFrom: Richard Remsing [view email]
[v1] Tue, 7 Oct 2014 04:51:48 GMT (1336kb,D)
[v2] Wed, 18 Feb 2015 17:01:12 GMT (1336kb,D)
Link back to: arXiv, form interface, contact. | http://export.arxiv.org/abs/1410.1614 |
At this time when Maximilien Robespierre professes that terror is an appropriate means to protect the popular government that now rules France, a government that my parents as well as my younger self could never have envisioned for our nation, I feel that it is appropriate for me, Jacques Griezmann of Rennes, to reflect back upon the life I have lived up until this year of 1794. It is firstly obvious that I witnessed the complete overturn of the Old Regime and the previous social order in France. I personally had a hand in drafting the declaration that was poised to promise the Third Estate liberty, not the frenzy and fear of this period. As an accomplished lawyer, I have been a part of a group of educated and competent men that challenged the structure of the Old Regime and its roots in the inequality of rights and privilege that favored noblemen of scanty education, motivation, and ability. We professional men, my fellow lawyers and the other men of status and wealth–the merchants, physicians, and men of industry–rose to a level of wealth and status unheard of in the first half of this century. I now shall tell my story.
At the age of fifteen I decided to follow in my father’s footsteps and pursue a career in the law. My father made a nice life for my mother, sister, and I as an advocate in Rennes. I was born on the 11th of January, 1740 and spent my youth in a home owned by my father. It was a modest home, not rich hangings or furnishings but with a large fireplace and a room for my sister and I, separate from our parents. We ate well and were schooled. As a young fellow, I saw the degree to which the destitution of peasants compared to the luxury of nobles, many of which held higher positions than my father and yet were less educated. I also grew up hearing my father talk of lawyers that had become extremely wealthy and lived like nobles, some living entirely off their wealth, others who had joined the courts and earned title of nobility. It was my ambition to study the law and surpass the success my father had achieved to therefore become a lawyer with status.
My early life was thus dedicated to the studies that would bring me to such a position. I remember much of my adolescence and early adulthood as having my nose in a book. Even as a young boy, however, I could not avoid the distraction of all the events occurring within France and our possessions abroad. I was born shortly before Frederick the Great invaded Silesia, and lived my early life as our country battled in the War of of the Austrian Succession. Although I was only eight years old when the Peace of Aix-la-Chapelle ended the war, I was well aware of my father’s dissatisfaction with the return of France’s conquested lands. I also saw the beginning and end of the Seven Years’ War during my early manhood. During the fighting, while I was still engaged in university studies, my father remonstrated the intense taxation. The war ended in 1763, the first year I had started practicing law. My friends, colleagues, and I conversed in the cafés about the inadequate management of the whole affair. For me, it was that failure that seeded the beginning of my understandings of the wretched incapability borne of the nonsensical social organization the Old Regime.
As a young man striving to build a career, the heavy taxation ordered to meet the demands of the Seven Years War, both during and after, weighed heavily on my wallet and my mind. It stood then as it does a now a travesty that we, the men of ability, whose work actually sustained this nation, were expected to empty our pockets for the Crown’s overseas holdings, while the privileged class romped around free of taxation but eager to collect from the Third Estate. France lost the war because we could not fund our military, and because of losing the war we signed away our North American possessions that once brought wealth to the nation and our men of industry. Even after that disastrous loss and the growing debt, Louis XV insisted on augmenting the navy and, consequently, our debt. All of this to be paid by increasing the taxes on the most industrious men and the commoners who fought in the war. If anything useful came of the Seven Years War, it was the blatant demonstration of the corrupt social and political order that allowed the privileged nobility to live at the expense of the citizens engaged in agricultural, industrial, and distinguished professions of law and commerce that were the true foundation of the nation.
Despite these frustrations, I committed myself to my work and the pursuit of success. I initially made my way by drawing up family papers and then worked up to practicing in the courts. All the while I worked to make a living, pay the enormous sums collected by the state, and earn my place of honor, the extravagances of the royal family increased and the nobility remained unscathed by the surrounding economic crisis. I nonetheless amassed a modest amount of wealth, purchased a residence in a neighborhood amongst nobles and other wealthy commoners, and married my wife Marie. By the time King Louis XV died in 1764 and was succeeded by King Louis XVI, I had been elected to the general assembly and was involved in managing the affairs of Rennes. This position brought me honor in status but none of the plentiful privileges of the nobles. What’s more, I had given much effort to attaining a position in the higher courts but was barred from the post because of my common birth. All the while it was obvious to me and the grand majority of our city that my so-called “common birth” was irrelevant when considering the real contributions I made to our city. I was a man with education, wealth, and status, respected by my fellow men and engaged in a profession without which France would crumble, but I was denied the political sway that was meanwhile granted to idle and frivolous nobleman. Alongside my friends and colleagues that were locked in the same absurd position, I grew bitter and angry at the crooked and frankly nonsensical system that placed uneducated, lazy, and incompetent nobles in offices that I was much better suited to fill.
As I exercised law and managed the affairs of my city, the nobles established their own seigneurial courts simply out of their inherent “right” to do so. They established these courts and usurped our city justice systems, enforcing “law” on the inhabitants with punishments that were ten-fold harsher than the crime. Of course, such punishment was only inflicted on the commoners, while the same crimes committed by a noble or friend of the court were left untouched. These injustices, along with the desperate pleas of the farming classes to curb the nobles from hunting on their fields and the heavy taxation that continued to support Queen Antoinette’s insatiable need for luxuries of all kinds, turned my ambition for noble title into a loathing for noble privilege. I nevertheless remained occupied by the numerous affairs of our city, what with the kingdom’s support of the American Revolution putting more burden on the commoners that did not have the money to spare. For all the woe the increased debt inflicted on our people, the King’s calling of the Estates General eventually brought me the influence I had always envisioned for myself.
I took part in the local assembly that drafted the cahiers de doléances for Rennes that would be considered at the assembly. At that point my colleagues and I only sought the removal of barriers from our entry into higher offices, the disposal of the noble privileges that instituted those barriers and other injuries, and the general restriction of various noble abuses that hurt peasant agriculture and general means of living. I was then elected as a deputy to represent Rennes in the Estates General, which convened in Versailles on the fifth of May in 1789. There is no need for me to account in detail the occurrences of that unfruitful meeting–the refusal of the Crown to grant voting by head would have stifled any justice and was not something the Third Estate could stand for. To think that the Crown attempted to suppress the hence formed National Assembly by barring us from our proposed meeting place that very next day is now humorous. I can still feel the energy and promise of the solemn oath my fellow men and I took on that tennis court.
Although I was hopeful and ready for social and political change, I cannot claim complete bravery. I wondered what it would mean to abolish a nobility, when I, as a lawyer,had once enjoyed near-noble honor and respect from the commoners. My nerves were slightly calmed when the members of the Court joined our National Assembly, but once again shaken when the Crown moved troops into Paris. The storming of the Bastille in July and the peasant rebellion that swept the nation around the same time had me worried that our undertaking was moving out of the hands of us rational and able men. Nevertheless, with the feudal regime abolished, there was no choice to stay with the Revolutionary cause. Setting to work on the Declaration of the Rights of Man and Citizen soothed some of my anxieties. My wife expressed anger that women were not included, but I remained firm that such a measure was not in the interest of France. I was enlivened by the idea of living under a France nation that would protect my property and allow me an equal chance at the positions of high office I had always wanted, but was simultaneously troubled by some of the more radical suggestions put forth. The year of 1789 realized my hopes for social change but also tested my notion of what that equality would mean.
Now I see that this primitive fear was more justified that I had previously imagined. I maintain that all the unrest of 1789 was worth the realization of the Declaration of the Rights of Man and Citizen and the Constitution we issued in 1791. Working as a member of the National Assembly was the power I had always dreamed of but in a form I could have never imagined. However, I can feel that the tension of the nation cannot be sustained. Antoine-Laurent Lavoisier, our nation’s great chemist who developed a method for refining saltpetre into the gunpowder we so desperately needed to win the revolution, was celebrated in the great armaments festival just two years ago, and has recently been murdered. How can we murder the scientist who made so many advances for chemistry in the name of France? How can we disband our Academy of Sciences, sure to bring France great recognition, when England’s industry is greatly more sophisticated than ours? The greatest invention of France of recent has been the improved guillotine, and it is used to kill off our men of greatness. The France I had envisioned was lead by the educated, able, and wealthy individuals that could steer our nation in the right direction, now these men are being murdered by Robespierre’s Terror. I did not foresee or hope for the republic that has been established. I write this memoir in the year of 1794 as I watch Terror take the lives of the citizens that the Revolution was meant to serve. I fear that if I speak at all, or breathe too loudly, I will be next. | http://technohistory2017.lmu.build/exhibits/show/france-1740/memoire-of-a-man-born-in-1740- |
The major objective of every organisation is to increase its productivity, and this is determined by the abilities and competences of its workforce. Manpower is the total number of all available workers in an organization. The role and importance of manpower in any business or enterprises cannot be overemphasized. Manpower is the basis of all resources used and it is the indispensable means of converting other resources to mankind’s use and benefits, so how well we develop and employ human resources skills is fundamental in deciding how much will be accomplished as an organization. Manpower development and utilization is of utmost importance to any organization, it deals is expected to ensure optimal performance of workers assigned roles in an efficient and effective manner. According to Adeniyi (1995), manpower or staff training and development is a necessary work activity that makes a very significant contribution to the overall effectiveness and profitability of an organization. Fajana (2002) the effectiveness and success of an organization lies on the people who form and work within the organization.
Saraswathi (2010) says manpower development in the organizational context is a process by which the employees of an organization are helped in a continuous, planned ways to acquire or sharpen capabilities required to perform various functions. There is no doubt that in this advanced age of development and technological breakthrough, manpower must be developed to meet the challenges of modern technology. Trained and well-developed manpower is the essential ingredient for efficiency and effectiveness in Nigeria Television Authority (NTA). To validate this assertion, Ojohwoh (2011) posit that manpower occupies an indispensable position in any establishment, be it an industry, commercial or educational institution. Onah (2014) says what sets most successful organization apart is how they manage human resources. The role of personnel training is inevitable, as many organisations have come to realize that training remains the only medium for improving productivity and ensuring work standard.
Equipment plays a very important role in any organization. The importance of broadcasting equipment cannot be overrated. The broadcast equipment are able to cater for the ever increasing demand for better methods of collecting data, editing the data into information and relaying the information to the target market.
The development of manpower is no doubt a key to Nigeria’s socioeconomic and political development. In the broadcasting industry such as Nigerian Television Authority (NTA) manpower development cannot be overemphasized. NTA runs the largest television network in Nigeria with stations in several parts of the country. The first television station in Nigeria, the Western Nigerian Government Broadcasting Corporation (WNTV) began broadcasting on 31 October 1959, with Olapade Obisesan as chairman and Vincent Maduka as general manger. In 1962, the three regional government had set up the Nigerian Television Service (NTS). Then with the creation of twelve states in Nigeria, more television services were established and by 1976 when all televisions were taken over by the federal government under decree 24 of 1977, NTA was founded as a sole entity responsible for television broadcasting in Nigeria, beginning with 10 stations. As of 1979, NTA had reached about 20% of the Nigerian population, by 1999 it had reached 30 stations. Today it boost of 101 stations, this development have given NTA the status of the largest network in Africa.
NTA’s vision is to be a World Class Television Network. Its mission is to provide excellent television services worldwide and project the true African perspectives. NTA’s corporate objectives is to influence, promote, sustain and improve Nigeria’s positive societal values through social, cultural, economic, political and technological programmes. To provide viewers with the most reliable, authoritative and independent coverage and analysis of contemporary issues of national and international events through News programmes, to promote civic responsibilities among others. Its core values are national interest, professionalism, accuracy, credibility, balance and objectivity, sensitivity and commitment to world peace and development.
As a global network, NTA presently has bureaus in 7 countries of the world, including the United Kingdom, Washington DC, Ottawa (Canada), Accra (Ghana), Cairo (Egypt), Germany and China. These bureaus are manned by experienced reporters who cover Nigerian related events across the world.
The structure and management of NTA
The board of directors is made up of 8 government appointed members of 8 executive directors and headed by the Director General. The executive Directors head the following Directorates:
- Directorate of programmes: NTA’s programmes Directorate has produced programmes in the genres of drama, children, youth, talk shows and documentaries, all targeting at family entertainment.
- Directorate of News: the Directorate deploys both its core News and current affairs to the populace in actualization of Government’s policies and programmes.
- Directorate of Marketing: is charged with the primary responsibility of generating revenue for the authority.
- Directorate of Finance and Administration: responsible for the administrative running and financial management of the organization.
- Directorate of Engineering: responsible for the technical aspect of the organization.
- Directorate of Special Duties: this Directorate carries out exceptional services that fall outside the core activities of the traditional operational areas of Television Broadcasting and its auxiliary departments of Corporate Affairs and Research Development. It also supervise the Multi-channels project comprising of 8 specialized broadcasting activities of NTA on digital platform. These channels are NTA News 24, NTA entertainment, NTA Knowledge, NTA parliament, NTA sports 24 and NTA Languages channels (Hausa, Igbo [Igbo Ezue] and Yoruba [Ikanni Oodua]).
- Directorate of Training and Capacity Building: this directorate is responsible for manpower development, through regular training of staff via workshops, seminars and short courses.
NTA outside broadcast capacity is outstanding, with latest OB Vans with HD facilities. NTA is positioned to deliver the best television and allied services through its subsidiaries. Unfortunately, the overwhelming and pervasive role of manpower resources and equipment in NTA seem to be compromised to the extent of misplacing its role in the achievement of organizational objectives.
The organization is bogged down by a number of issues, among which is human and material. Vehicles, cameras, computers, editing facilities and other modern technologies which can facilitate the work of the organization are in short supply. Also, about 70% of those who pass recruitment tests organized by the station are usually not recruited but rather replaced by nominees of the executive and legislative arms of the government (Tonnie, Vanguard 2016).
There are a number of factors that contribute to the success of any broadcasting industry such as capital, equipment, manpower etc. In Nigeria, many organizations have been deficient in their operations and the overall effectiveness due to the type or calibre of manpower/equipment they have. The federal government of Nigeria have tried to solve this problems by providing funds. Ismail Mudashir (Daily Trust, 2019) The Federal Executive Council approved N1.3 billion for the replacement of some obsolete equipment at the Nigerian Television Authority (NTA), Federal Radio Corporation of Nigeria (FRCN) and the News Agency of Nigeria (NAN).
NTA Lokoja is a broadcasting house charged with the responsibility of disseminating information among others. To effectively perform its function, it require well trained, developed, professional, dynamic manpower and advanced equipment.
1.2. Statement of the Research Problem
The importance of manpower training and equipment availability has no doubt been recognized in many organisations as the key factor for improved productivity. However, manpower training in the broadcast sector is threatened with a number of problems like the absence of regular training despite the continuous reforms with emphasis on training, this is because the various reforms in the broadcast sector have not considered it necessary to establish definite and continuous training programmes that will increase employees’ productivity. Equipment provided do not meet up with modern standard. Manpower and advanced equipment are considered the most critical to any organizational survival.
Employees of most broadcasting organisations are seldom sent for training and those who desire to undertake any form of training may not be given any kind of support. When staff embark on skill acquisition programmes, management sometimes do not provide the necessary equipment to enhance operations which could lead to redundant staffs.
This is so much so in NTA, for some time now it appears manpower development and equipment in NTA has been unsatisfactory, unplanned and unsystematic, and several of its employee such as machine operators, junior and middle level engineers, account clerks, computer operators, secretaries, drivers and many other category of workers, have not qualified for any form of training nor is there any systematic process of staff development in place.
Apart from the above, it was also observed that there is a paucity of data base needed for manpower planning, more emphasis is placed on the traditional personnel management functions like recruitments, placement, wages, administration, discipline and employee welfare at the detriment of manpower development. Moreover, workers are not deployed based on the skills acquired during the training. Some of the staff that has benefitted or sent at all for training, with all the financial resources incurred on the government name, have not been given the opportunity or placed in their rightful places according to the relevant training received. This has also been a very big problem as it leads to frustration and general inefficiency.
In NTA Lokoja, the ability to achieve and sustain competitive advantage lies within the availability of equipment, the level of manpower development. This study, therefore, intends to investigate the influence of manpower/equipment on productivity in the NTA with reference to NTA Lokoja.
1.3. Objectives of the study
The general objective of the study is to evaluate the influence of manpower/equipment on productivity in NTA Lokoja. The specific objectives are to:
- examine the impact of manpower on productivity in NTA Lokoja.
- ascertain the impact of equipment on productivity in NTA Lokoja.
- identify the challenges to effective manpower training in NTA Lokoja.
- investigate the challenges in accessing equipment in NTA Lokoja.
1.4. Research Questions
The study seeks to answer the following questions:
- What is the impact of manpower on productivity in NTA Lokoja?
- What is the impact of equipment on productivity in NTA Lokoja?
- What are the challenges to effective manpower training in NTA Lokoja?
- What are the challenges in accessing equipment in NTA Lokoja?
1.5 Research Hypotheses
The study is guided by the following hypotheses:
H0: There is no significant relationship between manpower and productivity in NTA Lokoja.
H0: There is no significant relationship between equipment and productivity in NTA Lokoja.
H0: There are no major challenges to effective manpower training in NTA Lokoja.
H0: There are no challenges in accessing equipment in NTA Lokoja.
1.6. Significance of the Study
Efficiency and effectiveness are the major goals of any organisation and this may not be achieved without recognizing the role of manpower training and equipment availability. This is because an inadequately trained employee using an absolete equipment is completely useless to the full achievement of the organizational goals. This applies to broadcasting sector in general and NTA Lokoja in particular.
This study is essential in discovering the relevance and impact of manpower/equipment on productivity in NTA Lokoja. This study will be important to NTA Lokoja, as it will help guide the management of NTA Lokoja on how it can operate, treat its workers, help to know the kind and level of equipment needed. It will teach it the importance of manpower and the necessary guide of attaining manpower. It will also help the management get maximum value from the employees by introducing training programmes at various cadres of the workforce; and enable them bring out better manpower development and utilization training programmes for its employees.
Furthermore, it will reveal the approaches to manpower training and equipment provision that is needed to address the deficiency as well as the due processes to be taken in order to achieve effectiveness in NTA. The study will unveil the challenges associated with manpower training and accessing equipment and proffer solutions to the challenges of training in NTA Lokoja.
Moreover, the recommendations of the study if strictly adhered to will improve manpower training exercise and ensure advanced technology in NTA Lokoja as well as contribute to the formulation of policies on broadcasting. Finally, the findings of the study if implemented, will greatly inspire the administration and control of the broadcasting sector to provide adequate funding for manpower training/equipment to resolve the problems of low productivity in the Nigerian broadcasting sector. Since evidence have shown that investment in manpower training/equipment is associated to increased productivity, which in turn boost socio-economic and political development.
It is hoped that the exploration of NTA Lokoja will provide a broad view of the operations of the media house to investors and government. The changing character of the broadcasting industry especially, the television station reforms including the licensing of online radio and television stations has affected the industry in recent times and will push studies on manpower/equipment on the industry to new evidence(s). This study will be of benefit to;
The Academia: members of the academia will find the study relevant as it will also form basis for further research and a reference tool for academic works.
Government: this study will reveal to the government happenings in the broadcasting industry. Formulation and implementation of policies based on this findings would ensure development in the industry.
Investors: investors especially those who may have research interest as it shall guide their private investment decisions.
This study at the end will enlighten the management of the company on the implication of inadequate equipment and manpower training.
1.6. Scope of the Study
The study is focused on the influence of manpower/equipment on productivity in NTA Lokoja in 2019 using staff workers. NTA Lokoja is located in No. 3, Olu of Oworo road, Lokoja, Kogi state. Other factors that affect productivity like remuneration and so on were not included in this study because sufficient time is required to gather the data, check and validate the questionnaires.
1.7. Operational Definition of Terms
The following terms have been defined operationally.
- Equipment: a set of tools or other objects commonly used to achieve a particular objective, this include the equipment used in NTA Lokoja.
- Manpower: the total number of all available workers; the workforce. This implied the total number of pensionable employees of NTA Lokoja.
- Training: the act of teaching a person a particular skill or type of behaviour. It is a type of activity which is planned, systematic and it results in enhanced level of skill, knowledge and competency that are necessary to perform work effectively. It include the various training programmes undergone in NTA Lokoja.
- Human resource management: is the way organizations manage their staff and help them to develop in order to be able to execute organizations’ missions and goals successfully. It relates to the way NTA Lokoja manages its staffs. | https://eduprojecttopics.com/product/influence-of-manpower-and-equipment-on-productivity-in-nta-lokoja/ |
The fact that you have permission by the state to be able to drive on public roadways is demonstrated by the California driver license. Most DMV offices allow you to apply for the California Permit Test. Driving in California without a valid driver license is a misdemeanor. If you are caught your vehicle may be impounded, you could be cited and you could have to appear in court. Your social security number (SSN) and the document that states your date of birth or legal presence must be provided when you apply for an original DL/ID card.
Drivers that fall between the ages of fifteen and a half and seventeen and a half are required to enroll in a driver’s education course that has been approved by the state. This is required by California law before being able to apply for a permit. This is not a legal requirement if you are older than seventeen and a half but by taking this course you will be increasing your chances of passing your test.
Getting a driver’s license is a huge milestone and exciting experience for all teenagers who are seeking the freedom to roam and no longer worry about catching a ride. However, the process can come with some worries too because it often is complicated and overwhelming for new drivers. Luckily, the following is a detailed step-by-step guide on how you can receive a California driver’s license in hand and get behind the wheel a little more easily.
Before being eligible to apply for a provisional permit, California state laws require that drivers between the ages of 15½ and 17½ enroll in a state-approved driver’s education course. If you are 17½ or older, you are allowed to skip to step number two, but it is still recommended that you consider taking the course to soak up as much information as possible. In order to be approved by the DMV, the driver’s education course must be at least 30 hours of instruction in a public or private high school or a licensed driver’s education school. In recent years, the DMV has also started to approve online driver’s education courses to complete outside of a conventional classroom setting as well.
Once you have completed driver’s education, it is still important to polish all of your new skills by studying for the written examination. At any DMV office location, you are encouraged to pick up a California Driver’s Handbook to help aid in your studies. Since the handbook contains all the information that will be given on the exam, it is important to study it until you know the whole book inside and out. It is also beneficial to further your studying online with a free practice test to test your knowledge and ensure you can proceed to the next step with confidence.
When you arrive at the DMV office to take the knowledge exam for your appointment, you will need to present verification of your legal presence and age through a birth certificate, as well as a certificate of completion from your driver’s education course. Then, you must fill out the Form DL-44 application completely and truthfully. It is required that all applicants under the age of 18 have parents or legal guardians sign the application on site. You will immediately have to pay the $32 application fee, which includes the testing fees and new license cost. After passing a vision exam, you will proceed to the examination room to take the test.
The knowledge examination consists of 46 written questions about essential California traffic regulations, road signs, laws, and safety procedures. In order to pass the test, you will need to score at least 39 correct answers. However, you are given three attempts at passing the exam if you fail, and you may take the examination again in one week. Once the written test is passed with flying colors, you will earn a Provisional Learner’s Permit.
Although the provisional permit proves that you have a solid basic understanding of being an excellent driver, actual driving experience behind the wheel is required. California drivers permits are valid for 12 months, so there is ample opportunity to gain vital hands-on practice. Before you will be eligible to schedule a road exam, it is required that you have proof of at least 50 hours of driver training with a qualified, licensed driver over the age of 25. 10 of the 50 hours must be completed at nighttime for a well-rounded driving experience. It is also necessary for you to finish at least six hours of training with a professional driving instructor approved by the state too.
After finishing the 50 hours of training and holding the permit for a minimum of six months, you may schedule the road test whenever you are ready. To do so, you must fill out the application for the provisional driver’s license and make an appointment for the driving test. When it is time for the test, the examiner will need to see your driver’s permit, proof of registration and insurance for the vehicle you are testing in, and approval by a parent or guardian if you are under 18. During the test, you will be examined on your basic driving skills, maneuvers, safety measures, and rules of the road. Always remember to check your mirrors regularly, keep eyes on the road, and turn your head to change lanes.
Congratulations! Passing your road test means you are now the proud owner of a California provisional driver’s license. During the provisional period, you are not allowed to drive without supervision by a licensed driver over 25 and you cannot drive between the hours of 11 PM and 5 AM. Once you turn 18 years old though, these restrictions will magically disappear and you will automatically be awarded an unrestricted California driver’s license!
The fee is $33 for original license, renewal or adding a motorcycle license (Class M1/M2).
The $27 fee for the duplicate license, name change or adding a firefighter endorsement. | https://www.driverknowledge.com/how-to-get-a-drivers-license-in-california/ |
For my podcast and radio program this week (they’ll post on Wednesday), I interviewed Uli Lorimer, the Director of Horticulture at the Native Plant Trust. Uli first attracted attention as the curator of the Brooklyn Botanic Garden’s native flora garden, which he helped to expand into one of the finest, most innovative displays of natives in the United States. A year ago, Uli moved to the Native Plant Trust (formerly the New England Wildflower Society) where he serves as Director of Horticulture, supervising the Trust’s 45-acre woodland garden and its nursery operation in western Massachusetts. When I spoke to him, I asked Uli about the difficulties I have found in sourcing truly native, “native” plants.
I enclosed native in quotation marks because, as Uli confirmed, many plants sold as natives are not actually native to the region where the customer gardens. Nursery people commonly apply the term rather loosely. So for example a plant may be sold as a native because it is native to North America, even though it is not native to your region. That’s fairly easy to discern with a quick look at reference works online or in books. What’s much more difficult to establish is if a plant that does grow naturally in your area came from a reasonably local and adapted strain. A species with a broad geographic range, for example, may be indigenous as a species to your area but the one for sale may be sourced from a very different ecoregion with a significantly different climate and conditions. If that is the case, the “native” you buy may actually be poorly adapted to the conditions in your garden.
Uli also spoke to a topic that has recently become a concern to me. I plant natives in large part because of the benefits they provide to wildlife. I also want to help bolster populations of native plants. For both reasons, I prefer to deal with wild-type, seed-grown plants. Yet such plants are difficult to find because the nursery industry, as it is presently constituted, cannot cope with their diversity. Wholesale growers prefer to grow uniform and compact, cloned plants, which lend themselves to industrial growing processes.
That practice takes the genetic diversity out of the plants, greatly decreasing the adaptability of the resulting population. This is a serious concern during an era of climate change, when adaptability is especially important. Reducing plants to clones can also markedly decrease a plant’s value to wildlife.
There are some nurseries that grow plants from ethically collected seeds and I think it behooves us as conscientious gardeners to patronize them to the extent that they can provide us with plants adapted to our region. I also think that we must demand more information about the plants we buy. The provenance of the plants we are offered must become standard information on the label. | https://gardenrant.com/2020/05/native-vs-native.html |
Health Care Law Symposium: Exploring the Modern Landscape of Health Law, Policy, and Technology
The Health Care Law Symposium, hosted by the Cleveland State Law Review, is seeking to explore modern problems and questions within the world of public health law, reproductive rights, and advancements in health care technology.
In our first panel, we will explore the modern landscape of medical marijuana, its legalization status, and potential public health concerns. Then, we will analyze the intersection of technological advancements, such as advancements in the legal standards surrounding electronic health records, gun control, and social media, and how these topics affect the law generally.
Our second panel will explore reproductive rights, specifically covering Ohio's current status on abortion law, surrogacy, and updates on the University Hospital's Fertility Clinic case.
Speakers/Panels: | https://www.law.csuohio.edu/taxonomy/term/25 |
View guide index
Thanks to this part of the Indivisible Walkthrough, you will be able to discover all the information about the non-playable characters that you may encounter during the adventure. These NPCs will join Ajna’s Inner Realm, and will offer you various services instead of taking part in battles.
Tharwa: You can meet Tharwa in front of the Tower of Wisdom when you arrive at Port Maerifa. By visiting her in your Inner Realm, you will be able to get information about your next main objective.
George: You meet George near the Port Maerifa docks just after you have unlocked the Pirate’s Leap skill. In your Inner Realm, chat with George to take part in training battles.
Asiri: You can find Asiri along with other NPCs in Kaanul’s Haven. She will allow you to change the colour of your playable characters’ clothes. | https://video-game-guide-walkthrough.supersoluce.com/solution/indivisible-guide-walkthrough/incarnations/other-characters/ |
By Elizabeth Thompson ’21
To kick off the fall semester, the Counseling Center and LaFarm co-hosted the second annual Thrive on the Quad. The event was launched last fall after the Class of 2018 selected the Counseling Center to be the senior class gift recipient. The event’s goal is to help students learn practical strategies to nurture personal growth and cultivate a positive college experience.
The Counseling Center focused on eight different domains centered on promoting students’ emotional health and well-being: gratitude, mindfulness, self-compassion, growth mindset, connection, digital detox, sleep, and exercise.
Eight activity stations, one for each domain, included soothing stones (students could write down a word or image and glue it to a clear stone), a wheel that had different questions related to sleep and exercise, and an opportunity to exchange bookmarks written with personal messages of hope with peers.
Once students completed at least three of the stations, they were able to get a plant from LaFarm. LaFarm also added tags to the plants that featured messages from students about how they have thrived at Lafayette. | https://admissions.lafayette.edu/2019/10/17/thriving-on-campus/ |
:
7am - 4pm
Saturday
:
7am - 4pm
*
Box trucks not accepted on Saturdays
Starting
Friday, Dec. 1
, in an effort to offer more disposal options and better serve the residents of the City of Canton, we will now offer FREE trash disposal to all residents that live within the city limits of Canton at our Canton City Collection Site located at
2525 Ridge Road
. The Canton City Collection Site will be open on Fridays and Saturdays from
7 a.m. to 4 p.m.
, excluding holidays.
In addition, the Canton City Collection Site will be open each day of the week following Christmas (
Tuesday, Dec. 26
, through
Saturday, Dec. 30
) to receive excess refuse from the holiday (no food related trash, please).
FREE and only open to CITY OF CANTON RESIDENTS
Items accepted
Old Lumber
Washers / Dryers
Stoves
Dishwashers
Metal
Air Conditioners
Water Heaters
Carpet
Freezers / Refrigerators
(Emptied and tagged as being Freon free)
Household Items
(i.e. furniture, couches, tables, etc)
Items NOT accepted
No Commercial Dumping
No Household Trash
No Paints, Chemicals, or Oils
No Brush or Leaves
No Roof Shingles
No Tires
No Dump Trucks
No Dump Trailers
The City of Canton’s “Dumpster Days” is a great opportunity for any Canton resident to dispose of trash, unwanted items, up to 10 tires per resident and recycle many electronics free of charge at City Hall (151 Elizabeth St.) from 8 a.m. to noon the first Saturday of each month.
FREE and only open to CITY OF CANTON RESIDENTS
Items accepted
Computers/Laptops, Gaming Systems, VCR/DVD players, Stereo Equipment, Vacuums, Microwave/Toasters. Hair Dryer, Curling Iron, Tools, Wires & Cables (all types), Phones (cellphones & home phone systems), Printers/Fax machines, Washers/dryers, dishwashers and other home appliances (excluding refrigerators), Sofas, Mattresses, Dry paint
Items NOT accepted
CRT TV or Monitor (Old style tube TV's or computer monitor), refrigerators, fuel tanks, motor oil, fuel drums, household hazardous waste, antifreeze, wet paint, paint thinners, pesticides, pool chemicals or commercial waste.
If you have any questions, please contact Code Compliance Manager Merrick McClure at
770.704.1554
or
[email protected]
.
Did you know the City of Canton and Waste Management will pick up your yard waste?
CITY OF CANTON BRUSH SERVICE
City of Canton residents can call the Canton Public Works Department at
770.720.7674
to schedule yard waste, such as weeds, grass, hedge trimmings, leaves, brush and tree limbs, for pick up using the following guidelines:
Leaves, grass clippings and yard waste (small sticks and brush) should be placed in paper lawn waste bags to receive expedited service. Paper bags can be purchased at hardware and grocery stores. The use of plastic bags for yard waste is prohibited. Rocks and dirt are not accepted (including plants and shrubs with dirt attached to the root system) and should not be placed in lawn waste bags (Do not combine leaves with any brush).
A maximum of 6 bags will be collected weekly per residential property.
Loose leaf pick-up can be requested as well, but will be scheduled based on availability.
Brush and limbs must have a diameter smaller than 6” and a length no greater than 6’. The overall size of the pile shall not be taller than 6’ or wider than 6’
The City of Canton will pick up brush once a week per residential property, upon request.
Removal of leaves, grass clippings, brush and trees cut by contractors will be the responsibility of the resident’s contractor.
Do not stack yard waste in the street, blocking sidewalks, near fire hydrants, cable or utility boxes, stormwater catch basins, mailboxes or any other public utility receptacles.
City of Canton Yard Debris pick-ups must be requested by a resident. To schedule a pick up of yard debris that meets the above criteria, please contact the City of Canton Public Works Department at
770.720.7674
.
WASTE MANAGEMENT BRUSH SERVICE
Waste Management will also pick up yard waste as part of your regular weekly service with the following guideline:
Limbs must be bundled and tied with rope or string. Bundles may not exceed 30 lbs. and cannot be greater than 4' long and 4" in diameter.
Weekly limit of 8 brown recycle bags, bundles or combination of the two (not to exceed the 8 bag limit for trash and yard waste combined).
Must be at curb before
6 a.m.
on collection day.
Grass clippings and leaves must be in bags or placed loose in a separate container labeled “Yard Waste.”
ITEMS NOT ACCEPTED INCLUDE: tree trunks, limbs greater than 4" in diameter, whole trees, logs, dirt, rocks, Christmas trees.
Christmas Tree Recycling:
“Bring One for the Chipper”
The City of Canton will help you recycle your Christmas trees for FREE after the holidays.
Drop-off your live tree (without lights/decorations) at the Canton City Collection Site located at
2525 Ridge Road,
Monday
through
Saturday
,
7 a.m. to 4 p.m.
,
Dec. 26
through the end of January (site closed on
Jan. 1 and Jan. 15
for City of Canton holidays). | https://www.cantonga.gov/news/displaynews.htm?NewsID=220&TargetID=1,2,3,7,8,6,11,12,13,14,5,15,16,4,17,18,19 |
Bacteria play a very important part in nature as well as for man. The circa 5,000 species are divided into three large groups: heterotrophs, autotrophs, and mixotrophs. Heterotrophic bacteria enable the circuit of substances between the three kingdoms: mineral, vegetal, and animal. These determine the fixation of free nitrogen from the atmosphere, they participate in fermentations, soil formation, etc. Chemoautotrophic bacteria participate in the formation of sulfur and iron deposits.
Algae are present worldwide in a number of 6,000 species, with dimensions starting from microscopic ones up until a few hundred meters (the algae forming the Sargasso Sea). In the Botanical Museum, inside the three cases, there are displayed samples of all four types of algae: blue, green, brown, and red.
The fungi exhibited in this part of the Museum are inedible and poisonous. There are also displayed some phytopathogenic fungi and their main effects on the different vegetal organs as well as some epixilous fungi (that grow on trees). Merulius lacrymans, the house sponge, is very harmful, it destroys paper and construction wood, frequently causing significant damage in archives or museums. It is exhibited in the Museum, in a special case.
Lichens can be seen in case no. 37. Of the circa 17,000 species of saxicolous, corticolous, and terricolous lichens known worldwide, approximately 10% can be found in Romania. They are the first colonizers of empty and unfriendly substrates, thus contributing to their preparation for colonization with other species. Turnsole is fabricated from lichens like Rocella tinctoria; Evernia prunastri is used in the perfume industry; the reindeer lichen (Cladonia rangiferina) is an important food source for reindeer during the entire winter time.
Moss (bryophytes) are represented in the Museum by 50 species (only original material). Worldwide there are circa 20,000 species of moss, Romania's flora including circa 200 species. They are exposed within the Museum in case 38.
Ferns (pteridophyta) account for approximately 12,000 species, of which 70 are present also in Romania's spontaneous flora. In case 39 there is exposed also authentic material, with species from Romania's flora as well as of the exotic one.
Ferns can be used for multiple purposes: food, medicines (diuretics, combating of intestinal parasites, strengthening of the immune system, etc.), industrial (polishing of metal objects, tawing), etc.
Of the arborescent ferns, whose number has been considerably reduced along the years, so that today it is an endangered species, having contributed to the formation of the oldest coal deposits worldwide, the Museum holds a trunk of the fern Dicksonia antarctica, brought in 1911 from the Tasmanian Island.
Coniferae (gymnospermae) are exhibited in cases 40-44. The collection contains pressed material, cones and seeds of gymnospermae from Romania or other continents: Pinus cembra, Taxus baccata, Araucaria imbricata, Torreja, Ginkgo biloba, Ephedra distachya, E. villarsi.
Coniferae have a multitude of uses: food (seeds of Pinus, Ginkgo biloba, the arillus of Taxus seeds), medicines (ephedrine extracted from Ephedra, the juniper – diuretic and antirheumatic properties), the wood is used for manufacturing furniture and shingle; spruce wood is used for fabricating keyboards, etc.
An old, rare and interesting gymnosperm is Welwitschia mirabilis growing in the Namibian Desert of Southwest Africa as a reminiscence of the flora of 100 million years ago. The trunk has only 2 leaves throughout the plant's whole life, and their length can reach up to a few meters, being torn by the powerful winds that blow in that region. On the superior part of the trunk there are either male or female flowers, depending on the gender of the plant (in conclusion, it is a dioecious unisexual plant). Given the fact that the number of samples of Welwitschia has diminished considerably, it is actually being protected worldwide by the international laws of biodiversity preservation.
Angiosperms, the most developed plants and, at the same time, the most numerous ones, circa 250,000 species worldwide, of which approximately 3,500 are present also in Romania's flora, are displayed in the Museum inside the rest of the cases (45-77) as pressed or conserved material (leaves, flowers, fruit, seeds) of monocotyledon and dicotyledon species of Romania's flora and the exotic one. | https://muzee.ubbcluj.ro/en/collections/botanical-museum-bacteria-algae-fungi-lichens-moss-ferns-gymnosperms-angiosperms |
Registration is now open for the 2016 OpenPOWER Summit, which will take place April 5-7 in San Jose, California in conjunction with the GPU Technology Conference. With a conference theme of “Revolutionizing the Datacenter,” the event has issued its Call for Speakers and Exhibits.
The OpenPOWER Foundation is a global, open development membership organization formed to facilitate and inspire collaborative innovation on the POWER architecture. OpenPOWER members share expertise, investment and server-class intellectual property to develop solutions that serve the evolving needs of technology customers. Since the inaugural OpenPOWER Summit in March 2015, the OpenPOWER Foundation membership roster has grown from 110 members to now more than 160 members worldwide collaborating on more than 100 development projects and 1,900 applications to drive innovation at all levels of the hardware and software stack.
We were pleased with the cross-section of attendees at our inaugural summit — from hardware and software developers to researchers, from industry luminaries to tech influencers. We expect even greater participation this year with the unique opportunity to present your latest projects, and to collaborate, learn and contribute to creating the best, highest-value server solutions that meet a variety of datacenter needs,” said Gordon MacKean, Chairman, OpenPOWER Foundation.
The three-day event will include presentations and an exhibitor pavilion where members will have the opportunity to unveil their OpenPOWER-based solutions and demonstrate performance breakthroughs achieved. The event will feature a keynote address by OpenPOWER’s leadership as well as a series of presentations by technical working groups, OpenPOWER members and end users. | https://insidehpc.com/2015/12/openpower-foundation-announces-2016-openpower-summit-revolutionizing-the-datacenter/ |
Biography:
Dr. Olga Russakovsky is an Assistant Professor in the Computer Science Department at Princeton University. Her research is in computer vision, closely integrated with the fields of machine learning, human-computer interaction and fairness, accountability and transparency. She has been awarded the AnitaB.org's Emerging Leader Abie Award in honor of Denice Denton in 2020, the CRA-WP Anita Borg Early Career Award in 2020, the MIT Technology Review's 35-under-35 Innovator award in 2017, the PAMI Everingham Prize in 2016 and Foreign Policy Magazine's 100 Leading Global Thinkers award in 2015. In addition to her research, she co-founded and continues to serve on the Board of Directors of the AI4ALL foundation dedicated to increasing diversity and inclusion in Artificial Intelligence (AI). She completed her PhD at Stanford University in 2015 and her postdoctoral fellowship at Carnegie Mellon University in 2017.
Kristen Grauman
Department of Computer Science
University of Texas at Austin
Biography:
Kristen Grauman is a Professor in the Department of Computer Science at the University of Texas at Austin and a Research Director in Facebook AI Research (FAIR). Her research in computer vision and machine learning focuses on visual recognition, video, and embodied perception. Before joining UT-Austin in 2007, she received her Ph.D. at MIT. She is an IEEE Fellow, AAAI Fellow, Sloan Fellow, and recipient of the 2013 Computers and Thought Award. She was inducted into the Academy of Distinguished Teachers at UT Austin in 2017. She and her collaborators have been recognized with several Best Paper awards in computer vision, including a 2011 Marr Prize and a 2017 Helmholtz Prize (test of time award). She has served as Associate Editor-in-Chief for PAMI and Program Chair of CVPR 2015 and NeurIPS 2018.
http://www.cs.utexas.edu/~grauman/
Jonathan Ragan-Kelley
Department of Electrical Engineering and Computer Science
Massachusetts Institute of Technology
Biography: Jonathan Ragan-Kelley is the Esther and Harold E. Edgerton Assistant Professor of Electrical Engineering & Computer Science at MIT and assistant professor of EECS at UC Berkeley. He works on high-efficiency visual computing, including systems, compilers, and architectures for image processing, vision, 3D graphics, and machine learning. He is a recipient of the ACM SIGGRAPH Significant New Researcher award, NSF CAREER award, Intel Outstanding Researcher award, and two CACM Research Highlights. He was previously a visiting researcher at Google, a postdoc in Computer Science at Stanford, and earned his PhD in Computer Science from MIT in 2014. He co-created the Halide language and has helped build more than a dozen other DSL and compiler systems, the first of which was a finalist for an Academy technical achievement award.
Biography: Currently Bhabatosh Chanda is a Professor in Indian Statistical Institute, Kolkata, India. His research interest includes Image and video Processing, Pattern Recognition, Computer Vision and Mathematical Morphology. He has published more than 200 technical articles in refereed journals and conferences, authored two books and edited six books. He has received `Young Scientist Medal' of Indian National Science Academy in 1989, `Computer Engineering Division Medal' of the Institution of Engineers (India) in 1998, 'Vikram Sarabhai Research Award in 2002 and IETE-Ram Lal Wadhwa Gold medal in 2007. He is fellow of Institute of Electronics and Telecommunication Engineers (FIETE), National Academy of Science, India (FNASc.), Indian National Academy of Engineering (FNAE), and International Association of Pattern Recognition (FIAPR). | https://iitj.ac.in/icvgip2021/plenary_speakers.php |
You'll be centrally located in Vineland with a stay at Hampton Inn & Suites Vineland, convenient to Landis Theater. This family-friendly hotel is within the vicinity of Cumberland County College and Cumberland Mall.
Rooms
Make yourself at home in one of the 130 air-conditioned rooms featuring refrigerators and LCD televisions. Complimentary wired and wireless Internet access keeps you connected, and satellite programming provides entertainment. Private bathrooms with showers feature complimentary toiletries and hair dryers. Conveniences include laptop-compatible safes and desks, and housekeeping is provided daily.
Amenities
Be sure to enjoy recreational amenities, including an indoor pool, a spa tub, and a fitness center. Additional amenities at this hotel include complimentary wireless Internet access, concierge services, and gift shops/newsstands.
Dining
Satisfy your appetite at the hotel's restaurant, which serves lunch and dinner, or stay in and take advantage of room service (during limited hours). A complimentary hot/cold buffet breakfast is included.
Business, Other Amenities
Featured amenities include a 24-hour business center, express check-in, and express check-out. Planning an event in Vineland? This hotel has 2485 square feet (224 square meters) of space consisting of conference space and meeting rooms. Free self parking is available onsite. | https://www.guestreservations.com/hampton-inn-suites-vineland/booking |
Regardless of changes in the landscape due to forest management, hotter and drier conditions due to human-caused climate change make it easier for fires to spread. Observations show that climate change has already had a hand in shaping fire seasons, especially in California and the western United States.
Climate change has exacerbated naturally occurring droughts, and therefore fuel conditions.
In California, 14 of the state's 20 largest wildfires on record have all burned since 2000.
(Partain et al. 2017) find that Alaskan fuel conditions during the 2015 fire season were 34 to 60 percent more likely to occur in today’s anthropogenically changed climate than in the past.
(Yoon et al. 2016) analyze the 2014 California wildfire season and identify an increase in fire risk in the state due to human-caused climate change.
(Abatzoglou and Williams, 2016) look at the effects of human-caused temperature rise and air moisture decrease on wildfires across western US forests. They find that these human influences account for about 55 percent of observed increases in the dryness of wildfire fuels from 1979 to 2015. Human actions also contributed to 75 percent more forested area experiencing high fire-season fuel aridity and an average of 9 additional days per year of high fire potential from 2000 to 2015. The authors estimate human-caused climate change contributed to an additional 16,400 square miles (the size of upper peninsula Michigan) of forest fire area from 1984 to 2015. This nearly doubles the area expected without global warming.
A global analysis of daily fire weather trends from 1979 to 2013 shows that fire weather seasons have lengthened across 11.4 million square miles—about the size of Africa and 25.3 percent of the Earth’s vegetated surface—resulting in an 18.7 percent increase in global mean fire weather season length.
(Tett et al. 2018) find that in 2015/2016, human-caused climate change quintupled the risk of extreme "vapor pressure deficits" (VPD) in western North America. VPD measures how much water is in the air. Extreme VPDs indicate there is very little water in the air, which contributes to dryness, or aridity, at the Earth's surface and increased wildfire risk. | https://www.climatesignals.org/climate-signals/wildfire-risk-increase |
More than 1 Million citizens calling for an end to pesticides
We did it! 1,161,257 citizens have signed the European Citizens’ Initiative (ECI) ‘Save bees and farmers’, calling on the European institutions to fully phase-out synthetic pesticides by 2035 and support farmers to make the transition to a environmentally-friendly farming practices.
Thanks to the mobilization of a cross-sector alliance of civil society organisations covering the environment, health, farming and beekeeping, among whom the European networks Friends of the Earth Europe and the Pesticide Action Network (PAN) as well as the Munich Environmental Institute, the Aurelia foundation (Germany), Générations Futures (France) and GLOBAL 2000/Friends of the Earth Austria, the European Commission and Parliament must now consider turning the campaign’s demands into law1.
What are the key demands
The ECI calls on the European Commission to introduce legal proposals to:
- Phase out synthetic pesticides by 2035: Phase out synthetic pesticides in EU agriculture by 80% by 2030, starting with the most hazardous, to become 100% free of synthetic pesticides by 2035
- Restore biodiversity: Restore natural ecosystems in agricultural areas so that farming becomes a vector of biodiversity recovery
- Support farmers in the transition: Reform agriculture by prioritising small scale, diverse and sustainable farming, supporting a rapid increase in agroecological and organic practice, and enabling independent farmer-based training and research into pesticide- and GMO-free farming
1 Provided that minimum 1 million signatures from at least seven EU countries are validated by national authorities. | https://friendsoftheearth.eu/news/savebeesandfarmers-reaches-more-than-1-million-signatures/ |
Astroworld’s music festival was a chaotic riot on Friday night when at least eight concertgoers died and hundreds more were injured in a dangerous crowd crush during Travis Scott’s performance in his native Houston.
These were the people who perished, with ages ranging from 14 to 27. the crowd of 50,000 who were tightly squeezed together at NRG ParkThe venue is in a very dangerous situation with no security or medical assistance.
Still, authorities continue to search for answers what specifically caused the crushThat night was a terrible one. Instead of placing blame on drugs and music, safety experts point to another issue that could affect the likelihood of an incident like Astroworld: Crowd management.
“Just being prepared. … It’s a horrible disaster, catastrophe, but not totally surprising. What went wrong? As a society we, I suppose. Where did we go wrong and not try to prevent that?” Jim Narva, executive director of the National Association of State Fire Marshals, told HuffPost. “We have to take prevention seriously, and lives will be saved.
“This isn’t the first event in a music venue, you know, we’ve had the Station Nightclub fire back in ’03. It was the scene of a hundred deaths. The people entered a door and saw fireworks. Once inside, it was lit up, so they attempted to exit the door. People were wedged into that door and couldn’t get out and died,” he added. “But a crowd manager or crowd managers could have helped direct people. Somebody has to know what’s going on in that facility or that venue when things go wrong so they can help people get out. That’s the whole idea.”
This is the authoritative standard in crowd management. ANSI ES1.9-2020This is the definition of the term. It refers to measures that facilitate the safe movement of people in confined areas. Crowd management is prevention, and it requires security and event organizers to have an understanding of the venue’s design and operational features, as well as the characteristics of the crowd attending an event.
The standard makes sure to differentiate crowd management from crowd control, which it defines as measures meant to address a situation in which a crowd has reached the limits of safe behavior and urgent action is needed to prevent crime or injury ― in other words, when the crowd management plan was unsuccessful.
Safety experts suggest the DIME-ICE method for managing crowds and analyzing risk. The model says event organizers should consider four ways a crowd can be influenced during an event: “design” of an event space; “information,” such as communicating safety decisions with the crowd; “management” systems, like emergency plans, barricades and easily identifiable security staff; and “expectations” from both the crowd and promoters on how the event will play out.
Those four influences should then be applied to the “ICE” portion of the model, which assesses their effect on crowd activity before, during and after an event ― otherwise known as ingress, circulation and egress.
“I know with Astroworld there were a lot of concerns and comments that the emergency responders couldn’t get to those who were hurt or injured, or in some cases passing away,” Narva said. “So having adequate entrance and exits, or ingress and egress, that’s not just for the crowd, but it also helps separate that a little bit by having aisles and, well, entrances and exits and some barricades where people can’t go to try and control that crowd a little bit.
“So it’s not only for the safety of the concertgoer but also those emergency responders that are trying to respond into that mayhem and help people,” he added. “You know, they’re at risk, they can’t get in there and do their jobs. It creates an unsafe situation for both the attendees and responders. So it’s all about life safety.”
According to National Fire Protection Association’s Life Safety CodeEvents require crowd management training for large public gatherings such as auditoriums or ballrooms. An event organizer must create a safety assessment for festival-seating venues. It requires them to take into account a variety of hazards and scenarios that could pose a danger.
Houston Fire Chief Samuel Peña previously said that there were 528 police officers on site at the concerttogether with 755 private security staff. The crowd management standard requires that there is at least one audience manager for crowds exceeding 50, as well as an additional crowd manager per 250 persons. Though the number of security officers at Scott’s concert met the standards, it’s unclear how they were dispersed and how many security officers were near the stage, where the occupant load rose too high.
Live Nation, the concert promoter, has not responded to HuffPost’s request for comment on how many members of security were near the stage, how many medics were present, if any security members were specifically trained in crowd management and what the barricade configuration was near the stage. The entertainment giant also did not provide any specific steps it’s taking to change how it approaches crowd management at future concerts and festivals it promotes.
A spokesperson for the Houston Police Department did not respond to the same questions, pointing instead to information the department is posting on its Twitter account that does not answer HuffPost’s questions. Troy Finner, Chief of Houston Police Department was on Monday. released a statement saying that he had met with Scott and the musician’s head of security prior to the main event, when Finner expressed concerns regarding public safety.
Police declared the festival a “mass casualty event” about 30 minutes into Scott’s performance, saying that they asked promoters at that time to stop the concert. Police said first responders arrived just a couple of minutes after the declaration, however, Scott’s concert didn’t end until 40 minutes later. Narva explained that due to Scott’s continued concert, and crowd size, first responders took longer time responding.
Scott has earned somewhat of a reputation for chaos at his concertsHis concert energy should reflect his spirit. brand of high adrenaline, dangerous stunts and expressive rowdinessThese can cover a variety of genres.
“I have long objected to the demonization of any particular type of entertainment or crowd configuration. The music or sporting event does not cause injury ― instead it is the choices made during event planning and how people behave at the event that make the difference,” Event Safety Alliance Vice President Steve Adelman said in a statementPublished Saturday.
“At any type of event, including this one, it is worth exploring whether something said or done onstage influenced the crowd to move or respond in a way that incited the crowd crush,” Adelman said. “I worked a case a few years ago where the artists definitely caused the crowd to rush forward, and then barricades failed and people fell onto a concrete concourse below the [general admission]lawn. Incitement does happen, but one should not assume just because of the genre of the event.”
Scott, a multiplatinum rapper, has been arrested twiceAfter being charged with disorderly conduct in relation to crowd rushes during his shows, he pleaded guilty to minor charges. The first arrest, in 2015, came after he encouraged Lollapalooza festival attendees to breach security barricades and surge forward, chanting “We want rage!” in a stampede that injured a 15-year-old girl. Scott made a big splash in music, going from small gigs to teaming with hip-hop stars and major-league rappers.
2017. police arrested Scott againFor encouraging supporters to run for the stage at an Arkansas performance, one person was charged with inciting disorder. A New York City concert attendee said that the charges of inciting riot were brought against him. in an ongoing civil case Scott had encouraged others to leap from third-floor balconies and then had Scott drag him on stage.
In 2019, a crowd surge at Astroworld ― named after Scott’s 2018 album ― led to some spectators being hospitalized. Security increased fencing and barricades to keep the crowd from rushing Friday’s concert, which some concertgoers claimed made it more difficult for them to get away.
In a video statement on Instagram, Scott said that, despite acknowledging an ambulance in the crowd on Friday, he did not realize the extent of the emergency ― adding that he usually halts his concerts to ensure injured fans can make it to safety. Scott said that despite acknowledging an ambulance in the crowd on Friday, he did not realize how serious it was. He also stated that he usually halts his concerts to ensure injured fans can reach safety. continued to perform after acknowledging the ambulanceFinner also noted that officials on the scene were concerned about a possible riot if the concert was stopped early.
Peña said that some of the blame falls on Scott for failing to react fast enough, telling The New York Times that the performer is the “one person who can really call for and get a tactical pause when something goes wrong.” It’s unclear how much Scott could really see of the crush from the stage.
Scott’s representatives said on Monday that the rapper would cover all funeral costs for the victimsHe cancels his Saturday appearance at Day N Vegas and will instead perform as a guest artist. Live Nation on Monday released a joint statementScoremore and Astroworld Festival providing information on how they are cooperating with the law enforcement agencies in this investigation.
“Our staff has met with local authorities to provide information, and we have also provided them with all footage from our CCTV cameras,” the statement said. “Load out of the site and equipment is currently paused to give investigators the time they requested to walk and document the grounds. All ticket holders are eligible for full refunds.
“And most importantly we are working on ways to support attendees, the families of victims, and staff, from providing mental health counseling to setting up a health fund to help with costs for medical expenses,” it continued. “Our entire team is mourning alongside the community.”
Narva stated that it is the best thing for a promoter, venue and artist to prevent a crowd crush at concerts. | https://gt-ride.com/astroworld-a-crowd-control-disaster-heres-what-could-have-prevented-it/ |
The Best Time to Post on Facebook, Instagram, Twitter, and LinkedIn
It’s an age-old question. You’ve spent hours (or months) researching, brainstorming, creating, editing, and polishing this new post (or campaign), and now it’s time to unveil it to the world.
But wait. What’s the optimal time? Are all hours or minutes equal in the eyes of the algorithm?
No, they’re not.
That’s why we analyzed over 30,000 social media posts to see if certain days and times universally get more engagement on social media than others. Here’s a quick summary of what we found, but continue reading to find out how to find the best times to post specific to your audience, industry, and time zones.
The best times to post on social media overall is 10:00 AM on Tuesdays, Wednesdays, and Thursdays.
The best time to post on Facebook is 8:00 AM to 12:00 PM on Tuesdays and Thursdays.
The best time to post on Instagram is 11:00 AM on Wednesdays.
The best time to post on Twitter is 8:00 AM on Mondays and Thursdays.
The best time to post on LinkedIn is 9:00 AM on Tuesdays and Wednesdays.
But what do these times mean?
If you’re starting fresh on social media and don’t have a lot of past posting data or audience insights to work with, these are good posting times to start with. But they are very general. As your accounts grow, you’ll want to tweak your posting schedule to better fit your specific audience’s behavior. You may be surprised how much it differs from the general population.
Below, we show you how to find your own best times to post using the same method as Hootsuite’s own social media team.
Is there really a best time to post on social media?
Because newsfeed algorithms (especially the Facebook algorithm and Instagram algorithm) consider “recency” as a major ranking signal, posting your content when your followers are online is one of the simplest ways to improve your organic reach.
This brings us to the bad news: it’s hard to agree on a single standard “best time to post on social media.” Everyone and their uncle has done a study on industry benchmarks—but the real source of truth always comes back to your own data on your own followers.
Universal best times to post like the ones we found in our research above are best used as starting points for new accounts who haven’t built an audience yet and so don’t have anyone to test on.
Once you do have an audience though, it’s staggeringly easy to figure out the best time to post for your social media channels—especially if you have the right tools.
First, we’ll tell you how our social media team at Hootsuite found their best time to post on every social network—an audience of roughly 8 million followers. Then we’ll show you how to find yours.
The best time to post on Facebook
According to our analysis, the best time to post on Facebook is 8:00 AM to 12:00 PM on Tuesdays and Thursdays. This tracks with what the Hootsuite social team found when they dug into their own data.
For the Hootsuite social media team, the best time to post to Facebook is at 6:15 AM and 12:15 PM PST on weekdays.
We chatted with Hootsuite Social Marketing Strategist Brayden Cohen to find out how the pros calculate an optimal posting schedule.
When it comes to Facebook, past performance and follower activity are both important.
Source: Hootsuite’s Social Team
This heatmap from Hootsuite Analytics shows that the largest volume of followers arrive on Facebook around noon PST (3PM EST) every weekday. According to this, you might think Cohen would be posting at noon PST.
But that’s not the whole story. Once we take past post performance into account, it turns out that for Hootsuite’s channels, the best time to post to Facebook is at 6:15 AM and 12:15 PM PST on weekdays.
“These times are most effective for us, because this is when people tend to have the biggest gaps in their schedule and are available to check social,” says Cohen.
“It’s best to post first thing in the morning because this is when people are catching up on their newsfeeds. Lunchtime is always great because it’s when people tend to have the biggest gaps in their schedules. Just after working hours are effective too, because people are checking out what they missed over the day.”
The best time to post on Instagram
The best time to post on Instagram is 11:00 AM on Wednesdays, according to our analysis. The Hootsuite social team had similar findings when they dug into their posting history.
For the Hootsuite social media team, the best time to post to Instagram is anytime between 8 AM-12 PM or 4-5 PM PST.
Perhaps unsurprisingly, Instagram’s algorithm has a lot in common with Facebook’s. That is, recency is a key ranking signal. Which means that audience behaviour is, again, an important factor in posting times.
Taking a look at when your followers are online can help get you started.
Source: Hootsuite’s Social Team
However, online activity is not the last word in strategy.
“With Instagram, I use past performance as my guiding star, and then I review when my audience is online as a second opinion. From there, if my content isn’t performing well, I’ll test different times to post to see if that changes reach and engagement.”
– Brayden Cohen, Social Media Strategist
For Hootsuite’s social channels, this means that most of our posting times line up to early morning or lunch time in PST. In EST, that’s mid-morning (getting to the office) or evening (logging off the computer and getting on their smartphone).
The best time to post on Twitter
The best time to post on Twitter is 8:00 AM on Mondays andThursdays, according to our analysis.
When the Hootsuite social team looked at their data, they found similar (but broader) results: weekdays at 6-9 AM PST.
According to Social Engagement Specialist Nick Martin, click-throughs are the most important metric on Twitter, and Hootsuite’s analytics are clear. Tweeting during UK and East Coast office hours drives the best results in terms of clicks and engagement.
Even on weekends, mornings are still best, but he schedules posts slightly later.
“People are getting started on their day. They’re taking the morning to get caught up on articles, scroll social media for news, and get their brains ready for work. Later in the afternoon people are heads-down on projects or in meetings, and they have less time to engage.”
– Nick Martin, Social Engagement Specialist
However, Martin says that with Twitter, it’s important to be mindful that analytics focusing on the “best time to post”—i.e., whenever the most followers are online—can neglect people in other time zones.
“It’s important to sprinkle content around the clock,” Martin says, “especially if you’re a brand with a global audience. Folks in Australia are having the same problems that social media marketers on the East Coast have. If you’re from Australia, New Zealand, India, or anywhere that isn’t the UK or North America: we see you, and we’re trying to get helpful content into your feed at a time that works for you.”
To reach Hootsuite’s global audience, Martin schedules tweets at all hours—not just the “best” ones—and also creates ad campaigns to boost posts targeting other time zones and countries.
The best time to post on LinkedIn
The best time to post on LinkedIn is 9:00 AM on Tuesdays and Wednesdays.
Hootsuite’s social team found similar results when they looked at their posting data. The best time for them to post on LinkedIn is weekdays between 8-11 AM PST.
Iain Beable, Hootsuite’s Social Marketing Strategist for Europe, Middle East and Africa, handles Hootsuite’s LinkedIn presence. He tells us that while he’s traditionally seen better performance during mornings, lunch and evenings, numbers have been a bit more sporadic and spread out over the day because of the pandemic.
“The majority of our audience is in North America, so I tend to plan posts around early morning PST,” Beable says. “That catches people in EMEA in the early evening, which seems to bring us the best performance overall. We post at weekends, too, but at a reduced cadence, and later in the morning. I’ve actually been seeing improved engagement on Sunday evenings, too.”
Beable says that as far as post scheduling strategy goes, “For LinkedIn, it’s very much a data-led, test-and-learn approach to find out what works. Our schedule is mainly based on what has performed well in the past, and testing different times to see what works best.”
Beable adds that in his experience with the LinkedIn algorithm, recency is less of a consideration that quality, relevance, and trending content.
“I can post something UK lunchtime, which gets maybe a little engagement, and then as soon as North America is online, hours later, suddenly engagement goes through the roof, because the algorithm knows it’s relevant to those users. Usually our audience will still see a post near the top of their feed even if it’s a few hours old.”
How to find the best time to post on social media
Look at when your audience is most active online
Many socialmediaalgorithms prioritize recency. Why? Because people care about what’s new—especially given how frequently we check our feeds these days.
Posting when your followers are online is one of the easiest ways to work with (not against) both the Facebook and Instagram algorithms. By predicting when your followers are likely to be browsing their feeds, you maximize the chances that your content will reach and connect with them.
Meanwhile, for your Facebook and Instagram strategies, knowing when your followers are online is as simple as looking at your analytics. Hootsuite’s Best Time to Publish feature, for instance, provides a heatmap of the hours and days your followers are active.
The tool helps you use data to experiment, by suggesting optimal times to post that your brand hasn’t tried in the past 30 days.
Look at your top-performing posts from the past
You’re already optimizing your content to match your social media performance goals. When it comes time to decide when to post that content, we recommend taking an equally data-driven approach.
The first step is to take a look at your analytics tools, or social media reports, and zero in on your more successful posts for a given metric. The posts that did the best in terms of:
Awareness (i.e., posts that have high impressions)
Engagement (i.e., posts that earned impressive engagement rates)
Sales/Traffic (i.e.,posts that attracted a lot of clicks)
Next, take a look at what time of day or week you posted successful content, and see what kind of patterns form.
You can also choose to view your best times to post based on impressions, engagements, or link clicks (most tools only show you impressions).
Check out the competition
Check your competitors’ feeds to see what they’re up to. Take a survey of their high-performing posts (or even do a full social competitive analysis) and see what patterns crop up, or perhaps reverse-engineer your competitors’ strategies.
Here at Hootsuite, for instance, we’ve learned to avoid publishing on the hour, because that’s when a lot of brands post. Instead we post on the :15 or :45 mark to give our content a little breathing room.
It’s worth keeping an ear to the ground in your industry, whether you learn tactics worth emulating, or just spot some pitfalls to avoid. (You might even consider adding publishing schedules to your ongoing social listening endeavours.)
Post in your audience’s time zone, not yours
If you’re aiming to catch people during their bleary-eyed morning bed-scroll, posting at 6AM makes perfect sense. Of course, if your target audience is made up of European innovation executives, make sure you schedule that post for 6AM Central European Time (or even earlier if you want to make sure you catch Eastern Europe, too.).
At Hootsuite, our channels strive to catch people across North America (PST through EST) by posting in the morning or early afternoon, Pacific Time. For channels that also want to catch the UK, the earlier in the morning, the better.
Meanwhile, brands with a substantial audience in a specific region might consider creating a separate handle for that audience. (This may have the added benefit of allowing you to post in a target language, too.)
Another option for those of you with a global customer base is publishing content around the clock. (In which case, we definitely recommend a social media scheduler.)
Test and optimize
At a certain point, you’ve done as much due diligence as you can, and it’s time to smash that publish (or schedule) button and see what happens. But what happens if results aren’t what you’d hoped?
Some systematic A/B tests (where you post the same content at different times in order to see which time earns the best results) can be illuminating.
As Nick Martin says, “One of our mottos is “Always Be Testing”—so we are continuously testing for multiple variables, whether that’s the images we choose, copy, or what time we post at.”
Keep monitoring for changes
Social media is always changing, and so are the people who use it. For example, the exodus to remote work over the course of 2020 has resulted in more frequentsocial media use.
Habits have shifted from checking feeds during lunch to checking between zoom meetings. If your audience is changing, your strategy might need to change too.
Here at Hootsuite, for instance, we don’t actually change the times we post that often. Maybe once a quarter, according to Cohen.
But at the same time, he adds: “We look at our top-performing posts weekly to determine if there is any data in there that can provide us with insights to rework our strategy or posting cadence.”
Martin adds: “For Twitter, we check our timing analytics monthly, but they rarely shift, and when they do it isn’t dramatic. That said, we definitely review the best time to post for time-constrained campaigns. For example, we found that International Women’s Day is very popular in the UK, even more than it is in North America, so we shifted our publishing cadence earlier, to hit 9AM-12PM in the UK.”
The key is to think of time as an important, but variable, factor as you continue to optimize your social media scheduling strategy.
Key takeaways about the best time to post on social media
In conclusion, there’s no failsafe universal best time to post on social media. Your brand’s optimal time is as unique as your audience, and different for every channel.
But with the right data, optimizing your posting schedule can drive real results and improve your social ROI.
For Twitter and LinkedIn, pay close attention to past post performance
For Instagram and Facebook, look at past post performance and when your followers are online
Find out your best times to post on social media using Hootsuite Analytics’ Best Time to Publish feature. Optimize your schedule based on when you’re most likely to get the most:
The Best Time to Post on Facebook, Instagram, Twitter, and LinkedIn
EIN Presswire's priority is source transparency. We do not allow opaque clients, and our editors try to be careful about weeding out false and misleading content.
As a user, if you see something we have missed, please do bring it to our attention. Your help is welcome. EIN Presswire, Everyone's Internet News Presswire™,
tries to define some of the boundaries that are reasonable in today's world. Please see our
Editorial Guidelines
for more information. | |
Advanced Knowledge:
To practice mechanical engineering at an advanced level in their particular field of study.
Problem Solving:
To apply in-depth knowledge of their chosen field in mechanical engineering using interdisciplinary approach for problem solving.
Research and Development:
To adapt, create, transfer and assimilate current and emerging technologies into new products through relevant research.
Ethics:
To understand the social and ethical responsibilities.
Lifelong Learning:
To improve their knowledge and skills continuously for pursuing lifelong learning in the broader context of innovation and technological developments. | https://www.ist.edu.pk/me-graduate-program-learning-outcomes |
In order for The Vanguard School to continue to provide your student with the most effective tools to enhance their learning, teachers and librarians may use educational web-based programs and applications. Many of the Terms of Service and/or Privacy Policies of these applications state that, due to Federal Law, any users under the age of 13 must obtain parental permission to use their sites and often require an email address.
Based on the Children’s Online Privacy Protection Act (COPPA), we must provide parental notification and obtain parental consent before collecting personal information from children under the age of 13.
The list below highlights websites, online services and apps used by The Vanguard School that collect student data. | https://www.vfes.net/Page/1127 |
she must team up with him to escape a murderous gang of bandits."
We grew up watching animated films and recreating action scenes in the backyard. Years later, not much has changed. Now working professionally as filmmakers, we have become fatigued by the increase of poorly-crafted CGI films that Hollywood hastily produces.
After graduating film school, our team decided to return to a handcrafted aesthetic and make the film of our dreams. Every frame of Rawspace will be a hand-drawn, digital painting that pays homage to the legendary animators that inspired us.
As writers, we work to fight against harmful tropes and establish complex roles for people of all backgrounds. We also want to demonstrate that animation is not a genre, but a limitless art form that can be consumed by children as well as mature audiences. Our story is fast-paced, fun, and explores themes of isolation, realistic heroism, and coping with guilt. At its heart, the story is about two young people trying to survive in an ever-changing world, which is not an easy task when the world contains murderous bandits, time-travel, and man-eating beasts.
A “proof of concept” trailer is currently being animated using a process called rotoscoping - a technique using live-action reference footage. Then our team will finish visual development and focus on funding and casting. If you would like to learn more about the story, our process, or are interested in contributing in some way, please contact us. | https://www.rawspace-movie.com/ |
Summary: In the current grant cycle, a course shell originally developed for online advanced reading and listening courses in East Asian languages is being used to develop a prototype distributed model featuring a mix of on-line instruction and face-to-face tutorials. An experimental two-year introductory course sequence in Mandarin Chinese is being developed and taught to cohorts of students at the University of Hawai‘i and Dillard University, an HBCU (Historically Black Colleges and Universities) in New Orleans.
The UH NFLRC has been carrying out a series of interrelated distance education and distributed learning projects since 1995. Projects have included developing models for teaching languages via interactive television as well as integrated CD-ROM/Web formats. The Center has conducted several distance-delivered summer institutes, including an on-line summer institute, “Web-Based Workshops for Advanced Reading & Writing Development & Maintenance for Non-native Instructors” in 2001. The Center has fostered the development of three advanced on-line courses currently offered at the University of Hawai‘i, two in Chinese and one in Korean. An on-line Japanese course is under development and will be offered for the first time in spring 2002. The third year Chinese and Korean Web-based reading/writing and listening/reading/writing courses feature UH-developed CD-ROMs based on authentic readings and/or video clips as the “core textbook,” together with a robust interactive component in an online learning community where students perform role-play tasks, hold discussions, participate in a grammar clinic, and share compositions.
These courses have attracted considerable attention and served as prototype course shells for the development of similar courses in other less commonly taught languages in a 2001 NFLRC Summer Institute, “Developing Web-Based Foreign Language Learning Environments.” During the 2002-2006 grant cycle, the NFLRC will support the further offering of these advanced level courses through a variety of institutional arrangements. Specifically, the NFLRC will cooperate with the UH CIBER in disseminating these courses to CIBER-sponsored business schools and with the UH East Asian NRC in disseminating information about the courses to 4-year institutions that do not have advanced level Asian language courses, enabling their students to function more effectively in student exchanges, internships abroad, and overseas careers.
However, the Center receives with ever increasing frequency requests for introductory Web-based course delivery. Given the current state of the World Wide Web and its probable direction of development, however, instruction delivered exclusively through the Web is probably not yet appropriate for beginning levels of language study. Web-based delivery is appropriate for skills other than speaking, and is especially suited to higher levels of language study where learners have established a foundation of reading and writing skills they can use independently, but beginning learners have special needs for instruction in the skills of listening and speaking. Ideally, they should receive ample ongoing, real-time support from a readily available instructor, and at present the Web is unable to facilitate such support. Instead, since Web technology advances quickly, within the next few years it will certainly become much easier for on-line learners to send and receive audio and video. Even when this happens, however, it cannot be assumed that the Web will be a popular medium for synchronous, or “live,” distance instruction. Due to the universal reach of the Web and the need in instructional contexts to archive submitted materials, it is more likely that teachers and learners will interact asynchronously by emailing video and/or audio messages to each other or placing them in discussion forums (also known as threaded discussions). Under these circumstances, strong initiative and autonomy will be required from each user as he or she records and posts to the forums; teacher support will be after-the-fact rather than ongoing in real time.
A more likely delivery format for introductory language instruction involving the Web will be some form of distributed learning. The boundaries between distance education and traditional education are dissolving as both distance and non-distance classes make use of multiple technologies, especially the Web, for delivering educational resources — hence the term “distributed learning.”
One distributed learning model is a mix of face-to-face and on-line instruction to prepare students for “offline” learning. In this model of distributed learning the instructor focuses on preparing students for independent learning activities and then following up on those activities. Distributed learning is becoming a point of convergence between traditional classroom instruction and distance education as more and more traditional classroom instructors offload portions of instructional activities to the Web. In some cases, Web-based activities, whether independent (such as reading assigned websites to obtain information) or group-based (such as threaded discussion), supplant classroom time. In this model, of course, learners continue to have face-to-face time in the classroom, so there is ample opportunity for treating listening and speaking skills in a communicative format. As models for distributed learning and distance education develop further, it is to be expected that the advantages of both Web-based instruction and face-to-face contact may be realized even in distance education situations by distributing the face-to-face portion of instruction among multiple tutors. In such a model, a Web-based course serves as a central point of contact between students and instructor who are separated by geographic distance. The NFLRC proposes to develop and deliver such a model of distributed introductory language instruction combining a Web-based instructor with face-to-face language tutoring.
The first phase in the project will be the development of websites for teacher-student and teacher-tutor interaction in these courses. The Web-based resources developed for the courses will consist of two distinct tracks, one concerned with training, and communicating with the tutors who will serve as speaking partners for the students in the course, the other comprising the course sites themselves, which will provide instructions for student learning activities and will serve as locations for some of the studentsÌ learning activities as well as for testing and receiving feedback from instructors.
All materials for the performance-based sequence of instruction in first and second year Chinese were developed by Cynthia Ning of the Center for Chinese Studies, with major funding from the U.S. Department of EducationÌs Office of International Education. The first year materials, called Communicating in Chinese, were published by Far Eastern Publications of Yale University Press. They support heavily interactive work in the classroom to develop listening comprehension and speaking skills. They also support work in task-based reading and writing, based on a combination of authentic and teacher-concocted texts. The second year materials are called Exploring in Chinese. There are two major components of the set. One, called The Spoken World, is based on video segments of unrehearsed social and transactional interactions filmed in Beijing, featuring three U.S. learners of Chinese who function at intermediate to advanced levels, interacting with a wide range of native speakers in various settings. Classroom exercises accompanying the video segments provide for previewing, viewing, and follow-up speaking, reading, and writing activities, which support both skill getting (learning new vocabulary and grammar) and skill using (practice using vocabulary and grammar in simulated real-life settings). Exploring in Chinese: The Spoken World is currently being tested in a lively experimental class. The second component will eventually be called Exploring in Chinese: The Written World and will feature a selection of authentic texts, ranging from ads to essays. The series will also be published by Far Eastern Publications of Yale University Press.
The second phase of the project will be to offer these courses in experimental learning sections of these courses on the UH campus, with additional cohorts of students and tutors at two institutions on the U.S. mainland. Chinese 101-102 will be offered in 2003-04 and Chinese 201-202 will be offered in 2004-05. The designated sections of introductory Chinese at UH will be divided into groups of five students each and be taught via Web by the instructor and face to face by a local tutor. UH graduate students will provide tutorials in the fall offerings of these courses (101, 201) as a class project, and the most successful of them will be engaged (and paid) as tutors in the spring (102, 202). Tutors for the U.S. mainland cohorts will be native or near-native speakers of the target language who are not necessarily teachers of the language. They will be recruited in coordination with the partnering institutions and be paid by the local institutions. The primary function of the tutors will be to serve as conversational partners in the communicative activities that are an integral part of the materials around which the courses will be designed. Tutor training will be provided via the Web, and communication will be maintained throughout the course so that they receive clear guidance and support as they carry out their tutorials.
The Web-based courses will serve as “home bases” for students. In the instructional sequence, a series of online and offline activities (using materials such as books, videos, and CD-ROMs) in each instructional unit will prepare students for interacting with their tutors. After the students meet with their tutor, further online and offline activities will consolidate the skills gained in the unit. The sequencing of activities will be governed by established pedagogical principles, such as “background knowledge is activated before engaging with a text” and “comprehensible input precedes output.” The websites, designed using a 3-tier client/server model employing open database connectivity (ODBC), will employ widely available Web technologies including client-side scripting and streaming media. Most needed applications will be developed in-house, although the possibility will remain of using external courseware or other helper applications.
2002-03
- Develop websites for teacher-student and teacher-tutor interaction to be used in a special section of first-year Chinese (101-102).
- Recruit UH students for the experimental distributed learning section of Chinese 101-102 to be taught in 2003-2004.
- Recruit two US mainland institutions to enroll students in the experimental distributed learning section of Chinese 101-102 to be taught in 2003-2004.
2003-04
- Teach the experimental distributed learning sections of Chinese 101-102 at UH using a distributed learning model with two tutor-student cohorts at UH and two tutor-student cohorts at two US mainland institutions.
- Develop websites for teacher-student and teacher-tutor interaction in a special section of second-year Chinese (201-202).
- Recruit new students as necessary for Chinese 201-202 to be taught in 2004-2005 to adjust for attrition.
- Offer summer institute on Distance Education, Distributed Learning, and Language Instruction.
2004-05
Teach the experimental distributed learning section of Chinese 201-202 at UH using a simulated distributed learning model.
2005-06
- Continue to teach distributed learning sections of Chinese 101-102 and 201-202 to both UH students and cohorts at US mainland institutions.
- Launch plan to implement and institutionalize a first- and second-year Chinese distributed learning program nationally.
- Disseminate results of experimental distributed learning project. | https://nflrc.hawaii.edu/projects/view/2006h/ |
The name of this working group is “Industrial Innovation Liaison (i2L)” and it is part in the NanoSafety Cluster as well as in the European Pilot Production Network as a cross-linking working group. This group is bringing together all nano-safety relevant experts from pilot-line/production projects, hence, real-life and application-oriented nanosafety and safe by design expertise.
WG aims and objectives
Bringing together nanosafety experts currently working in pilot-and innovation-led projects in the “Industrial Innovation Liaison (i2L)”-WG will:
- Maximise the synergies between ongoing pilot line projects that are dealing with key aspects of nanosafety including toxicology, ecotoxicology, exposure assessment, mechanisms of interaction, safe-by-design strategies, risk assessment and standardisation, and development of nano-related safety guidance.
- Focus on the needs of industry by creating broad-reaching strategies across the sectors that industrial partners involved in the projects are dealing with.
- Generate high added value by focussing the WG specifically on the synergies gained through discussion on project findings, and how these can be translated to other sectors and/or other pilot line projects with the aim of creating general safety guidance.
- Create a common framework for the implementation of the "safe-by-design" concept in the development of new pilot plants, throughout their life cycle (from the cradle to the grave), as well as a guideline for industrial implementation.
- Contribute to bridging the existing gap between nanosafety research, research into technology development, and industry, by promoting a two-way communication channel to facilitate the understanding of the real industrial needs (EPPN-side) and promote the industrial implementation of
solutions developed by the NSC.
- Create a platform for sharing results obtained during field measurements in different worker exposure scenarios to be further able to compare existing and proposed risk assessment and remediation strategies.
- Pool together and share non-confidential data/information related to the conditions of use, risk management measures and exposure data throughout the life cycle of engineered nanomaterials, in order to provide inputs for practical and cost-effective risk management, common safety guidelines (e.g. nano2go, etc.), and safe-by-design strategies.
Progress and Outcomes to date
- Approach further potential colleagues (other funding frameworks) inviting them to contribute to this activity [ongoing]
- In parallel, colleagues have already been invited to put into an Excel-sheet their nano -related safety-tasks and -deliverables including the timing (when these actions have to be completed). This table will help to identify the best times for discussion in this WG about the findings on the safety of materials, processes, products and applications [ongoing].
- Decide on dates for meetings (in person or via TeleCon).
- The i2L-group provides compiled feedback from 22 European companies to contribute to the REACH review (Published Online: December 13, 2016).
Expected impact
- Bring the NSC research community closer together by establishing links and communication between the different WGs (especially to ensure the connection with Hazard, Exposure and Risk WGs) of the NSC, as well as cross-linking with EPPN.
- Create a discussion platform to review the state-of-the-art procedure for the Life Cycle Assessment (LCA) of nano-enabled materials/products in order to improve efficiency and to avoid duplication efforts across different projects. | https://www.nanosafetycluster.eu/working-groups/Safe-by-Design-and-Industrial-Innovation-WG9/Industrial-Innovation-Liaison-i2L-WG9-Sub-Group.html |
I believe just about everyone suffers from some type of internalized stigma – some much more than others, very much a matter of degree and the source of the stigma. That does not mean that there aren’t many people with healthy self-esteem. But many of these people, sometime in their life, experienced internalized stigma. Overcoming this stigma can and does create both wisdom and that healthy self-esteem.
Tag Archives: self-esteem
Overcoming Internalized Stigma
I have for some time written and spoken about my “internalized stigma.” That concept could also be applied to race and religion, for all sorts of people, from the caste system in India to poor people globally.
It’s a matter of low self-esteem due to society’s view of you, or more pertinently, your own view of yourself through that eternal prism. This also pertains to gender, appearance, and so many human qualities.
What is the solution to these external factors which are then internalized? Some of these difficult stigmas can be overcome if one by one, million by million, billion by billion, we come to realize through faith that each of us and all of us have a “little piece of God” since the dawn of humankind.
Since 1963 I have lived with and eventually overcome the internalized stigma of bipolar disorder, and whatever other mental difficulties I received through my environment. My experience was that building genuine self-esteem with humility and without arrogance was no easy task with mental illness. I suspect this would be the same for others, whether they are overcoming stigmas associated with gender, race, religion and other human conditions.
We humans tend to label people far too quickly. The reality of it is that we are much more alike than we are different. I believe one essential key to overcome humankind’s toughest problems is to reach out globally to invoke a faith that each of us and all of us have a “little piece of God.” Thus, we must be kind to ourselves and all others, including those that don’t fit our perceptions of “our kind of people.” After all, we are all God’s children and we should not judge others with bias and prejudice, especially from appearances alone.
Government and charities can help in terms of health and education. But only business can solve the world’s poverty, especially for the 2.7 billion people who are living on $2 or less per day. Gandhi stated that “violence begets violence.” I fully agree. The reverse is true, too, as I have written: “Kindness begets kindness.”
I want to be, and it is my calling to be, a pathfinder toward Heaven on Earth, whether that involves being a public servant or serving like Gandhi did. That will be up to others to assess. I thank God for the opportunity to serve in whatever I am lead. | http://old.johnewade.com/tag/self-esteem/ |
Northwest Indiana Medical Malpractice Lawyer
What is Medical Malpractice?
We receive phone calls all the time from people with questions about a medical malpractice claim throughout Northwest Indiana. The person usually calls after they or a family member suffered a bad result or death with a healthcare provider, and they are wanting an answer to what happened.
We will start the discussion of what medical malpractice is by looking at one Indiana Jury Instruction. A jury instruction is a statement of law that is provided to the jury who hears a medical malpractice case. The jury instruction says,
“A medical specialist is one who devotes special attention to an ailment and its treatment, consistent with the state of scientific knowledge at the time. A physician employed as a specialist must exercise the same degree of care and skill that would be exercised by a specialist in the field.”
The key to this statement is that a doctor must use the same degree of care and skill as similar doctors – this is called the “standard of care.”
Medical malpractice occurs when a healthcare provider deviates from the applicable standard of care by something that he/she did or by something that he/she failed to do. You may also hear the terms “breached the standard of care” or “negligence.”
Additionally, Indiana law requires that the injured person prove that the healthcare provider’s breach of the standard of care caused the injury.
Medical Malpractice is not:
- A bad result in and of itself
- An unforeseen result
- A normal risk or complication of a medical procedure
- A bad bedside manner
- A failure to provide information to a patient or the patient’s family
Do You Have an Indiana Medical Malpractice Case In Northwest Indiana?
You or your family member has suffered significant injury following a medical procedure or the doctor failed to diagnose a long-standing condition and now you learned the cancer has spread and you’re dying, do you have a medical malpractice case?
The first two questions that Guy DiMartino will ask you if you’re asking if you have a medical malpractice case is? (1) what do you think the doctor did wrong? (2) how did the malpractice cause injury or death?
Many people can answer the first question easily. They can rattle off a litany of the things the doctor or hospital staff did wrong. However, when the person is asked to link the alleged malpractice to the patient’s injury or death, the person does not have an answer.
It is important for any medical malpractice lawyer to be brutally honest with a potential client about the facts of their case. The medical malpractice attorney may ask difficult questions, and play “devil’s advocate”. At times this can make the prospective client think that the attorney is not on their side, this isn’t true. It is much better to hear about the weaknesses in a potential medical malpractice case up front rather than five years later after you have spent thousands of dollars.
You see, as a patient or the patient’s family in a medical malpractice case, has the burden of proving (1) that the doctor owed the patient a duty of care; (2) that the doctor breached the standard of care (committed malpractice); (3) that the malpractice caused the injury or death; and (4) damages or loses occurred because of the injury. If any of these elements are missing, an injured patient should not bring a medical malpractice claim.
The more experienced the medical malpractice lawyer has; the easier it will be to make preliminarily determination if the elements of an Indiana medical malpractice claim are present.
Jumping Through the Hoops of Making a Medical Malpractice Claim
Northwest Indiana medical malpractice claims are governed by the Medical Malpractice Act (“MMA”). In the 1970s Indiana’s governor was a medical doctor. During this time, the legislature perceived a “medical malpractice crisis” and the forerunner of the current statute was placed into law. The law has the following components: (1) the patient compensation fund; (2) a statutory cap on all damages which is now $1,800,000; and (3) the Medical Review Panel process.
In order for a healthcare provider to gain the protections of the Act, they have to be a “qualified health care provider.” A physician becomes a qualified health care provider by purchasing a medical malpractice insurance policy in the amount of $ 500,000, and paying a surcharge to the patient compensation fund. The surcharge is determined by the commissioner of the Indiana Department of Insurance. If a doctor practices in Indiana and does not pay the surcharge to the patient compensation fund, he is not entitled to the protections of the Act, which include the medical review panel process,$1.8 million dollar cap on damages, and a limitation on attorney’s fees.
How Long Do You Have to Start a Medical Malpractice Claim
The statute of limitations in Indiana for medical malpractice is 2-years from the date of the occurrence. What this means is that if a doctor committed practice during your January 1, 2023 surgery, you have until January 1, 2025 to start your medical malpractice claim.
This may sound straightforward, but it really isn’t. What happens if you don’t realize that the doctor committed malpractice until after the 2-years. Well, in the past, Indiana law was clear that you wouldn’t be able to bring a case. Nowadays, it will depend on the specific facts of the case, and you may be able to get the statute of limitations extended. What does this mean? If you think you or a family member may have a medical malpractice claim, consult a lawyer as soon as possible.
Starting an Indiana Medical Malpractice Claim
Okay, you hired a lawyer. The medical documents were reviewed, and you and your lawyer decide to bring a medical malpractice claim. What’s next?
The Medical Review Panel Process
A malpractice claim begins with the filing of a proposed complaint with the Indiana Department of Insurance. The panel process begins when a party requests the formation of a panel. The panel is composed of one attorney and three doctors. The attorney acts as the chairman of the panel but he does not deliberate.
Prior to the formation of the panel, the parties will try to come to an agreement regarding the medical specialties of the panel members if there is more than one defendant. Once the parties come to an agreement, each party will submit the name of a doctor licensed in Indiana. As a matter of course, the other party strikes the name of the physician submitted by the other side. Each party has two strikes.
Next, the panel chairman will select the names of three prospective members, and each party will strike one. The one doctor left will be appointed to the panel, and the chairman will then select another three names of prospective panel members, and each party will strike a name off of the list. Once two panel members are chosen, they will pick a third panel member. Again, the parties have the right to strike the third panel member picked by the other doctors.
Once the panel is chosen, the chairman will coordinate a briefing schedule. Each party will put together their evidence and prepare a written submission, which is supposed to be reviewed by the panel.
The Indiana Medical Malpractice Act requires the panel to render an opinion within 6 months of time that the last panel member is chosen; however, these dates are routinely extended because of the various scheduling issues.
You can check a doctors’ performance on medical review panels online:
- www.indianapcf.com/index/aspx
- Click search for providers
- Click the bubble “individual”
- Type in: guy dimartino
- Select my name and select panel
- You will see that one panel is listed and I found for the healthcare provider
- On the other two cases, which are not online, I believe I also found for the healthcare provider
- In the next session, I will provide you an insider’s view of the panel process from a participant’s perspective
The Medical Review Panel is Biased Against the Patient
The Indiana medical malpractice review panel process from a Doctor’s perspective. The doctor will receive a letter from the panel chairman informing her that she has been appointed to the medical review panel. After a year or two the doctor will receive a packet of information from the attorneys. The packet will contain medical records and written submissions from each party. The doctor is supposed to review all the information.
Next, the panel chairman will schedule a meeting of the members. In a majority of the cases, the meeting is held by conference call. The doctors discussed the issues for somewhere between 30 minutes and an hour in the panels in which I participated.
The typical panel conference goes something like this:
- Dr. X, “I feel bad that Dr. Defendant is going through this.”
- Dr. Y, “Yeah, it could be anyone of us.”
- Dr. Z, “This happened to me a few years, and the patient’s attorney was a real jerk.”
- Dr. X, “You bet, I really hate attorneys.”
- Panel Chairman: “Doctors have you reached a decision.”
- Dr. X, “I wouldn’t have done so and so like Dr. Defendant but the patient didn’t conclusively prove to me that Dr. Defendant was negligent.”
- Dr. Y, “I agree, Dr. Defendant could have done a better job, but he wasn’t negligent.”
- Dr. Z, “What about so and so, did you look at this Dr. X and Dr. Y.”
- Dr. X, “I did, and Dr. Defendant could have done a better job, the patient shouldn’t have died, but I’m not convinced that he was negligent.”
- Dr. Y, “I agree.”
- Panel Chairman: “Okay doctors, I thank you very much for your service on the panel; I’ll circulate the opinion for your signature stating that Defendant doctor was not negligent.”
Within a week, the doctor will receive an oath and a copy
of the opinion, which reads: “The evidence does not support the conclusion that the defendant or defendants failed to meet the applicable standard of care as charged in the complaint.”
Under the Act the medical review panel may find one of the following:
- “The evidence supports the conclusion that the defendant or defendants failed to comply with the appropriate standard of care as charged in the complaint.” This find equates to malpractice. A very small percentage of medical review panels arrive at this decision. Occasionally, one out of the three will stand firm and find malpractice.
- “The evidence does not support the conclusion that the defendant or defendants failed to meet the applicable standard of care as charged in the complaint.” This opinion means the panel found no malpractice. This opinion occurs most of the time, like the above example.
- “There is a material issue of fact, not requiring expert opinion, bearing on liability for consideration by the court or jury.” With this opinion, the medical review panel does not rule. This type of opinion is infrequent and will usually occur when there is a significant dispute regarding the facts of the case.
- “The resultant conduct wasn’t a factor of the resultant damages.” This is the type of opinion that plaintiffs see when the doctor’s conduct was so negligent that they must find malpractice. Instead, the panel rules that the doctor committed malpractice, but so what; the injury or death was not related to the malpractice. For instance, I recently received a panel opinion that said the doctor was malpractice in his handling of advanced cardiac life support, but it didn’t matter. In essence, the panel said that even if the doctor would have done everything right, the patient still would have died.
The medical review panel process is the reason that most malpractice cases in Indiana do not settle short of trial. You see, most panels find for the doctor, so the insurance company and doctor have a sense of security.
How does a negative medical review opinion impact a lawsuit?
Once the medical review panel opinion has been rendered, a plaintiff has 90 days in which to file a lawsuit in court. Your attorney will consult with you after the panel opinion and discuss the pros and cons of filing a lawsuit. Some medical malpractice attorneys will sign a client up and then dismiss the client when they get a negative panel opinion.
At this point in time, the victim or his family will decide if they want to continue or drop the case. If they decide to continue, they will have to scramble to find another attorney. Beware! Most Indiana medical malpractice lawyers will not accept a case that has been handled by another attorney for years through the medical review panel process.
You may ask; how can I file a lawsuit once the medical review panel has ruled against me? The answer is as follows: the medical review panel opinion is not conclusive; however, you must have a doctor in your camp who is willing to testify that the doctor committed malpractice and the malpractice caused the injury or death.
The panel opinion will be the defendant doctor’s badge of honor at trial because the panel opinion is admissible evidence in trial. The jury will be instructed that it can give the panel opinion as much weight as it sees fit after hearing all the evidence.
A negative medical malpractice panel opinion is the biggest uphill battle and the reason why pursuing an Indiana Medical Malpractice claim is so difficult. Think about it, at trial the defendant will be starting with at least 4 doctors (3 panel members and himself) that will testify that he did everything right. It has been my experience, that a 3-0 panel opinion is an obstacle that can be overcome with a strong case and an experienced attorney. It has also been my experience that juries will see through the panel process when the facts and the medicine support the injured patient’s claim.
Despite what state legislature said when it wrote the Indiana Medical Malpractice Act, the medical review panel process is protectionist of the medical profession. Whether it is planned this way or just the inherent bias of doctors giving the benefit of the doctors, I can’t say.
Filing an Indiana Medical Malpractice Lawsuit
An injured patient or their family cannot file a lawsuit naming the doctor or hospital until the medical malpractice review panel process is done.
A victim of medical malpractice can suffer serious harm, injury and death. Society has recognized a victim’s right to sue for damages caused by the negligence of another person for over 100 years. In tort law, negligence is defined as a breach of the duty of care. The question that is asked is whether the defendant acted as a reasonable prudent person under same or similar circumstances.
In the medical malpractice area, negligence or malpractice is a deviation from the applicable standard of care. Specifically, the question asked is, did the doctor depart from good and accepted medical practice?
The law allows a victim of medical malpractice to be compensated for the harms and loses that are a result of the negligence. Compensation is the right to be paid for something that is owed.
How does a medical malpractice victim seek compensation for injuries?
- Call an experienced Indiana medical malpractice attorney. The attorney will consult with you and get your story. If the attorney believes there might be a case, he will agree to investigate the claim. At first, the attorney will only be concerned with the liability aspect of the case so he will either ask you to get the pertinent medical records or have you sign a release so he can get the medical records.
- If there are pertinent witnesses the attorney will take their statement(s). The closer to the event the statement can be taken, the better because recollection fades over time.
- Once the attorney receives the pertinent medical records, either he will review them or have them outlined by a legal nurse consultant. If the attorney is familiar with the medicine and issues, he may be able to make a decision as to the potential negligence.
- Expert witness retention. At some point in time, either before the medical review panel process or shortly thereafter, the attorney will retain an expert witness. Usually, this witness will be the same specialty as one or more of the defendants. If it is a medical condition that is treated by a variety of medical specialties, the expert will be somebody who regularly handles the medical condition. When the attorney has retained an expert, he has made a significant monetary commitment to the case because experts are not cheap.
- Once the medical malpractice attorney determines that the case is one that should go forward. She will file a proposed complaint with the Indiana Department of Insurance (IDOI). The IDOI will serve the healthcare provider with the proposed complaint. When the healthcare provider receives the proposed complaint, she will forward it to her medical malpractice insurance carrier. The insurance carrier will hire a defense attorney and this attorney will enter his appearance at the IDOI.
- The filing of the proposed complaint begins the medical review panel process and stays any statute of limitations. The medical review panel process takes years. See Chapter V for a complete description of the medical review panel process.
- Once the medical review panel renders a decision, which is typically a 3-0 decision for the doctor and against the patient, the patient and their lawyer will have to decide whether to file a lawsuit. The lawsuit must be filed within 60-days of medical review panel opinion. If there is a 3-0 panel decision against the patient, the must have an expert retained and ready to go to keep the case from being dismissed by the court.
- If the client and attorney agree to continue with the case, a complaint will be filed in the county where the negligence occurred. For instance, if the malpractice occurred in Michigan City, Indiana, the complaint will be filed in the LaPorte Circuit or Superior Court.
- A copy of the complaint will be sent to the defendant(s) attorney(s) and the case is off to the races
- If the defendant(s) had a panel opinion in his/her favor, as soon as they receive the complaint, they will file a motion for summary judgment (asking the court to dismiss the case). In support of the motion, the defendant will attach the medical review panel opinion stating that the doctor did nothing wrong. At this point in time, the victim has to show their hand and file an affidavit of his expert witness who disagrees with the panel opinion. If the affidavit is in proper form, the court will deny the defendant’s motion and the case will proceed.
- From the time of the filing of the complaint, until the time of mediation (a confidential settlement conference), the case will be in the discovery phase. During discovery, the parties exchange additional information that was not exchanged during the medical review panel process. The most important aspect of discovery from the client’s point of view will be the client’s deposition. The following tools are utilized during the discovery phase:
- Interrogatories: Written questions that are served to parties only and answered under oath.
- Request for Production of Documents or Inspection of Property: The parties will exchange documents and sometimes may have to inspect a premises or evaluate a piece of medical equipment.
- Deposition: Is a statement that is given under oath. Depositions are directed at parties, persons who are not parties that may have information regarding the case, and expert witnesses.
- CME/IME: The defendant may request that the client be examined by a doctor of his choosing. Don’t worry, we will explain the process and most of the time video the proceeding.
- All courts require the parties to go to a confidential mediation conference. The parties agree on an independent mediator to conduct the conference. Anything that is said during mediation cannot be used at trial. Indiana medical malpractice insurance companies do not settle cases when there is a 3-0 panel against the patient so if mediation will be fruitless the parties can motion the court to dispense with the requirement.
- Many courts will not give a trial date until mediation is completed or dispensed of by court order.
- Trial: This is the culmination of the case where a jury of six or seven peers hears the evidence and renders a decision.
- Post-trial Motion(s): A jury verdict is not necessarily the end of the case. If a party believes there was error committed by the judge during the proceeding, he can file a post-trial motion called a Motion to Correct Errors. If the party does not get the relief that he/she is looking for in the trial court, it can be appealed to the Court of Appeals.
- Court of Appeals: The court of appeals will review the trial record, briefs and render a decision affirming the jury verdict or overturning the jury verdict.
Sample Fact Patterns of Medical Malpractice Cases
Below is a list of some of the types of cases that I have been involved in either on behalf of a doctor or hospital (in my defense days) or on behalf of an injured or deceased patient in Northwest Indiana. Whether a healthcare provider is determined to be at fault in a malpractice case is dependent upon the specific facts of the case. Some of these illustrations are known risks and complications of the medical procedure, but the healthcare provider failed to take the risk into account or utilize techniques to minimize the risk or complication.
- An emergency room physician who failed to timely perform a CT of the head, which would have diagnosed a subdural hematoma.
- An emergency room team of healthcare providers that failed to timely draw blood and urine from a pediatric patient who died after he was in the emergency room for six hours.
- An emergency room physician, cardiologist and pulmonologist who failed to timely diagnose a pulmonary embolism.
- An emergency room physician who failed to timely diagnose an abdominal aortic aneurysm.
- An emergency room team of healthcare providers that failed to diagnose an impending heart attack.
- An emergency team of healthcare providers that failed to order a STAT ultrasound in a patient who had a splenic aneurysm.
- An internal medicine physician who diagnosed a patient with a knee problem that ended up being a pulmonary embolism.
- A cardiologist who allegedly misdiagnosed a nuclear perfusion heart scan that showed inferior wall ischemia.
- An internal medicine physician that did not report a positive biopsy finding on a patient’s prostate, which lead to a 9-month delay in treatment.
- A family practice physician that failed to order a breast biopsy when the physical exam findings were consistent with breast cancer, but the mammography and ultrasounds were inconclusive.
- A cardiologist that failed to timely monitor a patient’s INR when on Coumadin (Warfarin), a blood thinner, and the patient died from a hemorrhagic stroke.
- A cardiologist that utilized an axillary approach when performing a catheterization of the lower extremity arteries, which damaged the nerves in the shoulder where the axillary artery is located.
- A cardiologist that injured the iliac artery during an angiogram of the heart, which required the patient undergo a femoral artery-femoral artery bypass.
- An anesthesiologist that injected the spinal cord when performing a cervical facet joint block.
- A bariatric surgeon that failed to properly instruct a patient on proper nutrition following the surgery. The patient developed a brain condition because of a vitamin B deficiency.
- A bariatric surgeon that failed to timely diagnosis a breakdown of the anastomosis leading to peritonitis and death.
- A bariatric surgeon that failed to timely diagnosis a breakdown of the gastric pouch.
- A general surgeon that injured the common bile duct during a laparoscopic cholecystectomy (gall bladder surgery).
- A midwife that allowed a mother’s perineum to rip causing an anal fistula and permanent bowel incontinence.
- A urologist that injured the patient’s duodenum during a laparoscopic nephrectomy(removal of kidney), and failed to timely diagnosis peritonitis that led to death.
- A plastic surgeon that was sued for extensive scarring and infection following breast augmentation and liposuction.
- A pediatrician that allegedly failed to refer an adolescent to a cardiologist for long Q-T syndrome (a cardiac arrhythmia).
- A gastroenterologist that allegedly failed to properly follow-up with a patient who complained of abdominal pain following a colonoscopy that perforated the bowel.
- A chiropractor that was sued for failing to timely diagnosis and refer a patient to a surgeon for an extruded lumbar disc that resulted in cauda equina syndrome, which is a medical emergency.
- A chiropractor that allegedly herniated a cervical disc during manipulation.
- A chiropractor that allegedly caused dissection of the vertebral artery with a cervical adjustment.
- A podiatrist that failed to properly perform a bunionectomy leaving a short metatarsal.
- An obstetrician that failed to properly handle a shoulder dystocia resulting in an avulsed cervical nerve root and Erb’s palsy.
- An obstetrician that failed to timely perform an emergency cesarean section when the baby’s fetal heart rated noted late decelerations.
- An obstetrician that failed to timely perform an emergency cesarean section when the fetus was in distress because of placental abruption.
- A general surgeon who performed a tonsillectomy & adenoidectomy and damaged a major blood vessel in the throat of a child.
- A pediatrician and urologist who failed to timely diagnose nephrotic syndrome.
- A jail doctor that failed to timely diagnosis and refer an inmate who went into acute renal failure from rhabdomyolysis.
- A prison doctor who failed to timely diagnosis and refer an inmate with a head injury and acute renal failure following an altercation.
- A prison doctor that failed to properly treat an acute asthma attack that resulted in the death of an inmate.
- A prison doctor that failed to timely diagnose a patient’s blood clot.
- A spine surgeon that injured the spinal cord while performing neck surgery.
- A spine surgeon that caused cauda equina syndrome when performing low back surgery.
Medical Malpractice Causing Death – Should You Get An Autopsy
Indiana Medical Malpractice Lawyers always tell clients that the sooner you retain an attorney the better it is because evidence gets destroyed or stale. This holds true when somebody dies because of medical malpractice. Most people will not think of consulting a medical malpractice attorney until sometime after the injured person has died and was buried. The issue of whether an autopsy should have been done has come up numerous times so I will provide my thoughts on the subject.
An autopsy is a post-mortem examination of the body. The medical examiner or pathologist will evaluate the gross structure of the body and organs as well as the microscopic structure of the organ systems. Additionally, she may sample and test certain bodily fluids.
Autopsy can be used as a sword and a shield. At times, it can help prove cause of death in a case. Other times, it can be inconclusive and hamper the prosecution of a medical malpractice claim.
Here is an example of the dilemma. Let’s look at a claim for failing to timely diagnose cancer. Generally, the earlier cancer is diagnosed the greater the chance of survival. The patient ends up dying from the cancer and an autopsy is performed. During the autopsy, the pathologist finds other disease processes, which would limit the decedent’s life expectancy. The doctor or hospital’s lawyer will be able to take the position that even if the cancer was diagnosed timely and treated, the decedent had other disease processes that would have cut short his life.
On the other hand, I have seen autopsies that really solidified the cause of death. In one case, the patient’s lawyer’s theory of liability was unreasonable force by law enforcement officers that caused a medical condition, which was not timely diagnosed. The autopsy findings showed severe muscle breakdown, bruising and organ damage in multiple areas of the decedent’s body that was consistent with blunt force trauma.
In another medical malpractice case, the issue was whether the patient died of an unexpected acute heart attack or a pulmonary embolism (blood clot that travels to the lungs). The autopsy findings noted multiple blood clots in the decedent’s lungs, which supported pulmonary emboli instead of a heart attack as the cause of death.
Generally, if I was consulted by a family member and asked if an autopsy should be performed, and there was no religious objection, I would recommend that it should be performed if there is a question regarding cause of death. Autopsy findings may provide the cause of death that would allow us to work backwards to find out exactly what happened. An autopsy may also answer questions that family members may have regarding the death and provide closure.
Chiropractic Malpractice Cases in Indiana
In 2022, there were over 68,000 chiropractors in the United States, making it the second largest healing profession. Chiropractors are licensed in all states.
The Definition of Chiropractic in Indiana
Generally, chiropractic physicians deal with the structure and function of the body. Under chiropractic principles, pain, dysfunction and/or disease are caused by an interruption of the nervous system because of a subluxation (a vertebrae not in proper alignment) or a fixation (a vertebrae that is not function properly). At the heart of all chiropractic techniques is the adjustment or manipulation. The adjustment attempts to return the vertebrae back to its proper alignment so that the region of the spine will function properly.
Indiana law defines chiropractic as: “Chiropractic” means the diagnosis and analysis of any interference with normal nerve transmission and expression, the procedure preparatory to and complementary to the correction thereof by an adjustment of the articulations of the vertebral column, its immediate articulation, and includes other incidental means of adjustments of the spinal column and the practice of drugless therapeutics. However, chiropractic does not include any of the following:
- Prescription or administration of legend drugs or other controlled substances.
- Performing of incisive surgery or internal or external cauterization.
- Penetration of the skin with a needle or other instrument for any purpose except for the purpose of blood analysis.
- Use of colonic irrigations, plasmatics, ionizing radiation therapy, or radionics.
- Conducting invasive diagnostic tests or analysis of body fluids except for urinalysis.
- The taking of x-rays of any organ other than the vertebral column and extremities.
- The treatment or attempt to treat infectious diseases, endocrine disorders, or atypical or abnormal histology. IC-25-10-1.
Types of Chiropractic Malpractice Cases
Stroke: One of the most devastating injuries reported following a chiropractic adjustment is stroke. There are different types of strokes, which include (1) occlusive (a blood vessel closes off and the area supplied by the blood vessel does not receive blood; and (2) hemorrhagic (a blood vessels breaks and bleeds in an area of the brain.
If a patient is going to suffer a cerebral vascular accident following spinal manipulation (adjustment) in the neck, it is usually going to be because of a problem with a vertebral or carotid arteries. Vertebral or carotid artery dissection are difficult to diagnose until it is too late.
The vertebral arteries travel up the sides of the cervical vertebrae and bring blood to the back of the brain from the carotid artery. If a patient has blood clots or plaques in the vertebral artery the manipulation can loosen them up and they can travel to the brain and cause a stroke.
Just because a patient suffers a stroke following manipulation doesn’t mean there was malpractice. Your medical malpractice attorney will need to determine the following:
- Did the chiropractor determine if the patient had risk factors?
- Informed consent? What did the chiropractor explain about the treatment before the patient consented to undergo treatment?
- What type of adjustment did the chiropractor perform? There are numerous manipulative therapy techniques.
- How did the chiropractor respond to the situation when it occurred?
- Was the stroke transient or did the patient suffer permanent injury?
Herniated Disc: Discs are located between all vertebrae of the spine except the first and second vertebrae in the neck (cervical). The discs are rings of cartilage with a fluid filled center called the nucleus pulposis. The discs act as shock absorbers to the spine; however, if the cartilage cracks the nucleus can seep through the crack and bulge, herniate (protrude), and extrude (sequester). Generally, discs are resilient to axial (up and down) pressure on the spine. However, discs are susceptible to injury from rotation and lateral (side) bending of the spine at the same type.
The following malpractice issues exist regarding chiropractic manipulation and herniated discs:
- Did the chiropractic physician cause the disc herniation?
- Did the chiropractor perform a type of manipulation that was contraindicated because the patient had a prior disc herniation?
- Did the chiropractor fail to timely diagnose cauda equina syndrome, which is a medical emergency?
Below is a list of other types of cases that can be due to chiropractic malpractice:
- Failing to recognize that the patient has a condition in which spinal manipulation is contraindicated.
- Failing to timely diagnose a medical condition that is present on an x-ray that is taken and interpreted by the chiropractor. For example, lung cancer or bone cancer.
- Performing an adjustment or manipulation in a careless manner causing injury.
- Failing to timely refer the patient to another medical specialty.
- Practicing outside the chiropractic scope of practice within the specific state.
Failing to Timely Diagnosis a Heart Attack in an Emergency Room
How does a healthcare provider (years ago I would have written doctor, but now, it is likely that the patient will be taken care of in the emergency room will be a nurse or a physician’s assistant) fail to diagnose a heart attack?
Usually, in one of the following two ways:
- Failing to diagnose an impending or ongoing heart attack.
In this typical fact scenario, a patient will go to an emergency room complaining of pain in the chest or a stomach ache. The patient may have any of the following symptoms:
- Chest pain that may radiate into the shoulder, arm or jaw.
- Chest pain that may radiate from the chest to back.
- Sweaty and clammy.
- Shortness of breath.
- Indigestion and bloating.
- Stomach pain.
A heart attack (myocardial infarction) occurs when heart cells die because of disrupted blood supply. The heart’s job is to pump deoxygenated blood to the lungs so the blood can get oxygen, and to pump oxygenated blood to the rest of the body. The heart being an organ also has its own blood supply. The coronary arteries bring oxygenated blood to the heart muscle. When an artery that comes off a coronary artery becomes blocked, the heart muscle supplied by that blood vessel dies (infarction).
Sometimes when a patient goes to the hospital with atypical chest pain, an upset stomach or back pain, the healthcare provider will fail to work the patient up for a heart attack and misdiagnose the patient with gastritis. The problem occurs when the patient is released from the hospital and dies within a short time.
2. Failing to properly interpret diagnostic testing.
The standard of care requires a healthcare provider to rule out a heart attack when a patient presents to the emergency room with chest pain and cardiac risk factors. An EKG (electrocardiogram) is a test that measures the electrical activity of the heart. An EKG can show specific patterns if a patient is having a heart attack or has damaged heart muscle from a past heart attack.
Stress tests may also be used to determine if a patient is experiencing decreased blood supply to certain areas of the heart. Finally, the healthcare provider will order serial (repeated) enzyme testing. This test looks for enzymes within the blood that are supposed to be in the heart cells. When heart cells die, the enzymes will travel into the blood and will be detected by the test.
If the healthcare provider improperly interprets EKG or stress test or fails to order serial enzyme testing, the heart attack can be easily missed.
When investigating a potential failure to diagnose a heart attack claim, an Indiana Malpractice Lawyer has to determine the following:
- If the patient would have been timely diagnosed with a heart attack, what treatment would have been performed? Would the healthcare provider have placed the patient on blood thinners and nitroglycerin? Would the healthcare provider send the patient for an angiogram/angioplasty (test that visualizes the arteries/clears blockage and places stent)?
- Would the patient have had elective or emergency coronary artery bypass surgery? In this surgery, the doctor uses a vein from either the leg or the chest and bypasses the blood vessel that is clogged. This allows blood to get to the area of the heart that was supplied by the blocked artery.
- If elective bypass surgery was done and it took care of the problem, would the patient have ultimately had the heart attack? If the answer to this question is no, the patient’s medical malpractice case becomes stronger because timely diagnose and referral to surgery would have avoided the heart damage.
A heart attack may be preventable. It is important that the client let the lawyer know the exact complaints the patient had when she consulted the healthcare provider and the type of treatment the patient received.
Medical Malpractice At Birth – Shoulder Dystocia
Shoulder dystocia occurs during the birthing process when the baby’s shoulder gets stuck behind the pubis bone. Healthcare providers are schooled on the proper procedures to utilize when they encounter a shoulder dystocia. However, instead of staying calm and dealing with the dystocia in an orderly fashion, some healthcare providers will panic and traction the baby’s head while another healthcare provider will put pressure on the mom’s abdomen (fundal pressure). When traction to the head is applied, it can easily tear (avulse) nerve roots in the neck. The nerve roots in the neck supply the muscles of the arm and hand, and if they’re damaged, the baby will lose function in the upper extremity.
Risk factors for shoulder dystocia include: (1) gestational diabetes;(2)high birth weight (macrosomia); or the(3)use of a vacuum extractor or forceps during birth.
When confronted with a shoulder dystocia, there are several maneuvers the healthcare provider should utilize in successive fashion to free the baby’s shoulder. The following procedures are at the healthcare provider’s disposal:
Suprapubic Pressure: This is applied at the pubic bone, not the top of uterus. The pressure may free the shoulder from behind the pubic bone and allow the baby to be delivered without injury.
McRobert’s: The mother’s legs are flexed toward her shoulders as she lies on her back. This expands the pelvic outlet and can free up the baby’s shoulder. One study showed that this alleviated 42% of all cases of shoulder dystocia and allowed for birth of the infant..
Wood’s Corkscrew: The healthcare provider places his/her finger behind the shoulder and pushes 180 degrees.
Gaskin: If the mother has not had an epidural, she can be asked to go on all fours. This changes the diameter of the mother’s pelvis and will sometimes free the baby’s shoulder.
Rubin: This is similar to Woods Corkscrew maneuver. The healthcare provider puts two fingers behind the baby’s shoulder and will push towards the baby’s eyes. This procedure attempts to line up the baby’s shoulders, to allow for delivery.
Clavicle Fracture: The healthcare provider will break the baby’s collar bone, which will cause the bone to collapse and shrink the size of the shoulders.
Zavenelli: The healthcare provider will push the baby’s head back inside the vagina and convert to a caesarean section. This procedure is rarely done and is riskier than the others.
Years ago, it was in vogue for hospitals and birthing centers to allow parents to videotape the birth of their child. However, most hospitals will no longer allow this because a number of plaintiffs were able to prove that the healthcare providers tractioned the babies heads while the nurses pushed on the fundus (pushing on the upper part of the abdomen)to deliver a baby with shoulder dystocia.
The following injuries can happen to a mother and child if the healthcare providers are careless during delivery of a baby with shoulder dystocia:
- Avulsion of the cervical nerve roots
- Brachial plexus injury (Erb’s palsy)
- Maternal hemorrhage.
- Uterine rupture.
Medical Malpractice At Birth – Cerebral Palsy
The term “cerebral” refers to cerebrum, which is the part
of the brain that is damaged. The term “palsy” refers to a movement disorder. Approximately 80% of cerebral palsy cases occur from a lack of blood supply to the baby’s brain during pregnancy and/or birth. The lack of blood supply can come from the following conditions:
- The umbilical cord being wrapped around the baby’s neck
- Shoulder Dystocia
- Placenta Previa
- Placental Abruption
- Medications used during labor induction
During labor and delivery, the nurses and obstetrician have the responsibility to monitor the well-being of the fetus by listening to and observing the fetal heart rate patterns. Specific heart rate patterns allow the healthcare providers to determine if the baby is in distress and whether to child should be delivered by cesarean section.
The diagnosis of Cerebral Palsy is usually made within the first three years of life. Many times, parents will notice that their child is not developing as fast as other children. The medical literature describes three main types of CP: (1) spastic; (2) athetoid; and (3) mixed.
Spastic Cerebral Palsy is the most common reported form. The child presents with spasticity, which is excess muscle tone or tightness. Spasticity of muscles is one of the hallmark signs of a central nervous system or upper motor neuron lesion. These children have a spastic or scissors gait because the large muscles on the inside of the legs (adductors) are spastic.
Athetoid (Dyskinetic) Cerebral Palsy can affect the whole body. The child presents with uncontrolled, (snake-like) slow body movements. Athetoid movements usually develop because higher cortical areas of the brain (aka basal ganglia) have been damaged. These children have trouble sitting up straight and walking because of decreased muscle strength.
Mixed Cerebral Palsy is a combination of Spastic and Athetoid CP. The child will present with a combination of spasticity and decreased muscle strength.
Surgical Mistake Malpractice Cases
The hallmark to a surgical malpractice case has to do with the surgeon’s technique, the ability to observe the operative field and protecting surrounding structures. In years past, most surgeries required the surgeon to open the surgical field and put his/her hands inside the body. Over the last 20-years the trend has been minimally invasive surgeries including robotics and laparoscopic surgery. The benefit of these minimally invasive surgeries is a shorter recovery period. However, the problem with minimally invasive surgeries is that the surgeon is outside the body, so it is more difficult for the surgeon to utilize all their senses, but most importantly touch. These minimally invasive surgeries can be more like a videogame.
A Few Types of Surgical Malpractice Cases
Gall Bladder Common Bile Duct Injury: The gallbladder is a sack that holds a product produced by the liver called bile. When you eat a fatty meal, bile is released into the small intestine to help digest the fat.
There are two ducts or tubes related to the gallbladder. The first is the common bile duct, which is the tube that allows bile to flow down into the pancreatic duct and then the first part of the small intestine. The second duct is the cystic duct. This is the tube that transports bile that is stored in the gall bladder to the common bile duct, so the bile is available when you eat those slices of pizza.
To remove the gallbladder, the surgeon must cut the cystic duct. The problem laparoscopic surgery is the limited surgical field and the surgeon mistakes the common bile duct for the cystic duct causing permanent damage to the common bile duct, requiring a second surgery to reroute the flow of bile and potentially causing a lifetime of problems for the patient.
Neck Surgery – Surgical Mistakes
Injury to the spinal cord happens in these cases because the surgeon is careless when removing the disc by either causing direct injury to the spinal cord, direct injury to the nerves that come out of the spinal cord or causing direct injury to the blood vessels that feed the spinal cord or nerve roots.
Again, under the underlying problem is that the surgeon is working in a limited surgical field, the structures are very close, and the surgeon fails to protect the surrounding structures, while removing the disc or placing hardware in the area.
The Northwest Indiana Region
Northwest Indiana is located right outside Chicago, IL. Also known as “The Region,” it encompasses a large area of Western and North Central Indiana. Notable cities include Gary, Hammond, Highland, Schererville, Merrillville, Dyer, Valparaiso, Hobart, Chesterton, Portage, Michigan City and South Bend.
A Brief History Of Northwest Indiana
The NWI region was originally settled by the Potawatomi Native Americans before European settlement began in earnest during the 1800’s. It has been home to many different ethnic groups over the years including Germans, Irish, Poles and Italians. The city that eventually became Gary (named after one of its founders) was founded on a massive coal mining operation which still exists today. This made it an attractive location for immigrants looking to work in manufacturing jobs or those who simply wanted more room than they could afford back East.
NWI Hospitals and Care Centers
Northwest Indiana hosts a wide variety of hospitals and medical facilities due to the sheer number of people living here. Some notable examples include St. Josephs Hospital & Medical Center in South Bend, Franciscan Health System’s Heart Institute in Mishawaka and Methodist Hospitals Northlake campus just north of Gary.
There are also several smaller clinics scattered throughout the region such as Community Family Practice and Northwest Urgent Care.
Here is a general list of hospitals in the region, there are specialist clinics and smaller networks but we wanted to ensure you had an idea of a few different facilities.
- Porter Memorial Hospital Pmhs
- Pinnacle Hospital
- Northwest Health – Porter
- Franciscan St. Anthony Health
- Franciscan Health Rensselaer
- Community Hospital
- Saint Joseph’s Regional Medical Center
- Memorial Hospital of South Bend
- Saint Margaret Mercy Hospitals
- Saint Anthony Medical Center
A medical malpractice case can happen to anyone living in Northwest Indiana. If you have suffered from negligence at a hospital or other healthcare facility contact us now! We will fight for your rights under Indiana state law. You may be entitled to compensation. Learn more about Northwest Indiana Here
Guy DiMartino Is A Skilled NWI Malpractice Attorney
As you can see, Indiana Medical Malpractice is complex because we are dealing with medical issues and the law requires the patient to jump through a bunch of hoops. If you have any questions regarding a potential Indiana medical malpractice claim, call Guy DiMartino Law. The one thing that you will receive, is a brutally honest discussion about the claim. | https://michigancityinjurylaw.com/northwest-indiana-medical-malpractice-lawyer/ |
The present invention relates to a process for the preparation of an (ar)alkane carboxylic acid carried out by reacting an (ar) alkene in the presence of a manganese compound, which is at least trivalent, with a carbonyl compound having at least one hydrogen atom attached to the alpha- carbon atom.
In the specification and claims, the term (ar)alkane carboxylic acid refers to an aliphatic or an araliphatic carboxylic acid and an (ar) alkene means an olefin provided that if the olefin contains an aromatic ring there will be at least one carbon atom between the ethylene group and the aryl group.
A process similar to the instant case is described in the Belgian Patent Specification 734,184 and while this known process may give a good yield of (ar)alkane carboxylic acid, this acid, upon further analysis is found largely to consist of a reaction product in which two carbonyl compounds are bonded to said (ar)alkene per ethylene group of the (ar) alkene one of which compounds can be removed by hydrolysis. If the carbonyl compound is a combination of acetic acid and acetic anhydride, the product formed will mainly be gamma-acetoxyalkanoic acid in the case of an alpha-olefin instead of the commercially far more important alkanoic acid without an acetoxy group in the gamma position. In Example I of the afore-mentioned patent specification, using as starting materials octene-1 and a mixture of 500 ml of acetic acid and 100 ml of acetic anhydride with manganese dioxide as a coupling reagent, there is obtained a 75% yield of n-decanoic acid. However, the percentage indicated can only have been arrived at due to a misinterpretation of the results of the analysis. The same comment applies with respect to Example IX of the Belgian patent specification.
The present invention provides a process by which the above- described drawback (the bonding of two carbonyl compounds to the (ar) alkene) is largely obviated.
Concentrations expressed in moles per liter (moles/l) indicates hereinafter the number of gram-molecules per liter.
The invention is characterized in that in a process of the afore- mentioned known type:
A. THE CARBONYL COMPOUND CONTAINS AT LEAST 60% BY WEIGHT OF A CARBOXYLIC ANHYDRIDE;
B. THE TRIVALENT MANGANESE COMPOUND IS PRESENT IN AN AMOUNT IN THE RANGE OF 10.sup.-.sup.3 TO 10.sup.-.sup.10 MOLES/1; AND
C. THE (AR)ALKENE CONCENTRATION IS LOWER THAN 0.1 MOLE/1.
In this way it is possible to prepare an (ar)alkane carboxylic acid with only one carboxyl group per ethylene group in a yield of at least 70%.
If one calculates the acid yield on the trivalent manganese added, the acid yield may be greater than 400%. An important additional advantage of the process according to the invention is that more than 95% of the bivalent manganese compound which forms during the reaction process can readily be removed by simple filtration techniques.
The invention is based on the knowledge that the reaction proceeds in accordance with a radical mechanism which can be formulated as follows, HoAc and Ac.sub.2 O representing, acetic acid and acetic anhydride, respectively. The initiation proceeds thusly: ##STR1## It has been found that ##STR2## can readily be bonded to an ethylene group, as shown in the following equation: ##STR3## The addition product again is a radical, so that it will show a tendency to react rapidly with another molecule.
Since the reaction mixture is formed by dissimilar components different types of reactions may occur. It will be clear that the higher the proportion of a given component, the greater the chance of the radical reacting therewith. In the presence of a relatively high proportion of acetic anhydride the mixed anhydride of the desired alkanoic acid will form, and a new radical ##STR4## will result: ##STR5## It is therefore evident that the presence of a high carbonic anhydride concentration is of great importance.
The use of trivalent manganese will cause the reaction to proceed as follows: ##STR6##
It is recommended that the trivalent manganese concentration should be kept low to counteract the undesirable side reaction as much as possible.
On the assumption of the reaction mechanism operating according to the invention, another important side reaction may take place, viz. telomerization, involving reaction of the radical ##STR7## with an alkene (for instance, an alphaolefin) to form a dimer: ##STR8## This dimer radical may in its turn react with Ac.sub.2 O to form a dimer- branched acid; alternatively, it may react with trivalent manganese, etc.
Here it appears to be of great importance for the (ar)alkene concentration to be not unduly high.
The presence of the carbonyl compound in the form of carboyxlic anhydride in an amount of less than 60% by weight will give rise to the formation of a relatively large amount of by-products as a result of dimerization, the formation of lactone, etc. therefore causing the process proposed to be less attractive economically.
This applies to the use of a concentration of a trivalent manganese compound greater than 10.sup.-.sup.3 moles/1, whereas at a concentration lower than 10.sup.-.sup.10 moles/1 the reaction speed will be so low that the process is no longer attractive from a commercial point of view.
For the alkene concentration it also holds that it must not be higher than 0.1 mole/1, in order to prevent the formation of an unduly large amount of by-products, which in this case would consist of dimers and telomers for the greater part.
The most favorable results are found to be obtained if the process according to the invention is carried out with the concentration of the trivalent manganese compound in the range of 10.sup.-.sup.5 to 10. sup.-. sup.7 moles/1, preferably approximately 10.sup.-.sup.6 moles/1.
The (ar)alkene concentration is somewhat less critical than the concentration of the trivalent manganese compound, but for optimum results it should be in the range of 10.sup.-.sup.4 to 10.sup.+.sup.5 moles/1.
The (ar)alkenes suitable for carrying out the process according to the invention include cyclic and acyclic olefins. They may be substituted or non-substituted and contain several unsaturated ethylene groups. It is important that the carboxylic anhydrides used dissolve at temperatures in the range of approximately 50° to 250° C, in which range the reaction speed is reasonably high. Examples of such (ar) alkenes are all types of alpha-olefins, having from 2 to 22 carbon atoms exemplified by 1,3-butadiene, 1,5-hexadiene, allylbenzene, cyclo- octene, cyclo- hexene, etc.
The carbonyl compounds to be used for carrying out the process according to the invention include the anhydrides of the following acids: acetic acid, propionic acid, octanoic acid, phenylpropionic acid, stearic acid, etc. The acids may, of course, carry substituents, provided that the carbon atom, which is in the alpha-position relative to the carbonyl radical, contains at least one hydrogen atom.
For practical reasons it is preferred to use the anhydrides of lower fatty acids such as acetic acid and isobutyric acid, as they can readily be isolated from the reaction mixture by distillation.
In general it is desired that the product to be obtained should be as homogeneous as possible. It is therefore preferred to use the trivalent manganese compound in the form of the salt of carboxylic acid, which is derived from the same carboxylic acid as used for building up the carboxylic anhydride. In this way the formation of various acid anhydrides is counteracted as far as possible.
The process according to the invention may be carried out in one of several ways. In order to prevent the subsequent working up of the reaction mixture from becoming too expensive owing to the presence of large amounts of solvent as a result of the highly diluted concentration of the components taking part in the reaction, it is preferred that the trivalent manganese should be gradually added to the reaction mixture. During the addition the carboxylic acid formed separates as an anhydride without large amounts of undesired by-products being formed as a result of side reactions.
Despite the low concentration of one of the reaction components it is possible to obtain a high degree of conversion per unit volume of the reactor, provided that the reaction mixture is properly mixed. A proper mixing is also of great importance to avoid the occurrence of locally too high concentrations, which may give rise to the afore- mentioned side reactions.
As stated above, the (ar)alkene concentration is less critical than the trivalent manganese concentration; but here also the most favorable results are obtained if the (ar)alkene is added gradually to the reaction mixture.
The temperature at which the process according to the invention may successfully be carried out varies from approximately 50° C to approximately 250° C, depending on the reaction components used. It is preferred that the temperature range between 70° and 200. degree. C.
If the acetic anhydride contains relatively large proportions of acetic acid and water or if instead of anhydrous Mn(OAc).sub.3 use is made of Mn(OAc).sub.3 2 aq., it is preferred that the reaction temperature be above the boiling point of water and above that of the carboxylic acid derived from the anhydride used but below the boiling point of the carboxylic anhydride used.
It will be clear that the reaction also may be carried in a autoclave at elevated pressure. In view of the boiling points of the reaction components it may be desirable that the reaction be carried out at reduced pressure in some cases.
The reaction may be carried out batch-wise or in a continuous process. In the latter case, it may be advantageous if the (ar)alkene, the trivalent manganese compound and the carboxylic anhydride are slowly added to the reaction mixture in the reactor, with proper mixing, after which at the top of the reactor the water and carboxylic acid which may have formed are carried off while in the vapor phase, followed by having the carboxylic anhydride containing the reaction product, discharged via the bottom of the reactor, cooled, filtered and isolated. The carboyxlic anhydride evolved in the purification may again be added to the reaction mixture.
The invention will be described further in the following examples. The examples, of course, merely serve to elucidate the invention and are not to be considered a limitation upon the scope thereof.
EXAMPLE I
(Comparative Example in conformity with the Belgian Patent Specification 734,184)
Following Example IX of Belgian Patent Specification 734,184, 0. 318 moles of n-octene (50 ml) and 0.1 mole (23.2 g) of Mn(OAc).sub.3 were mixed with 600 ml of acetic acid and 100 ml of acetic anhydride in nitrogen atmosphere. The mixture was heated to 110° C until the color of the trivalent manganese had disappeared.
Upon cooling of the mixture no bivalent manganese compound separated out. After evaporation of the acetic acid/acetic anhydride mixture, water was added to the residue, which was subsequently kept for 48 hours. Acidification with sulfuric acid was followed by ether extraction. The ether extract was isolated and subsequently evaporated. The resulting residue weighed 10.65 g and contained 5.5% by weight of decanoic acid implying that the yield of decanoic acid is as low as 3.4%, calculated on the amount of trivalent manganese added. Gas chromatographic analysis revealed the presence of a large number of by- products.
EXAMPLE II
In an atmosphere of nitrogen a slurry of 0.025 moles Mn(OAc). sub. 3 in 200 ml acetic anhydride was, with proper stirring, slowly added to 300 ml of acetic anhydride maintained at a temperature of 122° C. Simultaneously 0.2 moles (22.4 g) of n-octene were slowly added to the acetic anhydride in small amounts. The rate at which the Mn(OAc).sub.3 was added to the reaction mixture was such as to permit the mixture to retain a pale pink color. The reaction mixture was then cooled down to room temperature, the Mn (OAc).sub.2 precipitating almost quantitatively (97.5% by weight), and filtered off. The acetic anhydride was removed from the filtrate by distillation. An infrared spectrum of the residue revealed a strong absorption of anhydride groups. It was heated under reflux with acetic acid with a drop of a mineral acid being added to the mixture.
After 2 1/2hours the mixture of acetic acid and acetic anhydride was removed by distillation. The weight of the residue was 28.2 g. An infrared spectrum showed strong absorption bands of a carboxyl group.
Gas chromatographic analysis revealed that the residue contained decanoic acid in an amount of 58.7% by weight. This corresponds to a yield of 386%, calculated on the Mn(OAc).sub.3 added.
Gel-Permeation-Chromatography analysis pointed to the presence of telomers, which were identified by means of mass spectroscopy, Nuclear- Magnetic-Resonance and infrared spectroscopy. The dimer was a gamma- branched C.sub.18 acid.
EXAMPLE III
The experiment described in Example II was repeated using n- dodecene in place of n-octene. After completion of the reaction acetic anhydride was distilled off, followed by heating the residue under reflux with acetic acid.
Evaporation of the acetic acid/acetic anhydride mixture resulted in 36. 1 g of solid white product, which contained 72% by weight of myristic acid. This is equivalent to a yield of 456%, calculated on the Mn(OAc). sub.3 added.
EXAMPLE IV
Example II was repeated using trivalent manganese isobutyrate in place of trivalent manganese acetate and isobutyric acid anhydride instead of acetic anhydride.
The reaction was carried out at a temperature of 140° C.
After evaporation of the isobutyric acid, the residue was added to 450 ml of water. After about 12 hours the mixture was acidified with sulfuric acid and extracted with diethylether. After evaporation of the ether, the resulting residue was found to contain substantially alpha, alpha'dimethyldecanoic acid. | |
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a catalyst for producing maleic anhydride by oxidizing butane and a process for producing the catalyst.
2. Description of the Related Art
Vanadium and phosphorus-containing compounds are used as catalysts for producing maleic anhydride by oxidizing n-butane with an oxygen- containing gas. The vanadium and phosphorus-containing compounds effective as the catalyst are known to be a crystalline compound of the formula, (VO).sub.2 P.sub.2 O.sub.7. In order to obtain the effective catalyst component, (VO).sub.2 P.sub.2 O.sub.7, usually V.sub.2 O.sub.5 is reduced to V.sub.2 O.sub.4 according to a conventional method, and the V.sub.2 O.sub.4 is reacted with phosphoric acid to prepare (VO).sub. 2 H. sub.4 P.sub.2 O.sub.9, and then this compound is thermally decomposed. In order to produce the catalyst precursor, (VO).sub.2 H.sub. 4 P.sub.2 O. sub.9, usually V.sub.2 O.sub.5, a reducing agent and phosphoric acid are caused to react in an organic solvent, in particular, an alcohol such as isobutyl alcohol and the like and the end product, (VO).sub.2 H.sub.4 P. sub.2 O.sub.9, is separated as a precipitate, and therefore, it is convenient to isolate and recover the effective catalyst component.
Many attempts have been made to add promoter components to vanadium and phosphorus-containing compounds. For example, examples of addition of promoter components are summarized in Burnett et al., Catalyst Today, 1, 537 (1987), but effects of addition and function and mechanism of promoters are not discussed. Examples of using magnesium compounds and zirconium compounds are not disclosed.
In Japanese Patent Application Laid-Open No. 146,992/78 is disclosed a process in which a catalyst precursor is formed by reacting a vanadium compound with phosphoric acid in the presence of an acid stronger than phosphoric acid. In the specification, rare earth elements and 15 other elements including zirconium are mentioned as examples of promoters. However, nothing is specifically explained with regard to the effects of zirconium.
In Japanese Patent Application Laid-Open No. 13,483/79 is proposed a process in which a catalyst precursor is synthesized by subjecting a pentavalent vanadium compound to reduction with a powdered metal or a colloidal metal and at the same time to hydrothermal synthesis. In the specification, magnesium is mentioned as an example of a metal reducing agent, but this method is not preferred since expensive metals are used as a reducing agent. Further, other than the metal reducing agents, 14 elements including zirconium and alkaline earth and alkaline metals are mentioned as promoters. However, nothing is mentioned about the effect resulting from the addition of zirconium.
In Japanese Patent Application Laid-Open No. 30114/79 is disclosed a process in which 23 promoters including magnesium are incorporated in vanadium-phosphorus system catalysts by impregnation. However, according to the working examples, the catalyst containing vanadium and phosphorus can give maleic anhydride in only 49% yield and therefore, is not sufficiently effective for industrial purpose.
In Japanese Patent Application Laid-Open No. 24,643/82 is disclosed an annular catalyst consisting of vanadium and phosphorus compounds. In the specification, 48 elements including magnesium and zirconium are mentioned as examples of metals to be incorporated. There are however no specific explanations on the effects of addition of the metallic elements.
In Japanese Patent Application Laid-Open No. 114,735/83 is described a process for activating vanadium and phosphorus-containing catalysts with oxygen and a reducing gas. In the specification, alkali metals, alkaline earth metals, rare earths and 13 other elements including zirconium are mentioned as possible promoter components. However, nothing is specifically explained with regard to the effect of magnesium, other alkaline earth metals and zirconium.
In Japanese Patent Application Laid-Open No. 12,759/84 is proposed a method wherein a catalyst precursor is recovered by adding water to an organic slurry containing the precursor resulting in separation into two phases. As examples of promoter components, mention is made of alkali metals, alkaline earth metals, lanthanides, an other 23 elements including zirconium. However, nothing is specifically described with regard to the promoter effects of magnesium, other alkaline earth metals and zirconium.
In Japanese Patent Application Laid-Open No. 55,350/84 is disclosed a method for spray drying a catalyst precursor after it has been pulverized and densified. In the specification, mention is made of promoter components such as alkali metals, alkaline earth metals, rare earths, and 24 other elements including zirconium. However, there are contained no specific descriptions with regard to the promoter effects of magnesium, other alkaline earth metals and zirconium.
In Japanese Patent Application Laid-Open No. 145046/84 is described a process for preparing a catalyst by mixing a first component, a crystalline vanadium and phosphorus-containing compound; a second component, an aqueous vanadyl phosphate; a third component, a compound of at least one element selected from magnesium, calcium, strontium and barium; and a fourth component, silica and drying the mixture. However, according to the present inventors' study, the catalyst prepared in such a procedure is not suitable for industrial production due to the low yield of maleic anhydride.
In Japanese Patent Application Laid-Open Nos. 227,835/85 and 227, 836/85 is described a process for preparing catalysts in which a vanadium and phosphorus-containing catalyst precursor is admixed with a paste of hydrated zirconium hydroxide. However, according to studies by the present inventors, catalysts prepared in accordance with the process give no significant improvements in the yields of maleic anhydride.
Zirconium is mentioned as a possible promoter component in Japanese Patent Application Laid-Open Nos. 71,641/82; 122,944/82; 130, 552/82; 132, 550/82; 84,045/83; 87,049/84 and 181,540/86. In the specifications of these patents, nothing is explained on the effects of zirconium.
SUMMARY OF THE INVENTION
An object of the present invention is to provide a catalyst capable of giving a high yield of maleic anhydride.
Another object of the present invention is to provide a method of producing the catalyst.
According to one aspect of the present invention, there is provided a process for preparing a catalyst for producing maleic anhydride from n- butane containing vanadium and phosphorus and additionally at least one of magnesium and zirconium which comprises:
(a) heating a pentavalent vanadium compound in an organic medium to reduce at least a part of the pentavalent vanadium to tetravalent vanadium,
(b) reacting the resulting vanadium compound with phosphoric acid in the presence of at least one of a magnesium compound and a zirconium compound to form a catalyst precursor,
(c) separating the resulting catalyst precursor from the organic medium, and
(d) drying and calcining the catalyst precursor.
According to another aspect of the present invention, there is provided a catalyst for producing maleic anhydride from n-butane containing vanadium and phosphorus and additionally at least one of magnesium and zirconium produced by
(a) heating a pentavalent vanadium compound in an organic medium to reduce at least a part of the pentavalent vanadium to tetravalent vanadium,
(b) reacting the resulting vanadium compound with phosphoric acid in the presence of at least one of a magnesium compound and a zirconium compound to form a catalyst precursor,
(c) separating the resulting catalyst precursor from the organic medium, and
(d) drying and calcining the catalyst precursor.
According to a further aspect of the present invention, there is provided a process for producing maleic anhydride comprising oxidizing n- butane with an oxygen-containing gas in the presence of the above- mentioned catalyst.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Examples of pentavalent vanadium compounds usable in this invention include vanadium pentoxide (V.sub.2 O.sub.5), and metavanadates, for example, ammonium metavanadate. In usual cases, vanadium pentoxide is used.
The organic medium used in the present invention has two functions; as a reducing agent for pentavalent vanadium compounds and as a reaction solvent.
Examples of the organic medium include alcohols such as methanol, ethanol, n-propyl alcohol, isopropyl alcohol, n-butyl alcohol, isobutyl alcohol, 2-butyl alcohol, amyl alcohol, benzyl alcohol, ethylene glycol, 1,2-propanediol, 1,3-propanediol, 1,2-butanediol, 1,3-butanediol, 1,4- butanediol, diethylene glycol, triethylene glycol, and the like; aldehydes such as benzaldehyde, acetaldehyde, propionaldehyde, and the like; ketones such as acetone, methyl ethyl ketone, and the like; and ethers such as diethyl ether, dibutyl ether, tetrahydrofuran, and the like. These organic media can be used either individually or in the form of a mixture of two or more. Of these media, primary and secondary alcohols are preferable. It can be particularly preferable to use isobutyl alcohol, or a mixture of isobutyl alcohol and benzyl alcohol.
In the reduction step, a pentavalent vanadium compound is reduced in an appropriate organic medium until at least PG,10 a part of the compound becomes a tetravalent state. For example, a pentavalent compound is mixed with an organic medium and the reduction is carried out with stirring under reflux, and water formed by the reduction is separated and removed from the organic medium.
In the reaction step, the resulting vanadium compound at least a part of which is reduced to the tetravalent state is reacted with phosphoric acid in the presence of a magnesium compound and/or a zirconium compound to produce a catalyst precursor.
According to the present invention, it is important that a magnesium compound and/or a zirconium compound is present when the reaction of the vanadium compound with phosphoric acid is caused.
In other words, if a magnesium compound and/or a zirconium compound is added to the catalyst system after a catalyst active component, (VO).sub. 2 P.sub.2 O.sub.7 or a catalyst precursor, (VO).sub. 2 H.sub.4 P.sub.2 O. sub.9 has been already formed, a catalyst giving a high yield of maleic anhydride can not be obtained.
The time at which, for example, a magnesium compound is added to a vanadium compound may be before or after the reduction step as long as the time is before the reaction of the vanadium compound with phosphoric acid occurs.
In the reaction step, there may be used commercially available 85% phosphoric acid. It is however preferable to use substantially anhydrous phosphoric acid. The wording "substantially anhydrous" means that phosphoric acid which is formally represented by H.sub.3 PO.sub.4 is contained in an amount not less than 95% by weight, preferably not less than 98% by weight.
In the catalyst, the atomic ratio of magnesium to the total of vanadium and magnesium is usually in the range of from 0.001 to 0.2, preferably from 0.01 to 0.15. If the ratio is too small, there is attained no improvements in the yield of maleic anhydride, whereas if it is too large, the conversion rate of butane is undesirably lowered.
In the catalyst, the atomic ratio of zirconium to the total of vanadium and zirconium is usually in the range of from 0.001 to 0.2, preferably from 0.01 to 0.15. If the ratio is too small, there is attained no improvements in the yield of maleic anhydride, whereas if it is too large, the conversion rate of butane is undesirably lowered.
In the catalyst, the atomic ratio of phosphorus to the total of vanadium and magnesium is in the range of from 0.9 to 1.2, preferably from 1.0 to 1.1. If the amount of phosphorus is too small, the selectivity to maleic anhydride is lowered, whereas if it is too large, the conversion of butane is lowered.
In the catalyst, the atomic ratio of phosphorus to the total of vanadium and zirconium is usually in the range of from 0.8 to 1.5, preferably from 0.9 to 1.5. If the amount of phosphorus is too small, the selectivity to maleic anhydride is lowered, whereas if it is too large, the conversion of butane is lowered.
As examples of magnesium compounds usable in the invention, mention may be made of inorganic magnesium compounds such as magnesium hydroxide, magnesium carbonate, magnesium nitrate, magnesium oxide, and the like; magnesium salts of organic acids such as magnesium acetate, magnesium oxalate, magnesium citrate, and the like; and complexes of magnesium with organic compounds such as ethylenediaminetetraacetic acid (EDTA), acetylacetone, nitrilotriacetic acid (NTA) and the like. Of these magnesium compounds, complexes of organic compounds and magnesium or salts of magnesium of organic acids are preferable.
As examples of zirconium compounds usable in the invention, mention may be made of inorganic zirconium compounds such as zirconium oxide, zirconium hydroxide, zirconium chloride, zirconium oxychloride, zirconium oxynitrate, zirconium sulfate, zirconium oxyphosphate, and the like; zirconium salts of organic acids such as zirconium oxyacetate and the like; and complexes of zirconium with organic compounds such as ethylenediaminetetraacetic acid (EDTA), acetylacetone, and nitrilotriacetic acid (NTA) and the like. Of these zirconium compounds, complexes of organic compounds and zirconium or salts of zirconium of organic acids are preferable.
The catalyst precursor obtained as above is separated from the organic medium in a conventional manner such as filtration, centrifugation, evaporation to dryness, or the like. In usual cases, the filtration method is employed.
The catalyst precursor separated from the organic medium is then dried, calcined and activated by a known method. Examples of gases usable for the calcining and activation include air, nitrogen, a mixture of air and nitrogen, a mixture of n-butane and air, a mixture of n- butane and nitrogen and the like. The calcining and activation can be carried out at a temperature of from 400° to 600° C.
There is no particular restrictions on the shape of the catalyst It can be in the form of tablets, rings, spheres, microspheres (for fluidized bed), extruded tips, or the like. The catalyst can be shaped by a known method, including compression molding, extrusion molding, and spray drying. The shaping may be effected before or after calcination and activation.
Maleic anhydride can be produced in high yield from n-butane in the presence of a catalyst obtained by the present invention according to the following formula (1). ##STR1##
The starting material may be n-butane alone or n-butane containing a small amount of isobutane, butenes, propane, and pentanes.
The reaction of producing maleic anhydride from n-butane may be carried out by using a reactor of a fixed bed type or a fluidized bed type. Upon the reaction, the starting material, n-butane, is usually mixed with air, but there may be used a mixture of air and an inert gas or a mixture of oxygen and an inert gas in place of air.
The concentration of n-butane is 1-5%, preferably 2-4%. In general when the concentration of n-butane is raised while the total gas amount is kept constant, the temperature required for attaining the same n- butane conversion rises.
Further, the higher the concentration of n-butane, the higher the possibility of danger of explosion. However, a higher concentration of n- butane is allowed in a fluidized bed reactor than in a fixed bed reactor. The higher the concentration of n-butane, the higher the concentration of maleic anhydride in the gas flowing out from the outlet of a reactor, and thereby, recovery of maleic anhydride at a later stage becomes easy.
In industrial apparatuses for producing maleic anhydride, the concentration of n-butane in a reaction gas is determined taking the above-mentioned point. The gas mixture may be fed to a reactor at a rate of 0.01-0.5 kg, preferably 0.02-0.1 kg of n-butane per one hour per 1 kg of the catalyst.
The oxidation reaction of n-butane is usually effected at 300. degree.- 500° C. The reaction pressure may be reduced pressure, ordinary pressure or high pressure, but the reaction is usually carried out at about ordinary pressure.
The catalyst of the present invention containing vanadium and phosphorus and additionally at least one of magnesium and zirconium gives a higher yield of maleic anhydride from n-butane than conventional catalyst, and it is highly valuable from an industrial point of view.
The present invention is now more particularly described with reference to the following examples which are for the purpose of illustration only and are intended to imply no limitation thereon.
EXAMPLE 1
V.sub.2 O.sub.5 powder (15.0 g) having a purity of 99% was added with stirring by small portions to 150 ml of a mixture of 60 vol % of isobutyl alcohol and 40 vol % of benzyl alcohol. Then, V.sub.2 O.sub.5 was reduced by heating the reaction mixture under reflux with stirring for 2 hours at ordinary pressure while water formed by the reaction was removed by means of azeotropy.
After completion of the reflux, the alcohol solution was cooled to room temperature, and 1.9 g of acetylacetonatomagnesium and then 17.9 g of 99% phosphoric acid were added thereto. The atomic ratio of magnesium to the total of vanadium and magnesium was 0.05; and the atomic ratio of phosphorus to the total of vanadium and magnesium was 1. 05.
With vigorous stirring, the resulting mixture was heated under reflux for 2 hours while the water formed was removed out of the system by means of azeotropy. The resulting solution was cooled to room temperature and then subjected to filtration to collect the catalyst precursor thus formed, which was washed with isopropyl alcohol and then dried. The dried product was calcined for 3 hours at 500° C. in an atmosphere of nitrogen. The calcined product was pulverized in a mortar, and screened to collect the portion of particles of 350 to 700 . mu.m in size.
Into a fixed-bed flow reactor (made of glass) was charged 1.5 g of the catalyst thus prepared, and an n-butane/air mixture was passed through the reactor at a rate of 50 ml/min. Unreacted butane was analyzed by gas chromatography, and maleic anhydride formed by the reaction was determined by titration.
The reaction temperature was changed in 10° C. increments to effect the activity test, and data were collected at a region around the temperature where the yield of maleic anhydride became the highest. The results are shown in Table 1 and Table 2.
As is clear from Table 1, the lower the concentration of n- butane, the higher the yield of maleic anhydride. In Example 2 et seq., the data at the n-butane concentration of 2% are shown as representative data.
TABLE 1
______________________________________
n-Butane Reaction n-Butane Maleic
concen- temper- conver- anhydride
tration ature sion yield
(%) (°C.)
(%) (mol %)
______________________________________
Example 1
2.0 420 85.3 58.1
430 93.0 60.8
440 96.0 58.1
1.5 410 87.1 61.5
420 91.4 64.2
430 95.7 62.9
1.0 400 84.4 64.9
410 92.0 68.1
420 96.3 67.4
______________________________________
EXAMPLE 2
The procedure of Example 1 was repeated except that the atomic ratio of magnesium to the total of vanadium and magnesium was 0.10, and a catalyst was prepared.
The catalyst (1.5 g) was charged into a fixed-bed flow reactor (made of glass) and an n-butane/air mixture was passed through the reactor at a rate of 50 ml/min.
Unreacted butane was analyzed by gas chromatography, and maleic anhydride formed by the reaction was determined by titration. The reaction temperature was changed in 10° C. increments to effect the activity test, and data exhibiting the highest yield of maleic anhydride are shown in Table 2.
EXAMPLE 3
The procedure of Example 1 was repeated except that the atomic ratio of magnesium to the total of vanadium and magnesium was 0.15, and a catalyst was prepared.
Following the procedure of Example 2, the activity test of the resulting catalyst was effected. The result of the reaction is shown in Table 2.
EXAMPLE 4
The procedure of Example 1 was repeated except that magnesium acetate was used in place of acetylacetonatomagnesium, and a catalyst was prepared. The atomic ratio of magnesium to the total of vanadium and magnesium was 0.05 and this is the same as that in Example 1. Following the procedure of Example 2, the activity test of the resulting catalyst was effected. The result of the reaction is shown in Table 2.
EXAMPLE 5-7
The procedure of Example 1 was repeated except that respective 85%, 89% and 94% phosphoric acids were used in place of 99% phosphoric acid, and catalysts were prepared respectively.
The atomic ratio of magnesium to the total of vanadium and magnesium was 0.05 and the atomic ratio of phosphorus to the total of vanadium and magnesium was 1.05, which was the same as that in Example 1.
The activity test was effected by using this catalyst in a manner similar to Example 2. The reaction results are shown in Table 2.
EXAMPLES 8-9
The procedure of Example 1 was repeated except that the atomic ratio of phosphorus to the total of vanadium and magnesium was 1.00 and 1. 10, respectively, and catalysts were prepared.
The activity test was effected by using the catalysts. The reaction results are shown in Table 2.
EXAMPLES 10-12
The procedure of Example 1 was repeated except that magnesium hydroxide, magnesium lactate and magnesium citrate, respectively, were used in place of acetylacetonatomagnesium, and respective catalysts were prepared.
The atomic ratio of magnesium to the total of vanadium and magnesium was 0.05, which was the same as that in Example 1.
The activity test was conducted by using these catalysts. The reaction results are shown in Table 2.
COMPARATIVE EXAMPLE 1
The procedure of Example 1 was repeated except that the magnesium compound was not added and 99% phosphoric acid was added in an amount of 17.9 g, and a catalyst was prepared. The activity test was effected. This comparative example was given to show the effect resulted from addition of a magnesium compound.
The reaction results are shown in Table 2 and Table 3.
COMPARATIVE EXAMPLE 2
To 10.0 g of a vanadium, phosphorus-containing catalyst precursor (dried) prepared by the method of Comparative Example 1 and 0. 69 g of acetylacetonatomagnesium was added a small amount of water, kneaded in a mortar and dried.
The resulting dry product was calcined in fluidization in a nitrogen atmosphere at 500° C. for 3 hours, and then pulverized in a mortar and screened to collect the portion of particles of 350-700 . mu.m in size.
This comparative example is given for showing that it is not effective to add a magnesium compound after a vanadium, phosphorus- containing catalyst precursor has been formed.
The catalyst was used to effect the activity test in the same way as in Example 2.
The reaction result is shown in Table 2.
COMPARATIVE EXAMPLE 3
The procedure of Comparative Example 2 was repeated except that 0. 18 g of magnesium hydroxide was used in place of 0.69 g of acetylacetonatomagnesium, and a catalyst was prepared. The activity test was effected.
The reaction result is shown in Table 2.
COMPARATIVE EXAMPLE 4
To 150 ml of an alcohol mixture of 60 vol % of isobutyl alcohol and 40 vol % of benzyl alcohol was added 15.0 g of V.sub.2 O.sub.5 powder of a purity of 99% by small portions with stirring, heated under reflux at ordinary pressure, and the reflux was continued with stirring for two hours while removing water formed by means of azeotropy and thereby V.sub. 2 O.sub.5 was reduced.
After completion of the reflux, the resulting alcohol solution was cooled to room temperature and then 17.9 g of 99% phosphoric acid were added thereto. The mixture was stirred for one hour at room temperature and then 1.9 g of acetylacetonatomagnesium was added followed by heating the resulting mixture under reflux for two hours while distilling off water formed from the system by means of azeotropy.
Then a catalyst was prepared following the procedure of Example 1.
This comparative example is given for showing that it is less effective to add a magnesium compound after a vanadium compound and phosphoric acid have been mixed.
The resulting catalyst was used for the activity test in the same way as in Example 2.
The reaction result is shown in Table 2.
TABLE 2
______________________________________
Reaction n-Butane Maleic
temperature
conversion anhydride yield
(°C.)
(%) (mol %)
______________________________________
Example 1
430 93.0 60.8
Example 2
410 91.2 60.6
Example 3
420 91.7 54.7
Example 4
420 92.1 56.7
Example 5
450 89.8 50.5
Example 6
440 90.4 51.3
Example 7
430 94.2 55.0
Example 8
400 90.4 59.7
Example 9
430 93.4 58.4
Example 10
430 92.0 55.1
Example 11
410 90.5 59.7
Example 12
430 93.5 57.1
Comparative
450 86.5 47.8
Example 1
Comparative
390 88.3 50.0
Example 2
Comparative
390 83.7 49.5
Example 3
Comparative
420 91.2 50.2
Example 4
______________________________________
TABLE 3
______________________________________
N-Butane
Reaction n-Butane Maleic
concen-
temper- conver- anhydride
tration
ature sion yield
(%) (°C.)
(%) (mol %)
______________________________________
Comparative
2.0 440 78.9 45.5
Example 1 450 86.5 47.8
460 91.9 47.5
1.5 420 87.1 50.1
430 91.4 53.4
440 95.7 51.6
1.0 410 84.4 54.2
420 92.0 56.9
430 96.3 55.7
______________________________________
EXAMPLE 13
To 150 ml of a mixture of 60 vol % of isobutyl alcohol and 40 vol % of benzyl alcohol were added 15.0 g of V.sub.2 O.sub.5 powder of 99% in purity by small portions with stirring, heated under reflux at ordinary pressure with stirring for two hours while removing water formed by means of azeotropy, to reduce V.sub.2 O.sub.5.
After completion of the reflux, the alcohol solution was cooled to room temperature, and then 4.2 g of acetylacetonatozirconium and 17.9 g of 99% phosphoric acid were added thereto.
The atomic ratio of zirconium to the total of vanadium and zirconium was 0.05 and the atomic ratio of phosphorus to the total of vanadium and zirconium was 1.05.
While stirring sufficiently the above-mentioned mixture was heated under reflux for two hours and the resulting water was distilled away from the system by means of azeotropy. The resulting solution was cooled to room temperature and the resulting catalyst precursor was filtered off, and then washed with isopropyl alcohol followed by drying. The product us dried was calcined in a nitrogen atmosphere at 500° C. for 3 hours and pulverized by a mortar and screened to collect the portion of particles of 350-700 &mgr;m in size.
The catalyst thus obtained, 1.5 g, was charged into a glass fixed bed flow type reactor and 2% n-butane/air mixed gas was passed through the reactor at a rate of 50 ml/min. Unreacted butane was analyzed by gas chromatography. The resulting maleic anhydride was quantitatively titrated. The reaction result is shown in Table 4.
EXAMPLE 14
The procedure of Example 13 was repeated except that the atomic ratio of zirconium to the total of vanadium and zirconium was 0.10 and the atomic ratio of phosphorus to vanadium and zirconium was 1.05, and a catalyst was prepared. The activity test was carried out. The reaction result is shown in Table 4.
EXAMPLE 15
The procedure of Example 13 was repeated except that the atomic ratio of zirconium to the total of vanadium and zirconium was 0.02 and the atomic ratio of phosphorus to the total of vanadium and zirconium was 1. 05, and a catalyst was prepared, and the activity test was effected.
The reaction result is shown in Table 4.
EXAMPLE 16
The procedure of Example 13 was repeated except that zirconium oxyacetate was used in place of acetylacetonatozirconium, and a catalyst was prepared, and the activity test was effected.
The atomic ratio of zirconium to the total of vanadium and zirconium was 0.05. This ratio is the same as that in Example 1.
The reaction result is shown in Table 4.
EXAMPLE 17
The procedure of Example 13 was repeated except that 15.0 g of V. sub. 2 O.sub.5 powder having a purity of 99%, 19.9 g of 85% phosphoric acid and 0.65 g of zirconium oxyacetate were used, and a catalyst was prepared, and the activity test was effected.
The atomic ratio of zirconium to the total of vanadium and zirconium was 0.02 and the atomic ratio of phosphorus to the total of vanadium and zirconium was 1.04. The reaction result is shown in Table 4.
EXAMPLE 18
The procedure of Example 17 was repeated except that the atomic ratio of zirconium to the total of vanadium and zirconium was 0.05 and the atomic ratio of phosphorus to the total of vanadium and zirconium was 1. 04, and a catalyst was prepared, and the activity test was effected. The reaction result is shown in Table 4.
EXAMPLE 19
The procedure of Example 13 was repeated except that zirconium oxynitrate was used in place of acetylacetonatozirconium, and the catalyst was prepared, and the activity test was effected. The atomic ratio of zirconium to the total of vanadium and zirconium was 0.05, which was the same as that in Example 13.
The reaction result is shown in Table 4.
EXAMPLE 20
The procedure of Example 13 was repeated except that zirconium oxide was used in place of acetylacetonatozirconium, and a catalyst was prepared, and the activity test was effected.
The atomic ratio of zirconium to the total of vanadium and zirconium was 0.05, which was the same as that in Example 13.
The reaction result is shown in Table 4.
COMPARATIVE EXAMPLE 5
To 10.0 g of a vanadium, phosphorus-containing catalyst precursor (dried) prepared by the method of Comparative Example 1 and 1. 5 g of acetylacetonatozirconium was added a small amount of water and kneaded in a mortar and then dried. The dried product was calcined in fluidization in a nitrogen atmosphere at 500° C. for 3 hours and then pulverized in a mortar and screened to collect the portion of particles of 350-700 &mgr;m in size.
This comparative example shows that it is not effective to add a zirconium compound after a vanadium, phosphorus-containing catalyst precursor has been formed. The reaction result is shown in Table 4.
COMPARATIVE EXAMPLE 6
To 150 ml of an alcohol mixture of 60 vol % of isobutyl alcohol and 40 vol % of benzyl alcohol was added 15.0 g of V.sub.2 O.sub.5 powder having a purity of 99% by small portions with stirring, heated under reflux at ordinary pressure, and the reflux was continued with stirring for two hours to reduce V.sub.2 O.sub.5 while removing water formed by means of azeotropy.
After completion of the reflux, the resulting alcohol solution was cooled to room temperature and then 17.9 g of 99% phosphoric acid was added thereto.
The resulting mixture was stirred at room temperature for one hour, and 4.2 g of acetylacetonatozirconium were added. Then, in a manner similar to Example 13, there were effected dehydration under reflux, filtration, drying, calcination, pulverization and classification.
The atomic ratio of zirconium to the total of vanadium and zirconium was 0.05 and the atomic ratio of phosphorus to the total of vanadium and zirconium was 1.05.
This comparative example shows that it is of little effect to add a zirconium compound after a vanadium compound and phosphoric acid have been mixed.
The reaction result is shown in Table 4.
COMPARATIVE EXAMPLE 7
10.0 g of a vanadium, phosphorus-containing catalyst precursor (dried) prepared by the method of Comparative Example 1 and 1.30 g of zirconium hydroxide sol (23.2 wt % in terms of zirconium oxide) were kneaded in a mortar and dried. The resulting dry product was calcined in fluidization in a nitrogen atmosphere at 500° C. for 3 hours, and pulverized in a mortar and, screened to collect the portion of particles of 350-700 &mgr; m in size.
The reaction result is shown in Table 4.
TABLE 4
______________________________________
Reaction n-Butane Maleic
temperature
conversion anhydride yield
(°C.)
(%) (mol %)
______________________________________
Example 13
420 94.0 59.2
Example 14
430 93.3 55.1
Example 15
450 89.9 51.2
Example 16
420 91.6 57.4
Example 17
440 93.2 53.8
Example 18
450 90.5 54.1
Example 19
430 92.1 52.0
Example 20
450 94.5 51.1
Comparative
430 88.7 45.0
Example 5
Comparative
440 90.0 49.2
Example 6
Comparative
410 84.6 39.6
Example 7
______________________________________ | |
Declaration on fundamental principles concerning the contribution of the mass media to strengthening peace and international understanding to the promotion of human rights and to countering racialism, apartheid and incitement of war. Proclaimed on November 28, 1978, on the twentieth session of the General Conference of the United Nations Educational, Scientific and Cultural Organization, Paris.
Declaration on Race and Racial Prejudice. UN E/CN.4 / Sub. / 1982/2
Declaration on the elimination of all forms of intolerance and of discrimination based on religion or belief. United Nations General Assembly, November 25, 1981, (Resolution 36/55).
Declaration on the rights of persons belonging to national or ethnic, religious and linguistic minorities. General Assembly resolution 47/135 of December 18, 1992.
Fact Sheet No. 18 / Rev. 1 – The rights of minorities. Office of the United Nations High Commissioner
for Human Rights.
General Comment No. 23. Ethnic minorities article 27 ICCPR, Human Rights Committee, April 26, 1994.
International Convention on the Elimination of all Forms of Racial Discrimination. General Assembly resolution 2106 (XX), December 21, 1965. Entry into force: January 2, 1969, in accordance with article 19.
World Conference Against Racism, Racial Discrimination, Xenophobia and Related Intolerance. Programme of Action, Durban, South Africa, UN Doc A/CONF.189/5
COUNCIL OF EUROPE
European Charter for Regional or Minority Languages 05/11/1992, 03/01/1998
Framework Convention for the Protection of National minorities 02/01/1995, 01/02/1998
INTER-AMERICAN COURT
Case of the Yakye Axa Indigenous Community v. Paraguay. R and C. Merits. June 20, 2005. Series C No. 125. Par. 131, 135, 137
Case of the Saramaka People v. Suriname. PO, Merits, R and C. November 28, 2007. Series C No. 172.Par. 94, 130
Committee on the elimination of Racial Discrimination
Working Group of Experts on People of African Descent. UN [email protected]
Special Rapporteur on the human rights of migrants. UN [email protected]
Special Rapporteur on contemporary forms of racism, racial discrimination, xenophobia and related intolerance. UN [email protected]
Independent Expert on minority issues. UN [email protected]
Working Group on Indigenous Populations / Communities in Africa
RELATED TOPICS: | https://www.catalogoderechoshumanos.com/right-of-minorities-to-enjoy-their-own-culture-to-profess-and-practice-their-own-religion-and-use-their-own-language/ |
Big data about individuals and populations is one of the most important resources we have today for understanding our societies, and for communicating and taking decisions. The pandemic we are confronting has confirmed that fact. Data visualizations about the exponential spread of the virus (“the curve”) in cities, countries and the world have been used by governments, scientists, economists, journalists, and citizens with various purposes. From enforcing lock-downs to reporting news, and from making economic policies to telling stories, data is at the core of the pandemic responses and narratives. Likewise, technology corporations like Google, Facebook and Apple, as some of the most powerful gatherers of data about people, have also showed up their capacity to track, analyze, model and predict the contagion with sophisticated data visualizations and maps, and have partnered with governments and other companies to offer solutions to the health crisis. Hundreds of mobile applications based on the tracing of social contact and the analysis of personal data have been developed around the world and installed on the smartphones of millions of citizens in order to monitor and control the spread of the virus.
The reliance on data, and particularly big data, during the pandemic allows us to think about the power asymmetries and relationships that exist in a world mediated and interconnected by digital technology, and characterized by an increasing process of datification. Today, the majority of social, economic, cultural, and other dimensions of human life are being measured and transformed into quantifiable data that can be collected, stored, processed, and analyzed using computers, data centers and sophisticated algorithms. Who has the capacity to track, storage, aggregate and analyze personal and social data today? What kind of relationships exist in the process of data collection that digital technology allows? How is the data of individuals and entire populations being used and with which purposes? How does the use of personal and social data by technology corporations limits the autonomy and freedom of citizens, communities and countries? How does data extraction and exploitation by a small number of private and public actors impact the stability of democratic societies?
Reflecting on these and other related questions, several scholars and activists have criticized the development of the global information and knowledge societies, the new phase of capitalism, and the coming of the digital and networked era. One of the concepts that has been used to analyze and criticize the current state of societies, capitalism, and a global world driven by technology is “digital colonialism.” Renata Avila, Paola Ricaurte, Nick Couldry, and Ulises Mejias, for instance, have written and spoken about it, pointing out the exploitative relationships that have existed and continue to exist with the development of a global digital infrastructure based on for-profit business models, surveillance, and data extractivism. The term “digital colonialism” re-introduces the historical process of colonialism and builds upon its legacy to explain the relations and practices of domination that rely on the extraction and exploitation of personal, community and social data. Taking distance from the optimistic narratives of a digital world that is more participatory, democratic and where more people has access to knowledge, proponents of “data colonialism” have criticized the uneven development of digital infrastructures, the reproduction of structural inequalities, the rise of big tech monopolies, and call attention to the unfair, and unethical relationships between citizens/users and digital platforms.
Colonialism, historically, is based on the domination of territories, nature, people. It is a practice of political, cultural and economic control that has different impacts over humans and societies according to people´s race, gender and other demographic and socio-cultural characteristics. It reproduces social inequalities and power imbalances, for instance the asymmetries between the Global Souths and Norths. The term colonialism carries strong meanings associated with historical processes from the past based on violence, domination, and subjugation. Can we talk about colonialism today? Why does it matter? According to Ulises Mejias and Nick Couldry, the focus is not on violence. Instead the term “data colonialism” is useful for thinking about the extractivist logic, appropriation practices, and business models that technology companies develop when they capture, store, and analyze the personal and social data.
Colonial relations are unfair, asymmetrical, and unethical. As the discussions about data justice and ethics that has emerged in recent years has shown, particularly in relation to artificial intelligence, the reliance on big data, algorithms, and mathematical models for decision making is problematic and has deep implications for human rights, discrimination, and democracy. Although the use of the term “colonialism” is certainly controversial given its association with historical processes that have relied on violence and domination, it can also be productive for criticizing and reflecting about contemporary capitalist societies driven by technology and data. The term it is certainly controversial and motivates our thinking and imagination.
Tomorrow I will join a conversation with some of the researchers, activists, and scholars who have been thinking about the problem of data colonialism in the digital era. This is the first event of Tierra Común, a resource and a network of hope intended to foster dialogue, thinking and imagination about fairer and more even futures. The event is hosted and organized by the Communication, Languages and Information doctoral program at the Facultad de Comunicación y Lenguajes of Universidad Javeriana. I look forward to discussing this problem and to talk about the opportunities and possible ways of building fairer and more even futures. | https://andreslombana.net/blog/2020/06/29/digital-colonialism/?shared=email&msg=fail |
Composers of the past did not always know their predecessors’ work as we do. Mozart’s musical upbringing being utterly of its time, the music he heard in his formative years was principally that of his older contemporaries rather than of the previous generation. Travelling around Europe with his family as a boy during the 1760s and 1770s he encountered all the fashionable local styles, incorporating them into his own with an ease that has led one writer to characterise him as a 'musical blotting paper'.
By the time he moved from Salzburg to Vienna to begin his freelance life as a composer, pianist and teacher in 1781 he had soaked up elements of the latest Italian operatic and instrumental styles in his operas, symphonies and chamber works, the depth and seriousness of French tragédie lyrique in his first great opera Idomeneo, the conservative Austrian church tradition in his Masses and other sacred pieces, a touch of the state-of-the-art High Classicism of his older compatriot Haydn in his instrumental works, and the melodic grace and elegance of the London-based Germans Carl Friedrich Abel and Johann Christian Bach. Armed with these, and backed by his stupendous natural talent, he entered his mid-20s with a self-confident, wide-ranging and thoroughly modern musical personality.
But the influence that would strike us today as a central one for any Western composer made its impact only late in Mozart’s life. Soon after the move to Vienna he met Baron Gottfried van Swieten, a court official with what at the time would have been a rare and eccentric love of 'ancient music', which in this case meant that of 50 years or so earlier, the era of the High Baroque. Having travelled widely in Europe himself as a diplomat, van Swieten had taken the opportunity to hear and collect music which would then have been virtually unknown in Austria, including works by JS Bach and Handel. Following his visit to London in 1769, in particular, he would have come away in no doubt of the esteem in which Handel was held in his adopted country, and may well also have left carrying copies of some of his works. Whatever the case, he devoted much energy during the 1770s to ordering (via an English contact) as many published Handel scores as he could.
Settled in Vienna from 1777 onwards as Prefect of the Imperial Library, he proceeded to organise weekly chamber concerts in his own home at which his passion for 'old' music could be indulged, and it was here that the gap in Mozart’s appreciation was filled: 'Every Sunday we go to Baron von Suiten [sic]', Mozart wrote to his father in April 1782, 'and there we play nothing but Handel and Bach.'
It should not be thought that Mozart was previously unaware of Handel; on his own visit to London in 1764-65, only a few years after the great man’s death, he had encountered works of his at court and at the pleasure gardens, and may well have heard some of his oratorios, which were still being regularly performed under the direction of men such as Thomas Arne, John Stanley, and Handel’s former assistant, John Christopher Smith. He also met many other people, musicians and non-musicians alike, who had known Handel personally.
But it appears that it was only in Vienna, after his meeting with van Swieten, that the power of the Baroque style hit him with its full force. Soon he was borrowing scores, making string quartet arrangements of fugues from the Well-Tempered Clavier (K405) – at that time still unpublished and circulating only among connoisseurs in manuscript copies – and composing exquisite Baroque-style keyboard pieces of his own (rather charmingly, as presents for his new wife, who loved them).
He also wrote home to his father, asking for copies of fugues (presumably held in the family library) by Handel and Johann Ernst Eberlin, writing again only 10 days later with what today would seem the unremarkable observation that Eberlin’s efforts were 'far too trivial to deserve a place beside Handel and Bach'.
Above all, the realisation of the expressive potential of Baroque music found voice almost immediately in Mozart’s own music, at first in the grandiloquent choruses of the great Mass in C minor, but also in a four-part fugue, also in C minor, that he composed for two pianos in 1783, and which five years later he arranged for strings and prefaced with an Adagio much in the style of an overture by Handel (K546). This is no mere exercise in pastiche, but a piece of almost terrifying cumulative power, an acknowledgement of earlier genius that is deeply, almost disturbingly personal.
But a much closer involvement with the music of Handel was still to come. Van Swieten had assembled a group of aristocratic patrons for the purpose of sponsoring performances of rare older choral music, and for their private concerts he invited Mozart to prepare new performing editions of a group of Handel oratorios: Acis and Galatea was the first to receive the treatment in November 1788; Messiah followed in March 1789, and the Ode for St Cecilia’s Day and Alexander’s Feast in July 1790. Doubtless Mozart was glad of the money, but, far from being workaday, the job he carried out on the scores is careful and considered, clearly born out of respect for Handel’s skill and creative personality.
His main objective was to recast Handel’s music – whose original Baroque orchestral line-up of strings, oboes and bassoon and occasional brass and timpani would have seemed a little thin to Classical ears – for an up-to-date ensemble which added flutes, clarinets and horns. He thus brings a warm Viennese glow to the music, but in places Mozart also added his own gloss to events, as for instance in Messiah when he adds a contrapuntal shadow to the stark unison accompaniment of 'The people that walked in darkness', or when he adds his own expressive comments to the already lugubrious 'He sung Darius great and good' in Alexander’s Feast.
Elsewhere there were more purely practical considerations to be taken into account: the art of clarino (or high natural trumpet-playing) needed for 'The trumpet shall sound' was already a lost one in Mozart’s day, so instead he devised a new obbligato part for horn.
It is perhaps only in recent decades that the idea of re-orchestrating Handel has come to need defending; for much of the two centuries following Handel’s death it was almost taken for granted. What is more, Mozart’s arrangements enjoyed considerable prestige during the 19th century following their publication in the early 1800s, withMessiah in particular serving as a starting-point for numerous subsequent editions and re-arrangements, including the one produced in 1902 by Ebenezer Prout and much used by Britain’s choral societies throughout much of the last century.
As for van Swieten, no doubt heartened by his successes in getting Handel’s oratorios performed, he later commissioned through his noble friends (now known as the Gesellschaft der Associierten) two original oratorios by Haydn, The Creation and The Seasons, both of which took the Handelian model forward into the 19th century, where it continued to flourish as a genre, most notably at the hands of Mendelssohn. According to his widow, Mozart himself would have composed oratorios of his own had he lived. Van Swieten it most probably was, too, who introduced Handel’s music to Beethoven around 1800 (perhaps partly in Mozart’s editions); Beethoven later raised Handel above Mozart to stand at the head of his own personal pantheon of great composers.
Antiquarian though he was, van Swieten thus well understood how to give his treasures life beyond that of the museum piece. He also seems to have appreciated not only the value of bringing Handel into Mozart’s life, but also the returns it would bring for both composers’ reputations, as he revealed in a letter to Mozart: 'Anyone who can clothe Handel so solemnly and so tastefully that he pleases modern fashion on the one hand, and on the other shows him in his sublimity, has felt his worth, has understood him, has penetrated the source of his expression, from which he can and will draw with assurance.' Thank goodness the opportunity did not go begging!
If you are a library, university or other organisation that would be interested in an institutional subscription to Gramophone please click here for further information. | https://www.gramophone.co.uk/feature/how-mozart-loved-handel |
Relativity is surprisingly simple.
It just requires elementary mathematical operations.
However, it also requires reasonable knowledge of the Lorentz Transformations.
This is why the above diagram should help.
THE LORENTZ TRANSFORMATIONS
|
|
x' = g x + b t
t' = g t – b x
y' = y z' = z
b (beta) = v / c = 0.5
g (contraction) = Sqr(1 – b ^ 2) = 0.866
This reversed equation set is much more easy to deal with because it yields exactly what Lorentz had in mind in 1904. See for yourself:
1 – Matter undergoes a contraction in accordance with g x. The normal A to A' distance being ten light-seconds, the B to B' distance below is 0.866 * 10 = 8.66 light-seconds instead. The 8 x 8 light-second squares transform into 8 x 6.9 rectangles, and circles transform to squashed ellipses. The contraction also applies to distances between pieces of matter for mechanical reasons.
2 – Matter moves from g x to g x + b t. This is merely a translation motion, that is to say Galileo's transformation which leads to his well known Relativity Principle: x' = x – v t, the reversed equation being: x = x' + v t or x' = x + v t as well.
3 – Clocks display slower seconds in accordance with: t' = g t. Below, g = 0.866 so that clocks are displaying 8.66 slower seconds after a 10 second delay (.866 * 10 = 8.66).
4 – Clocks display a time shift in accordance with: – b x. Below, b (beta) = .5, so that the B' clock exhibits a –5 second time shift with respect to B according to –0.5 * 10.
Knowing that, one can easily compare the two systems A-A' and B-B' below:
Observers A and B adjust their clock to t = t' = 0 when they meet.
Observer B' then tries to synchronize his clock according to B, but the procedure ends up with a –5 second time shift.
Observers B and B' try to maintain a 10 light-second distance to each other but the resulting distance is rather 8.66 light-seconds.
Now, let's examine the situation after a 20 second delay:
Because observer B truly moves at 0.5 c, he is now meeting exactly A' whose distance to A is 10 light-seconds.
Because clock B ticks slower, it displays only: g * t = 17.32 seconds instead of 20 seconds.
Observer B is unaware of the contraction. Additionally, he erroneously observes that A and A' are moving backward at 0.5 c.
B erroneously observes that clock A is ticking slower so that it now seems to display: g * 17.32 = 15 seconds.
Because he is meeting A', B observes that the apparently slower clock A' exhibits a + 5 second time shift (15 + 5 = 20 sec).
B thinks that his own clock indicates 17.3 seconds because apparently, the A to A' distance is only 8.66 light-seconds.
Observer B comes to the conclusion that he is stationary and that A and A' are transformed and moving leftward at 0.5 c.
Because his measures are correct, observer A also comes to the conclusion that he is stationary and that B and B' are moving.
Below is a video which reproduces more clearly the scene shown above. It should be helpful in order to understand why observer B especially is fooled by the Lorentz transformations.
Lorentz's reversed equations.
You may doubt my equations, which is advisable. One must firstly be aware that Henri Poincare discovered Relativity well before Einstein and that he was a superb mathematician. He could simplify Lorentz's equations (Woldemar Voigt's ones, actually) as soon as 1901. Here is a copy from his French book "Electricity and Optics":
Poincare could simplify Woldemar Voigt's equations as shown above, but Voigt's useless constant "l" is still present.
This is a transposition by Christian Marchal using more modern notation such as the gamma factor and the beta normalized speed.
By comparison, Lorentz original equations appear quite obscure.
The first equation may be simplified to: x' = (x – v t) / g and Voigt's useless constant is absent.
Unfortunately, this equation set creates a new "space-time" frame of reference which is incompatible with the first one.
Lorentz found that Voigt's constant was useless because its value should be 1. This constant being eliminated, Lorentz's first equation simplifies to:
According to Lorentz : x' = (x – v t) / g
According to Poincare : x' = gamma (x – b t)
The unknown variable being x, Poincare's equation must be rearranged like this:
x = x' / gamma + b t
Then Lorentz's contraction factor g, which is given by 1 / gamma, may replace the gamma factor:
x = g x' + b t
And finally, because x and t should obviously stand for the unmoving system variables, one must swap x and x':
The same process applied to the time equation leads to:
Thus, and this is true even for Einstein's Relativity, x' for the moving observer B' shown above is 18.66 light-seconds, and t' is 12.32 seconds after a 20 second delay (x = 10, t = 20, beta = 0.5, g = 0.866):
x' = g x + b t = (0.866 * 10) + (0.5 * 20) = 18.66 light-seconds.
t' = g t – b x = (0.866 * 20) – (0.5 * 10) = 12.32 seconds.
What is remarkable is that all those variables (x, x'; t, t') along with the sign (– instead of +) are fully reversible in order to retrieve the initial x and t variables. This amazing reciprocity was Poincare's discovery, who used it in 1904 in order to establish his Relativity Postulate:
x = g x' – b t' = 10 light-seconds.
t = g t' + b x' = 20 seconds.
Lorentz's version also works on the condition that x and x' are swapped (hence using t, not t'):
x = (x' – b t) / g = 10 secondes-lumière.
It should be pointed out that these new inverted equations are mainly intended to transform a stationary emitter into a moving one. This produces a Doppler effect. In this case, the Cartesian coordinates x, y et z stand for wavelength and the t variable stands for the wave period in 2 * pi units. Their purpose is definitely not to transform space and time. The original version was supposed to correct the Doppler effect instead, and this is exactly what Woldemar Voigt had in mind in 1887.
However, it becomes clear that Voigt's initial equations were wrong for many reasons. His constant was discarded by Lorentz, but it may still be useful in order to obtain the normal Doppler effect. In this case, its value equals g and it should divide the product g * t in the t' equation, not multiply it (compare Poincare's version above to my version below). It was a serious error. In addition, one must use the plus sign for the x equation and the minus sign for the t' one, yet this may be just an anomaly related to Maxwell's equations. And finally, because the x and t variables stand for the moving system coordinates, the original equation set creates an unnecessary and incompatible new frame of reference. Below is the corrected and inverted equation set:
This is Woldemar Voigt's revisited equation set.
It remains useful because it can produce a variable Doppler effect where the frequency is adjustable.
In the case of the normal Doppler effect, the k constant equals g and the frequency is unchanged.
In the case of light and radio waves, the k constant value is 1 and the frequency is slowed down according to g.
Consequently, any Doppler effect involving light or radio waves such as those emitted by a satellite supposes that the frequency is slower according to g, unless it is corrected afterwards. It is undoubtedly a relativistic effect. For example, if the observer is traveling inside the satellite, he is totally unable to detect the Doppler effect in spite of the fact that it is easily detectable on the earth's surface. This occurs because he himself is transformed according to Lorentz.
It is about the Doppler effect.
Those facts are undisputable. Lorentz's formulas just produce or correct a Doppler effect. And because they were wrongly used as a mathematical artifice whose effect was to transform space and time, I had to correct them. The equation set shown below is simply about a special Doppler effect involving a slower frequency. It just transforms the wavelength and the wave period, not space and time. It is not a theory, is is a fact which is easily verifiable on any emitter surrounded by spherical waves.
I wrote a program showing this:
Doppler_Voigt_transformations.bas Doppler _Voigt_transformations.exe
I did not remove Voigt's constant and hence, you have a choice of four different frequencies. You may press A, B, C or D to change the value of the constant. In Lorentz's version the k =1 constant does not appear any more. In this case, one obtains y' = y and z' = z, and the emitter frequency slows down according to g so that there is no transverse wavelength contraction. Please examine the source code to verify that I am really using my own version of Voigt's equations.
This is why I propose that Lorentz's equations should be corrected as below. The reversed set on the right was obtained using Poincare's method:
The Lorentz Transformations revisited.
The x et x' variables apply to the same Cartesian frame of reference, which remains stationary.
Please bear in mind that this reversed equation set yields totally new results.
Strangely, those new results are still consistent with those predicted by Lorentz, Poincare and Einstein.
As a matter of fact, they all predicted that a moving material body should appear shorter according to g * x.
It should also move according to beta * t. Thus, the equation x' = g x + b t is no surprise.
And finally, Lorentz, Poincare and Einstein also told us that a moving clock should tick slower according to: g * t.
The accurate time shift according to –beta * x or –v * x / c^2 was Lorentz's discovery.
In spite of that, nobody ever proposed those equations up to now. This is weird.
The Time Scanner performs even better.
Please examine this small video which I very proud of. It is honestly amazing. It contains a lot of information showing that Lorentz's version of Relativity (1904) was correct.
It is a high definition (1280 x 720) Mpeg-4 video using the now well accepted H-264 standard (Divx-7 .mkv Matroska file). I suggest VLC Media Player and the whole bunch of CCCP codecs (unrelated to the USSR!) which includes a free version of Zoom Player, also an excellent player. Below is the FreeBasic program which produced the images.
My Time Scanner is capable of accelerating the whole system where emitters and material bodies are moving at different speeds, on condition that they are already transformed. Here, it is accelerated to 50% of the speed of light to the right. However, C and C' are already moving to the right at this speed, and hence their new speed should be the speed of light. But Lorentz and Poincare discovered that no material body is capable of reaching the speed of light. This is why their resulting speed is only .8 c, according to Poincare's law of speed addition which is given by:
beta'' = (beta + beta') / (1 + beta * beta')
In my opinion, such a magnificent harmony should leave nobody unfeeling. Now, thanks to Lorentz, Relativity can be explained. There are no paradoxes any more. All is clear and logical.
On the one hand, it becomes possible to display more than two material bodies (hundreds, actually) whose speed and direction may differ. The results remain perfectly coherent after the scanning process, or the acceleration if you prefer.
On the other hand, a preferred stationary frame of reference may be designated as a convention. It should allow all observers to have a better image of their situation. Ideally, it is the one whose speed is intermediate, for instance the red scale as seen from A and B. Surprisingly, this red scale does not transform because its intermediate speed (not exactly .25 c because of Poincare's law of speed addition) is simply inverted after undergoing the acceleration. Its speed being the same, its contraction remains the same, so that A and B can adjust its length when they meet (they must consider that they are moving in opposite directions at the same speed). They can also adjust its clock rate so that it stubbornly displays the "absolute" time on condition that is is placed where x = 0 when A and B meet and on condition that they synchronize all clocks according to t = 0 when they meet, too. The time shift is inverted everywhere else because the red scale is stopped, then accelerated at the same speed in the opposite direction.
All becomes perfectly clear. The red scale length does not change and the clock displays the absolute time on condition that A and B, A and C, or B and C (two of them only) designate an intermediate one as a preferred Cartesian frame of reference. Thus, there exists a situation in which space and time remain constant. To put it even more clearly, as Euclid, Galileo, Descartes and Newton always thought, space and time do not transform.
In practice, Einstein's theory of Relativity appears inapplicable. Establishing a preferred frame of reference is advantageous. The present demonstration indicates that many of them are possible but that some of them are much better. Only Lorentz's version of Relativity allows such a choice. It should be pointed out that all this cannot be explained without the presence of the aether. Even if it cannot be detected, all happens as if it exists. It is imperative that the speed of light is related to it.
The Lorentz transformations indicate that all this happens solely because of the Doppler effect. This strongly suggests that matter is undergoing the Doppler effect. Matter behaves like waves do. Lorentz's Relativity indicates that matter consists of waves propagating at the speed of light. Such waves need a medium, the aether, so that finally, our material world is nothing but the aether...
It turns out that the Lorentz transformations are leading us well beyond Relativity. Now, we are dealing with matter mechanics, more accurately the Wave Mechanics.
The conclusion is that Newton's laws as well as all physical phenomena descriptions must be upgraded in order to conform with the Wave Mechanics.
LORENTZIAN RELATIVITY IS THE ONLY CORRECT ONE
The goal of this page is to show that Lorentz's Relativity is easily explainable. It becomes possible to show why such phenomena are possible. Unfortunately, Lorentz never released a complete version of his ideas like Einstein did. More or less recently, many authors tried to promote them but they frequently deviate into erratic opinions such as faster-than-light speeds. They obviously forget that Lorentz himself found that inertia, and hence matter mass increases according to its speed in such a way that it would be infinite at the speed of light.
This is why I am explaining Lorentz version of Relativity the way he himself would have done. As far as I know, this page is fully compatible with Lorentz's ideas, at least around 1904. It is by no means revolutionary.
It should be emphasized that Lorentz never doubted the existence of an aether until his death, which occurred in 1928, and hence many years after Einstein's theory triumphed. Unlike Poincare, he was sure that there should exist a preferred frame of reference. He was convinced that matter truly contracts and that moving clocks are displaying slower seconds along with a "local time". Such clocks cannot show the "true time".
To put it clearer, Lorentz never proposed an absurd "space-time" transformation. Poincare was much less rigorous. He rejected matter contraction. He thought that optical phenomena were only relative and he wrote that Lorentz's hypothesis was not satisfactory. He even wrote that the aether might some day be considered useless.
Below are two quotes from Lorentz which were written several years after 1904. They indicate that Lorentz had finally given up his previous concept and accepted much of Poincare's and Einstein's ideas. However, they are very clear on Lorentz's 1904 theory:
|
|
I had not thought of the straight path leading to them, since I considered there was an essential difference between the reference systems x, y, z, t and x', y', z', t'. In one of them were used - such was my reasoning - coordinate axes with a definite position in ether and what could be termed true time; in the other, on the contrary, one simply dealt with auxiliary quantities introduced with the aid of a mathematical trick.
The chief cause of my failure was my clinging to the idea that the variable t only can be considered as the true time and that my local time t' must be regarded as no more than an auxiliary mathematical quantity.
According to Lorentz, x' and t' are only auxiliary quantities introduced with the aid of a mathematical trick.
The variable t only can be considered as the "true time".
THE SCIENCE OF ILLUSION
|
|
Relativity is all about mystification where the Doppler effect hides from our eyes what is really going on. This can easily be explained on the condition that matter and fields of force are made of standing waves, and that all forces such as light and gravity are also caused by waves.
Clearly, any moving wave system should undergo the Doppler effect. However it is not that simple because the regular Doppler effect is asymmetric. For example, a bell moving at beta = sin 30° = .5 times the speed of sound emits sound waves which are lengthened backward less than they are compressed forward:
The forward wavelength is: 1 – beta = .5 time shorter.
The backward wavelength is: 1 + beta = 1.5 times longer.
Additionally, in the presence of a strong wind or in a moving frame of reference such as a train platform, additional effects occur because the observer is moving with respect to air. He may use a moving source and a moving screen in order to produce standing waves and check for the first node position (this is called the Hertz test).
Then the transverse wavelength and the transverse standing wave pattern are:
g = cos 30° = sqr(1 – beta ^ 2) = .866 time shorter.
However, the moving axial standing wave pattern is:
g ^ 2 = .75 time shorter.
Thus the difference allows the moving observer to detect his speed as compared to the wave medium. But this is no longer possible for matter or forces such as gravity and light because Lorentz's Doppler effect is perfectly symmetrical.
The point is that any periodic phenomenon slows down at high speed in accordance with the contraction factor: g = sqr(1 – beta^2). This was well established by Hendrick A. Lorentz in 1904. More particularly, the electron frequency slows down according to g:
The electron frequency slows down according to Lorentz's contraction factor.
This phenomenon alone causes the Lorentz transformations and explains Relativity.
Surprisingly, the frequency reduction produces a perfectly symmetric Doppler effect as seen by an unmoving observer. As compared to waves in an unmoving system, the contraction forward and the dilation backward occur according to the same ratio.
Let us suppose that the velocity of a complex wave system such as the electron is half of the speed of light, so that beta = .5 and g = .866. The forward or backward frequency ratio is R = (1 + beta) / g = 1.732.
The forward wavelength is: (1 – beta) / g = 1 / R = .577 time shorter.
The backward wavelength is: (1 + beta) / g = R = 1.732 times longer.
The transverse wavelength is: g / g = 1 (finally unchanged).
The transverse standing wave pattern is: g / g = 1 (finally unchanged).
The moving axial standing wave pattern is: g ^ 2 / g = g = .866 time shorter.
The axial standing wave node and antinode pattern becomes g = .866 shorter instead of g squared = .75. The point is that the electron is made of standing waves. It is a well known fact that the 8-electron atomic external layer radius, which is responsible for chemical binding, is linked to a given wavelength. This explains why molecules, hence matter, undergo an axial contraction according to g only instead of g squared.
Please note the incredible symmetry: 1 / 1.732 = .577 and inversely, 1 / .577 = 1.732 according to the Doppler ratio R = (1 + beta) / g = 1.732 > 1.
Detecting relative motion only.
On the one hand, this symmetry requires the observer to use the same R ratio for the redshift and the blueshift from matter or galaxies moving away from him or towards him (albeit the blueshift rarely occurs). On the other hand, the results would be exactly the same if the galaxy was rather stationary and if the observer was moving away from it or towards it. Whatever the situation, he does not have a choice any more. In both cases, he must use the formula below (lambda stands for wavelength as measured in his frame of reference) in order to establish the galaxy's beta velocity.
Thus, he will obtain only the relative velocity, which is given by:
Considering those results, the observer should be aware that this galaxy could stand perfectly still as well. He himself would rather be moving away at .866 c and, in this case, his whole environment would be transformed according to Lorentz. Especially, clocks would run two times slower; in this example they would display just .5 second instead of one absolute second.
The light waves emitted by the unmoving galaxy are free from any frequency reduction and any Doppler effect, but the moving observer experiences the virtual Doppler effect according to f ' = f (1 – beta) = .13397 time the original frequency. Additionally, his clocks indicate slower hours and the recorded frequency will seem to be .13397 / .5 = .26794 as compared to the original and absolute one, hence a perfectly identical and symmetric redshift ratio: R = 1 / .26794 = 3.732.
So, simply because the electron frequency slows down at high speed, the blueshift vs. redshift ratio can no longer inform the observer whether he is moving or not. Actually, both the observer and the galaxy are most likely to be moving with respect to the aether, but their absolute velocity can never be established. Whatever the situation, recorded data indicates relative velocity only.
Hundreds of examples.
One may carefully examine a lot of experiments where Lorentz's Relativity holds true. The list below is not exhaustive. Fortunately, they do not require complicated formulas and so many successful demonstrations as a whole finally builds a solid proof that Lorentz was right.
1. The absence of transverse contraction prevents the observer from detecting his absolute motion.
2. The radar echoes simulate or dissimulate the axial contraction.
3. The clock synchronization procedure ends up with a time shift.
4. The absolute motion causes the slowing down of all mechanisms.
5. The contraction cannot be detected by any means such as optical imaging or triangulation.
6. The speed of light seems to be the same in all frames of reference.
7. There are no means to detect that clocks are running slower.
8. The Michelson interferometer cannot detect its absolute motion because it undergoes a contraction.
9. The beam splitter angle must match the interferometer contraction in order to reflect correctly the light beam.
10. Bradley's stellar aberration cannot reveal the Earth's absolute motion.
11. The Fresnel-Fraunhofer diffraction pattern cannot reveal the absolute motion.
12. Light undergoes a symmetrical Doppler effect, so that relative motion only can be detected.
13. Any speed beyond the speed of light is impossible.
14. The relative speed between two material bodies may approach twice the speed of lignt.
15. Standing waves contract according to Lorentz on the condition that the frequency also slows down according to Lorentz.
16. Lorentzian Relativity remains consistent in the presence of an unlimited number of material bodies.
17. There is no General Relativity because gravity is not linked to Relativity.
18. The Lorentz transformations lead to Relativity but they also extend well beyond it.
This will be examined in the next page.
|
|
Gabriel LaFreniere, | http://www.mysearch.org.uk/websiteX/html/10%20Theory%20of%20Relativity%20-%20Lorentzian%20Relativity1.htm |
Lattice Semiconductor Corporation (NASDAQ LSCC), the leading provider of customizable smart connectivity solutions, announced that it would discuss its preliminary business outlook based on current expectations at the Company's analyst and investor meeting today at the Shelburne NYC Hotel. A live webcast will begin at 10 00 a.m. EDT today at www.LatticeSemi.com, with a replay available for those unable to attend the presentations in person. The Company plans to release financial results and host a conference call for the third quarter of 2017 in early November.
Darin Billerbeck, President and CEO, commented, "We have a clear pathway to growth and profitability, with stability in our core business as the foundation to build upon. At today's analyst and investor meeting, we are discussing how Edge of the cloud devices and applications require our Edge connectivity and Edge intelligence solutions. Edge connectivity drives our core business stability and growth today, while Edge intelligence will accelerate our future growth. We remain committed to creating greater shareholder value as we work to deliver increased free cash flow for future investments and to pay down our debt."
Preliminary Company Business Outlook Based on Current Expectations:
Forward-Looking Statements Notice:
The foregoing paragraphs contain forward-looking statements that involve estimates, assumptions, risks and uncertainties. Any statements about our expectations, beliefs, plans, objectives, assumptions or future events or performance are not historical facts and may be forward-looking. Such forward-looking statements include statements relating to: our belief that we have a clear pathway to growth and profitability, with stability in our core business as the foundation to build upon; that Edge of the cloud devices and applications require our Edge connectivity and Edge intelligence solutions; that Edge connectivity will drive our core business stability and growth today, while Edge intelligence will accelerate our future growth; and those statements under the heading "Company Updates Business Outlook" relating to revenue, gross margin, total operating expenses, EBITDA, free cash flow and debt reduction for Q3 2017, Q4 2017 and the full fiscal years 2017 and 2018, and restructuring and impairment charges for Q3 2017. Other forward-looking statements may be indicated by words such as "will," "could," "should," "would," "may," "expect," "plan," "project," "anticipate," "intend," "forecast," "future," "believe," "estimate," "predict," "propose," "potential," "continue" or the negative of these terms or other comparable terminology. Lattice believes the factors identified below could cause actual results to differ materially from the forward-looking statements.
Estimates of future revenue are inherently uncertain due to, among other things, the high percentage of quarterly "turns" business. In addition, revenue is affected by such factors as global economic conditions, which may affect customer demand, pricing pressures, competitive actions, the demand for our Mature, Mainstream and New products, and in particular our iCE40™ and MachXO3L™ devices, the ability to supply products to customers in a timely manner, changes in our distribution relationships, or the volatility of our consumer business. Actual gross margin percentage and operating expenses could vary from the estimates on the basis of, among other things, changes in revenue levels, changes in product pricing and mix, changes in wafer, assembly, test and other costs, including commodity costs, variations in manufacturing yields, the failure to sustain operational improvements, the actual amount of compensation charges due to stock price changes. Any unanticipated declines in revenue or gross margin, any unanticipated increases in our operating expenses or unanticipated charges could adversely affect our profitability.
In addition to the foregoing, other factors that may cause actual results to differ materially from the forward-looking statements in this press release include global economic uncertainty, overall semiconductor market conditions, market acceptance and demand for our new products, the Company's dependencies on its silicon wafer suppliers, the impact of competitive products and pricing, and technological and product development risks. In addition, actual results are subject to other risks and uncertainties that relate more broadly to our overall business, including those risks more fully described in Lattice's filings with the SEC including its annual report on Form 10-K for the fiscal year ended December 31, 2016, and Lattice's quarterly reports filed on Form 10-Q.
You should not unduly rely on forward-looking statements because actual results could differ materially from those expressed in any forward-looking statements. In addition, any forward-looking statement applies only as of the date on which it is made. The Company does not intend to update or revise any forward-looking statements, whether as a result of events or circumstances after the date hereof or to reflect the occurrence of unanticipated events.
About Lattice Semiconductor
Lattice Semiconductor (NASDAQ:LSCC) is a leader in smart connectivity solutions at the network edge, where the "things" of IoT live. Our low power FPGA, 60 GHz millimeter wave, video ASSP and IP products deliver edge intelligence, edge connectivity, and control solutions to the consumer, communications, industrial, compute, and automotive markets. Our unwavering commitment to our global customers enables them to accelerate their innovation, creating an ever better and more connected world.
For more information about Lattice please visit www.latticesemi.com. You can also follow us via LinkedIn, Twitter, Facebook, YouTube, WeChat, Weibo or Youku. | |
During the pandemic, teens have more reasons to be stressed than ever. However, learning how to manage stress is an important life skill for both the present and the future.
Here are some ways you can manage stress:
Avoid procrastination
Procrastination is easily one of the top ways to avoid getting overwhelmed. However, avoiding procrastination is easier said than done, as many of us have learned the hard way. There are simple steps you can take to make sure you do not procrastinate.
Get enough sleep: you are able to focus better when well-rested. Better focus allows you to avoid distractionsAn adequate amount of sleep also helps reduce stress.
Manage break time: be sure to reward yourself with enough breaks. Working for long periods of time at one go can make you less productive. Conversely, don’t take too many breaks. After each break, you have to get back into the groove of working, which will waste time, so take breaks only when you need to. Every person works differently, and you have to figure out your break schedule to have maximum productivity.
Break down big tasks: completing a whole science project sounds daunting, but breaking it down to smaller tasks (coming up with an idea, purpose, hypothesis, procedure) and completing one per day or so seems much more manageable. Just like this, any task can be broken down to smaller steps to make it simpler.
Forget motivation: this may seem contradicting, but you don’t always have to be motivated in order to get work done. Motivation eventually runs out. Highly productive people do not work on tasks only when motivated (although that is great), but also when not. When you are not motivated to finish your work, say this aloud to yourself: “So what?” This helps wire your brain into thinking having motivation is not the only way to get work done.
Slow down
Taking on big tasks and projects may seem like a good way to stay productive at first, but you will soon grow tired of working so hard. Instead, take on only how much you can manage, and no more. Leave time for yourself to have fun and do other activities you enjoy.
Find ways to relax
Whether it is listening to music, going for a run, or playing with your pet or sibling, having a go-to method for relaxation is extremely beneficial in the long run. If there is nothing you can think of, then try something new. Start drawing or yoga. Who knows, you could discover something you love.
Take care of your health
Health is crucial when it comes to anything, but especially crucial for stress. Make sure you find time to exercise during your busy day. Additionally, find healthy food to eat. A good meal will keep you energized, allowing for more work to get done.
Remember, while being stressed allows you to get tons of work done, it is bad for your health. Take these initiatives to avoid and manage stress. | https://www.successbasemass.com/post/how-to-say-no-to-stress |
Join India’s leading logistic services company ShadowFax, currently hiring Warehouse Operation Manager in Nadiad, Gujarat for direct warehousing, receiving and distribution operations.
You will oversee the inventory management, receipt, value-added servicing, storage and dispatch of a wide variety of all products in warehouse. However, you should be able to see the all-warehouse/ inventory processes are running smoothly for instance of given below detailed explanation.
Post: Warehouse Operation Manager
Location: , Nadiad or nearby warehouse in Gujarat
Job type: Full-time / On-roll
Work Schedule: Day shift
Details of Jobs in Warehouse Inventory:
Responsibilities of Warehouse Manager in Nadiad Gujarat:
- Ensure the Nadiad warehouse operates at peak efficiency, with customer satisfaction being the primary goal, by supervising, organizing, directing, and training warehouse employees and establishing, monitoring, and managing operation goals.
- Develop warehouse operations systems by determining product handling and storage requirements, equipment utilization, inventory management, gate processes, ordering and shipping.
- Train and manage a Nadiad-GJ warehouse team to solve daily operational issues and reach short-and long- term performance goals.
- Oversee daily operations, while controlling and managing inventory and logistics works.
- Review and prepare workflow, manning and space requirements, equipment layout, and action plans while ensuring productivity, quality and customer service standards are mets
- Maintain a safe and healthy work environment by establishing, following, and enforcing standards and procedures and complying with legal regulations of Gujarat govts.
- Supervise daily activities of the warehouse, including quality assurance, inventory control, space management, logistics, floor productivity, shipping, and customer service.
- Schedule and oversee the Nadiad-Gujarat warehouse team to meet the demands of the fulfillment center, and manage the flow and quality of work to maximize efficiency and minimize overtime.
- Inspect equipment, tools, and machinery regularly, and oversee general maintenance as needed.
- Schedule regular meeting with warehouse leads to review, analyze, and develop actionable plans for more and soft productivity
- Oversee and manage logistics utilized to transport products from Nadiad to customers and internal facilities, communicating with drivers and air partners to ensure efficient delivery of packages as per billed.
Requirements of Warehouse Manager Jobs in Nadiad
- Proven work experience as a Warehouse Operation / Inventory Management with graduate (Fulltime)
- Proven ability to implement process improvement initiatives.
- Looking Experience into Middle mile Operations, Warehouse Operations with excellent communication skills.
- Must have Gujarat local language knowledge (for example:Gujarati Hindi & English)
- Strong decision making and problem-solving skills.
- Local area knowledge of Nadiad, Gujarat,
- Leadership skills and ability manage staff also.
Hiring process of Warehouse jobs near Nadiad GJ
- Read job details of Nadiad with focus and get Register for job application.
- Fill all required details and attach your most updated copy of resume/cv/biodata.
- Submit and wait for the telephonic interview with HR Executive from head office of Gandhinagar
- Then shortlisted candidate will get connected for finale interview in Nadiad GJ.
About Company: ShadowFax is leading Logistic services company in India and delivering products in Nadiad and more other 500+ Cities in India with average 500k+ orders daily. Be a part of leading Transport and Logistic company. | https://hireleven.com/jobs/warehouse-manager-jobs-in-nadiad-gujarat |
Communication Yearbook 26 is devoted to publishing state-of-the-art literature reviews in which authors critique and synthesize a body of communication research. This volume continues the tradition of publishing critical, integrative reviews of specific lines of research. Chapters focus on comprehending speaker meaning; understanding family communication patterns and family functioning; affection in interpersonal relationships; audience activity and passivity; the political influence of business organizations in public policy. In addition, chapters discuss emotional intelligence in organizational communication; professionalism and social responsibility in the field of public relations; climate of opinion; ideology and the study of identity in interethnic communication; technology and the physician-patient relationship; and communication across the life span.
Representing media, interpersonal, intercultural, and other areas of communication, this is an important reference on current research for scholars and students in the social sciences.
What people are saying - Write a review
We haven't found any reviews in the usual places. | https://books.google.bs/books?id=9RyZ2U2Y0jQC&lr=&as_brr=0&source=gbs_citations_module_r&cad=5 |
Rosa spp.Rosa is the Latin meaning for “a flower”.
Gender: Feminine
Element: Water
Planet: Venus
The lavender rose is associated with enchantment, splendor and royalty. In the Victorian era, its message in the language of flowers was “love at first sight”. This rare beauty is rich in meaning. Send it to that special person with an essence of elegance, or someone who deserves special appreciation because of the way they share their gifts. Send it to the person who immediately enchanted you, in a romantic, or friendly way. Receiving a lavender rose is said to be an unforgettable experience!
Leave a Reply.
|
|
"My mission is
to help others see and cherish the beauty,
romance and treasures within and around them
that are often dismissed or completely overlooked."
Categories
All
Mikell
Mikell is a writer, artist and professional treasure hunter, finding the greatest treasures in the wonderful people who enter her life! | https://www.mikellshiddentreasures.com/todays-treasure/lavender-rose-for-enchantment |
Many professional, but also life goals are achieved in cooperation. What can be done to make cooperation more effective? What tools should be used? Here are some tips that will be useful both in project work and freelance cooperation.
What is the strongest influence on the effectiveness of collaboration within the group?
- good communication within the group – it is important that the communication is based not only on clear and understandable way of informing about the important issues but also on the ability to listen to others. Lack of clarity in communication should not be passed over in silence but should be followed up with questions asking for clarification. This helps avoid unnecessary misunderstandings,
- cohesion – this aspect determines the level of development of bonds between members belonging to the group, where loyalty is an important feature. A high level of cohesion will encourage new people to join the team,
- support given to other members – a kind attitude towards others is an element that improves cooperation, ruthless competition destroys bonds,
- trust in others, responsibility – trust in colleagues’ conscientious performance of their duties makes us work better, without falling into frustration (”everything on my head again”),
- building a good atmosphere – a harmonious team is also built through integration activities outside work, e.g. joint outings,
- cooperation skills – this manifests itself in the division of tasks and their implementation independently of each other so that they contribute to achieving a common goal,
- efficient transmission of instructions – they should be given in a clear and comprehensible manner, so that their meaning can be easily understood,
- delegating tasks – acting in such a way as to evenly distribute work among team members; it is also important when it comes to taking responsibility for its execution
- respecting other members – appreciating others translates into our sense of mutual worth, and a valued team works more efficiently.
How to improve effectiveness of collaboration? 8 important principles
Regardless of the level of effectiveness of cooperation in the group, it is worth taking action to improve this indicator. The fact that you have achieved a high level does not mean that it is time to stop there. The specificity of working with people is such that even in a very efficient group, something can go wrong – the mechanism “gets stuck” at an unexpected moment. Therefore, it is worth taking preventive measures from time to time. Here are ideas for improving the effectiveness of cooperation:
- Resolving conflicts
There is no illusion that friction can be avoided. However, you have to learn to manage them so that they become an impetus for creative work: they should signal different ways of seeing fundamental issues, which will enrich the team. On the other hand, you need to ensure that they do not create animosity among team members.
- Getting to know your colleagues better
We spend a significant part of our lives at work. It is good for us to know those with whom we have to work. This provides a basis for increased trust and confidence in the responsibility of co-workers for the tasks assigned to them.
- Using project management tools
Investment in project management applications is a move with the times. Modern technologies should support cooperation between people – this is the true side of innovation.
- Build diversity of competencies
Effectiveness is increased when, when selecting new team members, we bet on people with unique competences, which have not been present in the team so far. This will broaden its capabilities.
- Taking advice from external experts
Sometimes it is difficult to diagnose problems that occur within an organization on your own. It is necessary to look ”from the outside”. Hence, an audit done by a professional can prove to be crucial in the direction of working on effectiveness in the team.
- Improving communication in the team
Deepened listening skills and creating space for conversation are always important. It is advisable to give team members time to explain their reasons and talk freely.
- Rewarding members
Undoubtedly, the effectiveness of collaboration improves when group members feel that they are being rewarded for better performance. It doesn’t always have to be a tangible reward – sometimes praise alone is important.
- Stigmatize harmful habits
On an ongoing basis, it is worth pointing out those habits that harm the effectiveness of cooperation in the team. Quick reaction will prevent problems from growing. | https://frilif.com/career/do-you-enjoy-collaborating-with-others-learn-the-principles-of-effective-collaboration/ |
In recent years the preference of working in small teams has gained in popularity, mostly because of a wide range of benefits it can bring to the overall work. Generally speaking, in a small team it is easier to make a consensus, and usually, team members are willing to be more flexible. As a start-up is defined as a company in the early stages of its development with no certainty, it also includes just a few entrepreneurs who work on definite innovations, which means that working in a small team is the most common.
While working in a team when there are just a few team members, it is key to fully understand the start-up’s mission, vision, and clear goals for achieving them. Setting goals should be co-operation work, where everyone is included and can bring up any remarks to it which will lead to the bigger commitment of all team members. It is a combined effort of all team members where everyone understands business aims and knows how to contribute to achieving them. Setting goals in a small team helps to keep everyone aligned and allows members to have autonomy over their work. When team members see how they can contribute to achieving specific goals, they start to focus on finding ways to work smarter and more efficiently. It gives drive & passion for overall work and boosts the engagement of the small team.
Trust is a crucial aspect of a successful business for the comfort & safety it can provide. Being part of a team with no trust is like being just an individual in a group where cooperation can be very hard. However, when team members are aware that they will not be judged, punished, or embarrassed for their opinion they are much more likely to engage, participate and release their efforts. Especially in small teams where all ideas count and interaction is more dynamic than in bigger teams, self-reflection on judging other opinions is important. Team members should feel psychologically safe – which is defined as feeling comfortable to fully express themselves – between each other. This trust can bring more innovation, the courage to take appropriate risks, and the creative thinking of every team member.
More about what is psychological safety in the workforce:
The majority of start-ups start in a small team, which requires people to take several roles at once. As a leader of a small team, it is important to be open to new ideas of team members, as it gives them a feeling of being valued and respected. Empowerment impacts the engagement of the team, and also it impacts productivity, enabling individuals to think and take action in a self-sufficient way. It is part of self-development where they can pave their path to success along with creating a prosperous start-up.
In managing small teams, feedback is regarded as an essential management tool. It guides & motivates all individuals in a team to have to make their work even more effective. Furthermore, it conveys how team members see each other and what their strengths and weaknesses are. Especially in connection with starting a start-up, team members do not know how the cooperation between them will be and how every team member is able to work under pressure or in unexpected situations. That is why it is important to emphasize regular feedback meetings. It will point out the areas of improvement, identify challenges from past meetings, and gain other team members’ perspective.
By building an atmosphere that is friendly and supportive, a better workplace is automatically guaranteed. Team buildings or even casual get-togethers outside of work give employees an opportunity to build high-quality relationships with their colleagues. These activities can bring a more robust workflow and a more open attitude towards each other. A workplace with a relaxed atmosphere, where relations between employees are not tense, encourages people to work harder and be more efficient. Social interactions outside of the workplace ensure that all members of the team are on the same page. It gives a feeling of equality and inclusivity. Furthermore, close relations between team members help provide emotional support and, thus, contribute to improving team members’ overall well-being. | https://www.dsif.nl/5-simple-ways-to-be-an-effective-leader-in-small-teams/ |
*Corresponding author: Khalidullin O H, Ecology Professor, Academician of the Russian Federation LAN, Kazakh National University, Russia.
How to cite this article: Khalidullin O H. Water Circulation and Climate Change. JOJ Wildl Biodivers. 2018: 1(1): 555551.
Opinion
Humanity annually selects the nature of the earth for their needs. The rapidly developing machinery increases the productivity of all types of production, including the tillage processes: . The area of the arable land alone is about 13 million km2 or (9% of the land): . Increasing hydropower industry: we fill in new large areas with reservoirs for hydroelectric power plants. One of the latest creations of China - a pressure facility - the Three Gorges hydroelectric power station forms a large reservoir with an area of 1,045 km², - . According to the source , Over the past 50 years, man has destroyed 70% of the world’s forests. Created equipment with terrifying performance of forest destruction: .
According to the UN, in the world only during the construction of cities and roads, more than 3 thousand km2 are irretrievably lost every year . We fill up with waste - “the total area of landfills alone is approximately equal to the area of Mexico - 1.9 million km2” . In total in the world more than 3 billion hectares of land are subject to desertification - - this is 30 million km2 or 20% of the total land area - 149 million km2. The total land area in the world seized from nature, according to various sources of information, ranges from 30 to 76 percent. According to the data for 2015. Not the essence - the exact figure, but it is already commensurate with the area of the entire land. These areas are intensively growing and begin to exceed the natural ranges and can reduce them to zero. Quantity goes into new quality. Whole species of animals disappear, and with them ecosystems and food chains, the quality of fumes changes.
All the waters evaporating from these territories have lost their links in the everlasting cycle of transformations -the water circulation between heaven and earth. The quality of water, the volume and speed of transformations have evolved over millions of years in interaction with living organisms. Its main function is to dissolve the mineral and organic substances of the soil and bring them to the roots of plants and their consumption by animals. An important element in the food chain is biota water processing. Water does not disappear but changes and lingers in these organisms for some time, for example, it is known to all that camels can live without water for up to 8 days, people for up to 3 days, bears sleep all winter, plants and trees stop photosynthesis and stop movement juices. All biota is a kind of battery and moisture converter.
The exhalation, evaporation and all excretions of each of the animals and plants have their own individual parameters in the structure. Such a conclusion can be drawn since medicine can diagnose diseases by exhalation and other human secretions. Evaporations from degraded areas are substantially complemented by evaporations from technological processes of industrial and municipal production. Every animal that emerges from the water after drinking or bathing creates unnatural vapors when it dries. But this is a drop compared to the fumes created by man. Of all things, only man thought up to use water not on purpose on a huge scale. Nature did not expect such volumes of evaporation from washing and drying clothes, dishes, objects, asphalt, bodies, use in production processes - everything that accompanies our comfort. All evaporation of water, which has not gone the way of transformation in living organisms and plants, is alien to nature. The cycle of natural transformations without food chains is a shortened path. This is precisely the mistake of our civilization. Water is turned into a working fluid body - a means of transferring heat, pressure, transporting other substances, washing and cooling agents, and components of chemical and physical processes. The evaporation after the use of this water is direct and after sewage goes into the atmosphere without changing the structure or with a change, but not natural. Such evaporation can be called artificial.
The links of natural transformations disappeared, the time delay disappeared. The volumes of such evaporation correspond to the degraded areas and production processes of all mankind. Nature strictly metered provides the action of water on land after precipitation. One of the most important redistribution is carried out - water turns into a solution, passing in soils and, absorbing mineral and organic substances, delivers them for their intended purpose - to plant sap, blood and flesh of animals. Water never disappears anywhere. From the solution in the bodies of organisms, water turns into purely individual waste, which by evaporation goes to the sky. In the atmosphere, perhaps, these pairs also undergo metamorphosis, intermingled with individual pairs of other animals and plants. A new substance, concentrated in the clouds, plays a specific role in the formation of clouds, winds, and atmospheric pressure.
It is possible that these parameters create a mechanism that forms special conditions under which the clouds are driven into the given places in the given volumes and with a given periodicity. For millions of years, such a mechanism has been improved and stabilized with high accuracy, ensuring the formation of various habitats: steppes, deserts, forests, tropics - the whole palette of geographical zones. As industrialization develops, artificial evaporation increases in volumes and speeds. The quality of evaporation is a little-studied direction of science, but, likely, it also has some effect on the “heavenly kitchen.” Evaporations from drying asphalt, boiling water and from the plant or from the breath of an animal cannot be the same. Perhaps for some reason, unusual clouds have recently begun to appear . Increasing artificial vapors, unprecedented by nature in terms of volumes and speeds, changed the “heavenly kitchen”, broke down the mechanisms of distribution by territory and volume of deposition. In some places, devastating floods, in others - drought and fires. The increase in distortions of the natural functions of water led to a change in the most important organs of the climate system - the accumulation of water in polar and mountain glaciers. These are natural refrigerators and batteries that form the desired temperature and humidity conditions. Perhaps it is this factor that is one of the key factors in global temperature: “... The Arctic zone is the leader in global warming. Here it happens much faster. It is expected that by the end of the 21st century, the air temperature will rise by another 7 °C. We carried out calculations and concluded that with a probability of 73% in August-September 2058, the Arctic will be completely free from the ice sheet for the first time in 100,000 years.” . The official hypothesis, based on carbon dioxide emissions, distracts the world community from the true cause of climate change and leads the world to a global catastrophe. Being engaged in microscopic reductions in CO2 emissions, we have not seen the main reason.
From the beginning of the 20th century, according to UN experts, , the increase in CO2 emissions was from 0.5 to 5% per year. As a result, over the past hundred years, 400 billion tons of carbon dioxide has just entered the atmosphere due to the burning of fuel.” Or 4 billion tons per year. According to , annually mankind extracts up to 20 thousand cubic kilometers of groundwater for its needs. Plus, according to , people irrevocably take away about 2 thousand cubic kilometers of fresh water from rivers and lakes. Annually. Almost all this water is extracted from natural circulation and through the sewage system and evaporation goes into the atmosphere without organic changes. 22,000 cu. kilometers is 22 trillion cubic meters. meters or tons of water. In this volume, 4 billion tons of CO2 is just 0.018% - an imperceptible drop. Could this drop affect something when there are 22 trillion tons of artificial fumes in the sky? To these should be added the natural evaporation, with the preserved half of the land in its natural state. The fight against carbon dioxide is a war “with a few fleas” against the background of the “herd of elephants.” A clearer comparison: we are all in a boat with a hole at the bottom and are trying to bail out water with a teaspoon instead of filling the hole.
The fact of a change in the distribution of precipitation is not questioned - wet places are even more wet - there are floods, dry places are even drier, there is drought and fires. Hence, the extinction of species of biota and the constant increase of natural disasters. Another important consequence of the destroyed distribution of precipitation is the reduction of glaciers - their growth has stopped, the long-term accumulation of snow on glaciers. Without reaching the poles and mountain zones, the waters fall out of rain and snow not in historically given places, but in the oceans and foothill zones. The level of oceans is growing from melting glaciers, but this level is growing more from precipitation that does not reach the glaciers. This assumption is derived analytically, it is necessary to substantiate the data of weather stations located close to the glaciers and on the glaciers themselves.
“... At present, 2013, the main source of fresh water is still rivers, lakes, artesian wells and desalination of sea water. At the same time, if in all river channels there are 1.2 thousand cubic meters. kilometers of water, then its amount in the atmosphere is 14 thousand cubic kilometers. Every year, 577 thousand cubic kilometers of water evaporates from the surface of the land and the ocean, and the same amount then falls as precipitation”- . If we accept that precipitation falls evenly throughout the planet, then 1/3 of the land falls out of 1/3 of the total precipitation - 192 km3. 22 km3 of them - this is about 10% of artificial evaporation alone. The water evaporates along the shortened chain of the water cycle between the atmosphere and the soil. Obviously, these 10 percent and affect natural disasters, the melting of glaciers and lead to a global catastrophe. And these evaporations are increasing with terrifying acceleration. New hydroelectric power stations are being designed and built around the world with the flooding of vast territories. Receiving momentary benefits from the received electricity today, we are preparing the graves for future generations.
Is there any salvation? Do we want to continue humans and in general life on the planet? Everything must be taken back to nature: soil, forests and natural function water. Not in order to preserve the habitats of endangered living creatures, but on the scale of the return of everything that was taken by mankind. There is an urgent need to develop a new concept of saving life on the planet. It should be based on total saving of water in production and everyday life by every enterprise, every state, every person. It is not easy to make rules about forgotten tap and the reduction of water consumption. It is necessary to radically reconsider all actions related to water. Water must make a qualitative transition from the functions of the working fluid body, the intermediate means of technological processes to the primitive natural functions - the satisfaction of thirst, consumption - living organisms. Everything else must be reduced. Only a reduction in spending on unnatural needs can stop the destruction of the planet.
References
- https://www.youtube.com/watch?v=Lc2XVCTPzPQ
- https://ru.wikipedia.org/wiki/Power
- https://en.ppt-online.org/299479
- https://ru.wikipedia.org/wiki/Tri_uschelya_(elektrostantsiya)
- 50-let.html
- https://www.youtube.com/watch?v=vZCnvVyvIbo
- https://vuzlit.ru/635286/otchuzhdenie_zemel. | https://juniperpublishers.com/jojwb/JOJWB.MS.ID.555551.php |
AGENDA - MIL-STD-1310: SHIPBOARD EMC DESIGN PRACTICES
There has been a major explosion in the use of high speed digital systems, handheld wireless tranceivers, and other electrical and electronic equipment aboard naval vessels. All this high level RF energy introduces severe electromagnetic interference (EMI) and susceptibility problems to ship operation and performance. MIL-STD-464C has shipboard susceptibility requirements exceeding 27,000 V/m at some frequencies. To make matters worse the operational environment is highly corrosive and creates non linear junctions requiring control of hull generated interference and to minimize development cost there is increased use of commercial-off-the-shelf (COTS) equipment and non-developmental items (NDI).
MIL-STD-1310 specifies the performance requirements for shipboard bonding, grounding and shielding; identifies requirements for EMI control in the areas of hull-generated and equipment-generated EMI, hull and cable penetration EMI, and superstructure blockage/reflections; specifies requirements for protection of personnel from electrical shock, and identifies the applicable requirements for measuring the effectiveness of EMI control and safety measures. The specified requirements apply to both metal and nonmetallic hull ships and are applicable during construction, overhaul, alteration, or repair.
1. EMI/RFI/EMC BASICS
Terms and Definitions
Time to Frequency Conversion
Acronyms Used in MIL-STD-1310G
Examples of Interference Conditions
Interference Sources
Interference Receptors
Overview of Typical EMI Levels/Coupling
Power Line Disturbances
Transients - ESD, Lightning, EMP
F.A.S.T. Analysis
Systems Emission/Immunity
Comparison of MIL-STD-461E and FCC/EU Commercial EMC Requirements
MIL-STD-464A Requirements for Commercial and NDI Equipments
MIL-STD-464A Radiated Susceptibility Requirements for USNavy Ships
2. OVERVIEW MIL-STD-1310G REQUIREMENTS
Grounding/Bonding
Hull Generated EMI
Hull and Cable Penetration EMI
Superstructure Blockage/Reflections
Equipment Generated EMI
Electrical Safety for Ungrounded Power
3. EMC SYSTEMS DESIGN FUNDAMENTALS
Conducted vs Radiated Emission
Simplified Circuit Loop Radiation Equation
Maximum Loop Area to meet emission limits
Simplified Circuit Loop Pickup Equation
Design Emphasis
Spectrum Density vs Pulse Shape
Ultra Wide Band (UWB)
Narrow Band (NB) & Broad Band (BB) Signals
Differential and Common Mode Currents
4. CABLE EMC DESIGN/INSTALLATION PRACTICES
Cables: Equipment Antennas - The Primary EMC Problem
Cable Differential/Common Mode Coupling
Field to Wire-Pair and Wire-Pair to Field
Twisted Pair
Cable Shielding
Grounding Rules for Cable Shields
Pigtails and Daisy Chains
Coaxial Cables
Connectors
Crosstalk
Conduit, Ultimate Shield
Field to Grnd Loop Coupling & Reduction
Common Mode to Diff Mode Conversion
Floating & Single Point Grounding
Balanced Line Drivers/Receivers
Series RF Inductors
Double Shielding
Shielded Transformers and Baluns
Ferrites
Optical Coupling
5. FILTER SELECTION/INSTALLATION
Basic Filter Types
Attenuation vs Frequency
Source and Load Impedance
Butterworth Low-Pass Filter
Inrush Current
Filter Mounting & I/O Isolation
Faying Surface Requirements
Filter Grounding
Ferrite Bead Attenuation
Isolation Transformers for DC and AC Power CM/DM Filtering
6. GROUNDING/BONDING
Primary Grounding Configurations
Safety Earthing/Grounding vs EME Coupling
Grounding Myths vs Reality
Electrical Shock Avoidance (UL, NEC Req's)
Lightning Protection Systems
Filter Grounding
Bond Zo of Round/Flat Conductors & Planes
Contact Surfaces
MIL-B-5087 and MIL-STD-1310 Bond Classes
MIL-STD-464A Bonding Criteria
Class B & C Bonding
Type I, II, III, & IV Bond Straps
Practical Solutions (Appendix A)
Impedance Reduction
7. HULL/EQUIPMENT SHIELDING
Near Field (EF and HF)
Far Field/Plane Wave
Metal Barrier Performance
External/Internal Reflection & Absorption
Graphical representation
Cavity Amplification - Below Decks
Shielding Performance of Typical Metals
Absorption and Reflection equations
Shielding Effectiveness vs Frequency
Low Frequency Magnetic Shielding
Principal Seam Design Configurations
High Performance Enclosure Seams
Mechanical/Electrical Considerations
RF Gasket Mechanical/Electrical Considerations
Qualitative Shielding Effectiveness
Shielding Compromises
Aperture Integrity
Calculation of Aperture SE
Combination of Multiple Apertures
Window and Vent panels
SE of Screen Meshes
Conductive Glass
Waveguide-Below-Cutoff Effect
Honeycomb Air Filters
Component Penetrations (Fuses, Switches, Meters, Displays, etc.)
Hull/Cable Penetrations
8. ELECTRO-GALVANIC COMPATIBILITY
Corrosion a Major Ship board and Coastal Problem
Corrosion Induced EMC Failures
Conditions Necessary for Corrosion
Galvanic Potentials and Coupling
Shielded Enclosure Seams
Oxidation/Reduction Reaction
Preventing Corrosion
Protection Requirements
Faying Surface Preparation
Interstitial Conductive/Non-Conductive Faying Materials (A5.2/5.3)
9. TRANSMITTER/RECEIVER EMI PROBLEMS
Transmitters and Receivers Simplified
Receiver Bandwidth Considerations (5.5)
Purpose of Receiver Pre-selector
Co-Channel EMI
Adjacent Channel EMI
Tx Fundamental to Rx Fundamental
Tx Noise to Rx Fundamental
Tx Fundamental to Rx Spurs
Tx Spurs to Rx Spurs
Receiver Overload/Desensitization
Receiver Overload/Desensitization
Transmitter & Receiver Intermodulation
Hull Intermodulation/Interference
Nonmetallic Structural and Equipment Components
10. ANTENNA EMC CHARACTERISTICS
Antenna and Transmission Line Fundamentals
Frequency vs Wavelength
Structural Resonance
Basic Passive Antenna Types (Monopole, Yagi, LP, Horn, Dish)
Active Adaptive Antenna Arrays
Gain and Bandwidths
Polarization
Electric Field (EF) vs Power & Gain
Antenna Patterns, Main Beam & Side Lobes
Cosite Antenna to Antenna Coupling
Antenna Placement/Separation
Isolation by Directional Antennas, Antenna Shrouds, Blanking, Adaptive Antennas
Superstructure and Other Blockages
Reflections From Conducting Surfaces, Cylinders, and Corners
RF Absorber Materials
Ship to Ship Isolation by F A S T. | http://ronbrewer.com/AgenMil1310.html |
Founded in 1889, Bernhardt Furniture Company is one of the largest family-owned and operated manufacturers of fine case goods and upholstered furniture in the United States. Located in the foothills of western North Carolina. Their ultimate goal is to craft furniture that meets the highest standards of fashion and quality — the standards of discerning customers.
|MODERN BERNHARDT THREE-SEAT SOFA |
Upholstery:
Gray fabric embellished with pink stitching in a geometric pattern. | https://metroretrofurniture.com/product/vintage-bernhardt-three-seat-fabric-sofa/ |
WRMSDs – Biomechanical Risk Factors and Treatment Strategies
Many people in Brooklyn, NY seek treatment for various types of musculoskeletal disorders (MSDs) caused by work-related repetitive overuse of the joints and soft tissues. Common WRMSDs include sprains, strains, tears, back pain and pain in other joints, swelling, inflammation, compression of nerves, and musculoskeletal injuries. They occur due to activities such as bending, climbing, twisting, lifting, crawling, reaching, pulling, repetition, poor posture alignment, and overexertion.
While leading health care centers that provide rehabilitation services in NYC provide effective treatment for WRMSDs, people in jobs that stress the joints and soft tissues need to be aware about the biomechanical risk factors for these injuries. In an article in EHS Today, a certified professional ergonomist lists the physical and biomechanical risk factors for work-related joint and soft tissue injuries as follows:
- Neck: Awkward neck postures and general heavy physical work such as frequent lifting
- Low back: Heavy lifting and forceful exertions, repetitive lifting, excessive stretching, stooping and prolonged standing
- Upper limbs: Heavy physical work, forceful exertions, awkward postures, repetition and extended computer mouse use lead to upper limb (shoulder, arm, elbow, forearm, wrist and hand) injuries such as tendinitis, lateral epicondylitis and carpal tunnel syndrome (CTS)
- Shoulder: Physically tiring work, heavy pushing and pulling, and repetitive tool use can influence shoulder injuries
- Elbow/forearm: Sustained grasping postures, forceful exertions, repetitive arm and wrist motions, prolonged computer mouse use and other repetitive work
- Wrist/hand: Risk factors include frequent awkward postures such as wrist flexion and extension, forceful exertions, heavy physical work, and prolonged computer mouse use
- Lower limb: Repetitive stair climbing, repetitive heavy lifting, and prolonged kneeling or squatting
According to experts, certain risk factors such as forceful exertion and awkward postures tend to have a bigger role in the development of MSDs. That’s why every organization needs to have a good ergonomics training program to teach employees how to properly use equipment as well as the appropriate way to perform job tasks.
The common symptoms of WRMSDs are pain, numbness and/or tingling of the fingers, wrists, elbows, forearms, and/or shoulders, and loss of touch and grip. The first approach to treatment is to avoid the activities causing the injury. In an established Brooklyn pain management center, work-related musculoskeletal disorders are treated using safe and effective non-surgical strategies such as:
- Non-steroidal anti-inflammatory medication
- Pain injections
- Physical therapy
- Transcutaneous electrical nerve stimulation (TENS)
- Chiropractic care
- Cold compression therapy
- Non-surgical spinal decompression
- Radiofrequency radio ablation
- Massage therapy
- Rehabilitation exercises
Early diagnosis and proper treatment is necessary to prevent WRMSDs from getting worse and causing prolonged disability. | http://www.hqbk.com/blog/2016/10/wrmsds-biomechanical-risk-factors-treatment-strategies/ |
The current overlapping crises have a crucial influence on the transition to carbon-neutral societies. The COVCLIM project analyses approaches to carbon pricing that factor in poverty and inequality and underlying policy processes to support the transition to sustainable and equitable economic structures.
The economic and political impacts of the COVID-19 pandemic and Russia’s war of aggression in Ukraine fundamentally shape the prospects for a just transition to a sustainable society. Economic stimulus packages, climate change mitigation and adaptation measures, and aid and poverty alleviation programmes are straining public budgets and necessitating fiscal reforms. This pressure to act offers a historic opportunity to achieve a triple dividend: Climate action, fiscal consolidation, and social justice. Implementing a green tax reform could enable countries to address these challenges, in particular to set price signals for a low-carbon economy, raise revenues to consolidate public budgets, and fight poverty and inequality.
In this context, the COVCLIM project examines Nationally Determined Contributions (NDCs) pledged under the international climate agreement regarding carbon tax reforms as an indicator of climate ambition. We will also analyse design options of carbon tax reforms to reduce poverty as well as inequality and examine underlying differences in political and economic processes that lead to implementation or blockages. For this, we will explore reforms in industrialised and middle-income countries in more detail.
New topicwise publications:
Malerba, D., & Wiebe, K. S. (2021). Analysing the effect of climate policies on poverty through employment channels. Environmental Research Letters, 16(3), 035013.
Malerba, D., Gaentzsch, A., & Ward, H. (2021). Mitigating poverty: The patterns of multiple carbon tax and recycling regimes for Peru. Energy Policy, 149, 111961. | https://blogs.idos-research.de/2022/09/27/new-project-how-does-the-covid-19-pandemic-affect-climate-policy/ |
Is your school:
- Dealing with numerous challenges in providing healthy options for picky eaters?
- Balancing providing tasty, nutritious meals with monitoring allergens and specific dietary needs?
- Needing support in communicating the nutritional value and commitment of your meal plan?
- Struggling to provide the snacks students want with providing healthy options?
- Wanting to eliminate waste in cost and resources?
With a Lunchroom Makeover, you can explore new choices and combinations that will provide peace of mind to parents, a wide range of choices for your students, and affordability and flexibility for your school.choices. | https://www.kidsnutritionhouston.com/school-menu-makeover |
#TodayInHistory – October 223 min read
October 22 – Some important events on this day.
362 👉🏼 The temple of Apollo at Daphne, outside of Antioch, is destroyed in a mysterious fire
1633 👉🏼 Battle of Liaoluo Bay: Dutch East India Company defeated by Chinese Ming naval forces in southern Fujian sea
1721 👉🏼 Tsar Peter the Great becomes “All-Russian Imperator”
1797 👉🏼 First parachute jump is made over Paris.
André-Jacques Garnerin made the first documented parachute jump on this day, landing safely after exiting a balloon 3,200ft above a park in Paris.
It is said that he came up with the idea while serving in the French army and spending two years as a prisoner after being captured during hostilities against England. He was confined at a prison in Hungary where the high ramparts mocked the notion of any escape attempt but could have sparked the idea of a parachute in his brain.
1879 👉🏼 Thomas Edison perfects carbonized cotton filament light bulb
1883 👉🏼 New York’s original Metropolitan Opera House has its grand opening with a performance of the opera “Faust”
1884 👉🏼 International Meridian Conference in Washington, D.C. adopts Greenwich Mean Time (GMT) worldwide, creating 24 international time zones with longitude zero at the Greenwich meridian
1895 👉🏼 In Paris an express train overruns a buffer stop, crosses more than 30 meters of concourse before plummeting through a window at Gare Montparnasse
1897 👉🏼 World’s first car dealer opens in London
1907 👉🏼 Panic of 1907: A run on Knickerbocker Trust Company stock leads to US wide run on banks
1962 👉🏼 Cuban Missile Crisis: US President John F. Kennedy addresses TV about Russian missile bases in Cuba and imposes a naval blockade on Cuba, beginning the missile crisis.
Of the many heart-stopping incidents in the Cold War, perhaps none was more frightening than the Cuban Missile Crisis. On the morning of October 16, 1962, this photo was one of a set shown to US President John F. Kennedy, confirming that the Soviet Union had placed nuclear missiles in communist Cuba, 90 miles off the coast of Florida.
This kicked off thirteen extraordinary days of tension and brinkmanship between the two rivals. For days the Kennedy cabinet debated in private what to do about the situation, and on October 22, Kennedy went public with the crisis by announcing a ‘quarantine’ of Cuba – a carefully used word, since a blockade would technically be an act of war.
More tense moments passed. Soviet ships attempted to penetrate the blockade but turned back. A US spy plane was shot down over Cuba. Eventually, after a long period of talks, Kennedy and Nikita Khrushchev agreed that the Soviets would withdraw the missiles in exchange for a public assurance the US would not invade Cuba, as well as a secret deal that America would remove its missiles in Italy and Turkey.
What most people don’t know is just how close the situation came to nuclear war. During the crisis, the US Navy dropped practice depth charges on a Soviet submarine. Inside the sub, the commanders were unaware if a war had begun. It took three votes to launch a nuclear strike: only one of the three commanders, Vasili Arkhipov, voted not to retaliate with a strike, thereby preventing a nuclear war. | https://random-times.com/2020/10/22/todayinhistory-october-22/ |
Whole Group Exploration
Whole Group Exploration is a form of whole group instruction where we work with conceptual models to understand the algorithm behind solving math problems. Students work with whiteboards at the carpet as we discuss and work through a series of problems that build and understanding of our skill. As students successfully prove that they are ready to work independently, I dismiss them to their seat with our practice, keeping the students who need additional support to go through more practice problems. This strategy allows me to give more support to students who need it and release students who are ready to excel.
About this strategy
Long
Math
Fifth grade
Similar Strategies
Mad Minute is a fast-paced math fact practice strategy that our class does every day as our "Do Now." My students get one minute to finish as many problems as they can, working towards getting the highest number of consecutive problems correct. As my students work on Mad Minute more and more, they improve their accuracy and speed. We also focus on improvement rather than overall score, celebrating students who get higher scores towards the end of the week.
A blended teacher’s personal mindsets shape his decisions as an educator. These mindsets influence general pedagogies, instructional approaches, and short-term decision making, alike. Check out how Stephen’s mindsets have helped to shape his blended instruction.
Teachers need feedback from their students constantly to make good decisions. One way I check what my students brains are doing is through Post it Power. This strategy involves students writing an answer to either a reflective question or math problem that will illuminate their understanding. Using this information, I get a powerful, visual snapshot of the class that helps me to make decisions about the following days' lesson. | https://betterlesson.com/blended-learning/strategy/resource/14849/khan-tracker-png |
The ability to reduce noise in a received radar signal from its target largely indicates the accuracy of the radar system. Matched filters help to maximize the signal to noise ratio of radar systems. Matched Filters are commonly used in radars whose transmitted signals are known and are used as a replica to correlate with the received signal. The correlation is carried out in frequency domain applying Fourier Transforms. A Singular Value Decomposition (SVD) matrix filter is presented in place of the commonly used matched filter with the aim of leveraging the compression capability of the SVD algorithm as used in data compression. In this research, an FFT matched filter and an SVD matrix filter are simulated with an input chirp signal designed with LabVIEW. The results are compared based on their compression ratio, range resolution and signal to noise ratio. The SVD Matrix Filter from the simulation demonstrated a comparative improvement in compression ratio, range resolution, and signal to noise ratio over the Matched filter using the same parameters.
References
- Geetha, K., & Bohara, K. A. (2014). Design and Development of Signal Processing Algorithms for Ground Based Active Phased Array Radar. International Journal of Science, Engineering and Technology Research (IJSETR),, 3(7).
- Krishna, M. V., kumar, K. R., Suresh, K., & Rejesh, V. (2011). Radar Pulse Compression. International Journal of Electrical, Electronics and Data Communication Technology, 2(SP-1), 130-133.
- Bryant, J. H. (1994). Tracking the History of Radar. (O. Blumtritt, H. Petzold, & W. Aspray, Eds.) New Jersey: IEEE - Rutgers Center for the History of Electrical Engineering and the Deutsches Muscum.
- Skolnik, M. I. (2001). Introduction to Radar Systems (3rd ed.). (K. Kane, Ed.). New York: The McGraw-Hill Companies.
- Skolnik, M. I. (2008). Radar HandBook (3rd ed.). New York: The McGraw-Hill Companies. Retrieved 2013.
- O’Donnell, R. M. (2010). Radar Systems Engineering. IEEE New Hampshire Section. Lecture 11. IEEE AES Society.
- NASA Science Mission Directorate. (2010). Introduction to the Electromagnetic Spectrum. Retrieved December 04, 2014, from Mission Science: http://missionscience.nasa.gov/ems/01_intro.html
- Agilent Technologies. (2011). Improving Radar Performance by Optimizing Overall Signal-to-Noise Ratio. USA: Agilent Technologies. Retrieved 2013, from Agilent Technologies: http://cp.literature.agilent.com.
- Pardhu, T., Sree, A., & Tanuja, K. (2014). Design of Matched Filter for Radar Application. Electrical and Electronics Engineering: An International Journal (ELELIJ), 3(4).
- Mar, T. T., & Mon, S. S. (2014). Pulse Compression Method for Radar Signal Processing. International Journal of Science and Engineering Applications, 3(2), 31-35.
- Hosking, R. H. (2003). FPGA Cores Enhance Radar Pulse Compression. COTS Journal, 32-37.
- Hyun, E., & Lee, J.-H. (2010). Method to Improve Range and Velocity Error Using De-interleaving and Frequency Interpolation for Automotive FMCW Radars. International Journal of Signal Processing, Image Processing and Pattern Recognition, 2(2), 11-22.
- Pan, Y., & Hamdi, M. (1996). Singular value decomposition on processor arrays with a pipelined bus system. Journal of Network and Computer Applications, 235–248.
- Baker, K. (2013). Singular Value Decomposition Tutorial.
- Erricos, J. (2005). Handbook on Parallel Computing and Statistics.
- Stewart, G. (2000). The Decompositional Approach to Matrix Computation. University of Maryland, Computing In Science & Engineering. IEEE.
Keywords
Singular value decomposition, radar signals, signal-to-noise ratio, signal compression, radar. | https://www.ijcaonline.org/archives/volume150/number12/26145-2016911426 |
Overwatch is an upcoming First Person Shooter (FPS) developed by Blizzard Entertainment (Starcraft, Warcraft/World of Warcraft, Diablo). It marks the company's first foray into that specific genre. Lately, all of their newer endeavors involving branching out from the safety of long running franchises have been panning out. Some of these include Hearthstone (a free-to-play online collectible card video game) and Heroes of the Storm (a Multiplayer Online Battle Arena — MOBA). While these games may borrow elements from their franchise roster, they are completely different in regards to Blizzard's standard fare.
Overwatch is a bit unique in that it's sounding fairly team-based focused. Sure, most FPSs rely on some semblance of team work, but you don't necessarily need to have everybody on the same page. A game like this, featuring a large pool of characters offering different roles (Offense, Defense, Tank, and Support), however, may be a lot more demanding in communication and strategies among players.
I'm really curious about this game and am hoping to play during the Open Beta on Xbox One in May (the game releases later that same month on PC, PS4, and Xbox One) so that I can get a feel for if it's one I'd like for the long run. Believing The Division would be my only major video game purchase for 2016 isn't exactly going as planned. Having just played (and very much enjoyed) Battleborn, and now Overwatch being thrown into the mix, it's very possible I'll be dipping deeper into the piggy bank than anticipated...
Have you heard of Overwatch? Are you planning to play in the Open Beta (or already played in the Closed Beta)? Which character and/or role are you most interested in and why? Have you played other Blizzard Entertainment games? If so, which is your favorite? | https://crytonchronicles.com/ijak/2016/4/18/a-to-z-2016-overwatch |
- Context 1: Visitors to Bluecore.com and other Bluecore, Inc. owned and operated websites
- Context 2: Customers of Bluecore’s corporate clients, and/or visitors to websites utilizing Bluecore’s product and services
- Context 3: Corporate clients utilizing Bluecore’s products and services
- Context 4: Employee, Contractor and Applicant Data at Bluecore, Inc.
Overview: Definitions, Scope and Applicable Regulatory Information
About this policy
What is personal information?
As used herein, the term “personal information” or “personal data”means information that specifically identifies an individual (such as a name, address, telephone number, e-mail address, or other account number), and information about that individual’s activities, such as information about his or her use of Bluecore sites, products or services, when directly linked to personally identifiable information. Personal information also includes demographic information such as date of birth, gender, geographic area and preferences when such information is linked to other personal information that identifies you.
Personal information does not include “aggregate” information, which is data we collect about the use of the Site or about a group or category of products, services or users, from which individual identities or other personal information has been irreversibly removed. In other words, information about how you use a service may be collected and combined with information about how others use the same service. Aggregate data helps Bluecore understand trends and users’ needs so that we can better consider new features or otherwise tailor our offerings. This Policy in no way restricts or limits our collection and use of aggregate information.
Compliance Frameworks
International Data Transfer – Privacy Shield Frameworks
Bluecore complies with the EU-U.S. Privacy Shield Framework and the Swiss-U.S. Privacy Shield Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information transferred from the European Union and Switzerland to the United States, respectively. Bluecore has certified that it adheres to the Privacy Shield Principles. If there is any conflict between the terms in this Policy and the Privacy Shield Principles, the Privacy Shield Principles shall govern. To learn more about the Privacy Shield program, and to view our certification page, please visit https://www.privacyshield.gov/
In compliance with the Privacy Shield Principles, Bluecore commits to resolve complaints about your privacy and our collection or use of your personal information. European Union or Swiss individuals with inquiries or complaints regarding this Policy should first contact us at: [email protected]. If contacting us does not resolve your complaint, we are further committed to refer unresolved privacy complaints under the Privacy Shield Principles to BBB EU PRIVACY SHIELD, a non-profit alternative dispute resolution provider located in the United States and operated by the Council of Better Business Bureaus. If you do not receive timely acknowledgment of your complaint, or if your complaint is not satisfactorily addressed, please visit www.bbb.org/EU-privacy-shield/for-eu-consumers/ for more information and to file a complaint. Please note that if your complaint is not resolved through the aforementioned channels, under limited circumstances, a binding arbitration option may be available before a Privacy Shield Panel.
As described in the Privacy Shield Principles, Company is accountable for personal information that it receives and subsequently transfers to third parties. If third parties that process personal information on our behalf do so in a manner that does not comply with the Privacy Shield Principles, we are accountable and potentially liable.
EU General Data Protection Regulation
The EU General Data Protection Regulation (GDPR) is a comprehensive data protection directive going into effect May 25, 2018 in participating member states within the EU. Upon implementation, GDPR will replace Directive 95/46/EC. The GDPR applies to all Data Controllers and Data Processors who collect, process and/or store personal data of Data Subjects who reside in the EU, regardless of the Data Controller’s or Data Processor’s location. The objective of GDPR is to strengthen the protection of personal data to address increased globalization and complex international flows of personal data. GDPR will instantiate a consistent set of privacy rules and will be directly enforceable in each EU member state. GDPR enhances previous data privacy rights for EU individuals, data breach notification requirements and security requirements, as well as addressing the topics of customer profiling and monitoring requirements.
Federal Trade Commission
Bluecore, Inc. is subject to the investigatory and enforcement powers of the Federal Trade Commission (FTC).
Use, Retention and Storage of Personal Information
The duration for which Bluecore retains Personal Information depends on the purposes for which it is used. Bluecore will maintain Personal Information for as long as a user is a registered subscriber to Bluecore products, is a user that has supplied data processing consent to an active Bluecore client or partner, or for as long as Bluecore has a legal basis and business purpose to do so and, thereafter, for no longer than is required or permitted by law, or Bluecore’s Data Retention Policy, reasonably necessary for internal reporting and reconciliation purposes, or to provide users with feedback or information that is requested. The information Bluecore collects will be stored and processed in servers in the United States.
Security of Personal Information
Bluecore aims to protect the confidentiality, integrity and availability of data by taking reasonable steps given the context of the engagement in which data is provided to protect personal information from loss, misuse, interference, unauthorized access, disclosure, alteration, and destruction.
Bluecore adheres to a strict “data privacy by design” process that requires security and privacy diligence at all stages of the development, implementation, and operation of a product. This process ensures that the collection, use, storage, transmission or deletion of personal data is conducted in accordance with the GDPR, including data minimization, limited retention or appropriate data security. From the earliest stage of conception and development, risks are identified and documented and sound security measures are identified and encoded in the software as part of the service. The resulting security posture ensures adequate security is present within the entire product life cycle.
Use of personal information
Bluecore may use your personal information to:
- operate, maintain, and improve our sites, products, and services;
- process and deliver contest entries and rewards;
- respond to comments and questions and provide customer service;
- send information including confirmations, invoices, technical notices, updates, security alerts, and support and administrative messages;
- communicate promotions, upcoming events, and other news about products and services offered by us and our selected partners;
- link or combine user information with other personal information;
- protect, investigate, and deter against fraudulent, unauthorized, or illegal activity; and
- provide and deliver products and services requested by clients.
Sharing of personal information
- With user consent
- Bluecore may share personal information when we do a business deal, or negotiate a business deal, involving sale or transfer of all or a part of our business or assets. These deals can include any merger, financing, acquisition, or bankruptcy transaction or proceeding.
- Bluecore may share personal information for legal, protection, and safety purposes.
- Bluecore may share personal information to comply with laws.
- Bluecore may share personal information to respond to lawful requests and legal process, including to meet national security or law enforcement requirements.
- Bluecore may share personal information in an emergency. This includes protecting the safety of our employees and agents, our customers, or any other person.
- Bluecore may also share aggregated and/or anonymized data with others for its own uses.
Children’s Privacy
Bluecore’s products and services are not targeted to or intended for children. If a user is not of sufficient age to enter legally binding agreements in the applicable jurisdiction, that user may not use Bluecore products unless necessary parental consent has been obtained. If it is believed that Bluecore has received information from a person protected under child protection laws where necessary parental consent was not obtained, please notify Bluecore immediately, and steps will be taken to securely remove that information. Bluecore does not knowingly use Personal Information from children for any purpose except to deliver the products that are committed to Bluecore clients. If you believe we have collected information from your child in error or have questions or concerns about our practices relating to children, please notify us using the contact details below.
How to Request Action on Personal Information
With respect to personal information gathered within any of the four contexts included below, an individual who seeks access or who seeks to correct, amend, or delete inaccurate personal information, or limit the processing or sharing of their personal information, should contact [email protected].
In such a request, please make clear: (i) what personal information is concerned; and (ii) which of the above rights (i.e. access, correct, or delete) you would like to enforce. For your protection, Bluecore may only implement requests with respect to the personal information associated with the email address that was used to send the request, and Bluecore may need to verify the identity of the user behind a request before taking action. Bluecore will comply with privacy-related requests as soon as reasonably practicable and in any event, within 30 days of the request. Please note that Bluecore may need to retain certain information for recordkeeping purposes and/or to complete any transactions that began prior to requesting such change or deletion.
Individuals submitting requests should refrain from providing additional personal information such as address, phone number, government identifiers, photos or any type of personal documentation. Any such data does not need to accompany the request for action.
Context 1: Visitors to Bluecore.com and other Bluecore, Inc. owned and operated websites
Data Collected by Bluecore, Inc. websites
We may collect your personal information, specifically your email address, in a variety of ways, including:
- Personal Information delivered upon Account Creation
- Personal Information directly give to Bluecore on a Bluecore site
- Personal Information Bluecore receives from its clients
- Personal Information Automatically Collected with a web browser (activity, browser, time spent)
Cookies
Web Beacons
Bluecore may log personal information using digital images called Web beacons on our Site or in emails. Web beacons are used to manage cookies, count visits, and to learn what marketing works and what does not. Web Beacons are also used to determine if a user opens or acts on a Bluecore email message.
Information choices and changes
Bluecore marketing emails include instructions on how to “opt-out,” or you can send an email at [email protected] to unsubscribe. If you opt out, we may still send you non-marketing emails. Non-marketing emails include emails about your accounts and our business dealings with you. You can request to change contact choices, opt-out of our sharing with others, and update your personal information at that same email address. You can typically remove and reject cookies from our Site with your browser settings. Many browsers are set to accept cookies until you change your settings. If you remove or reject our cookies, it could affect how our Site works for you.
Context 2: Customers of Bluecore’s corporate clients, and/or visitors to websites utilizing Bluecore’s product and services
Lawful Basis for Processing Your Data
Depending on your country of residence, the processing of your Personal Information is lawful only if it is permitted under data protection legislation. Bluecore’s lawful processing permission is rooted in the following valid business cases:
- Legitimate Interest. Bluecore will process your data based on Legitimate Interest described in service agreements with its contracted clients.
Collection of Information
Bluecore collects Personal Information from individuals when the user browses a website of one of its clients, or when a client shares historical information about a user. This may include:
- Providing information during a purchase of a product or service,
- Request information about or otherwise use the website of a Bluecore client
- Enter a contest, leverage a promotion, sign-up for a notification service, such as marketing emails
- Voluntarily provide information to a Bluecore client
Web Browser Data
Bluecore also records information from your web browser. This may include information that does not identify you personally (such as browsing activity when examining a website anonymously). The information received depends on the settings on the web browser. Please review the settings on the web browser to learn how to change the browser settings to enable or disable relevant tracking and data collection mechanisms.
Cookie and Related Technologies
Bluecore tracks users by their email address and 1st party cookie ID. Bluecore maps all on-site behaviors and email engagement activity to the email address and cookie ID in order to create a single unified user view. Bluecore can collect as much data as is generated by user activity. Bluecore may also ingest purchase history, email database and its clients’ customer data to enhance the product’s performance. No other parties are given access to the data that is captured as Bluecore currently has no downstream data processors.
Data Collected by Bluecore products and services
The personal data typically collected by Bluecore consists of:
- Email Addresses
- Identifiers that identify a specific hardware device
- IP Addresses
- Customer IDs, provided by the client
- Derived and predictive data in the Bluecore query engine
- Sent Emails
In some cases, a Bluecore client provides additional personal data directly to Bluecore. Bluecore’s Terms of Service stipulate that clients cannot upload sensitive data.
Sensitive Data
Racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data, data concerning health or data concerning a natural person’s sex life or sexual orientation.
Location Data
If a user accesses a website containing Bluecore technology via a smart phone, mobile device or computer to access a website, Bluecore may collect information about physical location such as the geography of an IP address and billing/postal code.
How Data is Used
Bluecore’s lawful basis for processing data on behalf of its clients in rooted in the objective of helping commerce organizations find, message, and gain insights for their customers.
As permitted by law, Bluecore may disclose Personal Information when disclosure is appropriate to:
- comply with the law or a regulatory requirement,
- comply with governmental, administrative or judicial process, requirement or order (such as a court order),
- cooperate with law enforcement or other governmental investigations or report any activities that may be in violation of legal or regulatory requirements,
- service a contract,
- protect the legal rights of you, our employees, clients, business partners and the public in general
If a third party has acquired the Bluecore business or specific assets, your Personal Information will be transferred to that company, unless prohibited by law.
Deleting, Accessing and Updating Data
Users have the right, depending on jurisdiction to request the following actions related to Persona Information stored by Bluecore:
- Review the data by requesting export and delivery of a machine-readable format
- Correct the data if the data is found to be in error
- Restrict the processing of data in any manner
- Decline inclusion in marketing activities
- Request deletion of Personal Data
To request the actions described, please refer to earlier section of this document entitled “How to Request Action on Personal Information”
Under the EU GDPR, you have the right to report to your local Supervisory Authority if you believe your rights under data protection legislation have not been appropriately considered. However, before doing so, please contact us directly at [email protected] as we are committed to working with you to help resolve any concerns about your privacy.
Context 3: Corporate clients utilizing Bluecore’s products and services
Bluecore is committed to helping its brands successfully comply with the GDPR. The increased responsibilities for Data Controllers and Data Processors, particularly around data management, introduces a shared responsibility requiring business partners to cooperate on many aspects of data privacy. It is critical to recognize that not just European organizations that are affected, but also those outside of the EU who process data in connection with the offering of goods and services to, or monitoring the behavior of, EU residents. As such, it’s important to understand the obligations related to GDPR regardless of where an organization resides.
Collection of end-user consent is paramount to GDPR compliance. Bluecore’s corporate clients qualify as Data Controllers under GDPR, whereas, Bluecore qualifies as a Data Processor. The core element of this distinction entails the direct consumer relationship that Bluecore’s clients have with their customers. Bluecore, via contractual agreement with its clients, has obtained a legal basis to process customer data on behalf of its clients. For this reason, Bluecore clients must give in-scope EU residents a mechanism to disable behavioral tracking, per session, on their websites. The consent model required by the EU GDPR calls for explicit opt in, rather than implicit opt in + explicit unsubscribe.
Bluecore’s clients must maintain a valid inventory of consent from the users of its websites and communicate any changes in the state of individual user consent to downstream Data Processors, including Bluecore, Inc. The consent must be clearly inclusive of all downstream Data Processors and clearly state the legal basis for collection and transfer of personal information.
End-users have the right to interrogate any organization holding personal information records. If an individual contacts Bluecore clients with requests requiring the export, deletion or correction of an end-user’s data or consent this notice should be communicated to [email protected]. Likewise, should end users contact Bluecore directly with data-related requests, these communications will be passed to applicable Bluecore clients (and any future sub-processors, of which none exist as of this publication) via their advertised privacy activity intake mechanism.
Partnering on security is critical. Bluecore has granted access via username and password for access to certain parts of its Site or services. Each user is responsible for keeping access credentials confidential. It is required that users of the Bluecore services not share access credentials with anyone, including members of their own organization. Each user of the system must have a unique set of credentials. To protect the security of partner data or consumer data, Bluecore may suspend use of a Site or service, without notice, pending an investigation, if any breach of security is suspected. Access to and use of password-protected and/or secure area of the Site or services is restricted to authorized users only. Unauthorized access to such areas is prohibited and may lead to criminal prosecution.
Bluecore may collect and process Client, Vendor or Business Partner Data when you conduct business with Bluecore on behalf of a Client or prospective client, or as, or on behalf of, a vendor, supplier, consultant, professional adviser or other third party. Customer, Vendor or Business Partner Data means information relating to an identified or identifiable natural person that Bluecore receives on behalf of a client or prospective client, or from or on behalf of a vendor, supplier, consultant, professional adviser or any other third parties that do business with Bluecore, whether or not such natural person is also a Website user. Examples of Client, Vendor or Business Partner Data include:
- Contact details of points of contact for Customers, Vendors or Business Partners (such as name, business phone numbers, business address);
- Business contact information (such as job title, responsibilities, department and name of organization);
- Financial information (such as financial account information) if needed to take payment or fulfill contractual obligations or for related purposes;
- Information necessary to evaluate Bluecore’s performance and that of Business Partners
Context 4: Employee, Contractor and Applicant Data at Bluecore, Inc.
Bluecore is committed to protecting information collected from employees, contractors, temporary workers and employment candidates. This applies to Personal Information provided to Bluecore by individuals applying for employment and employees, contractors and temporary employees during employment.
Data Collected
Bluecore collects Personal Data based on individual employment responsibilities, citizenship and location of employment. Personal Data collected includes but is not limited to: name, address, government identification number (i.e., social security number, national identification number, tax payer identification number, driver’s license, etc.), date of birth, phone number, email address, gender, race, ethnicity, health and disability information, criminal history, resume information including but not limited to educational background, employment history, areas of expertise, job type preferences, and other related information.
How Data is Used
Bluecore uses data collected on employees, contractors, temporary workers and employment candidates for the following purposes:
- Process employment applications and conduct background investigations
- Administer compensation benefits and related human resources programs
- Communicate with personnel
- Comply with employment reporting regulations
- Design, evaluate and implement education programs
- Plan and manage budgets
- Monitor and manage business related travel and expenses
- Monitor and evaluate conduct and performance
The use of Personal Data includes storing, recording, transferring, summarizing, sharing and destroying Personal Data as necessary under the circumstances or as required by law. Bluecore will not process Personal Information in a way that is inconsistent with the purposes for which it was collected.
Disclosure of Data
Bluecore will not disclose, sell or otherwise distribute Personal Information without an individual’s permission except under the following circumstances:
- Third Party Service Providers: Bluecore discloses Personal Information to third parties such as suppliers, contractors and service agents providing services such as processing compensation, administering benefits, conducting background checks and performing legal and professional services.
- Legal Request and Investigations: Bluecore may disclose Personal Information to third parties if disclosure is necessary to protect Bluecore legal interests including but not limited to defending or prosecuting a lawsuit or administrative proceeding, to prevent fraud, to comply with an investigation of suspected or actual illegal activity, or to comply with any statute, law, rule or regulation.
- Protecting Bluecore and its Partners: Bluecore may disclose Personal Information to third parties to protect the rights, property, or safety of Bluecore and its associates, in an emergency situation where the health or security of an associate or applicant may be endangered, and when Bluecore believes disclosure is necessary or appropriate to prevent physical harm or financial loss.
- Business Transfers: As Bluecore continues to grow, companies, subsidiaries or business units may be sold or purchased. Under such transactions, Personal Information generally is one of the transferred business assets but remains subject to the promises made in any pre-existing privacy statement.
Accessing and Updating Data
Bluecore will use reasonable efforts to correct any reported factual inaccuracies in Personal Information. Associates should notify HR immediately about changes to an individual’s legal name, address, dependents, beneficiaries under a benefits plan, and other such status changes. Personnel may request a copy of Personal Information stored by Bluecore at any time.
Contact information
Bluecore welcomes your comments or questions about this Policy. You may contact Bluecore at the following email address: [email protected], or by mail at this address:
Bluecore, Inc.
Attn: Privacy
116 Nassau Street
7th Floor
New York, NY 10038
Changes to this Policy
Bluecore may change this Policy at its discretion. Any updates will result in a change to the last updated date below.
This Policy was last updated on April 18th, 2018. | https://www.triggermail.io/privacy/ |
Correct management of the breath is of first importance to the student of elocution. When the voice is not in use breathe exclusively through the nose so that the air may be warmed and purified before reaching the lungs. This habit will, in large measure, obviate the disagreeable effects of dry mouth and sore throat, so common to public speakers. Practise as much as possible in the open air. Be enthusiastic and in earnest.
It is now generally conceded that the abdominal method is the natural and correct way to breathe. In inhalation the abdominal wall moves outward, the diaphragm contracts and descends, while the lungs resting upon the latter are expanded to their fullest capacity. In exhalation the reverse movement takes place. To inflate the chest and draw in the abdomen is to breathe wrongly.
The correct position for practising the exercises is as follows: Stand easily erect, chest active, shoulders equal height, chin level, one foot slightly in advance of the other, heels at an angle of forty-five degrees, knees straight, weight of the body on the toes, arms a dead weight at sides.
BREATHING EXERCISES 1. Gentle abdominal breathing. Inhale through the nose gently and slowly, expanding first the abdomen, then the chest, filling the entire breathing capacity. Exhale quietly and evenly until these parts are wholly contracted. Repeat, inhaling and exhaling through the mouth.
2. Sipping and packing the air. Slowly sip the air until the normal capacity is filled, then increase the expansion by firmly packing in more air. Exhale slowly on aspirated ah (the sound of a in father). The exhalation should be deep, smooth and sustained as long as possible.
3. Nostril breathing. Gently close the right nostril with the thumb of the right hand. Inhale slowly and deeply through the left nostril until the capacity is filled, then change the thumb to the left nostril and exhale slowly through the right nostril until the breath is exhausted. Then with the thumb still closing the left nostril, inhale and repeat.
4. Holding the breath. Inhale deeply. Hold the breath while mentally counting five. Exhale slowly. Increase the count to ten, fifteen, etc. Stop at the first sign of dizziness.
5. Muscular expansion. Inhale deeply. Hold the breath and expand the lungs with a muscular effort. Exhale slowly. Again inhale and force the air down into the lungs. Also move the chest up and down, keeping the air in the lungs all the time.
6. Counting in a whisper. Inhale deeply. Count one to fifty in a loud whisper, in tens.
7. Whispering continued. Inhale deeply. Count in a projected whisper to fifty, one at a time, completely exhausting the air upon each figure.
8. Raising the hands above the head. Clasp the hands and while inhaling deeply raise them slowly above the head, endeavoring to reach as high as possible without raising the heels from the floor. Exhale while the arms gently fall to the sides.
9. Raising the shoulders. Inhale deeply. Clench the hands at sides and while holding the breath, slowly but firmly raise the shoulders up and down five times. Exhale slowly and smoothly.
10. Instantaneous breathing. Inhale instantaneously, deeply and fully. Exhale instantaneously.
11. Rapid breathing. Inhale fully and deeply. Breathe rapidly through the nostrils as in panting. Exhale slowly through the mouth. Rest and repeat.
12. Lying down. Practise the foregoing exercises lying flat on the back, without the use of a pillow.
RELAXATION EXERCISES
1. The arms. Relax the arms at sides. While inhaling, slowly raise the arms above the head with as little tension as possible. Hold the breath, make the arms tense and reach as high as possible with the hands, hold a few seconds, then relax and exhale as the arms slowly descend.
2. The hands. Repeat, clasping the hands above the head and swaying from side to side.
3. Walking. Relax the entire body and walk in imitation of intoxication.
4. The body. With head and neck thoroughly relaxed, shake the body vigorously.
5. The breath. While inhaling, raise the arms to horizontal position, then hold the breath and stretch as far as possible.
6. The feet. With weight on forward foot, the backward foot lightly touching the floor, slowly raise one arm while inhaling deeply and reach out as far as possible. Relax and reverse. | https://books.google.com.bd/books?id=HgZKAAAAIAAJ&pg=PA5&vq=%22wages+is+as+much+a+business+man+as+his+employer%3B+the+attorney+in+a+country+town+is+as+much+a%22&dq=editions:UOM39015075032303&lr=&output=html_text |
While national education leaders try to repair the wrongs of public education, plotting their post No Child Left Behind moves, here in Detroit, some folks tout that school reform might better begin with developing and nurturing relationships among students, between students and teachers, and between schools and community.
Enter a concept called Restorative Practices, a process used in schools (and elsewhere) to proactively build community and social coherence. When fully implemented, it involves everyone who spends their days within the school walls: students, food service staff, teachers, social workers, and principals. Together, they create a healthier environment for learning.
At Plymouth Educational Center in Detroit, a charter school district made up of a K-8 school, a 9th grade academy, and a 10th to 12th grade high school, Restorative Practices are being fully implemented to help students and teachers get along, set boundaries, and find support.
According to the center’s Interim Superintendent Dr. Christopher Plum, opening "circles" start the morning; circles give students a platform to check in with their classmates and teachers, talk about what’s on their mind, and share how they are feeling. The small amount of time spent on creating tighter relationships has benefits; students not only celebrate personal achievements with their peers, but also talk openly about struggles at home or elsewhere with support from their classmates and teacher.
The idea is this: with distractions aired and out of the way, students can better focus on learning. Teachers know what’s going on with their students, and, that alone, can lead to a different outcome for troubled students. In a traditional setting, a student who is troubled might be kicked out of class for being aloof or disruptive. With Restorative Practices, that student may have already dumped some of their emotional baggage during the circle, and if she’s still feeling upset, the teacher has that background and can offer additional support. Support and nurturing are a big part of Restorative Practices.
So is limit-setting and expectations, notes Henry McClendon, program officer at the Skillman Foundation, and an expert on Restorative Practices, having regionally represented the International Institute for Restorative Practices and having trained a number of Detroit school personnel on the process. He has a book bag full of great stories about how Restorative Practices have turned individual lives, classrooms, and whole schools around.
In Highland Park, for example, a teacher who was trained in Restorative Practices, but who was initially skeptical, had a class that was quickly spiraling out of control. She decided to try the process, creating a circle and sharing how the students’ behavior made her feel. She asked the students to answer a series of restorative questions, the last asking what needed to happen to make things better. The students came up with their own classroom guidelines. By using a fair process, and engaging students in the decisions, her discipline issues were done from that point forward.
McClendon also says an Osborn Academy teacher trained in Restorative Practices used the methodology to foster higher expectations. When grades came out, she called a circle and asked students what happened, how they felt about their grades, who was impacted by the grades and how, and what needed to be done to improve on their grades by the end of the next semester.
The students answered the questions and then created their own individual plans for improvement. She went from chasing kids down to complete their work to students chasing her down for extra work.
McClendon says that while many schools have some staff members trained in Restorative Practices, Plymouth Educational Center is the only Detroit district where the practices are being used fully.
Since implementing the system three years ago, students at Plymouth have become more proactive, rather than reactive, with problems that arise. Before, says Plum, "The dean of students wouldn’t know there was a problem until somebody’s nose got broken. This way, students are empowered to stay ahead of that stuff."
Circles are used to address issues at hand, and troubles are put on the table before they escalate. While the process has not been easy, it’s been rewarding.
"The framework for doing this work is not for the faint of heart and is not always clean and easy," says Plum. "It's not as easy as handing out a ditto every week saying: this week we’re talking about respect. But it really gets into relationship building and laying groundwork for long-term change through relationships."
Students at Plymouth Educational Center have embraced the process and understand that they are accountable for how they are feeling and how they contribute to the school environment. Plum says that creates "currency" for when students hit rough spots. Kids occasionally form circles on their own and resolve issues together, without adult guidance or direction. "They do it with each other, not to or for each other … and they come out and the problem is, as they like to say, squashed."
That is one of the fundamental concepts of Restorative Practices in schools: that kids will be more happy, willing, and productive when teachers and administrators let them find their own conclusions, doing things with them, rather than to them or for them.
As McClendon aptly notes, "It creates a process, and the beauty of this is when kids get a hold of it, they will own it."
Melinda Clynes is a regular contributor to Model D and statewide project editor for a series of stories that address children at risk. Her last piece was on an 'emerging leaders' program for girls.
Read more articles by Melinda Clynes.
Melinda Clynes is a freelance writer and regular contributor to Model D. She is the statewide project editor of Michigan Kids, a series of stories that highlight what’s working to improve outcomes for Michigan children. View her online portfolio here. | http://www.modeldmedia.com/features/citykidsclynes1012.aspx |
– Automatically keep track of prices on the competitors’ webpages and modify own prices for similar products or services accordingly.
– Compare sales with information about economic indicators, such as inflation rate and unemployment rate. Use this pattern to predict future sales.
– Predict sales based on weather forecast, including several factors such as temperature, wind speed, rain fall, and humidity.
– Analyze how much the demand depends on the price. Suggest discounted campaign products or services that the client would not buy with original price.
– Analyze performance and promotional effectiveness of campaigns. Use this information when planning new campaigns. | https://kaya-consulting.com/business-analytics-finance/ |
Location:
ONYX Greater China
Job title:
Director of S&M - shama daqing
Description:
Under the general guidance and supervision of the General Manager, and within the limits of established Corporate/Sales policies and procedures, oversees and directs all aspects of the Sales and Marketing activities. Responsibilities include overseeing the planning and development of promotional strategies and marketing plans; oversee and assist with the development and implementation of the sales and marketing plan; management of the sales and marketing team and reporting on effectiveness of the plan. Responsibilities also require direct and routine interaction with Regional Sales and Marketing office. Promotes the desired work culture around the core values of ONYX and the brand ethos.
Qualifications:
- Experience and familiar with local business market- Work experience with similar position in serviced apartment or 4 - 5 star hotel for minimum of 3 years- Mandarin speaker, with good English and communication skills- Good in leadership, solving problem, negotiation and time management skills
Education:
Bachelor
Years of experience:
- 2 years
Number of positions: | https://www.onyx-hospitality.com/careers/job-detail.aspx?id=3058 |
In April 2014, State Administration of Taxation of People’s Republic of China (“SAT”) submitted a letter (“the Letter”) to the subcommittee of UN Transfer Pricing Manual for Developing Countries (“UN TP Manual”). In this letter, SAT gives its comments on intra-group services fees and management fees from a China practical point of view. The Letter is expect to have a profound influence on China tax practices for it is the first time that SAT airs its views regarding intra-group service arrangements on the international platform. We share in this article our interpretation and observation of the Letter.
I. Summary
On top of all, SAT agrees with the application of the arm’s-length principle for intragroup services outlined in the OECD Transfer Pricing Guidelines (“OECD TP Guidelines”). In this regard, two aspects should be taken into consideration: firstly, to determine whether intra-group services have been rendered by employing the “benefit test”; and secondly, to determine an arm’s length price that an independent third party would have been willing to pay for the services rendered under the same circumstances.
Then SAT illustrates the following four circumstances where the parent company should not charge service fees to the subsidiary, which is the core of the Letter.
At last, SAT mentions some practical difficulties regarding intra-group services, such as how to validate the authenticity of the services rendered and the reasonableness of the associated allocation mechanisms, and how to differentiate royalties from technical service fees. For the former, SAT recommends that the UN TP Manual refers the relevant requirements in relation to transfer pricing documentation contained in the OECD Action Plan on Base Erosion and Profit Shifting (“BEPS”), and requires that the parent company discloses in the Master File the transfer pricing policies for global intra-group services, the method and the amount of services fees allocated to each subsidiary. For the latter, SAT recommends that the UN TP Manual provides additional guidance.
II. Our observations
The Letter focuses on the four circumstances where parent company should not charge services fees to the subsidiary. In general, under circumstance 1, 2 and 4, SAT analyses the actual beneficiary based on the benefit test, while under circumstance 3, SAT focuses on whether the charge of service fee is reasonable. The above views of SAT are of great importance to the tax practices in the future. In this regard, we recommend the taxpayers should pay due attention to the four circumstances in the Letter.
Outbound payments especially those involving service fees and management fees are subject to strict administration and scrutiny in China. Although the Announcement No.40 (Announcement 40) was issued with the purpose to streamline the cross-border remittance procedures for non-trade payments, complex tax practical issues may still occur during the cross-border remittance process.
As mentioned above, this is the first time for SAT to air its views regarding intra-group services from a practical perspective. Previously, only Article 41 in the Corporate Income Tax Law (“CIT”) and Article 49 in the Implementation Rules for the CIT Law of the People’s Republic of China govern the intra-group service fees and management fees; and the administration of intra-group service fees and management fees mainly depends on the practices. The Letter indicates that, on one hand, SAT has accumulated extensive experience regarding intragroup services administration, and on the other hand, the scrutiny environment on service fees will be even stricter. As such, enterprises may need more assistance in the consulting and negotiation with tax authorities on cross-border service fee remittance issue.
At last, we will pay close attention to the two practical difficulties mentioned in the Letter and promptly update the reply from the subcommittee of UN TP Manual in our future alerts.
III. How Grant Thornton can help you?
At present, although our SAT streamlines the cross-border remittance procedures, complex tax practical issues may still occur during the cross-border remittance process. With the increasingly strict scrutiny of SAT, our tax professionals have accumulated extensive experience during the communication and negotiation with local tax bureaus and are ready to provide the following services to assist you in the following areas:
- Contract Review: conduct contract review to ensure the tax compliance and tax efficiency, as well as to reflect the related responsibilities and liabilities of both parties regarding additional taxes that may incur under the remittance procedures;
- TP Policy Review: conduct TP review to assess whether the intercompany charges is arm’s length and the allocation method is appropriate;
- TP Study: conduct a “benefit test” to support the business substance of the intercompany transactions and prepare a TP study to establish arm’s length charges for intercompany transactions;
- Document Review: review the submitted documents and the inhouse supporting documents to ensure the consistency and also to support the tax deduction, as well as provide comments on additional documentation possibly needed;
- Application and Negotiation: assist in the contract registration and tax assessment process through discussing and negotiating with and seek confirmation from the in-charge tax authorities regarding the taxable income. | http://www.tax-lawexperts.com/news-publication/home-asia-pacific-tax-china-sat-submitted-a-letter-to-the-un-tp-manual-regarding-views-on-service-fees-and-management-fees/ |
On the 11th of March, the WHO (World Health Organization) declared the novel strain of coronavirus a pandemic.There is still a huge amount of misinformation and rumors circulating the outbreak of the virus, particularly on social media, so I decided to revisit the subject and share my findings with you. Also, as I work as front-line staff at a hospital in Scotland, I have now started encountering patients with COVID-19, although at the time of writing, we are only at the very bottom of the disease curve in the UK rising towards the peak.
These are some of the questions puzzling me, I hope they answer some of yours too!
Does the virus now have an official name? On the 11th of February the virus and the disease it causes was officially named. The virus was named severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) and the disease it causes COVID-19, so is no longer referred to as 2019-nCoV or Corona. The virus was named so, because Co and Vi come from coronavirus, “d” meaning disease and 19 standing for 2019, the year the first cases were seen, hence COVID-19.
What actually is a virus? Unlike bacteria, a virus cannot reproduce itself on its own. A virus needs a host to reproduce itself – for this reason they are sometimes called the living dead… The SARS-CoV-2 virus is a single cell organism with a single RNA (ribonucleic acid) strand, unlike the double helix DNA (deoxyribonucleic acid) we know from humans. Antibiotics only kill bacterial infections and have no effect on viruses.
Is there a cure or a vaccine? There is no cure, no vaccine and no treatment yet, apart from management of symptoms.
Has it now spread to the entire world? It has by today spread to every continent of the world with the exception of the Antarctic. So far, it has not reached the temporarily scientific research population living there, seasonally ranging between 1000 to 5000 people in international stations.
Which animal did it originate from? We still do not know precisely from which animal the SARS-CoV-2 virus originated. Sources agree that the most likely animal vector was a species of bats.
How does it spread? We still do not know exactly how the virus spreads from person to person, but based on similar viruses, it mainly spreads in respiratory droplets (coughing, accidentally spitting while talking or sneezing) and secondly, to lesser effect, from touching infected areas such as door handles or surfaces, then touching your face and thereby getting infected.
Do we know how easily it spreads? Well, the R0 value, the reproductive number, meaning how contagious the virus is (when it spreads to other people it reproduces itself) is still not exactly clarified. If an R0 is less than 1, the spread will decline and die out, if R0 equals 1, it will stay stable and when R0 is larger than 1, there will be an outbreak with the potential to reach a pandemic. The R0 value is calculated from the period people are infectious, the contact rate and mode of transmission. As the virus is still new there is uncertainty with these factors and hence how the R0 value should be calculated. Current estimations of the R0 value range from 1.4 to 6.49, with a mean of 3.28. In comparison, the common flu has an R0 of about 1.3 and the most severe pandemic of the seasonal flu in the winter of 2009/2010 had an estimated average R0 value of 1.46. So COVID-19 is considered more contagious than the common flu.
When is there highest risk of spreading COVID-19? People are considered most contagious while they are most symptomatic (peak sickness) but can also spread the virus before they start showing symptoms, although this is not considered the main route for spreading. Time from infection to symptoms (incubation period) is for 97.5% of people within 11.5 days of contracting the virus with a median of 5.1 days.
How deadly is it? The mortality rate of the COVID-19 pandemic is even more difficult to calculate, as there are many factors involved, most notable the lack of testing and hence an unknown number of actual cases. Access and quality to healthcare is another factor. If you live in an area with no oxygen masks or ventilators, more people are likely to die of COVID-19. More so, the mortality rate can be calculated in different ways: 1) number of dead out of number of infected or 2) number of dead out of number of infected 14 days ago (taking into account a maximum incubation time) or 3) number of dead in relation to number of recovered individuals, hence only cases with an outcome (death or recovery). Hence, while the true death rate of COVID-19 will take some time to fully understand, the numbers from China, who is on the way to recovery (from the first wave), seem to indicate a mortality of about 3%. This may be lower due to the actual number of infected people being higher but undetected.
Is it mutating? Yes, SARS-CoV-2 has mutated into two strains called the L-strain and the S-strain. The S-strain is considered to be the original version, predominantly found in China. The S-strain then mutated to the L-strain, which is seen in about 70% of cases. Because the L-strain is more widespread than the original S-strain it has been suggested to be more “aggressive”. However, it is too early to state this – it may be that it became more prevalent for reasons such as human travel patterns and thus a more rapid spread.
What does the SARS-CoV-2 virus actually look like? The National Institute of Allergy and Infectious Diseases’ (NIAID) Rocky Mountains Laboratories (RML) have released some images of covid-19 as seen under a microscope.
As the WHO and government continue to monitor and research, we will learn more about the COVID-19 disease over the next few months and I will endeavor to keep you posted.
References for images: Figure 1 and 2: The National Institute of Allergy and Infectious Diseases’ (NIAID) Rocky Mountains Laboratories (RML). | https://www.charlotteprimeau.com/update-on-the-covid-19-what-do-we-know-today-and-what-dont-we-know/ |
Html Code: Image Color Change on Mouse Hover
To have a dynamic and attractive website for the visitors, elements must be such that attract more audiences. One of these elements is photo. Because visitors are more inclined to see the photo than to read long texts. For this reason, we must use special styles to make these photos more attractive. One of these styles is the presence of effects on the mouse hover. In the following code, the photo which is normally black and white, becomes gradually colorful when it is pointed by the mouse cursor.
If you don't know how to use this code or need more information Click here! | http://www.htmlfreecode.com/Image_Color_Change_on_Mouse_Hover.htm |
Cheon Seong Gyeong 807
Don’t you think that your mind – even your fallen mind – knows what you have done in your life? Do you or do you not know what kind of person you are? You cannot deceive yourself.
Each of you knows what you are really like. You should not think too highly of yourself. Everything will be totally revealed in the spirit world. Your misdeeds will be revealed first. You have to first clear up your misdeeds before entering the spirit world. Without doing so, you cannot enter the heavenly spirit world. Even if you close your eyes, your misdeeds will be revealed and punishment demanded. Consequently, you must be educated until you rid yourself of that misbehavior. You have to receive training. You have to undergo intense training. The spirit world as a whole is now being trained and is creating an education system guided by Heung-jin. (287-203, 1997.10.30)
Cheon Seong Gyeong 1143
Originally human beings were supposed to become God’s princes and princesses, but they became the offspring of the servant and multiplied the servant’s children. You know who Satan is, right? He is an adulterer. What is an adulterer? He is a robber of love, someone who deviated from the proper way of love. That is why Satan is a thief of love. (135- 283, 1985.12.15)
Devotion
DEVOTION MEANS TO WORSHIP GOD OUT OF LOVE. Love can be volitional, expressed in acts of dedication and sacrifice, as in the biblical commandment, “Love God with all your heart, with all your soul and with all your mind.” In the Abrahamic faiths, devotion is primarily expressed in acts of loyalty and dedication to God’s will.
Love for God can also be an emotional experience. Devotional worship is expressed in joyful and emotional outpourings of praise and song and in the constant longing for God’s sweet presence. This powerful mode of religious consciousness is particularly manifest in the Hindu and Sikh bhakti tradition, the dancing and song of Sufi Muslims and Hassidic Jews, and in the outpourings of the Holy Spirit in Pentecostal Christianity.
Many passages of scripture describe this mystical emotion as a transfigured sublime love of a bride for her beloved, as in the Song of Solomon in the Bible, in the loves of Radha and Krishna or Sita and Rama in the Hindu tradition, and in the devotion of Mary Magdalene to Jesus.
Father Moon teaches that there is a fundamental link between the love of man and woman and the joining of heaven and earth. Father Moon also adds a new, minor key to this longing to experience God’s love by bringing in the element of God’s suffering heart. If God’s real circumstances are full of suffering and pain, then the longing for emotional unity with God should also take us into the experience of divine sorrow. His prayers are full of tears, commiserating with God. Knowing that God is in pain also motivates us to act in this world to alleviate His suffering by saving our brothers and sisters from sin, oppression and despair. At this deep level, heart and action become one.
- Deeds of Devotion to God and His Will
Whatever you do, do all to the glory of God.
1 Corinthians 10.31Let all your deeds be done for the sake of Heaven.
Mishnah, Avot 2.17 (Judaism)
The most excellent action is love for God’s sake and hatred for God’s sake.
Hadith of Abu Dawud (Islam)
He is the Living One; there is no god but He: call upon Him, giving Him sincere devotion.
Qur’an 40.65
You shall love the Lord your God with all your heart, with all your soul, and with all your might. And these words which I command you this day shall be upon your heart; and you shall teach them diligently to your children, and shall talk of them when you sit in your house, and Prayer and Worship 819 when you walk by the way, and when you lie down, and when you rise. And you shall bind them as a sign upon your hand, and they shall be as frontlets between your eyes. And you shall write them upon the doorposts of your house and upon your gates.
Deuteronomy 6.5-9
Whatever I am offered in devotion with a pure heart—a leaf, a flower, fruit, or water—I partake of that love offering. Whatever you do, make it an offering to me—the food that you eat, the sacrifices that you make, the help you give, even your suffering. In this way you will be freed from the bondage of karma.
Bhagavad-Gita 9.26-27 (Hinduism)
Holy is the man of devotion;
Through thoughts and words and deed
And through his conscience he increases Righteousness;
The Wise Lord as Good Mind gives the dominion.
For this good reward I pray. | https://inspiration.visionroot.org/2022/05/17/do-all-to-the-glory-of-god/ |
We’re on a rollercoaster last month (October) as we released two courses, “How to Find Positional Chess Sacrifices” by IM Asaf Givon, and “Attack and Win” which was prepared by myself. And then, we celebrated Halloween. But you know that we don’t stop there. Yes, we’ve got more!
We’re planning to create the next chess course for RCA, but this time we would like to get your opinion. We would like to what exactly you wish to learn and from which author. And that’s exactly why we’re taking a survey. It will be very helpful for us to know your thoughts.
The survey has only 3 questions and you can finish it in just a minute. After taking the survey, you will get the summary (PDF) of my video lesson “The Main Secret of Strong Chess Players“– as a thank you gift! 😊
Even though the goal of a chess game is to checkmate the opponent’s king, that is rarely the winning strategy in the games of strong players and top grandmasters. Rather, the strong players’ winning strategy is to go after the opponent’s pawns – they win a pawn and convert a seemingly equal position into a win. Sadly, many chess players do not understand this, and therefore, they are stuck in their ELO rating and make no real progress no matter how much they train and how hard they try.
Participate in the survey now! | https://chess-teacher.com/survey-for-next-rca-chess-course/ |
When faced with a child’s diagnosis of a developmental disability, families might feel unmoored and isolated in learning how to equip their child with the tools to lead a successful, independent life. Fortunately, 417-land is full of resources.
By Erin Gregory
Apr 2018
Parenting is hard enough as it is, but where do you turn for help when your child is diagnosed with autism? Autism is a developmental disability typically recognized when an individual has difficulty with social interaction, problems with verbal and nonverbal communication and repetitive or obsessive behaviors. Autism is almost five times more common among boys than girls. Fortunately for local parents, 417-land is full of resources that help families understand this diagnosis and equip their children with valuable life skills through childhood and beyond.
“Autism is on the rise in the country and a very important diagnosis families are dealing with now,” says Danielle Wise, Director of Development at The Arc of the Ozarks, an organization dedicated to serving individuals with a variety of disabilities. “The community is essential in assisting families in understanding and coping with the diagnosis.”
The Arc is one of several organizations in the Ozarks that seek to help families cope with autism and help individuals live an independent life. The Arc provides a variety of resources for families dealing with autism, including the family advocacy department. The Arc is one of the only groups in the area that offers this service, allowing individuals the opportunity to gain an understanding of what steps they will need to take when facing a diagnosis of this type.
The Arc also hosts several educational and recreational programs with a variety of activities to encourage students to broaden their social skills and independence. For students elementary school age and older, The Arc’s academy, Rivendale Institute of Learning & Center for Autism, provides an alternative education for students ages 6 to 21, including a one-on-one learning environment for each individual. “The goal is for individuals to move out of this school and into the public-school system, or the workforce, and become a functioning member of society,” Wise says. Although scholarships aren’t offered, The Arc works to provide services that each family needs individually. “We can even provide 24-hour support to several individuals,” Wise says.
Another growing organization in Springfield which seeks to offer services to growing adults with autism is the Perspectives Preparatory Academy (PPA). “PPA is a tuition-free private school that places an emphasis on inclusion, strength-based learning and advocacy in the community,” says Nacy Ryerson, co-founder of PPA. “Currently, PPA serves 24 students ages Kindergarten through seventh [grade]. Our unique student population is served in a personalized learning environment at each student’s pace.
Approximately 50 percent of the student population qualifies under IDEA as a student with a disability (however, PPA prefers the term differing ABILITY), and the other 50 percent does not qualify and would spend 100 percent of their day in a general education setting if they were in a traditional setting. Eight percent of the student population is gifted or twice exceptional.”
PPA plans to grow into a K–12 school and desires to support students and families in the transition to college and the workforce. PPA has already begun creating relationships with local businesses to begin an internship program for high school students to support student interests. PPA knows that allowing students to utilize their strengths puts graduates in a place to succeed and enjoy their chosen careers and degree programs.
PPA believes that putting students in an environment early to explore their passions and strengths leads to better outcomes upon graduation. Every student has a Strength-Based Learning Plan that places an equal emphasis on what a student’s strengths are, and PPA encourages students to be a part of these plans so they learn to advocate for themselves upon graduation.
Because PPA is a tuition-free school, it relies on donors to support more students and families. PPA desires to add more classrooms in the next several years and needs support from the community to be able to support more learners. The school hosts monthly tours and social events as well as free informational events to the community, making itself an even more visible resource for families learning how to live with an autism diagnosis. | https://www.417mag.com/issues/may-2018/springfield-missouri-autism-resources/ |
Activities are based on techniques that physicists use to make discoveries. We have included activities that use data from Cosmic Ray studies and activities that help students explore the concepts in this experiment.
Energy, Momentum, and Mass
Students examine data to find how energy, momentum, and mass are related.
Histograms: Uncertainty
Students construct histograms, identify the best value to represent the data, and report the uncertainty in their answers.
Histograms: The Basics
Students build basic histogram skills required in many of the other activities in the Data Activities Portfolio.
Mean Lifetime Part 3: MINERvA
Students collect data from muons which decay in the MINERvA detector in the Fermilab NuMi beamline to understand particle decay and determine the muon lifetime.
Mean Lifetime Part 1: Dice
Rolling dice serves as the model for decaying particles.
Signal and Noise: Cosmic Muons
In this introductory tutorial that, students learn about how to distinguish muon signals from background and instrumental noise.
Signal and Noise: The Basics
Students analyze signals and noise first in audio and video forms and then look at signals and noise from physic measurements.
Mean Lifetime Part 2: Cosmic Muons
Students learn how physicists measure muon lifetime.
Dice, Histograms & Probability
Students roll dice, record the resulting individual values as well as the sum of the values, create histograms of the data and develop insight into the concept of “degrees of freedom."
Cosmic Rays and the Sun
Students search for a specific data file in the Cosmic Ray e-Lab and look for evidence of the passage of the sun in the flux measurements derived from this file. | https://quarknet.org/category/dataset/cosmic-ray |
So I have been a fan of the New York Jets and the New York Mets since I was 6 years old. That’s a 40 year relationship. If I’m honest, I stopped rooting for the Mets at one point because the organization treated me fairly poorly when I was in the media. But old habits die hard and I could never quite stay away despite flirtations with other teams (Cubs, Diamondbacks).
Many of my friends contend that one should never leave a team. To do so, one says, means you were never a fan to begin with. I suppose Red Sox and Cubs fans might agree after finally winning after the longest droughts.
As a young Met fan I saw a lot of ineptitude, but it never seemed to me like the team wasn’t trying on the field or even that the front office wasn’t trying to get better. They often just bet on the wrong horse or had players that needed more time to develop.
Recently though, I have flirted with the idea of dumping the Jets. A New York Post article backs up my own thought on the basis of psychological health. But 40 years is a long time and many of my friends questioned my loyalty. And so, after a brief discernment I penned the following on Facebook to the Jets.
After much discernment I have decided to do the following with my NFL rooting. Issue the NY Jets a final ultimatum. Next season two things must happen: Severe restructuring of the organization and at least make some moves to become a playoff team and not to be embarrassed on the field as you were far too often this year. Should this not occur, I will become a fan of….The New York Giants.
And since you have given me nothing to root for this year consider me in the Giants fandom for the remainder of this season.
NY Jets: You are on the clock.
It seems somewhat ridiculous. The Jets don’t really care about my commitment, though they should because many feel the same way. I’m surprised season tickets haven’t plunged. Rooting for a sports team isn’t exactly a reciprocal commitment. In fact, loyalty on my part aside, the Jets haven’t exactly been loyal to their own fanbase. They left Queens for New Jersey many moons ago and then flirted with trying to open a new stadium on the West Side of Manhattan. While remaining in New Jersey, it’s not exactly like the Jets make the same kind of commitment that a fan does. We pledge loyalty and hope for the best without any assurance that the team is going to listen to their desires or in fact, give them anything in return. Sure there are fan giveaways and a perk or two if you buy season tickets, but to simply root…there’s not much given in return by the team to those who bleed team colors.
But root nonetheless we do. As frustrating as it might be at times, fans adore their team, sometimes obsessively. And perhaps that is the line. When rooting for your team starts to bleed over into one’s personal life, it might be time for a check. Sports are a pastime. A hobby, something fun, a way to be involved in something bigger. It’s not marriage, or church membership, or even terribly important in the grand scheme of things. The players are the ones who it is truly important to as they risk injury and salary to go all-out on the field against other top athletes. For us, who watch, our passive meandering through is simply that. With the number of concussion injuries in the NFL that have been reported, we may even wish to consider not watching at all as the league, nor the owners, often consider the humans who are on the field more than commodities and their injuries more than collateral damage.
So whether I remain a Jets fan or not, I suppose depends on whether it continues to be fun for me to watch them. Otherwise, it seems somewhat masochistic. Hence, my ultimatum to the team’s management.
Today, I will pray for better days for my team. But will also pray that I can place being fan in the proper order of life’s many events and enjoy the time I spend watching athletes compete at a high level. | http://www.googlinggod.com/2017/01/04/are-sports-fans-married-to-their-teams/ |
This isn’t exactly a sequel, but takes place at roughly the same time and in the same world as the phenomenal The Girl With All the Gifts. A terrible fungus has been released on the world, turning all who are exposed into “hungries” – basically zombies. The survivors have banded together, and a crew of scientists and soldiers sets out into the post-apocalyptic mayhem to gather samples, reconnoiter, and look for a solution.
We follow this crew on their journey: a pregnant scientist (Rina Khan), the teenage boy science genius (Stephen) she’s taken under her wing, a military commander, a spineless doofus who attempts to be the civilian commander, and a miscellaneous collection of other scientists and soldiers. Naturally, people can’t play nice with each other even when they might be the last humans left on earth, so there’s drama within the crew, as well as a power struggle back at home base that threatens to divide our heroes.
Stephen falls into the “magical mental illness” trap a little bit – he’s either severely traumatized or has autism; nobody cares about diagnoses post-apocalypse – but by the end of the book, it makes sense why he was written that way. As Melanie was the lynchpin in Girl With All the Gifts, this book could not have happened without Stephen. His encounter with the Children changes everything science knows about the hungries, and opens up possibilities for treatment and even a cure…but at what cost? | https://cannonballread.com/2017/08/like-revisiting-an-alarming-homicidal-old-friend/ |
Towards Gas Hydrate-Free Pipelines: A Comprehensive Review of Gas Hydrate Inhibition Techniques ( MDPI , 2022 , Article Review)Gas hydrate blockage is a major issue that the production and transportation processes in the oil/gas industry faces. The formation of gas hydrates in pipelines results in significant financial losses and serious safety ...
-
Role of metal oxide nanofibers in water purification ( Elsevier , 2021 , Book chapter)Water treatment through nanomaterials and nanocomposites is a booming research area, since water resources are of prime importance for human sustainability. Having high permeability, optimum pore size, and specific surface ...
-
Influence of combined natural deep eutectic solvent and polyacrylamide on the flocculation and rheological behaviors of bentonite dispersion ( Elsevier , 2022 , Article)The influence of hybrid coagulation/ flocculation systems on the degree of flocculation and rheological behavior of highly stable bentonite suspension has been investigated throughout this study. Natural deep eutectic ...
-
Long-Term Treatment of Highly Saline Brine in a Direct Contact Membrane Distillation (DCMD) Pilot Unit Using Polyethylene Membranes ( MDPI , 2022 , Article)Membrane distillation (MD) is an attractive separation process for wastewater treatment and desalination. There are continuing challenges in implementing MD technologies at a large industrial scale. This work attempts to ...
-
Magnetic nanoparticles draw solution for forward osmosis: Current status and future challenges in wastewater treatment ( Elsevier , 2022 , Article)Forward osmosis is considered as the least energy intensive membrane process since it operates based on the osmotic pressure gradient. However, it is still considered as immature technology mainly due to the elevated cost ...
-
MXene (Ti3 C2 Tx )/Cellulose Acetate Mixed-Matrix Membrane Enhances Fouling Resistance and Rejection in the Crossflow Filtration Process ( MDPI , 2022 , Article)Obstacles in the membrane-based separation field are mainly related to membrane fouling. This study involved the synthesis and utilization of covalently crosslinked MXene/cellulose acetate mixed matrix membranes with MXene ...
-
Self-Healing Silicones for Outdoor High Voltage Insulation: Mechanism, Applications and Measurements ( MDPI , 2022 , Article Review)This paper discusses the state of the art in the application of self-healing silicone-based materials for outdoor high-voltage insulation. Both the dynamic behavior of the dimethyl side groups of silicone rubber and the ...
-
A review on recent advances in CO2 separation using zeolite and zeolite-like materials as adsorbents and fillers in mixed matrix membranes (MMMs) ( Elsevier , 2021 , Article)Anthropogenic emissions have developed the environmental demands for proficient carbon dioxide (CO2) separation technologies. Adsorption and membrane technologies are widely used to separate CO2 from other light gases due ...
-
Behavior of artificially corroded RC beams strengthened with CFRP and hybrid CFRP-GFRP laminates ( Elsevier , 2022 , Article)Steel corrosion is a major degradation factor for the reinforced concrete (RC) infrastructure and necessitates a costly repair after short service life. Predicting the strength of corroded and retrofitted structural elements ...
-
Impact of high turbidity on reverse osmosis: Evaluation of pretreatment processes ( Desalination Publications , 2020 , Article)This study evaluates the performance of sand filtration (SF) and ultra-filtration (UF) as pretreat-ment processes for reverse osmosis (RO) for seawater with turbidities of 4.8, 23.2, and 99.7 NTU. For seawater with a ...
-
A hybrid nf-fo-ro process for the supply of irrigation water from treated wastewater: Simulation study ( MDPI AG , 2021 , Article)Municipal treated wastewater could be considered as a water source for food crop irrigation purposes. Enhancing the quality of treated wastewater to meet irrigation standards has become a necessary practice. Nanofiltration ...
-
Comparison of nanofiltration with reverse osmosis in reclaiming tertiary treated municipal wastewater for irrigation purposes ( MDPI AG , 2021 , Article)This study compares the performance of nanofiltration (NF) and reverse osmosis (RO) for the reclamation of ultrafiltered municipal wastewater for irrigation of food crops. RO and NF technologies were evaluated at different ...
-
Molecular dynamics of CH4/CO2 on calcite for enhancing gas recovery ( John Wiley and Sons Inc , 2022 , Article)The effect of temperature and pressure on the adsorption of CO2 and CH4 gases on calcite (104) has been studied by means of classical molecular dynamics. The results show that carbon dioxide greatly improves methane ...
-
Reaction kinetics of carbon dioxide in aqueous blends of N-methyldiethanolamine and glycine using the stopped flow technique ( Elsevier , 2016 , Article)Carbon dioxide managements and its association with global worming remains a major concern among governments and the scientific community, with novel, energy efficient and more affordable technologies topping the research ...
-
Thermodynamic characterization of deepwater natural gas mixtures with heavy hydrocarbon content at high pressures ( Elsevier , 2015 , Article)This paper includes high-accuracy density measurements and phase envelopes for deepwater natural gas mixtures. Mixtures primarily consist of (0.88 and 0.94) mole fraction methane and both mixtures includes heavy components ...
-
Experimental determination of carbamate formation and amine protonation constants in 3-amino-1-propanol-CO2-H2O system and their temperature dependency ( Elsevier , 2015 , Article)The equilibrium constant for the formation of carbamate in 3-amino-1-propanol-CO2-H2O system was evaluated at different CO2 loadings, different temperature values, and different amine protonation constant. The studied ...
-
An experience to develop a web portal about the historical and archeological sites in qatar ( IEEE Computer Society , 2010 , Conference Paper)Qatar is located in the heart of the Arabian Peninsula. The country possesses many magnificent historical and archaeological sites which are the common heritage and history of the Arab and Muslim people. However, a little ...
-
Life-threatening arrhythmogenic CaM mutations disrupt CaM binding to a distinct RyR2 CaM-binding pocket ( Elsevier , 2023 , Article)Calmodulin (CaM) modulates the activity of several proteins that play a key role in excitation-contraction coupling (ECC). In cardiac muscle, the major binding partner of CaM is the type-2 ryanodine receptor (RyR2) and ...
-
SPERM FACTORS AND EGG ACTIVATION The structure and function relationship of sperm PLCZ1 ( BioScientifica , 2022 , Article Review)In 2002, sperm-specific phospholipase C zeta1 (PLCZ1) was discovered and through these 20 years, it has been established as the predominant sperm oocyte-activating factor. PLCZ1 cRNA expression or direct protein microinjection ...
-
Exploring the challenges of virtual internships during the COVID-19 pandemic and their potential influence on the professional identity of health professions students: A view from Qatar University ( Frontiers Media , 2023 , Article)Introduction: COVID-19 has imposed many shared limitations on medical and health education. Just like other health professions programs at most institutions, the Qatar University health cluster (QU Health) applied a ... | https://qspace.qu.edu.qa/handle/10576/32;jsessionid=6658310BA00C6D7E46808231D8DE17C6 |
Wicker furniture spends the majority of its time outside. Therefore, it is constantly being exposed to the damaging elements of the weather. Over time, outdoor wicker furniture that is exposed to rain and snow can be subject to mold and mildew growth. Not only are these organisms unsightly and smelly, but they can also be harmful to your wicker furniture if they are not removed from the surface. Thankfully, mold and mildew can be removed from wicker furniture rather easily. Keep reading to learn how to clean mold and mildew off wicker furniture.
Cleaning wicker furniture with Bleach and water
Use a feather duster to remove loose dirt and debris from the furniture. Then, use a vacuum attachment to remove the loose dirt from the inside creases and crevices of the wicker.
Create Solution and Apply
Place the wicker furniture outside on a dry day. Dip a soft-bristled brush into a solution made from 50% water and 50% bleach. Rub all affected areas with the brush, making sure to dip the brush back into the bucket often.
Scrub
Wipe down the entire piece of furniture with a sponge that has been dipped in the bleach and water solution. This process will help to eliminate the odors that are caused by the mold and mildew. Use a toothbrush that has been dipped in the solution to access the areas that are difficult to reach with the bristled brush.
Rinse
Fill another bucket with plain water. Soak a clean sponge in the bucket, and thoroughly wipe down the wicker furniture. Keep the sponge saturated by dunking it in the bucket often.
Dry
Dry your wicker furniture completely with a dry towel to prevent the wicker from absorbing any extra water. This step will help prevent the furniture from warping. Place the furniture in an off-set area to dry. The location should be dry and out of direct sunlight. Avoid using the furniture for several days until it is completely dry to prevent the material from stretching under pressure.
Cleaning wicker furniture with ammonia
A similar process using ammonia rather than bleach can also be used to remove mold and mildew from wicker furniture.
Create Solution
Make a cleaning solution by combining two tablespoons of ammonia and one gallon of water. When using this solution, you can practice the spray method or the wet cloth method.
Spray Method
Pour solution into a spray bottle and spray a generous amount over your wicker furniture.
Scrub
Using a soft-bristled brush, scrub the mold and mildew off of the wicker furniture. Use a clean toothbrush to get into the hard to reach areas.
Rinse
Rinse the furniture with a clean, wet sponge.
Dry
Use a dry cloth to remove the surface moisture. Air dry the wicker furniture in an outdoor area that is not humid and out of the sun.
Wet cloth method
If you do not have a spray bottle, you can create the same solution in an ordinary bucket.
Wipe
Dunk a clean cloth into the bucket. Wipe down the surface of the wicker furniture, paying particular attention to the sections that have visible mold and mildew.
Scrub
Use a toothbrush to get into the hard to reach places.
Rinse
Rinse furniture with a clean, wet sponge.
Dry
Air dry.
It should be noted that these two methods should NEVER be combined. Mixing bleach and ammonia has a toxic result, and the consequences can be dire. Always use safety precautions when cleaning anything at your home.
If you absolutely cannot clean your wicker furniture outside, proceed with extreme caution and make sure your windows are fully open. You should also turn on the ceiling or floor fan. Proper ventilation is a key factor to remaining safe when cleaning with noxious substances such as bleach and ammonia.
Properly cared for wicker furniture can last you a lifetime. Although wicker furniture is durable and meant to stay outside, it still needs some occasional TLC. When you notice that your wicker furniture is looking run-down because it is covered with mold and mildew, it is time for action. Use a little elbow grease and a lot of care to remove the mold and mildew from your furniture before it becomes an unsightly, smelly mess. But, be sure to take precautions to assure you are cleaning your wicker furniture in the safest way possible.
Design Furnishings has a long history selling outdoor wicker furniture. We are always happy to provide assistance to our customers and anyone else seeking assistance with properly caring for their wicker furniture. Our expertise on wicker furniture is borne from years of experience in the industry. Check us out today and see what we have to offer.
Contact our experts at Design Furnishings today for everything you need to know about outdoor wicker furniture! | https://www.designfurnishings.com/blog/no-mold-mildew-stains-wicker/ |
A personal computer is a general-purpose computer whose size, capabilities and price make it feasible for individual use. PCs are intended to be operated directly by an end-user with only a general knowledge of computers, rather than by a computer expert or technician. “Computers were invented to ‘compute’: to solve complex mathematical problems,” but today, due to media dependency and the everyday use of computers, it is seen that “’computing’ is the least important thing computers do.
The computer time-sharing models that were typically used with larger, more expensive minicomputer and mainframe systems, to enable them to be used by many people at the same time, are not used with PCs. A range of software applications (“programmes”) are available for personal computers, including, but are not limited to, word processing, spreadsheets, databases, web browsers and email, digital media playback, video games and many personal productivity and special-purpose software applications.
In the 2010s, PCs are typically connected to the Internet, allowing access to the World Wide Web and other resources. Personal computers may be connected to a local area network (LAN), either by a cable or a wireless connection. In the 2010s, a PC may be a multi-component desktop computer, designed for use in a fixed location; a laptop computer, designed for easy portability or; a tablet computer, designed to be hand-held.
Copyright PUNCH.
All rights reserved. This material, and other digital content on this website, may not be reproduced, published, broadcast, rewritten or redistributed in whole or in part without prior express written permission from PUNCH. | https://punchng.com/personal-computer/ |
What is an Energy Management System?
An energy management system should be an all-encompassing tool for organizations to streamline energy...
When it comes to driving corporate sustainability, a key factor, and major hurdle to overcome, is having the tools to efficiently target and...
Industrial Energy Management: A Short Guide for Engineering Managers
One of the main challenges Engineering Managers face in the product...
Cutting Costs and Improving Energy Efficiency with an Energy Management System
Looking for a simpler way to consolidate utility and energy data,...
What is Energy Management Software?
Energy Management Software (EMS) is a central tool for businesses looking to reduce their energy usage and...
How can real-time energy data & monitoring improve utility management?
Real-time energy data is a key metric for an energy management program to...
The correlation between data and energy saving targets
Reporting on your energy saving targets is a vital part of any effort to increase energy...
Waste management is quickly moving up the business agenda.... | https://info.esightenergy.com/blog |
Carica papaya glutamine cyclotransferase belongs to a novel plant enzyme subfamily: cloning and characterization of the recombinant enzyme.
A full-length cDNA encoding Carica papaya glutamine cyclotransferase was cloned by RT-PCR on the basis of results from amino acid sequencing of tryptic fragments of the native enzyme. The cDNA of 1036 nucleotides encodes a typical 22-residue signal peptide and a mature protein of 266 residues with a calculated molecular mass of 30,923 Da. Five plant ESTs encoding putative QCs highly homologous to PQC were identified and the numbers and locations of cysteines and N-glycosylation sites are conserved. The plant QC amino acid sequences are very different from the known mammalian QC sequences and no clear homology was observed. The PQC cDNA was expressed in Escherichia coli as either His-tagged PQC, with three different signal peptides and in fusions with thioredoxin, glutathione S-transferase, and (pre-) maltose-binding protein. In all cases, the expressed protein was either undetectable or insoluble. Expression in Pichia pastoris of PQC fused to the alpha-factor leader resulted in low levels of PQC activity. Extracellular expression of PQC in the insect cell/baculovirus system was successful and 15-50 mg/liter of active PQCs with three different secretion signals was expressed and purified. Further, PQC N-terminally fused to a combined secretion signal/His-tag peptide was correctly processed by the host signal peptidase and the His-tag could subsequently be removed with dipeptidyl peptidase I. The expressed products were characterized by activity assays, SDS-PAGE, N-terminal amino acid sequencing, MALDI-TOF mass spectroscopy, and peptide mass fingerprint analysis.
| |
McDougall, Allan Young (2011) The journalism of Neil Munro: fiction, criticism and cultural comment. MPhil(R) thesis, University of Glasgow.Full text available as:
|
|
|
PDF
|
Download (1MB) | Preview
Abstract
In a period of over thirty years from the mid 1890s, Neil Munro occupied a unique position in Scotland’s literary and social scenes. Although perhaps now best known as a novelist, short-story writer or essayist Munro was primarily a journalist, mainly with Glasgow’s Evening News and later in life with the Daily Record, and in this role he cast a wide and critical eye over Scottish life and letters.
This research focuses primarily on Neil Munro’s journalistic output in the (Glasgow) Evening News and seeks to determine his views on literature, his literary and artistic peers and contemporary and current affairs in two specific periods gathered from prime records (from 22nd August 1895 to 27th January 1898 and at the resumption of the columns after the Great War, 19th June 1919 to 28th June 1920) and from published compilations of articles gathered throughout his career until 1927. In compiling two weekly columns in the Evening News, The Looker-On on the Monday and Views and Reviews on the Thursday, Munro influenced the opinions and reading habits of a large section of the population of the west of Scotland. In Views and Reviews he set out his views on the meaning of art and literature, nationally and internationally; in The Looker-On Munro sketched the world around him, whether local or national or international, through his eclectic choice of topics and his personable and endearing style.
The thesis is structured in three main parts, each one dealing, in short, focussed episodes, on topics arising from the journalism. Part One deals mainly with material before the First World War; Part Two with issues which straddle the pre- and post-War periods; Part Three considers the episodic fiction found in The Looker-On columns. Rather than adopt a general, over-arching argument, this approach allows us to take shorter, sharper assessments of Munro’s views of particular aspects of the culture that was his context. These then gradually accumulate to allow us to draw general conclusions only after we have allowed each one its particular value and place.
This consideration of a range of subjects builds up a picture of a journalist with strong views on the state of literature, of Scotland, of all the arts. His opinions are founded on Victorian and Edwardian sensibilities, in the sense that he is open to the working of arts and science in society as a whole, and the romantic tradition, in that he engages emotionally as well as intellectually with his subjects, seeking passion in the work of others rather than intellectual rigour. Crucial to the structure of the thesis is the argument that by considering these two periods of his journalism, pre-War (1895 – 98) and post-War (1919 – 1927), two different aspects of Munro’s character can be understood more profoundly. Pre-war, his journalism expresses his healthy curiosity in human nature, his comfort in tradition and the effect of scientific and social progress and a creeping globalism on the citizens of his adopted city. Post-war, acknowledging the changes caused by the Great War, he seems to become paralysed, trying to respond to new literary and social structures, rejecting the experimentalism of modernism and seeing no need or value in an organised “Scottish Renaissance”. And yet, as the research for this thesis should make clear, the late nineteenth- and early twentieth-century sensibility that is evident in Munro’s journalism does in fact carry him forward into the context of the modern world in his three series of episodic fiction, Erchie (1902-1926), Para Handy (1905-1924) and Jimmy Swan (1911-1917 and then 1923-1926).
In conclusion, I will suggest that the essential literary value and popularity of these stories lies in their emergence from the pre-War sensibility and their characters’ humble sympathy for the pre-War world. | https://theses.gla.ac.uk/2518/ |
Dive into helpful ideas and strategies behind some of our customers’ choices that helped their business flourish. Below you can browse through our selection of success stories to find out how it makes a difference.
We hope that you found our selection of case studies can be useful. We tried to showcase examples that may help you plan a successful journey in scaling your business. By combining our list of case studies, we were aiming to help you gain a more detailed understanding of ecommerce order fulfilment. The case studies are here to provide you with recommendations and practical solutions available when you you decide to outsource your distribution logistics to us.
In case you were unable to find what you were looking for, please do not hesitate to get in touch. We work with many clients and can provide more insight into the perks of your industry to help you decide what the best next step in your business development is.
Please contact one of our team members if you have any questions, and we will be happy to assist. | https://www.thestorageplace.co.uk/ecommerce-order-fulfilment-case-studies/ |
This is a list of songs from the nursery to sing to your little one. They are all happy and upbeat and will keep your baby entertained for hours.
-Baa baa black sheep (a song about sheep)
-Twinkle Twinkle Little Star (a song about stars)
-Old McDonald Had A Farm (a song about farms)
-Row Row Row Your Boat (a song about boats)
-Five Little Ducks (a song about ducks) -Old Macdonald had a farm, ee, ee, ooo, ooo…
The Happy And You Know It Dance Dance Party More Nursery Rhymes & Kids Songs is a collection of songs that will make your baby happy. The songs are sung by parents and kids in different languages and are easy to sing along to.
The album includes nursery rhymes, kids songs, and baby songs that are easy to sing along with. Each song has an accompanying picture of the lyrics so you can learn how to sing the song while you listen. | https://bigzvideo.com/happy-and-you-know-it-dance-dance-party-more-nursery-rhymes-kids-songs/ |
Complex manufacturing operations often employ multiple operating stations or cells in which sequential machining, assembly or other operations are performed on a workpiece. These sequential operations are often controlled by a PLC (Programmable Logic Controller) in order to automate work station operations and material flow. PLCs are industrial computer control systems that continuously monitor the state of input devices and make decisions based on custom software to control the state of output devices. Broadly, PLCs comprise a central processing unit (CPU), a memory system, input modules and output modules, a programming device and one or more operating modules that allow an operator to process information to be displayed and new control parameters to be entered.
PLCs typically perform four sets of operations: scanning the state of input devices, executing user created program logic, controlling output devices connected to the PLC and performing miscellaneous housekeeping activities which may include communications with programming terminals, internal diagnostics, etc. Several languages are employed to program PLC'S, although ladder logic is most commonly used. More recent PLC applications may utilize simulation software programs which allow simulation of a variety of operating conditions useful in designing and testing the PLC system. As a result, in part, of the development of simulation programs, a number of “virtual” relationships are established between tooling, control devices, PLC logic, PLC I/O fault bits, etc.
Complex manufacturing systems controlled by PLC's sometimes experience failures which are registered as a machine fault condition, or a “fault”. A fault exists where, as a result of the PLC executing the PLC logic used to control the operating cycle of tooling, the PLC has encountered a set of conditions that indicate a non-manual intervened interruption has occurred, causing the system to stop production. Such faults may be due to the failure of a physical device, such as a sensor within the system, or may be caused by an error in software logic or other non-physical phenomena.
In the past, a machine fault was communicated to an operator by means of a fault code or textual machine fault message being displayed on a graphical display, typically a touch screen display in view of an operator. These fault codes and textual messages were normally brief, and even cryptic, providing little information concerning the exact nature and location of the problem giving rise to the fault. Because of the highly abbreviated nature of these fault messages, an experienced operator was required to interpret the intent of the message. Typically, the fault message provided only a PLC I/O memory bit address corresponding to an element that was bad, without any reference to the physical location of the fault within the manufacturing system, or identification of the particular control device type.
A number of virtual relationships have been established between various parts of the PLC based system but these relationships have not been advantageously used in diagnosing faults. For example, existing PLC control logic simulation includes the use of: PLC control logic that is used on the manufacturing plant floor; virtual tooling models that interact with the execution of the PLC logic during a simulation; virtual control devices such as sensors and actuators; 3 D visualization data of the tooling, facilities and control devices. When setting up the PLC control logic simulation “virtual wire” connections are made between the pertinent PLC I/O locations and the virtual control devices, exactly replicating the relationship between the physical tooling and PLC hardware and logic. PLC control logic simulation (virtual PLC) is performed where the PLC logic is tested against the virtual tooling and control device models. The end result is PLC logic that is verified to process design intent. In the past, the verified PLC logic files are the only information sent down stream in the process of building tools for use in tool tryout and production from the control logic simulation process.
The inability to quickly identify, recognize and locate devices within the manufacturing system responsible for faults increases system downtime and impairs timing of launch ramp up of new PLC based manufacturing systems.
Accordingly, there is a need in the art for an improved system for rapidly identifying and visualizing faults in PLC-based manufacturing Systems which overcomes the problems discussed above. The present invention is intended to satisfy this need.
| |
The canvas on which tattooing is etched on may only be skin deep, but the history of this art form goes much deeper. If, like me, you have partaken in the joy of the needle (having a professional doodler draw upon your skin not, I hasten to add, drugs) we are participating in a social ritual, which has existed for at least 5,000 years.
The history of tattooing begins with a discovery that was unearthed in the Austrian Alps in 1991. The frozen remains of a perfectly preserved primitive human represented not just a breakthrough in archaeology but also caused a stir among anthropologists who were surprised to find this body to be covered with elaborate geometric tattoos, 57 in total. Researchers believe these geometric shapes were thought to provide therapeutic relief for arthritis.
Tattoos were also prevalent among women in Egyptian culture, usually serving a ritualistic or therapeutic purpose to ease a woman’s pregnancy. The tattoos, consisting of geometric displays of dots and lines, were strategically placed on a woman’s body to provide her greater fertility. While tattooing was clearly springing up independently around the world, the influence of the Egyptian practise of tattooing was instrumental in introducing the art to Greece, Persia and Arabia.
It was on its eastwards journey that the spiritual and ritualistic nature of tattooing was lost and corrupted by the Greeks and became loaded full of connotations of barbarism and criminality. The Greeks adapted tattooing to mark society’s ‘undesirables’ such as slaves and thieves. This practice haunts us today in the use of tattooing by the Nazis to identify and dehumanise inmates in concentration camps. Christianity too failed to capitalise on the spiritual advantages which tattooing offered, as Old Testament Bible stores such as the story of the curse of Cain reinforced the notion tattoos were to be used to mark the wrong-doers.
It proved to be colonisation that introduced tattooing to the modern western world. By the late 18th century the practice became popular among British sailors after Captain Cook’s voyages to the South Pacific, but the art met an unexpected popularity among members of the British gentry when King George was tattooed. So despite an element of respectability, tattoos in the Victorian period were predominantly the preserve of vagabonds and circus freaks, for customers to ogle at.
However, it was the opinions that formed in 20th century America which remain at the heart of today’s tattoo culture, appealing to the working-classes for its masculine values or to reflect individuality. The tradition of expressing one’s adventurous or well-travelled lifestyle was made appealing by returning sailors from the American navy. As journalist Jack London put it, ‘‘Show me a man with a tattoo and I’ll show you a man with an interesting past’’. | http://manchesterhistorian.com/2012/from-icemen-to-sailors-tattooing-and-its-history/ |
CINCINNATI, OHIO – A local school has received national recognition for making improvements to school nutrition efforts. U.S. Sen. Sherrod Brown (D-OH) today announced that Loveland Intermediate School in Loveland was selected to receive the Healthier U.S. School Challenge (HUSSC) award for expanding nutrition and physical activity opportunities. The U.S. Department of Agriculture (USDA) and First Lady Michelle Obama sponsored the HUSSC to champion schools that voluntarily adopt USDA standards to improve nutritional meals.
“Loveland Intermediate School– a Healthier U.S. School Challenge honoree – is a leader in providing nutritious meals for its students,” Brown said. “School nutrition programs ensure that students not only get the healthy foods they need to perform well academically, but also help our children establish good eating habits so that they can live long and healthy lives.”
To view new USDA foods offered at schools during the upcoming academic year, click here.
Brown is a leading voice in the U.S. Congress for eradicating hunger and improving childhood nutrition. As Chairman of the Senate Subcommittee on Hunger, Nutrition, and Family Farms he fought to pass the Healthy, Hunger-Free Kids Act of 2010. This new law is aimed at ending childhood hunger, reducing childhood obesity, and improving school nutrition programs. One important provision in the law is Brown’s Hunger-Free Schools Act, which would help reduce paperwork and enroll already eligible students in childhood nutrition programs through direct certification. | https://www.brown.senate.gov/newsroom/press/release/sen-brown-announces-that-loveland-intermediate-school-receives-national-award-for-nutrition-efforts |
The word ‘information’ is very widely used but just what is ‘information’? The question is one element of the discussions around big data. Does ‘big data’ include information? When talking about information we are often reduced to emphasising that we are referring to ‘unstructured information’ but in fact we are using this expression to differentiate information from ‘structured’ data. Then we come to ‘content’, a convenient word when talking about enterprise content management. Is ‘content’ the same as information, or different? And how is it the same or different?
There is a General Definition of Information that is based around a concept of ‘data + meaning’. There is a good summary account of GDI in the Stanford Encyclopedia of Philosophy written by Luciano Floridi, the author of the excellent book Information – A Very Short Introduction. When you start reading this book you quickly find that information is a very much wider concept than something notionally related to a document.
A couple of weeks ago there was a fascinating television programme on BBC4 on information by Professor Jim Al-Kahili which traversed the period from the initial development of writing scripts to Alan Turing’s seminal work on the basic principles of computation via Claude Shannon’s 1948 paper on A Mathematical Theory of Communication. One of the concepts introduced by Shannon was information entropy as a measure of the uncertainty in a message. At the Enterprise Search Meetup which took place during the Enterprise Search Summit Fall in Washington in October it was interesting to hear some quite intense discussions around the implications of entropy in enterprise search.
I’ve just finished reading Understanding Information and Computation by Philip Tetlow. The chapter titles are somewhat daunting, including ‘Dot-to-Dots Point the Way’ and ‘Why Are Conic Sections Important’. Summarising the book is very difficult but in essence the author sets out to show that information is one of the fundamental forces of the physical word, somewhat like gravity and electromagnetism. This may seem far-fetched but the case made by Tetlow is a powerful one. Incidentally if you are interested in how search applications work Chapter 15 ‘Time to Reformulate with a Little Help from Information Retrieval Research’ is a good description of the widely used vector space relevance algorithms.
In 1968 Marshall McLuhan remarked in ‘War and Peace in the Global Village’ that the one thing that fish are totally unaware about is water, as they have no anti-environment that would enable them to perceive the element they swim in. You don’t need to know anything about water to drink it or wash in it but have a look at the Wikipedia entry on the properties of water and you will begin to appreciate the value of some of the properties to our existence on the planet. After all about 50-60% of our body weight is water! Information is just the same. We can continue to use the word to mean whatever we want it to mean but before too long we perhaps should be thinking in more detail and more rigour about the meaning, purpose and value of information. | http://intranetfocus.com/so-just-what-is-information/ |
It is well known that animals and robots can sense and navigate obstacles using sensory feedback. However, while moving rapidly in a terrain with large, complex, 3-D obstacles, sensing and planning are often impossible due bandwidth limitations, and the animal or robot physically interacts with obstacles in the environment. By studying rapid traversal in which there is often collision with an obstacle due to sensory feedback limitations, it is possible to discover general mechanical principles of obstacle traversal. Here, in the first of our two companion studies, we studied traversal of a large gap obstacle by a legged animal (discoid cockroach) and robot.
Our observations of gap traversal showed that animal and robot behavior was remarkably similar. For both, traversal was usually successful when the animal and robot head bridged the gap and unsuccessful if the head fell into the gap prior to reaching the opposite side (see the videos below). By running at high speeds towards the gap, both the animal and robot were able to traverse a large gap up to one body length by briding with the head.
Figure 1: An animal and a robot bridge across a gap.
Due to the similarity between the animal and robot and our observation of gap bridging by the head, we developed a template (a fundamental general model) of the gap bridging behavior (figure 2). We approximated the animal and robot as a rigid body traveling towards the gap and falling under its own weight. By calculating the passive falling dynamics of the rigid body, we could accurately predict the maximal gap traversal distance of the animal given a set of initial conditions like approach speed towards the gap, body pitch, and body pitch angular velocity (see video below). In agreement with our animal and robot experiments, the template model also showed that using high approach speed and a pitched up body increased gap traversal performance. Therefore, we discovered that using high translational and rotational kinetic energy are general mechanical principles of gap traversal.
Figure 2: The template model for gap traversal. (a) An animal or robot body is modeled as a rigid body traveling at a constant speed towards the gap. (b) Side view of model-predicted representative head trajectories traveling at a high speed (red curve) and low speed (blue curve).
Inspired by the discoveries from our template model, we added an active tail to the robot to systematically pitch the robot upwards prior to reaching the gap (see video below). Our simple control strategy increased the maximal traversable gap length by 50% (figure 3).
Figure 3: Adding active tail body pitch control to the robot increased performance by 50%.
We are in Mech. Engineering at Johns Hopkins, and are affiliated with Laboratory for Computational Sensing and Robotics. | https://li.me.jhu.edu/large-gap-traversal-first-dynamic-template-for-locomotion-in-3-d-terrain/ |
I was asked to prepare a presentation on conflict resolution for Christian counselor and pastoral care training seminars. The task seemed daunting; however, I found preparing the talk to be a formative process. I learned about conflict resolution in China, in the West, and around the world. It took me some time to identify culture as the angle that I would take in my presentation. To develop the lecture, I read about Chinese history and philosophy, and learned about how these might relate to conflict resolution in China. During the presentation, a number of things stood out. I gave participants a chance to tell their own conflict stories, and to share the stories that contained life lessons about conflict that they told their children. They readily participated, and seemed to thrive. I was struck by how much the group appreciated the research that I had done about their culture. Through my work, I was able to validate their culture and bring to the foreground something that had been only minimally visible to them. One response in particular stood out. A participant indicated that a common understanding among Chinese Christians was that there was only one way to do conflict resolution, and that’s the Christian way. Through this presentation, they learned just how much their own culture actually influenced their conflict resolution assumptions and practices, just as culture does in different ways in different countries.
Annie Mathew
I am glad that I was able to go to another country and experience the culture, people, history, food, and language in the context of a safe community. It was a significant journey for me since I grew up in India and wanted to learn how one can take Western understandings, insights, and skills into another culture with wisdom, patience, and passion. I was impressed by the growing churches in China, as well as the basic theology of love that gave thrust to the “social” aspect of their ministry. Visits to three seminaries were powerful—when doing small groups, one could sense both the excitement and the fear the students had. In the seminaries, I learned the power of contextualizing the material according to the understanding of the person in another culture. This
was an important lesson for me to learn as a future educator in India. The students challenged me to think about how we deal with cultural diversity when working with our clients, since we can become pretty comfortable with the generalizations that we have acquired from our own
training and experiences. The mental health professional gathering at the Puan church was moving. It was amazing to see university professors talking about
the need for the study of religion and psychology at the university level. They all had insights and strong convictions about how both are essential to understand the past and shape the future of Chinese society.
Lisa Findlay
The cultural exchanges I had as a guest in China have been some of the most intriguing and challenging of my life. I have traveled to many different countries, but I have never been to a country where I didn’t have at least a basic understanding of the language. Chinese culture is probably the most complicated and “foreign” culture I have ever encountered. Abstract or generalized conceptions of collectivism and individualism do not capture the intricacies of how it is actually expressed relationally. I learned so much in a very short time. I will treasure the lunch I shared with some members of a church on our way to Han Wang. I sat on a thin bench in a small room as women quietly filled the table with different dishes. The women eagerly refilled my bowl and it was easy to communicate with them using gestures and smiles. We laughed often. It was the kind of cultural exchange that affirms a shared and basic human spirit and is truly a gift from God. All of the women at the table knew people who had died in the earthquake, and others who had suffered, but their faith was very strong, very pragmatic. I was so touched by their eagerness to serve strangers, their generosity, and their quiet strength. I walked away feeling blessed to have met those church members. I think American churches and American Christians have much to learn from China. We have much to learn about humility and living life in community. | https://fullerstudio.fuller.edu/school-of-psychology-students-reflect-on-time-abroad-in-china/ |
BACKGROUND OF INVENTION
1. Field of Invention
This invention relates to cigarette package spacers. More particularly this invention relates to package spacers used to promote tightly fitted packing of ultrathin cigarettes in thin cigarette packs and the packing of thin cigarette packs in standard width cartons.
2. Prior Art
For many years standard cigarette packs have had a relatively standard thickness and a height dependant upon whether the cigarette was of regular size, king size or ultra king size. Since the thickness of cigarette packs was standard, the thickness of cigarettes cartons necessarily did not vary. As a result, it was possible to manufacture cartons of a single width which would accommodate all cigarette packs.
In order to place the tax stamp which is required on the bottom of each cigarette pack, the usual procedure is to place the cigarette packs in the cigarette carton leaving the bottom end of the carton open which permits application of the cigarette tax stamp. Because in the past virtually all cigarette packs have been of the same width, except for highly specialized and costly brands, it was possible to use a single stamping machine to stamp cigarette cartons for all brands.
In recent years, the cigarette industry has sought to diversify its packing styles and cigarette types in order to maintain or increase market share. Among the packing changes which have been considered include the use of thinner and supposedly more attractive cigarettes. When 20 of these ultrathin cigarettes are packed in a standard cigarette pack, a large amount of the unoccupied space remains. Accordingly, cigarette manufacturers have redesigned cigarette packs and boxes to somewhat reduce their thicknesses. In addition, however, it has been necessary to provide internal packing material within each cigarette pack in order to take up additional space not occupied by the ultrathin cigarettes. Concomitantly, the use of thinner cigarette packs has required changes in the design of cigarette cartons. With thinner cigarette packs, there were two possibilities: either the carton could be made more narrow or a packing material could be inserted within each carton to allow the use of the same size of carton with the thinner cigarette pack.
The approach most preferred in the cigarette industry has been the use of added packing material to permit the use of a standard width carton. This procedure allows the use of previously purchased stamping machines without the need for costly modification of these machines; or the more costly alternative of having nonstandard packs hand stamped at the distributor level.
Several designs for carton and cigarette pack inserts have been attempted. However, each of the inserts used to date have been expensive to manufacture because of the large amount of packing material which is wasted during fabrication.
Thus, it is an object of this invention to prepare cigarette pack and cigarette carton packing materials.
It is a further object of this invention to prepare packing materials employing a process which reduces the amount of packing stock which is wasted during fabrication and/or permits the fabrication of a greater amount of packing materials from the same volume of stock.
It is yet another object of this invention to prepare packing materials which may be utilized with ultrathin cigarettes to permit the packing of these cigarettes into sightly thinner boxes and packages and to permit the use of these boxes and packages in standard sized cigarette cartons.
These and other objectives are obtained by preparing the packing materials according to the instant invention.
Summary of Invention
Basically, the packing materials of the instant invention are of a mutually nestable design which permit the stamping or cutting of the packing stock from a single sheet of cardboard or other packing material without the excess loss of stock material. The design of the cigarette pack insert is in the form of a modified "H" wherein the legs of the "H" may be nested into the top and bottom of the "H" such that numerous "H" designs may be obtained out of a single square of cardboard having a central "H" and two "H" legs from another "H" seeded in each top and bottom of the central "H". The carton packing material contains an indented section along the top and bottom for each cigarette pack to be placed in a cigarette carton. For example, S-shaped or square shaped indentations are designed to seat within complimentary S-shaped indentations so as to allow row upon row of seated indentations to produce complimentary packing materials out of a single sheet of packing material without any excess loss of stock material.
DESCRIPTION OF DRAWING
FIG. 1 shows a top view of a prior art carton spacer.
FIG. 2 shows a top view of a square, saw-tooth shaped carton spacer according to the instant invention.
FIG. 3 shows a top view of a sheet of stock material which has been laid out to permit the manufacture of several complimentary, nesting carton spacers of the FIG. 2 type from the same sheet.
FIG. 4 shows a top view of an S-shaped spacer for cartons as described in the instant invention.
FIG. 5 shows a top view of the FIG. 4 design of spacer laid out on a single sheet of stock material.
FIG. 6 shows a top view of a prior art cigarette pack spacer.
FIG. 7 shows a top view of one design of the H-shaped cigarette pack spacer of the instant invention.
FIG. 8 shows a top view of the FIG. 7 pack space design laid out on a single sheet of stock according to the instant invention.
DETAILED DESCRIPTION OF INVENTION
The carton space and the pack spacer of the instant invention share the common element that they are nestable, one within the other, to provide efficient manufacturing of the spacers from a single sheet of stock material. Thus, the carton spacers may be formed from modified "S" or saw-tooth shaped sides wherein each saw-tooth or "S" nests one within another saw-tooth or "S" side. Similarly, the H-shaped cigarette pack spacer of the instant invention nests with surrounding H's within a central "H" to permit the manufacture of numerous H's from a single sheet of packing material without excess loss of packing stock.
The advantage of the nested carton or cigarette pack spacer described herein is that it permits the economical manufacture of spacer without attendant and significant waste of the spacing stock material. The prior art spacer as shown in FIG. 1 does not provide the nesting design described above. As a result, when this design is employed a significant percent of the spacing stock is lost during manufacture. When a typical cigarette company may sell millions of cartons of cigarettes in a single year, the magnitude of the loss represented by this wasted spacing material is significant.
Stated another way, the carton spacers and the pack spacers of the instant invention may be manufactured more economically from stock material because the nesting design of the instant invention permits a greater number of spacer to be manufactured from the same unit volume of stock material.
The spacing material utilized in the instant invention may be formed from any conventional packing material including cardboard, corrugated cardboard, styrofoam, vacuum formed plastic, corrugated plastic and any other type of material which can be readily manufactured in sheet form.
In FIG. 1 a typical, prior art, carton spacer is shown. This spacer is inserted inside of a cigarette carton to allow the use of standard sized cartons with less than standard width cigarette boxes or packs. Use of this spacer in turn permits the use of the standard tax stamping machines. The deficiency in this prior art package spacer, however, is that when the spacer as shown in FIG. 1 is formed, a large amount of stock in the indentation (A) is wasted each time a spacer is cut out.
FIG. 2 shows the improved carton spacer obtained by the use of the instant invention. The approximately square, saw-toothed, indented carton spacer shown in FIG. 2 when cut from a single sheet of package stock, greatly reduces the amount of stock which is lost. As can be seen, particularly in FIG. 3, when the package stock is laid out with the spacers of FIG. 2, there is no significant loss of package stock due to cutting. Rather, the approximately square, saw-toothed edge (2) shown in FIG. 3 of one package spacer nests within a complementary saw-toothed edge (3) of another package spacer, thereby permitting the formation of several interconnected and nestable spacers (4), (5) and (6) from a single sheet of stock.
Likewise, with respect to the "S" shaped carton spacer of FIG. 4, it is readily seen that this spacer can be laid out on a sheet of stock material as in FIG. 5 without any significant loss of stock due to cutting. Again, in FIG. 5, the "S" edge (7) of one spacer of FIG. 4 nests complementarily into a corresponding edge (8) of another nesting spacer, thereby permitting the formation of several interconnected and nestable spacers (9), (10) and (11) from a single sheet of stock.
In addition to being useful in forming spacers for cigarette cartons, the concept of the instant invention readily lends itself to construction of spacers for use with individual cigarette packs. In FIG. 6 a prior art cigarette pack spacer is shown. As can be seen, the spacer requires the use of a large amount of spacer stock as compared to H- shaped spacer shown in FIG. 7. The H-shaped spacer of FIG. 7 may have fitted into its side arm areas (12) and (13) the arms from other H- shaped spacers which are cut-out from a single piece of packaging stock. As shown in FIG. 8, employing the H-shaped packing material permits the forming of many "H" shaped spacers from a sheet of stock without any significant loss of the stock material due to cutting.
It is essential when designing carton inserts for use according to the instant invention that each insert contain an indentation along each longest edge of the carton insert which indents near the middle of each pack of cigarettes. This indentation permits grasping of the cigarette carton and easy removal. Thus, for example, with ten pack, two row carton, there must be five indentations arranged regularly along each long side of the spacer.
Likewise, with cigarette pack inserts, the spacer should have an indentations so as to form an "X", "H" or "+" shaped spacer go as to provide for nesting of the inserts one within the other. | |
This project aimed to spread a culture of peace, dialogue and non-violence through artistic activities by encouraging young artists and talents to come together in a safe and creative space to dialogue and exchange ideas. This project aimed at empowering young artists to promote greater intercultural dialogue and appreciation; promoting inter-organizational networking and cooperation in the EuroMed region and creating space while raising awareness about intercultural dialogue for EuroMed citizens. Twelve artists from Jordan, Cyprus and Lebanon met in a Residency in Jordan to realize experimental interactive workshops at cultural venues about arts and intercultural dialogue and exchange ideas and experiences about their respective cultures and backgrounds. Their experience was transmitted to other young artists in Jordan, including refugees through one of the workshops as well as the final presentation. Their final artistic productions was shared with the Jordanian community and the ALF international community (online) through a final presentation which included a concert and exhibition that took place in Princess Sumaya for Technology University in Amman. This project lasted for eleven months through which the different partners in the three countries collaborated to realize these activities by selecting the participating young artists to come together and realize these objectives with the help of experts and renowned artists in Jordan.
01/10/2020 - 01/08/2022
"Artists in Residence: Exploration of Arts, Humanity and Dialogue" | https://riifs.org/en/activity/artists-in-residence-exploration-of-arts-humanity-and-dialogue/ |
Abstract: Modern AI/ML algorithms have the potential to improve performance over traditional algorithms for online optimization, which are designed to give worst-case guarantees. However, while AI/ML algorithms might perform well when the training data accurately reflects the deployment environment, they lack worst-case performance guarantees, e.g., under distribution shift. This hinders their use in real-world settings where safety/performance guarantees are crucial. In this talk, I will discuss recent work designing algorithms for online optimization with "black-box" advice that bridge the gap between the good average-case performance of AI/ML and the worst-case guarantees of traditional algorithms. We focus on the problem of chasing convex bodies and functions, discussing several algorithms and fundamental limits on algorithm performance in this setting.
Bio: Nico Christianson is a third-year PhD student in Computing and Mathematical Sciences at Caltech, where he is advised by Adam Wierman and Steven Low. Before Caltech, he received his AB in Applied Math from Harvard in 2020. He is broadly interested in online algorithms, optimization, and learning, with an emphasis toward designing machine learning-augmented algorithms for complex sequential decision-making problems. Nico's work is supported by an NSF Graduate Research Fellowship.
The Data Science Deep Dive is free and open to the public. If you are interested in giving a talk, please email Mohammad Hajiesmaili or Adam Lechowicz. Note that in addition to being a public lecture series, the Data Science Deep Dive is also a seminar (CompSci 692K, Algorithms with Predictions Seminar) that can be taken for credit. | https://www.cics.umass.edu/event/chasing-convex-bodies-and-functions-black-box-advice |
Systems Engineer (1108) | Annapolis Junction, 20701, Annapolis Junction, Annapolis Junction, MD, US
Summary:
Zapata Technology, Inc. seeks a cleared person holding a TS/SCI clearance with polygraph to become a Systems Engineer in Annapolis Junction, MD. Check out the details below and our awesome benefits here.
Essential Functions:
- Analyzes user’s requirements, concepts of operations.
- Will be responsible for incorporating new plans, designs and systems into ongoing operations
- Analyzes system requirements and leads design and development activities
- Develops technical documentation
- Develops system Architect
- Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations
- Ultimate responsibility for the technical integrity of work performed and deliverables associated with the Systems Engineering area of responsibility
- Communicates with other program personnel, government overseers, and senior executives
Required Job Qualifications and Skills:
- Seven (7) years’ experience as a Systems Engineer in program and contracts of similar scope, type, and complexity is required
- Practical knowledge and experience in installation, configuration, and troubleshooting of the following products is critical:
-
- VMWare – vCenter ESXi 6.5 & 6.7 – storage arrays; Horizon Thin Client, vSphere, vROps
- Linux – Ubuntu 14.04, 16.04, 18.04, CentOS 7&8, Puppet, SNMP, Netflow analyzers/data (configuration and management), Ability to join Linus hosts to a Windows domain, Samba share installation
- Cisco – Catalyst 3850 & Nexus 3000, NextGEN Firewall
- Windows – Active Directory (LDAP), distributed switching knowledge
- Compliance knowledge – NESSUS scans, user privileged access, role-based access, documentation
- This position would be an independent SE role, sitting with a group of intel analysts who put things on the closed network to see what’s going on. So you’d be controlling your own stand-alone network.
- Ability to analyze user requirements to derive software design and performance requirements
- Ability to debug existing software and correct defects
- Must possess the knowledge to provide recommendations for improving documentation and software development process standards
- Ability to integrate existing software into new or modified systems or operating environments
- Knowledge to develop simple data queries for existing or proposed databases or data repositories
- Ability to write or review software and system documentation
- Candidate will serve as a team lead at the level appropriate to the software development process being used on any particular project
- Ability to design or implement algorithms to meet or exceed system performance and functional standards
- Ability to assist with developing and executing test procedures for software components
- Must have the skills to modify existing software to correct errors, to adapt to new hardware, or to improve its performance
- Candidate must be able to quickly ascertain a variety of network infrastructure issues in a blended (70% Windows & 30% UNIX) environment pertaining to service availability, latency, storage capacity, (mis)configurations, device hardware failures, and potential collateral damage associated with any hardware/software upgrades
Education/Experience include:
A Bachelor’s Degree in Computer Science or a related discipline from an accredited college or university is required paired with seven (7) years’ experience.
Position Type/Expected Hours of Work:
This is a regular full-time position.
Clearance Type:
Requires an active TS/SCI security clearance with poly. Employment is contingent on having or obtaining the required active security clearance or successfully passing the required background check, as well as other factors including, but not limited to, drug screens.
AAP/EEO Statement:
Equal Opportunity Employer – M/F/Disabled/Veteran
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
Zapata Technology, Inc. provides reasonable accommodation to applicants who are veterans or who have disabilities and are unable to fully use our company application system. If you need a reasonable accommodation for any part of the application and hiring process, please notify Christina Hall, EEO Coordinator. | https://www.zapatatechnology.com/systems-engineer-1108/ |
Required fields are indicated by .
Loading...
Course DescriptionThis introductory course introduces the learner to the fundamentals of event planning. Determine target markets, explore the various types of events and create compelling event concepts to improve participant experience. Produce budget and schedules, obtain appropriate licensing, permits and insurance in order to prevent potential barriers. Identify the elements involved in creating an event from venue selection, decor and menu design; vendor selection, rentals and entertainment; marketing and promotions.
Relevant Programs
- Wedding & Event Management Certificate : Required
Loading... | https://continuingstudies.vcc.ca/search/publicCourseSearchDetails.do?method=load&courseId=1020704 |
The SolarWinds hackers potentially accessed three percent of the US Justice Department’s Office 365 mailboxes in what the department is classifying as a “major incident.”
The Justice Department said it learned 24 December that suspected Russian hackers had gained access to the department’s Microsoft Office 365 environment, department spokesman Marc Raimondi said Wednesday. After learning of this malicious activity, the Justice Department said it eliminated the identified method by which the hacker was accessing the department’s Office 365 email environment.
“At this point, the number of potentially accessed Office 365 mailboxes appears limited to around 3 percent, and we have no indication that any classified systems were impacted,” Raimondi said in a statement.
The announcement makes the Justice Department at least the eighth US government agency to reportedly be hit by the SolarWinds hackers. Official disclosures and media reports have indicated the Commerce Department, Defense Department, Energy Department, Homeland Security Department, National Institute of Health, State Department and Treasury Department were also compromised.
Nearly ten federal agencies experienced follow-on activity on their systems after being compromised through a malicious update to their SolarWinds Orion network monitoring platform, the U.S. Cyber Unified Coordination Group (UCG) announced yesterday. The UCG also said a Russian Advanced Persistent Threat (APT) group is likely behind the SolarWinds breach for intelligence gathering purposes.
As part of its ongoing technical analysis, the Justice Department said it determined that the Office 365 compromise constitutes a major incident under the Federal Information Security Modernization Act, and is taking steps consistent with that determination. The department said it’ll continue to notify the appropriate federal agencies, Congress, and the public as warranted, according to Raimondi.
The Justice Department discovered their Office 365 compromise just two days after The New York Times reported that hackers had seized upon a Microsoft flaw to infiltrate the email system used by the US Treasury Department’s senior leadership. The hackers did a complex step inside Office 365 to create an encrypted “token” that tricked the Treasury’s system into thinking the hackers were legitimate users.
That tricked the Treasury Department’s system into thinking the hackers were legitimate users, meaning the hackers were able to sign on without having to guess user names and passwords, Sen. Ron Wyden, D-Ore., told The Times on Dec. 22. Like the Justice Department, the Treasury Department also didn’t see any evidence that hackers had gotten into their classified systems, Secretary Steven Mnuchin said.
One day before the Justice Department discovered its breach, CrowdStrike disclosed that hackers tried to attack the endpoint security giant through a Microsoft reseller’s Azure account. The reseller’s Azure account was used for managing CrowdStrike’s Microsoft Office licenses, and the hackers failed in their attempt to read the company’s email, CrowdStrike said.
Microsoft told CRN USA on 24 December that if a customer buys a cloud service from a reseller and allows the reseller to retain administrative access, then a compromise of reseller credentials would grant access to the customer’s tenant. The abuse of access would not be a compromise of Microsoft’s services themselves, according to the company.
Reuters reported 17 December that Microsoft was compromised via SolarWinds, with suspected Russian hackers then using Microsoft’s own products to further the attacks on other victims. Microsoft said at the time that sources for the Reuters report are “misinformed or misinterpreting their information,” but acknowledged the software giant had “detected malicious SolarWinds binaries” in its environment.
Microsoft reaffirmed on 31 December that it’s found no indications that its systems were used to attack others.
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation. Your use of this website
constitutes acceptance of nextmedia's Privacy Policy and
Terms & Conditions. | |
TUESDAYS & THURSDAYS, 12:00P - 1:00P
Yoga Playground is a weekly movement class incorporating elements of flow yoga, strength, mobility, and play. As a strength coach and yoga instructor, Tony Irwin provides a unique perspective to bridge the gap between the two worlds. Creative dialogue and visual aids within an interactive environment help students foster a well-rounded relationship with their bodies, while providing the tools to cultivate a meaningful and intuitive movement practice for themselves.
Offered as an ongoing drop-in series. Discounted class bundles available. | https://www.mela.yoga/all-events-1/2018/4/24/yoga-playground-wtony-irwin |
Difference between revisions of "Monitoring urban Heat Island Phenomenon in Metro Manila: A Remote Sensing-GIS Approah"
|
|
Mqmallonga (talk | contribs)
|Line 15:||Line 15:|
[[Category: Geodetic Engineering Thesis]]
[[Category: Geodetic Engineering Thesis]]
[[Category: College of Engineering Thesis]]
[[Category: College of Engineering Thesis]]
|+|
Latest revision as of 04:09, 21 April 2012
Rosalyn A. Pereira
Thesis (MS Remote Sensing)--University of the Philippines Diliman. -2004
Abstract
Metro Manila, being the center of socio-economic activity in the country, attracts migrants from other regions. To accommodate the growing population, more infrastructures have been built resulting in the deterioration of the environment. Natural vegetation has been replaced by surfaces which are low-reflective, non-evaporating and non-transpiring thus forming what is referred to as Urban Heat Islands (UHI). Remote sensing can detect urban growth and land surface temperature. Land use cover and surface temperature data over Metro Manila were derived over the period 1989 to 2002 using Landsat Thematic Mapper (TM) and Enhanced Thematic Mapper (ETM+) images. Supervised classification of the images using the maximum likelihood algorithm was applied to derive landcover data while surface temperature was extracted using an algorithm developed by the United States Geologic Survey (USGS). Normalized Difference Vegetation Index (NDVI)was also derived to establish the relationship between surface temperature and biophysical properties of leaf biomass. With the use of geographic information system (GIS) software, values obtained from the demographic data, landcover and surface temperature were analyzed to identify spatial pattern changes in landcover and surface temperature. UHI was modeled using a multiple linear regression equation to determine the relationship between built-up cover (BUC), population (POP), and vegetation cover (VEG), and the contribution of each of these factors to UHI. The combined use of remote sensing and GIS has been proven useful in monitoring urban growth and surface temperature which have a direct proportional relationship. An increase in surface temperature resulting from urban sprawl leads to the aggravation of UHI. Urban development has decreased vegetation cover thus decreasing surface moisture availability. Land surface temperature had an average increase of 4.5'C from 1989 to 2002 in Metro Manila. Disproportions in temperature between Metro Manila and its adjacent municipalities were also observed. In the regression analysis, no independent variable was omitted in the test for multi-colinearity. The respective correlation between the dependent and each of the independent variables was tested to affirm the inclusion of the independent variable in the multiple regression analysis. Only built-up cover (BUC) indicated strong relationship with UHI. In the regression equation, built-up cover has a contribution factor of 1.25 to UHI. The results of this study can be used by planners and decision-makers in formulating their sustainable development strategies for Metro Manila. Collection Category FI
Subject Index : Urban heat island--Metro Manila--Philippines , | https://iskomunidad.upd.edu.ph/index.php?title=Monitoring_urban_Heat_Island_Phenomenon_in_Metro_Manila:_A_Remote_Sensing-GIS_Approah&diff=24182&oldid=21591 |
Legaz Arrese A., Serrano Ostáriz E., Jcasajús Mallén J. A., Munguía Izquierdo D.
Faculty of Physical Activity and Sports Sciences, University of Saragossa, Saragossa, Spain
Aim. The relationship between V.O2max (mL·kg-1·min-1) and running performance has been assessed in cross-sectional studies. Follow-up studies of the long-term effects of running training on the changes in performance and V.O2max have not been undertaken.
Methods. Twenty-five male endurance-trained (MET) and 8 female endurance-trained (FET) athletes were tracked over 4 years. In each event the athletes were divided into Class A, including half the number of athletes with the best performances, and Class B. V.O2max, examined at the end of the competitive season, and the best performance was chosen each year.
Results. After 3 years of training, in MET and FET athletes the performance improved by 1.77% and 0.69% (P<0.01 and P=0.579), respectively. In Class A runners, training resulted in non-significant increase in performance (-0.04%) (P=0.982) and in Class B runners, performance increased by 3.16% (P=0.001). In all groups V.O2max remained essentially unchanged. Longitudinal changes in the V.O2max were not related with the changes in running performance in any group.
Conclusion. This study show than in older runners with more years of training, heavy training does not produce improvements in running performance neither changes in the V.O2max. It is possible that these elite athletes have reached the plateau in their performance; although unlikely, some improvement in training techniques may happen and break the present limit. In younger runners with less years of training, heavy training produce improvements in running performance without changes in the V.O2max. These athletes that had not attained his biological limits at the beginning of study improved the performance in competition and it is quite probable that this improvement be due to training. The changes in performance were not related to changes in V.O2max. Consequently, another physiological or psychological variables must be studied by longitudinal form to explain the variability of performance in competition. | http://www.minervamedica.it/en/journals/sports-med-physical-fitness/article.php?cod=R40Y2005N04A0435 |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
1. Cross-Linked Silicone Gel
2. Electromagnetic Wave Absorbing Filler
3. Squeezable, Cross-Linked, Grease-Like Electromagnetic Wave Absorber
4. Container
5. Method for Absorbing Electromagnetic Waves
EXAMPLES
Example 1
Example 2
COMPARATIVE EXAMPLE 1
COMPARATIVE EXAMPLE 2
COMPARATIVE EXAMPLE 3
COMPARATIVE EXAMPLE 4
1. Field of the Invention
The present invention relates to a squeezable, cross-linked, grease-like electromagnetic wave absorber, container which contains the absorber, method for producing the container and method for using the absorber and container for absorbing electromagnetic waves; in particular to a squeezable, cross-linked, grease-like electromagnetic wave absorber excellent in electromagnetic wave absorbing, capability, thermal conductivity and flame retardancy, having limited temperature dependency, and applicable to a gap and site to be formed into a thin film thereon, to which a sheet product is essentially inapplicable, container which contains the absorber, method for producing the container and method for using the absorber and container for absorbing electromagnetic waves.
2. Description of the Prior Art
Recently, troubles caused by electromagnetic waves, e.g., radio interferences and electronic device errors, have been frequently occurring, because of expanded utilization of electromagnetic waves by broadcasting, communication by moving devices, radars, cellular phones, wireless LANs and so forth, which massively scatter electromagnetic waves in living spaces. In particular, unnecessary electromagnetic waves (noises) radiated from elements in devices which generate electromagnetic waves and patterns on printed boards cause interference and resonance phenomena. These problems have called for urgent measures against electromagnetic waves in neighborhood electromagnetic fields, which induce deteriorated device functions and reliability, and increased heat emitted from arithmetic elements which are speeding up increasingly.
Some of the major measures against these problems taken so far include reflection for returning noises back to the source, by-passing for directing noises to a stable potential surface (e.g., by grounding) and shielding.
None of these methods, however, has sufficiently achieved measures against electromagnetic waves in neighborhood electromagnetic fields and increased heat radiation simultaneously for various reasons. Elements are mounted at a higher density to satisfy requirements for compacter and lighter assemblies, which tends to cut spaces for devices for controlling noises. Elements are driven at a lower voltage to satisfy requirements for energy-saving, with the result that their power sources tend to be interfered with high-frequency waves radiated from another medium. Arithmetic elements have narrowed clock signals to satisfy requirements for higher processing speed, with the result that they are more sensitive to high-frequency waves. Resin boxes tend to have structures which allow electromagnetic waves to leak out more easily as they are rapidly spreading, with the result that they are interfered with each other as available frequency bands rapidly expand.
Electromagnetic wave absorbers are now spreading to convert noises, emitted from elements and patterns on printed boards contained in boxes, into heat energy to solve these problems. The absorbers are required to have functions of absorbing electromagnetic energy of noises by utilizing magnetism loss characteristics and converting it into heat energy to control noise reflection and transmission in boxes, and functions of adding an impedance to the electromagnetic energy emitted from board patterns and element terminals working as antennas to deteriorate the antenna effects and thereby to reduce the electromagnetic energy level. There are demands for the absorbers which fully exhibit these functions.
One of the absorbers proposed to solve these problems is a flexible, thin laminate of a flexible, sheet-shape wave absorption layer and wave reflection layer, the former being of a mixture of materials, one for dissipating and the other for retaining electromagnetic energy, and the latter of an organic fiber fabric electrolessly plated with a highly electroconductive metal (JP-B-3097343).
Various measures for shielding electromagnetic waves have been adopted. For examples, some devices are provided with a metallic shielding plate to prevent leakage of electromagnetic waves outwards. Some devices are contained in boxes treated to have electroconductivity and hence electromagnetic wave shielding capability. These shielding materials involve problems, e.g., electromagnetic waves reflected and scattered by them fill device insides to complicate electromagnetic interferences, or cause interferences between boards in a device. One of the proposals to solve these problems is controlling electromagnetic interferences by a laminate of electroconductive supporter coated with an electrically insulating, soft magnetic layer of soft magnetic powder and an organic binder (JP-A-7-212079).
JP-A-2002-329995 discloses a laminated electromagnetic wave absorber composed of an electromagnetic wave reflection layer coated, at least on one side, with an electromagnetic wave absorption layer, where the reflection layer comprises an electroconductive filler dispersed in a silicone resin and the absorption layer comprises an electromagnetic wave absorbing filler dispersed in a silicone resin. It is claimed to have high electromagnetic wave absorbing and shielding capabilities, and, at the same time, high moldability, flexibility, weather resistance and heat resistance coming from the silicone resin itself JP-A-11-335472 discloses a sheet of electromagnetic wave absorbing, thermoconductive silicone gel composition containing magnetic particles of metal oxide (e.g., ferrite) and thermoconductive filler of metal oxide or the like.
Each of the above techniques, however, provides an electromagnetic wave absorber structure in the form of sheet or the like. The sheet-shape absorber cannot be sufficiently applicable to some boxes which have complicated surfaces, e.g., those with openings (slits or the like) for improved heat radiation effect, because it needs special treatment, e.g., cutting in a complex manner. Several materials have been proposed to be applied to such surfaces, e.g., electrically insulating paste of high permeability for electromagnetic wave shielding, which contains 200 to 900 parts by mass of soft magnetic powder per 100 parts by mass of electrically insulating resin (JP-A-4-352498); electromagnetic wave absorbing adhesive agent of viscous mixture comprising sendust soft magnetic powder containing an organic binder and coupling agent (JP-A-11-50029); composite magnetic paste of putty composition containing flat, Fe—Al—Si alloy powder and an organic binder (JP-A-11-54985); liquid composition for preventing wave interferences, comprising silicone resin or the like incorporated with carbon fibers, magnetic particles and graphitized carbon (JP-A-2000-244173); electromagnetic wave shielding material comprising a thermosetting resin or the like, which remains liquid when applied, incorporated with magnetic particles (JP-A-2001-284877); and electromagnetic wave absorbing paste prepared by kneading an electromagnetic wave absorbing material of magnetic particles and an organic binder (JP-A-2001-77585). However, each material tends to trickle down, bleed to the surrounding area and separate from a magnetic powder, and hence is difficult to apply to an aimed site sufficiently thinly. Moreover, it is difficult to handle, because it cannot be easily contained in a container, e.g., tube or syringe.
The present invention has been developed to solve the problems described above. It is an object of the present invention to provide a squeezable, cross-linked, grease-like electromagnetic wave absorber which has improved characteristics to prevent undesirable phenomena (trickling down, bleeding to the surrounding area and separation from a filler with which it is used); can be contained in a container (e.g., tube or syringe) like grease, paste, clay or the like; is squeezable from a container by a weak force (e.g., by hand from a tube or by air which presses a syringe piston); can be formed into any shape by a force after being squeezed out from the container; shows no diffusion phenomenon (bleeding phenomenon) in a device in which it is used; can retain its shape intact so long as it is allowed to remain as it is in the ordinary course of events even when exposed to a light load (e.g., that occurring when it is placed on a slanted object), i.e., showing self-shape-retaining nature; shows limited temporal aging; is excellent in electromagnetic wave absorbing capability, thermal conductivity and flame retardancy; has limited temperature dependency; and is applicable to a gap and site to be formed into a thin film thereon, to which a sheet product is essentially inapplicable. The other objects of the present invention are to provide a container which contains the absorber, a method for producing the container, and a method for using the absorber and container for absorbing electromagnetic waves.
The inventors of the present invention have found, after having extensively studied to solve the above problems, that a squeezable, cross-linked, grease-like electromagnetic wave absorber produced by heating a starting material for silicone gel after it is dispersed with a filler for absorbing electromagnetic waves is unexpectedly movable by a weak force, e.g., that produced by a syringe piston, although it was at first considered to be unmovable because it is a cross-linked product; can be formed into a specific shape; shows self-shape-retaining nature by which it can retain its shape intact so long as it is allowed to remain as it is in the ordinary course of events even when exposed to a light load (e.g., that occurring when it is placed on a slanted object); shows excellent electromagnetic wave absorption capability, thermal conductivity and flame retardancy, when incorporated preferably with soft ferrite and/or flat, soft magnetic metal powder each working as an electromagnetic wave absorbing agent, and further preferably with a composite filler containing magnetite as a flame retardant at a specific content; has limited temperature dependency; and is applicable to a gap and site to be formed into a thin film thereon, to which a sheet product is essentially inapplicable, achieving the present invention.
The first aspect of the present invention is a squeezable, cross-linked, grease-like electromagnetic wave absorber comprising a cross-linked silicone gel dispersed with an electromagnetic wave absorbing filler, which shows self-shape-retaining nature in spite of its fluidity and contains the filler at 200 to 800 parts by mass per 100 parts by mass of the cross-linked silicone gel.
The second aspect of the present invention is the squeezable, cross-linked, grease-like electromagnetic wave absorber of the first aspect, wherein the cross-linked silicone gel has a consistency of 50 to 200, determined in accordance with JIS K 2220 with a ¼ cone.
The third aspect of the present invention is the squeezable, cross-linked, grease-like electromagnetic wave absorber of the first or second aspect, wherein the electromagnetic wave absorbing filler is a mixture of electromagnetic wave absorbing agent and flame retardant.
The fourth aspect of the present invention is the squeezable, cross-linked, grease-like electromagnetic wave absorber of the third aspect, wherein the electromagnetic wave absorbing agent is of a soft ferrite surface-treated with a silane compound having a non-functional group and/or flat, soft magnetic metal powder.
The fifth aspect of the present invention is the squeezable, cross-linked, grease-like electromagnetic wave absorber of the fourth aspect, wherein the soft ferrite surface-treated with a silane compound having a non-functional group is surface treated with dimethyldimethoxy silane or methyltrimethoxy silane.
The sixth aspect of the present invention is the squeezable, cross-linked, grease-like electromagnetic wave absorber of the fourth or fifth aspect, wherein the soft ferrite surface-treated with a silane compound having a non-functional group is kept at a pH of 8.5 or less.
The seventh aspect of the present invention is the squeezable, cross-linked, grease-like electromagnetic wave absorber of one of the third to sixth aspects, wherein the flame retardant is of magnetite.
The eighth aspect of the present invention is a container which contains the squeezable, cross-linked, grease-like electromagnetic wave absorber of one of the first to seventh aspects.
The ninth aspect of the present invention is the container of the eighth aspect which takes a form of syringe or tube.
The tenth aspect of the present invention is a method for producing the container of the eighth or ninth aspect, wherein a squeezable, cross-linked, grease-like electromagnetic wave absorber, produced by heating a mixture of starting material for a cross-linked silicone gel and electromagnetic wave absorbing filler while or after they are mixed to disperse the filler in the absorber, is contained therein.
th
The 11aspect of the present invention is a method for producing the container of the eighth or ninth aspect, wherein a squeezable, cross-linked, grease-like electromagnetic wave absorber is produced by heating the container which has already contained a mixed solution of starting material for a cross-linked silicone gel and electromagnetic wave absorbing filler to disperse the filler in the absorber.
th
The 12aspect of the present invention is a method for absorbing unnecessary electromagnetic waves, wherein the squeezable, cross-linked, grease-like electromagnetic wave absorber contained in the container of the eighth or ninth aspect is applied to an area around an opening for heat radiation on a box to be formed into a thin film thereon to control radiation of unnecessary electromagnetic waves from the opening.
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention is excellent in electromagnetic wave absorbing capability, thermal conductivity and flame retardancy; has limited temperature dependency; and is applicable to a gap and site to be formed into a thin film thereon, to which a sheet product is essentially inapplicable.
Moreover, the squeezable, cross-linked, grease-like heat-radiating material of the present invention can be contained in a container (e.g., tube or syringe) like grease, paste, clay or the like, and hence is squeezable from the container by a weak force (e.g., by hand from a tube or by air which presses a syringe piston); can be formed into any shape by a force after being squeezed out from a container, the formed shape showing self-shape-retaining nature by which it retains its shape intact so long as it is allowed to remain as it is in the ordinary course of events even when exposed to a light load (e.g., that occurring when it is placed on a slanted object) and also showing limited temporal aging because it is already cross-linked. As such, the present invention provides a novel electromagnetic wave absorber different from the conventional ones.
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention comprises a cross-linked silicone gel dispersed with an electromagnetic wave absorbing filler. The container of the present invention contains the squeezable, cross-linked, grease-like electromagnetic wave absorber. The method of the present invention for producing the container provides a method by which the squeezable, cross-linked, grease-like electromagnetic wave absorber is contained. The constituent components of the absorber, container and method for producing the absorber and container are described below.
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention comprises a cross-linked silicone gel as a matrix material. Cross-linked silicone gel itself is a known substance. However, it should satisfy various conditions for the squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention. More specifically, it is particularly preferable that it is fluid as to be squeezable from a syringe or tube, shows plasticity and self-shape-retaining nature even when massively incorporated with an electromagnetic wave absorbing filler, is free of a low-molecular-weight silicone compound, and contains alkenyl group to a limited extent and residual hydrogen group directly bound to the silicone atom.
The cross-linked silicone gel has a consistency of 50 to 200, determined in accordance with JIS K 2220 with a ¼ cone. Consistency beyond the above range is not desirable. A silicone gel having a consistency of above 200 may lose self-shape-retaining nature to bleed or diffuse into the surrounding area when it is applied. On the other hand, a silicone gel having a consistency of below 50 may lose fluidity.
The method for producing the cross-linked silicone gel for the present invention is not limited. However, it is normally produced from organohydrogen polysiloxane and alkenylpolysiloxane, described later, as starting materials by hydrosilylation (addition reaction) in the presence of a catalyst. In other words, starting materials for the silicone gel for the present invention are organohydrogen polysiloxane and alkenylpolysiloxane in many cases. An organohydrogen polysiloxane as one of the starting materials for the present invention is preferably the one represented by the general formula (1):
1
2
3
4
1
2
3
4
1
In the formula (1), Ris a substituted or unsubstituted monovalent hydrocarbon group, where R's may be the same or different; R, Rand Rare each Ror —H, at least 2 of R, Rand Rbeing —H; “x” and “y” are each an integer representing number of each unit, each unit being configured in a block or preferably random manner, where “x” is an integer of 0 or more but preferably 10 to 30, “y” is an integer of 0 or more but preferably 1 to 10, “x+y” is an integer of 5 to 300, but preferably 30 to 200, and “y/(x+y)” is preferably 0.1 or less, because the cross-linked grease-like material may no longer obtained for the present invention due to the presence of an excessive number of cross-linking points when the ratio exceeds 0.1. Examples of the hydrocarbon group Rinclude alkyl groups, e.g., methyl, ethyl, propyl and butyl; cycloalkyl groups, e.g., cyclopentyl and cyclohexyl; aryl groups, e.g., phenyl and tolyl; and aralkyl groups, e.g., benzyl and phenylethyl, where hydrogen atoms of these groups may be partly substituted with a halogen atom, e.g., chlorine or fluorine, to form a halogenated hydrocarbon.
The hydrogen atom directly bound to the silicon atom (Si—H) is necessary to activate the addition reaction (hydrosilylation) with the alkenyl group directly or indirectly bound to the silicon atom. At least the two hydrogen atoms are required in the organohydrogen polysiloxane molecule. In the presence of an insufficient number of the hydrogen atoms directly bound to the silicon atom, the silicone gel may not be formed due to an insufficient number of the cross-linking points, with the result that the product will have properties not much different from those of silicone oil. In the presence of an excessive number of the hydrogen atoms directly bound to the silicon atom, on the other hand, the product will have properties not much different from those of silicone rubber due to an excessive number of the cross-linking points. It is needless to say that there is an optimum ratio of number of the Si—H group in the organohydrogen polysiloxane to that of the alkenyl group in the alkenylpolysiloxane. The ratio S—H group/alkenyl group is preferably in a range of from 0.85 to 1.25, particularly preferably from 0.9 to 1.1. When the ratio is within the above range, number of the residual alkenyl group is limited to prevent oxidation-caused deterioration of the silicone gel in an electronic device, in which it is exposed to high temperature, and, at the same time, number of the residual Si—H group is limited to prevent deterioration of gel thermal conductivity resulting from evolution of hydrogen.
An alkenylpolysiloxane as the other starting material for the present invention is preferably the one represented by the general formula (2):
1
1
5
6
7
1
5
6
7
1
In the formula (2), Ris a substituted or unsubstituted monovalent hydrocarbon group, where Rs may be the same or different; R, Rand Rare each Ror an alkenyl group, at least 2 of R, Rand Rbeing an alkenyl group; “s” and “t” are each an integer representing number of each unit, each unit being configured in a block or preferably random manner, where “s” is an integer of 0 or more, “t” is an integer of 0 or more, “s+t” is an integer of 10 to 600, and “t/(s+t)” is preferably 0.1 or less, because the cross-linked grease-like material may no longer obtained for the present invention due to the presence of an excessive number of cross-linking points when the ratio exceeds 0.1. Examples of the hydrocarbon group Rinclude alkyl groups, e.g., methyl, ethyl, propyl and butyl; cycloalkyl groups, e.g., cyclopentyl and cyclohexyl; aryl groups, e.g., phenyl and tolyl; and aralkyl groups, e.g., benzyl and phenylethyl, where hydrogen atoms of these groups may be partly substituted with a halogen atom, e.g., chlorine or fluorine, to form a halogenated hydrocarbon.
The alkenyl group (e.g., vinyl or allyl group) directly or indirectly bound to the silicon atom is necessary to activate the addition reaction (hydrosilylation) with the hydrogen atom directly bound to the silicon atom (Si—H). At least the two alkenyl groups are required in the alkenylpolysiloxane molecule. In the presence of an insufficient number of the alkenyl group, the silicone gel may not be formed due to an insufficient number of the cross-linking points, with the result that the product will have properties not much different from those of silicone oil. In the presence of an excessive number of the alkenyl group, on the other hand, the product will have properties not much different from those of silicone rubber due to an excessive number of the cross-linking points. It is needless to say that there is an optimum ratio of number of the alkenyl group in the alkenylpolysiloxane to that of the Si—H group in the organohydrogen polysiloxane. The ratio S—H group/alkenyl group is preferably in a range of from 0.85 to 1.25, particularly preferably from 0.9 to 1.1, for the reasons described above. The number “s+t” determines distance between the cross-linking points. When it is excessively small, number of the cross-linking points is excessively large. When it is excessively large, on the other hand, number of the cross-linking points is insufficient, with the result that the product will have an excessively high molecular weight to be smoothly discharged from a syringe.
The hydrogen polysiloxane for the present invention, represented by the general formula (1), has the hydrogen group (—H) directly bound to the silicon atom, and the alkenylpolysiloxane represented by the general formula (2) has the carbon-carbon double bond. The double bond and hydrogen group cause an addition reaction, referred to as hydrosilylation.
The hydrosilylation reaction may be carried out by a known technique, in the presence or absence of an organic solvent. The organic solvents useful for the reaction include alcohols, e.g., ethanol and isopropyl alcohol; aromatic hydrocarbons, e.g., toluene and xylene; ethers, e.g., dioxane and THF; aliphatic hydrocarbons; and chlorinated hydrocarbons. It is carried out normally at 50 to 150° C. in the presence of a catalyst, e.g., chloroplatinic acid, chloroplatinic acid/alcohol complex, platinum/olefin complex, platinum/vinyl siloxane complex or platinum/phosphorus complex. The catalyst is incorporated in the reaction system normally at 1 to 500 ppm by mass as platinum on the alkenylpolysiloxane, preferably 3 to 250 ppm by mass in consideration of product curability and physical properties of the cured product.
The electromagnetic wave absorbing filler which can be incorporated in the cross-linked silicone gel for the present invention is not limited, so long as it has a function of absorbing electromagnetic waves. Examples of the filler useful for the present invention include soft ferrite and flat, soft magnetic metal powder. These may be used either individually or in combination. Moreover, the filler is preferably incorporated with a flame retardant to form a composite filler.
The soft ferrite useful as an electromagnetic wave absorber which can be incorporated in the cross-linked silicone gel for the present invention is selected from the ones which can exhibit a magnetic function even at a very low excitation current. The soft ferrite is not limited for the present invention. Examples of the soft ferrite useful for the present invention include Ni—Zn, Mn—Zn, Mn—Mg, Cu—Zn, Ni—Zn—Cu, Fe—Ni—Zn—Cu, Fe—Mg—Zn—Cu and Fe—Mn—Zn ferrites, of which Ni—Zn ferrite is more preferable in consideration of a balance among electromagnetic wave absorption characteristics, thermal conductivity, cost and so forth.
The soft ferrite particle is not limited in shape. It may take any desired shape, e.g., spherical, fibrous or indefinite. It is preferably spherical for the present invention, because the soft ferrite can be densely packed to give a higher thermal conductivity. The spherical soft ferrite powder has a particle size at which it is densely packed and, at the same time, prevented from agglomerating with each other to facilitate the mixing work.
The spherical Ni—Zn ferrite particles are well dispersible in silicone gel, described above, without inhibiting cure of the gel, while exhibiting a thermal conductivity to some extent.
50
50
The soft ferrite has a particle size distribution Dof 1 to 30 μm, preferably 1 to 10 μm. The distribution Dbeyond the above range is not desirable. When it is below 1 μm, the absorber may have a deteriorated electromagnetic wave absorption capability at a low frequency band of 500 MHz or less. When it is above 30 μm, on the other hand, the absorber may have deteriorated flatness/smoothness.
50
The particle size distribution Drepresents a size range around the midpoint in a cumulative distribution in which sizes determined by a particle size distribution meter are arranged in an ascending order.
It is necessary to treat the soft ferrite for the present invention with a silane compound having a non-functional group, in order to control effects of the alkali ion remaining on the surface. The soft ferrite is incorporated in silicone described above, and the alkali ion remaining on the surface may inhibit cure of the silicone effected by a condensation or addition mechanism. When cure of the silicone is inhibited, the soft ferrite may be insufficiently packed and dispersed.
The soft ferrite surface-treated with a silane compound having a non-functional group has a pH of 8.5 or less, preferably 8.2 or less, more preferably 7.8 to 8.2. Keeping the soft ferrite at a pH of 8.5 or less controls the inhibition effect on cure of the silicone and makes it applicable to any type of silicone. Moreover, it improves compatibility of the soft ferrite with the silicone, allowing it to be incorporated in the silicone at a higher content and increasing its compatibility with a thermoconductive filler to make the formed article more uniform.
The silane compounds having a non-functional group useful for the present invention for surface treatment of the soft ferrite include methyltrimethoxy silane, phenyltrimethoxy silane, diphenyldimethoxy silane, methyltriethoxy silane, dimethyldimethoxy silane, phenyltriethoxy silane, diphenyldiethoxy silane, isobutyltrimethoxy silane and decyltrimethoxy silane, of which dimethyldimethoxy silane and methyltrimethoxy silane are more preferable. They may be used either individually or in combination.
A common silane coupling agent having a functional group, e.g., epoxy- or vinyl-based one, which is used for surface treatment of filler or the like, is not desirable for surface treatment of the soft ferrite for the present invention, because it may cause hardness change of increased hardness in an environment test carried out under heating. The increased hardness, when occurs, may lead to cracking or the like caused by thermal decomposition and damages of external appearance.
The method for surface treatment of the soft ferrite with the silane compound having a non-functional group is not limited, and a common method with an inorganic compound, e.g., silane compound, may be adopted. For example, the soft ferrite is immersed in a methyl alcohol solution containing dimethyldimethoxy silane at around 5% by mass to be mixed with the silane compound, to which water is added for hydrolysis, and the product is then milled and mixed by a Henschel mixer and the like. The silane compound having a non-functional group is preferably incorporated at around 0.2 to 10% by mass on the soft ferrite.
The flat, soft magnetic metal powder which can be incorporated in the cross-linked silicone gel for the present invention is a material which has an effect of securing a stable energy conversion efficiency in a broad frequency band of MHz to 10 GHz.
The flat, soft magnetic metal powder is not limited, so long as it exhibits soft magnetism and can be mechanically flattened. It preferably has a high permeability, low self-oxidation rate and shape of high aspect ratio (average particle size divided by average thickness). More specifically, the metals useful for the present invention include soft magnetic ones, e.g., Fe—Ni, Fe—Ni—Mo, Fe—Ni—Si—B, Fe—Si, Fe—Si—Al, Fe—Si—B, Fe—Cr, Fe—Cr—Si, Co—Fe—Si—B, Al—Ni—Cr—Fe and Si—Ni—Cr—Fe alloys, of which Al-based and Si—Ni—Cr—Fe alloys are more preferable particularly viewed from their low self-oxidation rate. They may be used either individually or in combination.
Degree of self-oxidation can be measured by mass change of a sample, determined by an atmospheric exposure test under heating. It is preferable that the degree is 0.3% by mass or less when a sample is kept at 200° C. in air for 300 hours. Flat, soft magnetic metal powder of low self-oxidation rate has an advantage of being resistant to temporal aging in magnetic characteristics resulting from changed ambient conditions, e.g., humidity, even when it is incorporated with a highly moisture-permeable silicone gel or the like as a binder resin.
Powder of low self-oxidation rate has another advantage that it can be massively stored and handled easily to improve productivity, because it involves no risk of dust explosion and considered to be non-hazardous.
The flat, soft magnetic metal powder preferably have an average thickness of 0.01 to 1 μm. The particles having an average thickness of below 0.01 μm may have deteriorated dispersibility in a resin, and may not be sufficiently oriented unidirectionally when orientation-treated in an external magnetic field. At the same time, they may have deteriorated magnetic properties (e.g., permeability) and magnetism shielding characteristics, even when they are of the same composition. On the other hand, those having an average thickness of above 1 μm may not be packed at a sufficient density. They are more sensitive to a diamagnetic field, because of decreased aspect ratio, which leads to deteriorated permeability and hence insufficient shielding characteristics.
50
50
50
The flat, soft magnetic metal powder preferably has a particle size distribution Dof 8 to 42 μm. The powder having a particle size distribution Dof below 8 μm may have a deteriorated energy conversion efficiency. On the other hand, the particles having a size distribution Dof above 42 μm may have a deteriorated mechanical strength and tend to be broken when mechanically treated for mixing.
50
The particle size distribution Drepresents a size range around the midpoint in a cumulative distribution in which sizes determined by a particle size distribution meter are arranged in an ascending order.
2
2
2
The flat, soft magnetic metal powder preferably has a specific surface area of 0.8 to 1.2 m/g. It functions to convert energy by electromagnetic induction, and can have an increased energy conversion efficiency as its specific area increases. Increased specific surface area, however, is accompanied by decreased mechanical strength. Therefore, it should be within an optimum range. The powder having a specific surface area of below 0.8 m/g can be densely packed but has a deteriorated energy conversion. On the other hand, the powder having a specific surface area of above 1.2 m/g tends to be broken when mechanically treated for mixing, difficult to retain the absorber shape, and shows a deteriorated energy conversion function even when densely packed.
The specific surface area is determined by a BET tester.
Moreover, the flat, soft magnetic metal powder preferably has an aspect ratio of 17 to 20, and tap density of 0.55 to 0.75 g/ml. Still more, it is preferably surface-treated with an oxidation inhibitor.
The flat, soft magnetic metal powder for the present invention is preferably microcapsulation-treated before use. It tends to have a deteriorated volumetric resistance and dielectric breakdown strength, when packed together with soft ferrite or the like. Microcapsulation can not only prevent deterioration of its dielectric breakdown strength but also improve the strength.
Any microcapsulation method may be adopted, so long as it uses a material which can coat the flat, soft magnetic metal particle surfaces to some extent and is not harmful to energy conversion efficiency of the powder.
For example, it may use gelatin to coat the flat, soft magnetic metal particle surfaces, where the particles are dispersed in a toluene solution of gelatin and then toluene is removed by evaporation to produce the microcapsulated particles coated with gelatin. For example, the microcapsulated particles composed of gelatin and the flat, soft magnetic metal powder at about 20 and 80% by mass can have a size of about 100 μm. The microcapsulation treatment can almost double dielectric breakdown strength of the electromagnetic wave absorber.
3
4
A flame retardant to be incorporated together with the above-described electromagnetic wave absorbing filler is preferably of magnetite. Magnetite is iron oxide (FeO), and can impart flame retardancy to the absorber and improve its thermal conductivity, when used in combination with the soft ferrite and/or flat, soft magnetic metal powder. Moreover, it can improve electromagnetic wave absorption effect of the electromagnetic wave absorber as a whole by the synergistic effect brought by its magnetic characteristics.
50
50
50
50
The magnetite preferably has a particle size distribution Dof 0.1 to 0.4 μm. It allows the soft ferrite to be densely packed, when its particle size distribution Dis kept at about one-tenth of that of the soft ferrite. The magnetite may be difficult to handle when its distribution Dis below 0.1 μm. It may not be densely packed together with the soft ferrite when its distribution Dexceeds 0.4 μm.
50
The particle size distribution Drepresents a size range around the midpoint in a cumulative distribution in which sizes determined by a particle size distribution meter are arranged in an ascending order.
The magnetite particle is not limited in shape. It may take any desired shape, e.g., spherical, fibrous or indefinite. It is preferably fine and octahedral for the present invention to realize the electromagnetic wave absorber of high flame retardancy. The fine, octahedral magnetite particles can have a large specific surface area and high effect of imparting flame retardancy.
When the electromagnetic wave absorber of the present invention is incorporated with a composite electromagnetic wave absorbing filler in which magnetite is combined with the soft ferrite surface-treated with a silane compound having a non-functional group, the composite filler is preferably composed of 60 to 90% by mass of the soft ferrite and 3 to 25% by mass of the magnetite. The resultant absorber is suitable for high-resistance/high-insulation purposes.
When the electromagnetic wave absorber of the present invention is incorporated with a composite electromagnetic wave absorbing filler in which magnetite is combined with the flat, soft magnetic metal powder, the composite filler is preferably composed of 60 to 70% by mass of the metal powder and 3 to 10% by mass of the magnetite. The resultant absorber is suitable for purposes which need absorption of electromagnetic waves in a frequency band of from 2 to 4 GHz.
When the electromagnetic wave absorber of the present invention is incorporated with a composite electromagnetic wave absorbing filler in which magnetite is combined with the soft ferrite surface-treated with a silane compound having a non-functional group and flat, soft magnetic metal powder, the composite filler is preferably composed of 40 to 60% by mass of the soft ferrite, 20 to 30% by mass of the metal powder and 3 to 10% by mass of the magnetite. The resultant absorber is suitable for purposes which need absorption of electromagnetic waves in a broad frequency band of from MHz to 10 GHz.
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention is incorporated with the electromagnetic wave absorbing filler at 200 to 800 parts by mass per 100 parts by mass of the cross-linked silicone gel. The filler content beyond the above range is not desirable. When it is below 200 parts by mass, the absorber may have a deteriorated energy conversion efficiency. When it is above 800 parts by mass, on the other hand, the absorber may not be squeezed out from a syringe or the like because of decreased fluidity.
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention is a composite material with the cross-linked silicone gel as a matrix material dispersed with the electromagnetic wave absorbing filler. When incorporated with an inorganic filler, e.g., ferrite, flat, soft magnetic metal powder or magnetite, at a high content, silicone generally becomes too viscous to be kneaded by a roll or kneader (e.g., Banbury kneader). Even when kneaded, the compound is too viscous. On the other hand, incorporation of silicone with soft ferrite surface-treated with a silane compound having a non-functional group facilitates its treatment, e.g., kneading. When roll-kneaded, silicone containing densely packed ferrite loses strength for holding ferrite and hence structural integrity. At the same time, the compound will not be homogeneous, because it tends to stick to roll surfaces. When surface-treated with a silane compound having a non-functional group, soft ferrite becomes well dispersible in cross-linked silicone gel. Moreover, microcapsulation of flat, soft magnetic metal powder brings an advantage of further facilitating treatment, e.g., kneading.
For use of the squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention, it is squeezed out of a container, e.g., syringe in which it is contained, and spread over, or poured or pressed into a space to which a sheet product is essentially inapplicable. Moreover, it has self-shape-retaining nature by which it retains its shape intact after being applied even when exposed to a light load (e.g., that occurring when it is placed on a slanted object)
The term “cross-linked” used in this specification means that the electromagnetic wave absorber of the present invention is a product of novel type, produced based on a technical concept different from that for an uncrosslinked silicone resin, which has been used thus far. The term “squeezable” means that the electromagnetic wave absorber of the present invention is applied after being squeezed out of a container, e.g., syringe, in which it is contained, to a space over which it is spread or into which it is poured or pressed, or over which it is spread, even when the space has a random shape.
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention can be contained in a container, from which it can be squeezed out for use. The container may be represented by a syringe, tube or the like. It is not limited, so long as it has a space for containing a fluid, fluid injection and discharge port(s), piston or blade by which a fluid is injected or discharged, cap, seal and so forth, and has a function of injecting, discharging and containing an optional quantity of fluid. Taking a tube as an example, it may have a fluid injection and discharge ports; one port working for injecting and discharging fluid; both ports at first but an injection port is closed and left unused after a fluid is contained, leaving only a discharge port for use; or both ports which are closed after a fluid is contained. Moreover, it may have a varying means for closing an injection and discharge ports, e.g., plug, cap with a rotational groove, sealing under heating, closing with a seal, or the like.
The container may be equipped with one or more means selected from various types, e.g., heating, cooling, depressurizing, pressurizing, aspiration, evaporation, motoring, hydraulic, pneumatic, measuring, dust proofing, auxiliary handling, displaying, evolved gas releasing, reverse flow prevention, temperature sensing means and so forth. The most extensively used containers are syringe-shape and tube containers.
The method for containing the squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention in a container is not limited. For example, it may be contained by one of the following two methods.
(1) A cross-linked silicone gel and electromagnetic wave absorbing filler are heated while or after they are mixed to produce the squeezable, cross-linked, grease-like electromagnetic wave absorber dispersed with the filler, and then the product is contained in a container. This method can efficiently produce the absorber, because it can massively handle the starting material and filler. It is necessary to contain the product with degassing to prevent bubbles from entering the container.
(2) A mixed solution of starting material for a cross-linked silicone gel and electromagnetic wave absorbing filler is contained, and then heated together with the container to cross-link the starting material to produce the squeezable, cross-linked, grease-like electromagnetic wave absorber dispersed with the filler. This method can contain the mixed solution of low viscosity in a container, e.g., syringe, tube or the like, while preventing bubbles from entering the container more efficiently, and hence keep the product in a higher-quality condition for use.
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention can be squeezed out of a container in which it is contained from its discharge port, and spread over an area around radiation opening(s), e.g., slit(s) or the like, to form a thin film on a box which holds an electronic device to control radiation of unnecessary electromagnetic waves through the opening(s). Some of the electronic devices held in such a box are personal computers (PCs), DVD drivers and TV sets.
The present invention is described in detail by EXAMPLES and COMPARATIVE EXAMPLES. It is to be understood that the present invention is not limited by EXAMPLES. In EXAMPLES, The properties were determined by the following methods.
(1) Testing of diffusion (bleeding) phenomenon: A 50 g of a squeezable, cross-linked, grease-like electromagnetic wave absorber sample was placed between two glass plates and pressed to a gap of 2 mm between the plates, i.e., the sample was kept 2 mm thick. It was then placed in a horizontal or slanted condition under no load, and tested by an environment tester, where it was exposed to cycles of 30 minutes at −4° C. and 30 minutes at 100° C. for a total of 300 hours, to observe the sample conditions.
(2) Consistency: determined in accordance with JIS K 2220 with a ¼ cone
(3) Magnetism loss (permeability): determined by a permeability/induction rate analyzing system (S parameter type coaxial tube er, μr analyzing system, Anritsu & Keycom)
(4) Volumetric resistance: determined in accordance with JIS K 6249
(5) Dielectric breakdown strength: determined in accordance with JIS K
(6) Thermal conductivity: determined in accordance with the QTM method (Kyoto Electronics Manufacturing)
(7) Flame retardancy: determined in accordance with UL94
(8) Heat resistance: The sample was heated at constant 150° C. to determine penetration and thermal conductivity changing with time. It is defined as time elapsing until a change is observed.
50
50
3
2
A mixture of 83% by mass of Ni—Zn-based soft ferrite (BSN-714, Toda Kogyo, particle size distribution D: 1 to 10 μm) surface treated with methyltrimethoxy silane and 5% by mass of fine magnetite particles of octahedral shape (KN-320, Toda Kogyo, particle size distribution D: 0.1 to 0.4 μm), was well dispersed uniformly in 12% by mass of silicone gel (SIG5000, Shin-Etsu Chemical, curable by an addition mechanism to a consistency of 130, determined in accordance with JIS K 2220 with a ¼ cone) with defoaming treatment under a vacuum. The product was injected into a syringe (inner volume: 30 cm, injection/discharge port cross-sectional area: 2 mm) with defoaming treatment under a vacuum, and heated at 80° C. for 30 minutes together with the whole syringe to cross-link the gel. This produced the syringe which contained the squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention. It could be discharged from the discharge port when the syringe piston was pressed lightly by a thumb. It was tested and evaluated by the methods, described above.
The sample placed in a horizontal condition showed no diffusion (bleeding) phenomenon with its periphery kept intact. The sample placed in a slanted condition showed no trickling phenomenon. It was also observed to show a temporal change only to a limited extent.
FIG. 1
The evaluation results of the cross-linked, grease-like electromagnetic wave absorber are given in Table 1. shows its magnetism loss (Line A) measured in a frequency range of from 0.5 to 10 GHz.
50
50
50
3
2
A mixture of 50% by mass of Ni—Zn-based soft ferrite (BSN-714, Toda Kogyo, particle size distribution D: 1 to 10 μm) surface treated with methyltrimethoxy silane, 25% by mass of flat soft magnetic metal powder (JEM-M, Jemco, particle size distribution D: 8 to 42 μm, self-oxidation rate: 0.26%) and 5% by mass of fine magnetite particles of octahedral shape (KN-320, Toda Kogyo, particle size distribution D: 0.1 to 0.4 μm), was well dispersed in 20% by mass of silicone gel (SIG5000, Shin-Etsu Chemical, curable by an addition mechanism to a consistency of 130, determined in accordance with JIS K 2220 with a ¼ cone) with defoaming treatment under a vacuum. The product was injected into a syringe (inner volume: 30 cm, injection/discharge port cross-sectional area: 2 mm) with defoaming treatment under a vacuum, and heated at 80° C. for 30 minutes together with the whole syringe to cross-link the gel. This produced the syringe which contained the squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention. It could be discharged from the discharge port when the syringe piston was pressed lightly by a thumb. It was tested and evaluated by the methods, described above.
The sample placed in a horizontal condition showed no diffusion (bleeding) phenomenon with its periphery kept intact. The sample placed in a slanted condition showed no trickling phenomenon. It was also observed to show a temporal change only to a limited extent.
FIG. 1
The evaluation results of the cross-linked, grease-like electromagnetic wave absorber are given in Table 1. shows its magnetism loss (Line B) measured in a frequency range of from 0.5 to 10 GHz.
Soft ferrite not surface-treated was incorporated in the silicone gel used in EXAMPLE 1, and tested for curability. The evaluation results are given in Table 1. The mixture could not be cross-linked when it contained ferrite at 20% by mass, because of inhibited curing of the silicone gel. It had a low magnetism loss (1 GHz) of 0.5.
An electromagnetic wave absorber was prepared in the same manner as in EXAMPLE 1, except that the soft ferrite was surface-treated with epoxy trimethoxy silane as a silane compound having a functional group, and evaluated. The evaluation results are given in Table 1. It had a low heat resistance of 1000 hours or less.
An electromagnetic wave absorber was prepared in the same manner as in EXAMPLE 1, except that the silicone gel was not cross-linked, and evaluated. The evaluation results are given in Table 1. The diffusion phenomenon test, carried out in the same manner as in EXAMPLE 1, revealed that the sample placed in a horizontal condition was observed to diffuse (bleed) with the peripheries failing to retain the original position, and that the one placed in a slanted condition was observed also to trickle down. Moreover, it suffered a temporal change to a higher extent, because it was not cross-linked.
An electromagnetic wave absorber was prepared in the same manner as in EXAMPLE 2, except that the silicone gel was not cross-linked, and evaluated. The evaluation results are given in Table 1. It was observed to diffuse (bleed) and trickle down, and to suffer a temporal change to a higher extent, as was the case with the absorber prepared in COMPARATIVE EXAMPLE 3.
TABLE 1
EXAMPLES
COMPARATIVE EXAMPLES
1
2
1
2
3
4
Electromagnetic
Soft
D<sub>50</sub>
μmn
1~10
1~10
1~10
1~10
1~10
1~10
wave absorber
ferrite
Surface treatment agent
—
Methyl-
Methyl-
Untreated
Epoxy
Methyl-
Methyl-
composition
trimethoxy
trimethoxy
trimethoxy
trimethoxy
trimethoxy
silane
silane
silane
silane
silane
pH after surface treatment
<8.2
<8.2
>8.5
<8.2
<8.2
<8.2
Content
wt %
83
50
20
83
83
50
(upper limit)
Flat, soft
D<sub>50</sub>
μm
—
8~42
—
—
—
8~42
magnetic
Content
wt %
0
25
0
0
0
25
metal powder
Magnetite
D<sub>50</sub>
μm
0.1~0.4
0.1~0.4
—
0.1~0.4
0.1~0.4
0.1~0.4
Content
wt %
5
5
0
5
5
5
Silicone
Consistency
—
130
130
130
130
130
130
Content
wt %
12
20
80
12
12
20
Electromagnetic
Magnetism loss (see FIG. 1)
μ″
A
B
0.5(1 GH)
—
—
—
wave absorber
Volumetric resistance
Ωm
2 × 10<sup>11</sup>
10<sup>7</sup>
—
2 × 10<sup>11</sup>
—
—
evaluation
Dielectric breakdown strength
KV/mm
4.5
0.2
—
4.5
—
—
results
Thermal conductivity
W/
1.2
0.8
—
1.2
—
—
m · K
Specific gravity
—
2.8
3.0
—
2.8
—
—
Consistency
—
80
50
—
80
—
—
Flame retardancy (UL94)
—
V-0
V-0
—
V-0
—
—
equivalent
equivalent
equivalent
Heat resistance (150° C.)
Hr
>1000
>1000
—
<1000
—
—
Diffusion/trickling phenomena
—
Not
Not
—
Not
Observed
Observed
observed
observed
observed
The squeezable, cross-linked, grease-like electromagnetic wave absorber of the present invention contains an electromagnetic wave absorbing filler uniformly in a cross-linked silicone gel, and shows no phase separation or segregation even at a high filler content, to have improved electromagnetic wave absorbing capability. It has various other advantages. It can be contained in a container, e.g., tube or syringe, and squeezable from a container by a weak force (e.g., by hand from a tube or by air which presses a syringe piston). Moreover, it can be formed into any shape by a force after being squeezed out. Still more, it shows no diffusion phenomenon (bleeding phenomenon) in a device in which it is used, and can retain its shape intact so long as it is allowed to remain as it is in the ordinary course of events even when exposed to a light load (e.g., that occurring when it is placed on a slanted object), i.e., showing self-shape-retaining nature. Still more, it shows limited temporal aging, because it is already cross-linked. Therefore, it can absorb unnecessary electromagnetic waves emitted from a box in which an electronic device is held by merely coating box opening(s) with a thin film to abate noise radiation efficiency. As such, it is greatly more advantageous costwise than a conventional absorber, which needs a secondary treatment and complex gluing works.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
present measured magnetism loss results of the electromagnetic wave absorber prepared in EXAMPLE. | |
*Ethics and Science: An Introduction* is a timely publication focused on an issue that deserves attention. Briggle and Mitcham developed this book to stimulate critical thinking and to help scientists understand that ethics not only plays a central role in science but also that science influences ethics. The book can be used as a guide for scientists to make good judgments about what is acceptable and not acceptable in science. It can also help scientists determine how they want to see their discipline develop in the future in light of scientific discoveries and technological advancements in an increasingly global environment. The authors point out that ethics is more than theory and analysis. Ethics is about an engagement between science and society to co-construct ideas and practices as guiding ethical visions.
Briggle and Mitcham developed 12 chapters that cover a broad range of topics related to ethics and science. The first chapter provides an introduction and overview. They point to the relations between ethics and science and describe seven trends which show that science is not as objective and value-neutral as one might think. These trends are: 1) the increasing power of science; 2) the threats and risks from science; 3) humans and animals as research subjects; 4) scientific misconduct; 5) commercializing science; 6) science in cultural and political controversies; and 7) science and technology. This is followed by the responses that have come from the professions, industry, and government. The authors state that "science is such an integral and important part of society that it can no longer be---if ever it were---a refuge from ethical issues, challenges, and ambiguities" (p. 10).
Chapters 2 and 3 outline various ethical concepts and theories (e.g., virtue ethics, consequentialism, and deontology) and the norms of science in a more general sense (e.g., the social institutionalization of science), respectively. Briggle and Mitcham then turn their attention to the standards of science practice and discuss issues related to responsible conduct (Chapter 4), science involving humans (Chapter 5), and science involving animals (Chapter 6). In the seventh chapter, the authors ask what science can tell us about ethics. They discuss this question from the perspectives of evolutionary science, decision science, developmental psychology, and neuroscience.
In Chapter 8, entitled "Transition: from ethics to politics and policy," Briggle and Mitcham give advice to educators on how to develop and effectively teach an interdisciplinary course on ethics and science. The remaining chapters focus on "science in society." While Chapters 9 and 10 deal with policymaking issues, Chapter 11 is about the modes of interaction between science and culture. In the final chapter, the authors use the example of the ethics of engineering to discuss the relationship between ethics and applied science.
This book is well structured and written. The chapters contain real-world cases, in-depth discussions, succinct chapter summaries, opportunities for extending reflections, questions for research and discussion, and references for further reading. There is also a fascinating epilogue in which the authors reflect upon the moral character of scientists. I also like the inclusion of a list of ethics codes, ranging from the Hippocratic Oath (5^th^ century BCE) to the Singapore (World Conference) Statement on Research Integrity (2010). Finally, there is an extensive bibliography and a functional index. I believe Briggle and Mitcham developed a high-quality textbook for undergraduate students (2^nd^ year and higher) and graduate students (all levels), as well as an excellent guide for educators and researchers who want to learn why ethics matters.
| |
Mantill is an interesting name. What’s the story there?
I’m the only Mantill I know of, too. From what I understand, my aunt suggested it. She was watching a New York Mets baseball game, and the Mets had a player named Felix Mantilla. My aunt liked the name Mantilla, but she and my mother decided you couldn’t have my name end with that “a,” so they dropped it, and I became Mantill. My brothers and I all have first names that start with “M,” so that was a factor, too.
You went to West Virginia University, home of the famous “People Mover.” Did that have a role in your later work in public transportation?
No, it’s a coincidence, but the West Virginia University (WVU) PRT – for personal rapid transportation – was an early and convenient way to get you from one campus to the other. Initially, my experience there had no real connection to my work in public transportation, beyond my academic work. I’m from St. Louis and transferred from the University of Missouri to WVU, where I got a master’s in public administration. In a sense, public transportation found me.
Early in my career, I worked for the American Trucking Associations and eventually for the American Automobile Association (AAA). That led me where I am today at APTA. I like working in transportation because the issues tend to be bi-partisan. They affect everyone, and public transportation improves our quality of life. Whether you use it or not, everyone benefits. Public transportation makes for livable communities, and provides the opportunity to walk, bike or take short car trips to wherever you need to go.
When Washington, D.C., was building its Metro system, the citizens of Georgetown did not want a Metro stop in their part of the city. And Georgetown seems to have suffered as a result.
That’s right. I think the residents there probably would agree that a rail transit stop would have taken many of the cars off the road and alleviated a lot of the traffic congestion. You can still get to the stores and restaurants, but most people drive or go by bus. When the Washington Metro system was being developed, some people could not imagine how it could help the mobility of a community and provide for safe, efficient transportation. Overall, some may be surprised to learn that a metro rail stop can be among the safest public spaces in a city. People now realize that whenever there is a rail stop, property values go up, not down.
When you mention congestion, I think of cars, and AAA was all about cars, while advocates of public transportation always talk about getting cars off the roads.
It’s not an either/or choice, but it is important we provide multiple options for travelers. At APTA, we want people to be multimodal. We believe public transit can be the backbone of a new mobility system that includes ride-sharing, autonomous vehicles, electric cars, scooters and other evolving technologies. Today, cars are still the number one choice, and APTA and AAA have actually partnered on some projects. Even those at AAA will agree, when you are traveling throughout some cities, sometimes driving your own car isn’t always the best option.
Back when the new administration took over, there was a lot of talk about rebuilding America’s infrastructure. This must have been highly encouraging to the advocates of public transit.
Yes, it was encouraging. We are starting to see more bi-partisan talk about funding infrastructure. It may be an issue where both Republicans and Democrats can agree. It is important as we look at a possible infrastructure proposal we need to make sure we are not looking to reduce investment in some forms of public transit to pay for increases in other forms of transportation. We need more funding for public transit, not less.
What do you do when you’re not at the job?
I’m really health-conscious so I work out and my wife and I like to go on long walks. Alexandria and the D.C. area is great for that, with museums and concerts and sporting events. We have become big Nationals fans and, reluctantly, a Redskins fans. We are getting into hockey, and it was fun that the Caps opened up the arena during [playoff] away games so the fans could watch the games on the Jumbotrons as a community. And they’ve built a new soccer stadium for D.C. United. We are excited about that. The concerts are great, too. We saw Wynton Marsalis’ performance at the Kennedy Center. And we saw the musical “Ain’t Too Proud to Beg,” a biographical story about the Temptations. In Washington, we like to do things tourists do. A good public transportation system makes that possible.
Reach Mantill at 202.496.4869 or [email protected]. | https://pac.org/impact/visit-mantill-williams |
OSFI Sets Domestic Stability Buffer Level at 2.25%
OSFI has set the Domestic Stability Buffer, or DSB, at 2.25% of total risk-weighted assets, with effect from April 30, 2020. The buffer is applicable to domestic systemically important banks (D-SIBs) and is calculated as specified under the Capital Adequacy Requirements (CAR) Guideline. As of December 2019, six federally regulated financial institutions have been designated as D-SIBs—namely, Bank of Montreal, Bank of Nova Scotia, Canadian Imperial Bank of Commerce, National Bank of Canada, Royal Bank of Canada, and Toronto-Dominion Bank.
This reflects the view of OSFI that key vulnerabilities to D-SIBs in Canada remain elevated and show signs of increasing in some cases. In addition, global vulnerabilities related to ongoing trade tensions and rising leverage are growing, which could increase the chance of a spillover of external risks into the Canadian financial system. The specific vulnerabilities covered by the buffer continue to include:
- Canadian consumer indebtedness
- Asset imbalances in the Canadian market
- Canadian institutional indebtedness
Against a backdrop of accommodative low interest rates and stable economic conditions, it is prudent to build additional resilience against potential shocks to the financial system. An effective capital regime ensures that banks are holding adequate capital to protect against risks to the financial system, while encouraging them to use their buffers during times of stress to avoid asset-sales or drastic reductions in lending. This announcement is consistent with recent statements from FSB, which caution that “given rising global vulnerabilities, authorities should continue to assess whether existing buffers are adequate to support resilience, taking into account their domestic conditions and cyclical position.”
OSFI reviews and sets the level of the Domestic Stability Buffer on a semi-annual basis (June and December), based on its ongoing monitoring of federally regulated financial institutions as well as system-wide and sectoral developments. D-SIBs must publicly disclose the level of the Domestic Stability Buffer and include a brief narrative on the buffer. Disclosures are expected quarterly and when OSFI publicly announces decisions to change the buffer level. Breaches of the buffer by an individual bank will require public disclosure pursuant to International Financial Reporting Standards (IFRS).
Related Links
Keywords: Americas, Canada, Banking, Domestic Stability Buffer, D-SIBs, Systemic Risk, Capital Adequacy Requirements, Financial Stability, Basel III, OSFI
Featured Experts
María Cañamero
Skilled market researcher; growth strategist; successful go-to-market campaign developer
Pierre-Etienne Chabanel
Brings expertise in technology and software solutions around banking regulation, whether deployed on-premises or in the cloud.
Nicolas Degruson
Works with financial institutions, regulatory experts, business analysts, product managers, and software engineers to drive regulatory solutions across the globe.
Related Articles
BCBS Consults on Principles for Operational Risk and Resilience
BCBS is consulting on the principles for operational resilience and the revisions to the principles for sound management of operational risk for banks.
FSI Note Discusses Challenges Associated with COVID Relief Measures
The Financial Stability Institute (FSI) of BIS published a brief note that examines the supervisory challenges associated with certain temporary regulatory relief measures introduced by BCBS and prudential authorities in response to the COVID-19 pandemic.
HKMA Announces Repayment Deferment Under Payment Holiday Scheme
HKMA, together with the Banking Sector Small and Medium-Size Enterprise (SME) Lending Coordination Mechanism, announced a ninety-day repayment deferment for trade facilities under the Pre-approved Principal Payment Holiday Scheme.
ESRB Paper Presents Alternative Approach to EBA Stress Test Proposal
The Advisory Scientific Committee of ESRB published a response, in the form of an Insights Paper, to the EBA proposals for reforms to the stress testing framework in EU.
MAS Announces Key Initiatives to Support Adoption of SORA
MAS announced several initiatives to support adoption of the Singapore Overnight Rate Average (SORA), which is administered by MAS.
BoE Updates Template and Definitions for Form ER
BoE updated the reporting template for Form ER as well as the Form ER definitions, which contain guidance on the methodology to be used in calculating annualized interest rates.
PRA to Extend Temporary High Balance Coverage Amid COVID Crisis
PRA published the policy statement PS19/20 on the final policy for extending coverage under the Financial Services Compensation Scheme (FSCS) for Temporary High Balance.
EBA Publishes Standards on Disclosure and Reporting of MREL and TLAC
EBA published the final draft implementing technical standards for disclosures and reporting on the minimum requirements for own funds and eligible liabilities (MREL) and the total loss-absorbing capacity (TLAC) requirements in EU.
EBA Releases Erratum for Phase 2 Package on Reporting Framework 2.10
EBA published an erratum for the phase 2 of technical package on the reporting framework 2.10.
EC Sets Out Updated Technical Information for Solvency II Calculations
EC published the Implementing Regulation 2020/1145, which lays down technical information for calculation of technical provisions and basic own funds. | https://www.moodysanalytics.com/regulatory-news/Dec-10-19-OSFI-Sets-Domestic-Stability-Buffer-Level-at-2-25 |
MEMORANDUM DECISION
Pursuant to Ind. Appellate Rule 65(D),
this Memorandum Decision shall not be
FILED
regarded as precedent or cited before any Aug 19 2019, 10:21 am
court except for the purpose of establishing CLERK
Indiana Supreme Court
the defense of res judicata, collateral Court of Appeals
and Tax Court
estoppel, or the law of the case.
APPELLANT PRO SE ATTORNEYS FOR APPELLEE
Emmanuel J. Cain Curtis T. Hill, Jr.
Pendleton, Indiana Attorney General of Indiana
Justin F. Roebel
Supervising Deputy Attorney General
Indianapolis, Indiana
IN THE
COURT OF APPEALS OF INDIANA
Emmanuel J. Cain, August 19, 2019
Appellant-Petitioner, Court of Appeals Case No.
18A-PC-1979
v. Appeal from the Monroe Circuit
Court
State of Indiana, The Honorable Marc R. Kellams,
Appellee-Respondent. Judge
Trial Court Cause No.
53C02-1601-PC-140
Bailey, Judge.
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 1 of 9
Case Summary
[1] Pro-se Appellant-Petitioner Emmanuel J. Cain (“Cain”) appeals the denial of
his petition for post-conviction relief, following his convictions for two counts
of Dealing in Cocaine. We affirm.
Issues
[2] Cain presents two issues for review:
I. Whether he was denied the effective assistance of trial
counsel; and
II. Whether he was denied the effective assistance of appellate
counsel.
Facts and Procedural History
[3] The relevant facts were recited by a panel of this Court on direct appeal, as
follows:
On July 18, 2013, confidential informant C.H. contacted
Bloomington Police Department Detective Erich Teuton.
Detective Teuton arranged to have C.H. buy drugs from Cain at
a hotel in Bloomington and met her there at 8:30 p.m. Detective
Teuton searched C.H. for drugs and money, and he provided her
with a video recording device and money to buy drugs. C.H.
then bought two half-gram bags of crack cocaine from Cain. The
resulting buy video was of poor quality, and C.H. had entered
another room before locating Cain.
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 2 of 9
In order to obtain better quality, recorded evidence, C.H. and
Detective Teuton conducted two similar controlled buys from
Cain the following day, this time using a different recording
device. The first buy on July 19 yielded two bags containing .27
grams and .19 grams of crack cocaine, and the second buy
yielded two more bags containing .27 and .23 grams of crack
cocaine. The Indiana State Crime Lab tested the larger bags
from each buy and confirmed that both contained a cocaine base.
On August 15, 2013, the State charged Cain with three counts of
dealing in cocaine, all as Class B felonies, each of which related
to one of the three sales of crack cocaine that transpired on July
18 and 19. At his ensuing jury trial on April 14, 2014, the trial
court admitted into evidence the video recordings of Cain’s sales
to C.H. and Detective Teuton’s related testimony. Cain did not
object to the admission of this evidence. However, after the jury
had returned its verdicts, Cain for the first time complained that
the State’s video evidence violated his Sixth Amendment rights.
Cain v. State, No. 53A01-1406-CR-242, slip op. at 1 (May 26, 2015), trans.
denied.
[4] Cain appealed, challenging his convictions and his twenty-year aggregate
sentence. He raised three issues: whether the trial court committed
fundamental error when it admitted recordings of Cain’s drug transactions and
testimony regarding those recordings; whether sufficient evidence supported his
convictions; and whether his sentence was inappropriate. See id. His
convictions and sentence were affirmed and the Indiana Supreme Court denied
transfer.
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 3 of 9
[5] On January 22, 2016, Cain filed his petition for post-conviction relief, which
was amended on February 28, 2018. Also on February 28, the post-conviction
court conducted a hearing at which argument was heard but no testimony was
presented. On May 9, 2018, the post-conviction court entered its findings,
conclusions, and order denying Cain post-conviction relief. He now appeals.
Discussion and Decision
Standard of Review
[6] The petitioner in a post-conviction proceeding bears the burden of establishing
the grounds for relief by a preponderance of the evidence. Ind. Post-Conviction
Rule 1(5); Fisher v. State, 810 N.E.2d 674, 679 (Ind. 2004). When appealing
from the denial of post-conviction relief, the petitioner stands in the position of
one appealing from a negative judgment. Id. On review, we will not reverse
the judgment of the post-conviction court unless the evidence as a whole
unerringly and unmistakably leads to a conclusion opposite that reached by the
post-conviction court. Id. A post-conviction court’s findings and judgment will
be reversed only upon a showing of clear error, that which leaves us with a
definite and firm conviction that a mistake has been made. Id. In this review,
findings of fact are accepted unless they are clearly erroneous and no deference
is accorded to conclusions of law. Id. The post-conviction court is the sole
judge of the weight of the evidence and the credibility of witnesses. Id.
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 4 of 9
Effectiveness of Trial Counsel
[7] Cain claims that his counsel was ineffective because (1) he failed to move to
suppress the videos on grounds that they were obtained in violation of Cain’s
rights under the Fourth Amendment to the United States Constitution and
Article 1, Section 13 of the Indiana Constitution and (2) he had a conflict of
interest precluding his effective representation of Cain.
[8] Effectiveness of counsel is a mixed question of law and fact. Strickland v.
Washington, 466 U.S. 668, 698 (1984). We evaluate Sixth Amendment claims
of ineffective assistance under the two-part test announced in Strickland. Id. To
prevail on an ineffective assistance of counsel claim, a defendant must
demonstrate both deficient performance and resulting prejudice. Dobbins v.
State, 721 N.E.2d 867, 873 (Ind. 1999) (citing Strickland, 466 U.S. at 87).
Deficient performance is that which falls below an objective standard of
reasonableness. Strickland, 466 U.S. at 687; see also Douglas v. State, 663 N.E.2d
1153, 1154 (Ind. 1996). Prejudice exists when a claimant demonstrates that
“there is a reasonable probability that, but for counsel’s unprofessional errors,
the result of the proceeding would have been different. A reasonable
probability is a probability sufficient to undermine confidence in the outcome.”
Strickland, 466 U.S. at 694; see also Cook v. State, 675 N.E.2d 687, 692 (Ind.
1996). The two prongs of the Strickland test are separate and independent
inquiries. Strickland, 466 U.S. at 697. Thus, “[i]f it is easier to dispose of an
ineffectiveness claim on the ground of lack of sufficient prejudice … that course
should be followed.” Id.
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 5 of 9
[9] We “strongly presume” that counsel provided adequate assistance and
exercised reasonable professional judgment in all significant decisions. McCary
v. State, 761 N.E.2d 389, 392 (Ind. 2002). Counsel is to be afforded
considerable discretion in the choice of strategy and tactics. Timberlake v. State,
753 N.E.2d 591, 603 (Ind. 2001). The decision whether or not to file a motion
to suppress is a matter of trial strategy. See Monegan v. State, 721 N.E.2d 243,
251 (Ind. 1999).
[10] At the post-conviction hearing, Cain presented argument to the court, but no
witnesses. According to Cain, he had asked his trial counsel to make a motion
to suppress the incriminating video recordings and counsel had refused to do
so. Cain asserted that he had “expected privacy” and did not “give consent to a
warrantless search of his identity.” (P-C.R. Tr., pgs. 8-9.) He also claimed that,
after the trial court denied trial counsel’s request for withdrawal, counsel was
thereafter ineffective because of a conflict of interest. In denying Cain post-
conviction relief, the court observed that trial counsel had objected to the video
recordings as lacking adequate foundation or any authentication testimony
from C.H. The post-conviction court concluded that Cain had not shown
additional grounds for suppression, nor had Cain demonstrated that there was a
conflict of interest precluding his trial counsel from effectively representing him.
[11] On appeal from the denial of post-conviction relief, Cain asserts that he had an
“expectation of privacy from being videotaped inside [the] motel room” and
“the covert camera becomes [sic] a warrantless seizure of Cain’s identity.”
Appellant’s Brief at 13. He suggests that his affirmative consent to video
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 6 of 9
recording was a mandatory prerequisite to its admission as evidence, arguing:
“it must be shown, before [an] informant’s seizure can be upheld, that
defendant had consented to informant’s relevant actions where informant is
acting as [a] police agent.” Id. at 14.
[12] Our Indiana Supreme Court has “reject[ed] claims that the broadcast and
recording of private conversations from a microphone and transmitter carried
by a consenting participant in the conversation violates the rights of the other
participants against unreasonable searches and seizures guaranteed by the
Fourth Amendment.” Snellgrove v. State, 569 N.E.2d 337, 339-40 (Ind. 1991).
In so doing, the Court relied upon the reasoning of the plurality opinion of
United States v. White, 401 U.S. 745, 752 (1971):
If the law gives no protection to the wrongdoer whose trusted
accomplice is or becomes a police agent, neither should it protect
him when that same agent has recorded or transmitted the
conversations which are later offered in evidence to prove the
State’s case.
[13] Properly-authenticated video recordings may be offered as substantive evidence
under a “silent witness” theory. McHenry v. State, 820 N.E.2d 124, 128 (Ind.
2005). Cain offers no legal authority to support his contention that the absence
of his affirmative consent to video recording rendered it inadmissible. And
while Cain baldly asserts that, had trial counsel moved to suppress the video
recordings on Fourth Amendment or Indiana constitutional grounds, they
would have been excluded, again he provides no legal authority for his broad
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 7 of 9
propositions. Cain has not shown that a motion to suppress made by trial
counsel would have succeeded and probably changed the outcome of the trial.
[14] “Ineffective assistance of counsel can occur where counsel is burdened by a
conflict of interest,” that is, “a division of loyalties.” Johnson v. State, 948
N.E.2d 331, 334 (Ind. 2011). But merely alleging a personal conflict or a
history of tactical disagreements is not equivalent to allegations of divided
loyalty between a defendant and another client. Id. at 335. Here, at most, Cain
has alleged that he complained about his trial counsel’s strategy,1 trial counsel
moved to withdraw his representation, and the trial court denied that motion.
Cain has not alleged, much less demonstrated, that trial counsel had an actual
conflict or divergent interests that precluded his effective representation of Cain.
Effectiveness of Appellate Counsel
[15] A defendant is entitled to the effective assistance of appellate counsel. Stevens v.
State, 770 N.E.2d 739, 760 (Ind. 2002). The two-pronged standard for
evaluating the assistance of trial counsel first enunciated in Strickland is
applicable to appellate counsel ineffective assistance claims. Bieghler v. State,
690 N.E.2d 188, 192 (Ind. 1997). There are three basic categories of alleged
appellate ineffectiveness: (1) denying access to an appeal, (2) waiver of issues,
and (3) failure to present issues well. Here, the second category is implicated,
1
According to Cain, he insisted that trial counsel should depose C.H. and trial counsel disagreed that a
deposition was necessary.
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 8 of 9
as Cain claims that appellate counsel “prejudiced him for not raising grounds of
exclusion of inadmissible evidence.” Appellant’s Brief at 7. However, he fails
to develop a corresponding argument.
Conclusion
[16] Cain has not demonstrated his entitlement to post-conviction relief on grounds
of ineffectiveness of trial or appellate counsel. The post-conviction court
properly denied the petition for post-conviction relief.
[17] Affirmed.
May, J., and Mathias, J., concur.
Court of Appeals of Indiana | Memorandum Decision 18A-PC-1979 | August 19, 2019 Page 9 of 9
| |
Have Questions? Contact Us.
Since its inception, NYCLA has been at the forefront of most legal debates in the country. We have provided legal education for more than 40 years.
ETHICS OPINION 296
NUMBER 296 1932
Question. In the opinion of the Committee, may a lawyer with professional propriety accept professional employment from a firm of engineering contractors who have procured from property owners contingent contracts to look after their interests in property adjoining a projected subway, and to employ legal counsel in procuring compensation for damage to their property resulting from the construction. The firm offers such employment to the lawyer upon a contingent basis amounting to one-half of the percentage which the firm is to receive under its contract with the property owners, for any amount which the lawyer may collect by settlement or suit.
The firm is itself, under its employment by the property owners, required to generally supervise for the property owners, for the protection of their property, the work of the subway contractors adjoining their premises, to avoid injury as far as can be, and, in case of injury, to procure from the latter repairs of the damage, or to adjust the compensation therefor, upon a basis of contingent reward to the firm. No action is to be brought unless the firm fails in its effort. And the firm’s contract with the property owners includes a provision that their contingent percentage is to include counsel fees.
Answer. In the opinion of the Committee a lawyer may not with professional propriety accept the employment outlined in the question. The arrangement is in substance one whereby the engineering firm as an independent contractor undertakes to furnish the services of a lawyer where such services seem to the engineering firm necessary and desirable, and to pay the lawyer’s fee out of the engineering firm’s contingent compensation. Such an arrangement, in the opinion of the Committee, involves the control and exploitation of the lawyer’s professional services by a lay intermediary in contravention of Canon 35 of the Canons of Professional Ethics of the American Bar Association (see also Opinions 47, II; 125; 220; 286), and tends to destroy the personal and fiduciary relation of attorney and client between the lawyer and the property owner. | https://www.nycla.org/resource/ethics-opinion/ethics-opinion-296-1932/ |
Is leadership limited to managers, administrators, and other supervisory personnel? Although many people believe it is, the truth is that people can lead from different positions, including supporting roles. Let’s consider some ways to lead from a supporting role.
Take responsibility in your job
Some people go to work, do what is required, and go home. They don’t fully engage, and they never feel very connected with the job, coworkers, or anything else during their working hours. That’s not leadership. Leaders go the extra mile; this can be especially important in healthcare. They take ownership and invest themselves as partners. In care environments, being a full partner involves taking responsibility for identifying problems and areas of waste…and making necessary adjustments to realize established goals.
Learn as much as you can
Leaders are learners. They observe what’s going on around them so they can learn about what works and what doesn’t. They keep up on what’s going on elsewhere in the field so they can put innovations to work to improve the workplace. They also try to learn about leadership – because there’s always something to learn. It can be useful in a supporting role, but it can also come in handy for advancement: having the ability to change leadership styles based on situations is a helpful leadership skill to take into a healthcare administration position.
Be knowledgeable when you are asked for ideas
When an individual in a supporting healthcare role exhibits leadership qualities, others may begin to ask to tap into that leadership by asking for ideas. A budding leader who takes responsibility in the job and learns as much as possible will always be ready with ideas. This could cover a variety of topics, including issues related to the bottom line: private healthcare is more than a calling. It’s also a business that needs to accomplish financial goals and stay out of the red.
The willingness to continue How Can You Lead from a Supporting Healthcare Role?learning is important, and it helps leaders to be knowledgeable when they’re asked for ideas. Professionals never stop learning, and a voracious appetite for up-to-the-minute information and research about modern healthcare issues in technology, economics, finance, management, or legal and ethical issues will keep an administrator – or budding leader – relevant to the industry.
Bring your own ideas when you see things that can be improved
Healthcare is constantly evolving, and it’s important for budding leaders to be part of that evolution. For example, patients expect faster and more efficient access to health information via portals, hospital websites, text messages, health monitoring apps, home monitoring systems, telemedicine, and even social media. An employee with leadership skills who is tuned into the environment will be more attentive to opportunities for improvement; this can benefit the employee’s opportunities for advancement, but it can also benefit the organization and the patients it serves.
Are you a leader?
At 365 Healthcare Staffing Services, we specialize in the recruitment and placement of healthcare professionals in per diem, travel, and permanent assignments in healthcare facilities across the country. Are you a leader? If you are – or if you’re not sure yet – we’d love to work with you; call us at 310.436.3650 today! | https://www.365healthstaffing.com/2017/05/11/leadership-healthcare-supporting-role-surgical-tech-jobs-california/ |
This is the first of a series of posts about storing social science data in relational databases. I’ve found that grad school has prepared me for many things: using statistical software to do complex analyses, writing up academic papers and submit them for review to journals, collecting and coding data for research projects, presenting and networking at conferences. But I never learned how to properly keep track and store the data I’ve collected throughout my young academic career. Instead, I’ve cobbled together techniques, borrowing heavily from my skills as amateur computer and web programmer, that seem to work for me. In an effort to get more social scientists to think about this, I’ve decided to share some of my techniques, beginning with storing data in databases.
Collecting data is an integral part of social science research. Without data, we can’t test theories or make empirical claims. But, in my experience, we are rarely prepared for the task of storing this data in ways that enable analysis or facilitate collaboration. More often than not (and I am occasionally as guilty of this as anyone else), we store our data in a series of confusingly named files, either spreadsheets or text files, with variable or case names that do little to elucidate their use or purpose. As computers make it easier to collect and analyze data, this problem of data storage is exacerbated. As data become multileveled, and the number of cases reach into the tens of thousands (or more), simple spreadsheets become not only unwieldy, but also potentially unstable as files reach the memory limits of their associated programs. However, there is a solution: databases.
No doubt you’ve heard of Microsoft Access, Microsoft’s version of a database application. There are others – FileMaker Pro is particularly popular among Apple-centric firms, as Access does not run on Macs. Both of these programs cost quite a bit of money, however. MySQL is a free, open source database application, and perhaps the most used, as it powers many popular websites. MySQL has no native graphical user interface and does not have built-in forms support, as Access and FileMaker do, but it easily interfaces with numerous programming languages to build custom forms for inputting, organizing, and viewing data. But we’re jumping ahead: let’s slow things down a bit, put on some light jazz (your choice of station) and talk about databases more generally.
One of the biggest advantages of a database over a spreadsheet is that the database can be relational. A rational database consists of multiple tables, each table storing different types of data. These tables connect to one another through defined relationships. For example, say you are studying elementary school outcomes. You have a sample of classrooms from certain schools in a school district, and have collected data on every student in these classrooms. Initially, you are storing your data in a spreadsheet and it looks something like Table 1:
|Table 1: Spreadsheet data for school outcomes study|
|student id||math score||verbal score||teacher’s education||classroom size||school’s %white||school’s %school lunch program|
|1||95||65||bachelors||23||45||32|
|2||84||78||bachelors||23||45||32|
|3||56||75||bachelors||27||45||32|
|4||63||69||bachelors||27||45||32|
|3||92||98||masters||19||85||8|
|4||89||95||masters||19||85||8|
|5||86||84||bachelors||18||85||8|
|6||97||99||masters||15||85||8|
Obviously, this is truncated data (both vertically and horizontally), but this is a good illustration of why spreadsheets are bad for this type of data. Data are duplicated across rows – the same school data appear in four rows, the same classroom data appear in two rows. Not only is this a waste of space, but also introduces much more error than there should be. Under this scheme, school data has to be entered for each new student in the data. In addition to taking more time, there’s potential for miscoding school data with every entry. The same goes for the classroom data. Ideally, we enter this data once, verify that we entered them correctly, then simply refer to a record of this data for each student. This is how relational databases work. Tables 2a-c show how the above data could be reentered into a relational database:
|Table 2a: Students|
|student id||math score||verbal score||classroom id|
|1||95||65||1|
|2||84||78||1|
|3||56||75||2|
|4||63||69||2|
|3||92||98||3|
|4||89||95||3|
|5||86||84||4|
|6||97||99||5|
|Table 2b: Classrooms|
|classroom id||teacher’s education||class size||school id|
|1||bachelors||23||1|
|2||bachelors||27||1|
|3||masters||19||2|
|4||bachelors||18||2|
|5||masters||15||2|
|Table 2c: Schools|
|school id||% white||% school lunch program|
|1||45||32|
|2||85||8|
While it may seem less efficient (we now have three tables instead of one), the actual data are only entered once. You’ll notice that each classroom and each school now has an ID number. Other tables can use the ID number in the classroom table to refer to a specific classroom record. So student 1 refers to classroom 1, and classroom 1 refers to school 1. These are the relationships connecting the tables together. Relationships in a relational database are defined by common fields. In the case above, classroom id and school id are common fields defining the relationship between the students, classrooms, and schools tables. Now, we only have to enter and store the school-level and classroom-level data once. When we enter a new student, we simply refer to the classroom record for the classroom they are in (and this classroom record refers to the school record the classroom is in). We can visualize this database as in figure 1:
The student table refers to the classroom table using the classroom id field. The classroom table refers to the school table using the school id field. We’ve preserved the data from the original spreadsheet, but are storing them in a much more efficient manner. What’s more, relational databases allow you to pull data from the tables in virtually any manner you wish. Say you wanted to run analyses on just classroom level data. You can ask the database to return a spreadsheet with each row containing a classroom, duplicating the school level data on each row, and aggregating student-level data up to the classroom level (say as average math and verbal scores). This is easy to do; the request generates a spreadsheet ready to be imported into your favorite stats program and preserves the original data perfectly. You can save these data requests so that as you collect new data, you code everything into the database, and then request the updated dataset when you are ready for analysis. | http://thomaselliott.me/blog/2012/11/storing-data-part-1/ |
ProLogis (Denver), a global provider of distribution facilities and services, recently released the latest edition of the ProLogis Supply Chain Review entitled, “Product Proliferation -- The Scourge of Lean Supply Chains.”Authored by University of Denver logistics experts Paul Nuzum and Carl Johnson, the report explores the massive increase in individual consumer products, or SKUs, that has occurred globally in recent years.
"Product proliferation is an unavoidable--and in many respects laudable--byproduct of the global trend toward more efficient manufacturing and distribution," said Leonard Sahling, first vice president of research for ProLogis. "At the same time, it can wreak havoc on a smooth-running supply chain. This new report provides valuable insights into the downside impacts companies face when they maintain too many SKUs."
Product proliferation is in large part a result of the deep-seated trend toward so-called "mass customization," in which middle-class consumers are insisting on custom-designed, personalized products at affordable prices.
The problem can also be blamed in part on the widespread failure by companies to effectively manage SKU life cycles. Many suppliers maintain individual products long after they have been displaced or rendered redundant by new offerings. In doing so, they introduce unintended cost and complexity into their logistics operations.
Supply chain managers are often at odds with their sales and marketing departments when it comes to pruning product lines. Sales executives typically oppose eliminating SKUs, arguing that it's better to offer a broader range of choices to customers.
"Postponement"--the practice of timing production of finished products to receipt of firm orders from customers--is the classic logistics strategy used by companies to neutralize the ill effects of product proliferation. Indeed, after having implemented effective postponement strategies, many companies have been able to expand their product-lines and SKUs without commensurate increases in their inventory levels.
The report is based on in-depth interviews conducted with supply chain executives at more than 30 major companies from a variety of industries. | https://www.mhlnews.com/archive/product-proliferation-scourge-lean-supply-chains-new-research-report-prologis |
14. Center Stage did have some dance doubles, but not many. While most of the dancers were professionals, Saldana and Pratt both had doubles who performed the more difficult dance scenes. Saldana’s plot-twist appearance in Jonathan’s ballet, for example, featured Aesha Ash, an NYCB corps de ballet member.
Thereof, Was Gillian Murphy in Center Stage? Murphy was seen in the feature film Center Stage and also appeared in the sequel, Center Stage 2: Turn It Up. In 2013, she starred as Giselle in the the New Zealand Film Commission’s movie of Ethan Stiefel and Johan Kobborg’s production of Giselle at the Royal New Zealand Ballet.
Who doubled for Zoe Saldana in Center Stage? Aesha Ash for Zoe Saldana, “Center Stage”
famously didn’t use dance doubles for most of its cast, since Amanda Schull, Sascha Radetsky, Ethan Stiefel, and Julie Kent were, um, more than capable of doing their own dancing.
Then Is Zoe Saldana ballet trained? With her mother and her sisters Cisely and Mariel, Saldana settled into life in the DR, even discovering her love of dance. She enrolled in the Santo Domingo-based ECOS Espacio de Danza Academy, where she studied various dance forms and styles. But one stood out far more than others: ballet, Saldana’s “first passion.”
Did Susan May Pratt do her own dancing in Center Stage?
The film hired four professional dancers — Amanda Schull from San Francisco Ballet and Ethan Stiefel, Julie Kent and Sascha Radetsky from the American Ballet Theatre. … A dance double was used for Susan May Pratt.
Is Gillian Murphy still with ABT? Murphy has been a Principal Dancer with the American Ballet Theatre (opens in new tab) (ABT) since 2002 (she joined the company in 1996). She is married to fellow dancer Ethan Stiefel, a famed choreographer, director and former dean of UNCSA’s School of Dance. The two welcomed son Ax to the world in June 2019.
Did Zoe Saldana do ballet? Saldaña discovered her love of dance in the Dominican Republic, then enrolled in the ECOS Espacio de Danza Academy studying forms of dance, but describes ballet as her passion. … Her dance training and her acting experience helped her land her first film role, playing ballet student Eva Rodriguez in Center Stage (2000).
Does Mila Kunis do her own dancing in Black Swan? Before taking on the role of Lily in Black Swan, Mila Kunis had never really danced. It was a whole new experience for her, and she’ll be the first to admit that she had no idea how hard ballerinas trained. She spent months working with choreographers to learn the ropes and get her technique down.
Is Zoe Saldana trained dancer?
Saldaña discovered her love of dance in the Dominican Republic, then enrolled in the ECOS Espacio de Danza Academy studying forms of dance, but describes ballet as her passion. … Her dance training and her acting experience helped her land her first film role, playing ballet student Eva Rodriguez in Center Stage (2000).
How old is Cooper in Center Stage? The now 47-year-old ballet dancer wasn’t clean shaven or rocking a mop of hair, instead, he was sporting shoulder length hair and a mustache! “Good god, Ethan Stiefel, that look is a choice,” one fan wrote after watching the reunion which also featured Zoe Saldana, Sascha Radetsky, and Amanda Schull.
Did Zoe Saldana do her own dancing in Drumline? For her role as a dancer in the new movie “Drumline,” Zoe Saldana learned a lot more than she bargained for. “I knew how to dance, but the [movie’s] choreography was not hip-hop or modern,” says the 24-year-old Queens native. … “Laila’s from the South and she’s respectful, composed and disciplined,” says Saldana.
How did Zoe Saldana became famous?
Dancer-turned-actress Zoe Saldana started her acting career in films like Crossroads, Drumline, The Terminal and Pirates of the Caribbean. After years of diverse work, in 2009 she landed leading roles in the blockbusters Star Trek, Avatar and Guardians of the Galaxy.
Who danced as Eva in Center Stage?
Zoe Saldana may have been one of the only non-dancers in the main cast of Center Stage, but the sheer power of her performance made her its most unforgettable character. Only 22 years old when the film hit theaters in 2000, the actress made her feature film debut as talented but hard-nosed dancer Eva Rodriguez.
Was Stella Abrera in Center Stage? While Abrera doesn’t actually make an appearance in the movie, Radetsky was one of the stars as Charlie, the American Ballet Academy student with a heart of gold.
How accurate is Center Stage?
Center Stage is one of the best-known ballet movies amongst ballet dancers, for its almost comedic accuracy. … The film shows just how incredibly competitive a time it is for these young dancers. The movie really captures how badly the dancers want to get the lead roles.
How tall is Tommy peaky blinders? More recently he is best known for playing Thomas Shelby in the BBC series Peaky Blinders. He stands at just 5 feet 7 inches tall.
Is Natalie Portman actually a ballerina?
We know that Natalie Portman studied ballet as a kid and had a year of intensive training for the film, but that doesn’t add up to being a ballerina. However, it seems that many people believe that Portman did her own dancing in Black Swan.”
How old was Natalie Portman in Black Swan? A year before shooting “Swan,” 29-year-old Portman went through extreme ballet and cross-training, shedding 20 pounds from her 5-foot-3-inch frame. “I think it was just the physicality of it all that was the most extreme,” she told UsMagazine.com.
How old was Natalie Portman when she did Black Swan?
Darren Aronofsky first approached Natalie Portman about making a film set in the dance world in 2001 when Portman was 20 years old. Aronofsky envisioned it as a film loosely based on “The Double: A Petersburg Poem” by Fyodor Dostoevsky.
What is Zoe Saldana doing now? Saldana continues to act and model with editorial features in Elle, Vanity Fair, V, GQ Italia, and Nylon. Saldana’s career climbed to new heights in 2009 when she played Uhura in Star Trek. She officially joined the A-list with her groundbreaking role as Neytiri, the Na’vi princess, in James Cameron’s Avatar (2009).
Who does Jody Sawyer end up with?
Jody would ultimately choose Charlie, but decided to be a principal at Cooper’s new dance company. “I haven’t thought about where she would be. She’s kind of immortalized in time to be where she left off. I think wherever she is she’s happy and she’s definitely owning her own story,” Schull tells Us.
How old is Jody Sawyer in Center Stage? Jody is, at most, eighteen years old (God, let’s hope she’s eighteen!) And Cooper is an ADULT. His age is never specifically stated, but he was a principal with the company for a while even before he took a hiatus and then came back. | https://sport-net.org/is-zoe-saldana-dancing-in-center-stage-4/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.