content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
Who Is the Most Clutch Player in MLB Today? Baseball always has been and always will be a sport driven by statistics, and while there are a number of useful numbers to look at for this discussion, there is no clearly defined measure of clutch. Everyone will value statistics differently when weighing which player deserves the title of most clutch. Ahead we've presented a few different measures of clutch ability for your consideration based on 2019 production, both on the position player and pitcher side of things, before coming to our own conclusion on who is baseball's most clutch performer right now. Let the debate begin. Batting Average with Runners in Scoring Position (Hitters) 1 of 8 DJ LeMahieuPaul Bereswill/Getty Images The argument here is pretty easy. A clutch hitter is someone who delivers when the stakes are highest, so how well a hitter performs with runners in scoring position is a good indication of his level of clutch. Here's an interesting blind example: Player A: 550 PA, .305 BA overall; 112 PA, .235 BA w/RISP Player B: 596 PA, .252 BA overall; 116 PA, .309 BA w/RISP Would you rather have a .300 hitter who bats under .250 with runners in scoring position or a .250 hitter who bats over .300 with runners in scoring position? Player A is Hanser Alberto. Player B is Max Kepler. That's obviously just a cherry-picked example, but it does illustrate the value of clutch hitting, and the occasional emptiness of overall batting average. For reference, here are last season's top 10 in batting average with runners in scoring position among players with at least 100 such plate appearances: DJ LeMahieu: .389 Charlie Blackmon: .385 Miguel Cabrera: .369 Nelson Cruz: .368 Anthony Rendon: .365 Freddie Freeman: .358 Bryce Harper: .357 Jeff McNeil: .350 Yordan Alvarez: .344 Gleyber Torres: .344 That's a pretty impressive list, and it makes for a compelling argument for batting average with runners in scoring position to being used as a gauge of clutch ability. Limiting Damage with Runners in Scoring Position (Pitchers) 2 of 8 Hyun-Jin RyuMark Brown/Getty Images If a high batting average with runners in scoring position makes a hitter clutch, it stands to reason that a pitcher who is able to limit damage with runners in scoring position is deserving of some clutch points as well. That's especially true of a starting pitcher, as his ability to pitch deep into games often hinges on whether or not he can pitch out of an early jam or two. With that in mind, here's a look at the 10 starting pitchers who did the best job limiting damage with runners in scoring position, among pitchers with at least 75 such plate appearances: Hyun-Jin Ryu: 148 PA, 6.13 ERA Zac Gallen: 79 PA, 6.30 ERA Gerrit Cole: 140 PA, 6.57 ERA Justin Verlander: 117 PA, 7.34 ERA Frankie Montas: 91 PA, 7.36 ERA Jacob deGrom: 165 PA, 7.44 ERA Mike Soroka: 158 PA, 7.71 ERA Jon Gray: 154 PA, 8.27 ERA Max Scherzer: 145 PA, 8.35 ERA Sonny Gray: 146 PA, 8.35 ERA Those are ugly numbers at first glance, but when you consider that a hit of any sort will almost certainly result in an earned run in those scenarios, it puts things into context. We can also take that a step further by looking at Fielding Independent Pitching (FIP) leaderboard for that same situation. That essentially provides an expected ERA based on the three outcomes a pitcher can fully control: strikeouts, walks and home runs. Gerrit Cole: 140 PA, 1.35 FIP Mike Clevinger: 85 PA, 1.79 FIP Max Scherzer: 145 PA, 1.82 FIP Lance Lynn: 213 PA, 1.90 FIP Chris Sale: 109 PA, 2.00 FIP Frankie Montas: 91 PA, 2.26 FIP Mike Soroka: 158 PA, 2.33 FIP Jose Urena: 82 PA, 2.39 FIP Jon Gray: 154 PA, 2.49 FIP James Paxton: 133 PA, 2.52 FIP The fact that Cole, Scherzer, Montas, Soroka and Gray appeared on both lists is telling of their ability to pitch around trouble. High-Leverage Performance (Hitters) 3 of 8 Anthony RendonMatt York/Associated Press While delivering with runners in scoring position may be a good indication of clutch ability, we can take that a step further thanks to the advanced metrics at our disposal. One such metric that is relevant to this discussion is the "high leverage" statistical modifier, courtesy of FanGraphs, which isolates a player's performance in the most impactful moments in a game. Below is a list of the players with the highest Weighted Runs Created (wRC) in high-leverage situations. Essentially, these players provided their team with the most runs when it mattered most: Yelich and Rendon also tied with Mike Moustakas and Miguel Sano for the MLB lead with six home runs in high-leverage situations, while Harper (29) and Reynolds (28) were the RBI leaders. The highest batting average in high-leverage situations belonged to Minnesota Twins rookie Luis Arraez, who hit .556 in 31 plate appearances. Yelich was second with a .476 average in 48 trips to the plate. High-Leverage Performance (Pitchers) 4 of 8 Scott ObergMatthew Stockman/Getty Images Once again, we can also look at the pitcher side of the coin in high-leverage situations. As you might expect, it's a reliever-heavy list, considering most high-leverage situations occur late in games when they score is still close. Here are the 2019 ERA leaders in high-leverage situations with at least 30 plate appearances against: Felipe Vazquez: 82 PA, 1.23 ERA Scott Oberg: 75 PA, 1.45 ERA Will Smith: 114 PA, 1.47 ERA Nick Wittgren: 40 PA, 1.69 ERA Kirby Yates: 118 PA, 1.82 ERA Aaron Bummer: 72 PA, 2.05 ERA Max Scherzer: 30 PA, 2.21 ERA Justin Wilson: 51 PA, 2.25 ERA Ken Giles: 83 PA, 2.25 ERA Jon Lester: 34 PA, 2.61 ERA Emilio Pagan: 78 PA, 2.70 ERA The top starting pitchers on this list behind Scherzer are a bit surprising, starting with Jon Lester, who had a middling 4.46 ERA last season. Those two are followed by Julio Teheran (34 PA, 3.60 ERA) and Zach Eflin (30 PA, 4.00 ERA). Scott Oberg and Nick Wittgren entered the 2019 season a long way from the list of baseball's top relievers, but both pitchers turned in the best seasons of their careers. Win Probability Added (Hitters) 5 of 8 Christian YelichNorm Hall/Getty Images Win Probability Added is an interesting stat to contextualize a player's impact on the outcome of the game. Here's a quick definition, via FanGraphs: "WPA captures the change in win expectancy from one plate appearance to the next and credits or debits the player based on how much their action increased their team's odds of winning." It stands to reason then that if you add up each player's WPA for every plate appearance over the course of the season, the player with the highest net total would have had the biggest impact on his team's win total. It's no surprise to see Justin Verlander at the top, but the fact that closer Will Smith led the NL in WPA among pitchers when he spent the season pitching for an also-ran San Francisco Giants team is interesting. The presence of Chicago White Sox reliever Aaron Bummer is also a shock. The left-hander had an excellent 2019 season with a 2.13 ERA and 0.99 WHIP in 58 appearances, but he wasn't even pitching in the closer's role, tallying just one save to go along with 27 holds. Save Percentage (Pitchers) 7 of 8 Ken GilesG Fiume/Getty Images After seeing relievers Will Smith, Kirby Yates and Aaron Bummer appear among the WPA pitching leaders, it's worth further exploring the idea that a relief pitcher might be worthy of consideration for the title of most clutch player in baseball. Saves is the defining stat for a closer, but it's not a great judge of a reliever's effectiveness. Closers pitching for a contender are generally going to see more save opportunities than guys working the ninth inning for a team that rarely has a lead to protect. Let's take a look at the closers from the two Los Angeles teams to further illustrate that point: Kenley Jansen: 33 SV, 8 BS, 80.5 SV% Hansel Robles: 23 SV, 4 BS, 85.2 SV% The Dodgers won 106 games, so Jansen had more opportunities to record a save. The Angels won just 72 games, but Robles was more effective at slamming the door when given the chance. So rather than simply looking at the save leaders, let's focus on the save percentage leaders among guys who had at least 20 saves: Ken Giles: 23 SV, 95.8 SV% Kirby Yates: 41 SV, 93.2 SV% Alex Colome: 30 SV, 90.9 SV% Felipe Vazquez: 28 SV, 90.3 SV% Will Smith: 34 SV, 89.5 SV% Carlos Martinez: 24 SV, 88.9 SV% Ian Kennedy: 30 SV, 88.2 SV% Aroldis Chapman: 37 SV, 88.1 SV% Brad Hand: 34 SV, 87.2 SV% Sergio Romo: 20 SV, 87.0 SV% Closers come in with the game on the line and a chance to secure a victory for their team. What else can effectiveness in that role be called besides clutch? Verdict: Christian Yelich 8 of 8 Dylan Buell/Getty Images If we're taking a stat-based approach to determining who the most clutch player in baseball is right now, it's hard to argue against Christian Yelich based on his 2019 season. The wide gap in his WPA compared to Justin Verlander (5.607), Will Smith (5.580), Mike Trout (5.198) and Cody Bellinger (4.986), who rounded out the top five, speaks volumes to his importance to a Milwaukee Brewers team that needed every single one of their 89 wins to claim a wild-card berth. Plenty of players are capable of overtaking him, but for now, Christian Yelich deserves the title of most clutch player in baseball.
In this issue: UN-SPIDER at a glance - UN-SPIDER compiles list of satellite resources in response to Nepal earthquake - UN-SPIDER holds training course for Bhutan officials - UN-SPIDER concludes training workshop in Bangladesh - Regional Centre for Space Science and Technology Education in Asia and the Pacific: Successful first training - UN-SPIDER experts publishes article on space-based information and ecosystems - UN-SPIDER participates in Engage2015 Conference News from our Regional Support Offices - ICIMOD: Contribution to International Space Apps Challenge 2015 - Nepal: Raising awareness to fight fires through satellite imagery - RCMRD launched land potential knowledge system News from our Community - DigitalGlobe: First complete satellite imagery base map for Africa now available - First satellite for Turkmenistan in space - China: Launch of new-generation BeiDou navigation satellite - Mapping global forests in unprecedented detail - Algeria: Alsat-2A satellite imagery shows vegetation recovering after forest fires - Tanzania: New agency for disaster risk reduction - South Africa plans to launch Earth observation satellite in 2019 - Honduras and Colombia share knowledge to reduce disaster risks - NOAA: Interactive storm surge map for flood risks - Study to test smartphones as earthquake early warning - Website relaunch: Geospatial crop data for food policy - Copernicus Master competition now accepting submissions - Bangladesh: Satellite helps to forecast floods - FAO and Norway to help developing countries monitor their forest through Earth observation - International Charter activated three times in April 2015 Upcoming events - 26-28 May 2015, Bonn, Germany: United Nations/ Germany International Conference on Earth Observation - 1-5 June 2015, Hangzhou, China: East Asia Summit (EAS) workshop on Application of Space Information Technology in Major Natural Disaster Monitoring and Assessment and 2nd ASEAN workshop on “Development of mechanisms for acquisition and utilisation of space-based information during emergency response” - 9-10 June, Beijing, China: International Workshop on Supporting Future Earth with Global Geo-Information - Apply now! 7-10 September, Graz, Austria: United Nations/Austria Symposium for Integrated Space Technology Applications for Climate Change - Apply now! 14-16 September 2015, Beijing, China: United Nations International Conference on Spacebased Technologies for Disaster Management - “A consolidating role in the implementation of the Sendai Framework on DIsaster Risk Reduction: 2015-2030” Issue Date:
http://un-spider.org/news-and-events/updates/un-spider-updates-april-2015
Given two arrays, one is array of political parties namely - party, and their corresponding array of seats received - seats. You have to print the political parties in lexicographical sorted order along with their seats, and highest seats received by the party. Input Format: The first line of input contains T denoting the number of testcases. T testcases follow. Each testcase contains three lines of input. The first line contains number of parties N. The second line contains the names of the parties. The third line contains the votes corresponding to each party. Output Format: For each testcase, in a new line, print the required answer. User Task: Your task is to complete the function Election2019(party, seats, n) which accepts three arguments and prints the required result. Constraints: 1 <= T<= 100 1 <= N <= 26 1 <= seats <= 543 Examples: Input: 1 7 A B C D E F G 90 150 33 23 17 500 2 Output: A 90 B 150 C 33 D 23 E 17 F 500 G 2 500 Explanation: Testcase1: We print parties and their respective seats in lexiographically sorted order. At the end we print the maximum seats. If you have purchased any course from GeeksforGeeks then please ask your doubt on course discussion forum. You will get quick replies from GFG Moderators there.
https://practice.geeksforgeeks.org/problems/parties-and-seats/1
Mariscada - steamed lobster, clams, shrimp and scallops in a wine and butter sauce - is a featured item on The Atlantic Restaurant's menu. Photographed at the restaurant in Danbury on Tuesday, Oct. 16, 2012. Mariscada - steamed lobster, clams, shrimp and scallops in a wine and butter sauce - is a featured item on The Atlantic Restaurant's menu. Photographed at the restaurant in Danbury on Tuesday, Oct. 16, 2012. Visiting Atlantic Restaurant in Danbury one recent evening was like dropping in at the home of a friend you haven't seen in a long, long time -- or maybe a great-aunt's house -- for dinner. It felt comfortable but not so familiar as to be old hat. The building is divided between the bar on one side and the dining room on the other. We arrived at just the right time -- early enough to be seated right away. Within an hour of our arrival, every table in the dining room was filled and the sound of lively conversations came from every direction. The ladies serving dinner were kept busy for quite a while. The restaurant had a pleasant, casual vibe that made my friend and I feel welcome. Cream-colored walls were decorated with nautically-themed items, from paintings to figurines. A large tropical fish tank livened up space near the entrance. White tablecloths and seafoam green napkins graced the tables, with decorations of leaf-topped pumpkins acknowledging the season. The menu lists dishes in Portuguese with English translations, and includes meat, seafood and poultry. Learn from our ignorance -- plan to split appetizers. We each ordered one and once they arrived, realized we'd have to pace ourselves to leave some room for our entrees. Our order easily could've piqued the appetites of a party of four. I ordered clams Atlantico to start, expecting at most a small plate of clams to arrive, but instead received an entire crock full of them, cooked with onions and plenty of flavorful sauce that added a kick. My friend chose the grilled sausage for his appetizer. Its arrival to the table was an event -- a ceramic pig with an open grill back had flames shooting up around the sausage draped along the back. Other appetizer options on the menu include several preparations of shrimp or quail dishes, plus hot chicken wings and a soup of the day. I stayed with seafood for my entree, selecting the Bacalhau com Batatas a Muro, or more prosaically, Grilled Codfish with Baked Potatoes. Sounds mild, right? Maybe a dull choice on my part? Not at all. Thinking of "salted cod," I was prepared for the possibility of heavy salt, but there was more flavor going on here than just salt would provide. The cod arrived topped with peppers and onions, surrounded by large grilled potato quarters, seasoned with just the right bite. Bitoque, described as Small Steak with Fried Egg, was my friend's choice of entree. It was accompanied by rice and some delicious, freshly made thick potato chips. He was very pleased with his choice. Other entree possibilities included Espetada a Atlantico, or Shis-ka-bob with Shrimp, which I saw other diners enjoying; Carne Alentejana, a dish of pork, fried potatoes and clams; several other steak and pork options, a few different chicken dishes and plentiful seafood choices. Very hungry seafood lovers might try one of the platters, such as the Mariscada, that includes steamed lobster, clams, shrimp and scallops in a wine and butter sauce. We split an order of the flan, a nice cool end to our flavorful dinner, and enjoyed excellent cups of coffee that perked us up before we hit the road. Other desserts offered included cheesecake, seasonal fruit, and a custard creme.
Ramarama School is a small, rural primary school. The school has a long-established relationship and historical links with the local community. It celebrated its 150th anniversary in 2017. There are 206 students on the roll, with 14 percent identifying as Māori. Nearly half of the students are from outside the local community. The school is planning for roll growth over the next five years. The school’s vision is focused on ‘growing successful futures, together’. Leaders, teachers and the school’s community have identified values and capabilities for students that include being: Leaders and teachers regularly report to the board schoolwide information about outcomes for students in the following areas: achievement in reading, writing and mathematics progress and accelerated learning of targeted students success in broader curriculum experiences and personal growth. Since the 2015 ERO review there have been a number of staff changes, including the appointment of a new principal and deputy principal. The current board is a mix of experienced and new trustees. Leaders and teachers have participated in professional learning and development initiatives including Accelerated Learning in Mathematics (ALIM) and Accelerating Learning in Literacy (ALL). There has also been a strong emphasis on incorporating play-based learning into junior classes and across the school. Ramarama School is a member of the Rosehill Pathways Kāhui Ako I Community of Learning (CoL). The school is effective in achieving positive outcomes for most students. Overall, levels of achievement have remained consistently high over time. Most students, including Māori, achieve at or above expectations in reading, writing and mathematics. Teachers use a range of appropriate assessment methods. Moderation within the school enables teachers to make consistent judgements about children’s learning, progress and achievement. The school deliberately celebrates a wide range of students’ successes to build confidence as learners and to foster achievement. Leaders and teachers have anecdotal information about students’ achievement of the clearly identified capabilities. They consistently reinforce students’ achievement of these valued outcomes and include this information in reports to parents. The school effectively identifies, monitors and responds to students whose learning and achievement need acceleration. The majority of targeted students made accelerated progress in 2018. The school continues to target progress and achievement in students’ writing and mathematics, and where necessary, reading. The school has effective systems to monitor and assist all students, including those who start part way through the year. Students with additional learning needs are well supported to achieve their personal best through regular, careful planning and tracking of their progress. A number of school processes and practices are effective in supporting the school to achieve equity and excellence across the school, and accelerate students’ learning. There is clear alignment of the school’s shared vision and valued outcomes for students that contribute to achieving the school’s priorities. Ramarama School promotes an inclusive, respectful culture at all levels of the school. Leaders and teachers place students at the centre of learning, teaching and decision making. They take collective responsibility for children’s learning and wellbeing by creating and maintaining welcoming, supportive relationships with children, parents and whānau. Leaders and teachers know students and their families well and incorporate these meaningful connections into the curriculum. Parents and whānau who spoke with ERO are appreciative of the small class sizes and the many ways they are kept informed about and involved in the life of the school. This results in strong community support for students’ learning and wellbeing, and for the direction of the school. Students are purposefully involved in a broad, responsive curriculum that is firmly based in local, real-life contexts. They value education outside the classroom and the wide range of leadership opportunities available to all students. Students regularly take part in creative, collaborative learning experiences and many student-led physical activities. Teachers create inviting, visually appealing learning environments where students’ work is valued and carefully displayed. This helps to foster their strong sense of belonging and pride in the school. The cohesive staff team fosters students’ development and love of learning. Teachers purposefully use the (NZC) key competencies, and the school’s values and capabilities in planning to promote life-long learning skills. They are sensitive to students’ abilities and interests. Teachers skilfully support students to build social and emotional competence through fostering their confidence, self-esteem and self-management skills.New Zealand Curriculum Leaders set high expectations of themselves, teachers and students. They thoughtfully implement changes to benefit children’s learning and wellbeing. Leaders promote an orderly, purposeful environment and the use of deliberate strategies to foster students’ learning, progress, achievement and confidence. School leadership promotes open communication and collaborative professional practice. There is a thoughtful approach to sharing leadership across the school that is helping to build a culture of innovation and continuous improvement. Teachers participate in relevant professional learning and development that supports the achievement of school priorities, builds teacher capability and contributes to student success. The board is representative of and responsive to the school’s community, direction and vision. Trustees are well informed and make evidence-based decisions including how best to resource the school. Some areas of the school’s processes and practices need to be strengthened and embedded more fully to increase the achievement of equity and excellence across the school. Leaders and teachers should continue to develop curriculum documentation. It would be useful to include well-founded expectations about teaching approaches that enable students’ depth of thinking and increase opportunities for them to lead their own learning. Teachers should further enhance approaches to bicultural practices by placing a stronger emphasis on tikanga and the use of te reo Māori, school wide. Leaders need to strengthen the appraisal process to promote the consistency of effective practice and to ensure the Education Council’s Standards for the Teaching Profession are clearly met. Internal evaluation activity is building a reflective culture in the school. However, leaders and teachers should extend current internal evaluation processes and practices to include: Before the review, the board and principal of the school completed the ERO Board Assurance Statement and Self-Audit Checklists. In these documents they attested that they had taken all reasonable steps to meet their legislative obligations related to the following: board administration curriculum management of health, safety and welfare personnel management finance asset management. During the review, ERO checked the following items because they have a potentially high impact on student safety and wellbeing: emotional safety of students (including prevention of bullying and sexual harassment) physical safety of students teacher registration and certification processes for appointing staff stand down, suspension, expulsion and exclusion of students attendance school policies in relation to meeting the requirements of the Vulnerable Children Act 2014. For sustained improvement and future learner success, the school can draw on existing strengths in: the inclusive and respectful culture that places children at the centre of learning and teaching to promote their wellbeing, engagement and learning a collaborative and cohesive approach to learning and teaching that ensures high expectations for students and teachers the broad, relevant curriculum that uses the local environment to engage students in learning strong school leadership that creates trusting relationships through effective communication and promotes meaningful parent and whānau involvement in learning. For sustained improvement and future learner success, priorities for further development are in: deepening understanding of and extending of te reo and tikanga Māori to extend bicultural practice across the school strengthening internal evaluation processes to measure the impacts of plans, programmes and practices on outcomes for students and support ongoing development reviewing and improving appraisal practices to enable teachers to better demonstrate and build their professional capabilities. ERO is likely to carry out the next external evaluation in three years.
https://www.ero.govt.nz/review-reports/ramarama-school-18-01-2019/
The Legion of Honor gives a sweeping portrait of the Old Master Peter Paul Rubens when he was a young man, returning to Antwerp from a formative eight-year journey in Italy in 1608, in the exhibition Early Rubens (until 8 September). The show, the first to specifically look at this moment in the artist’s career, has an impressive but digestible array of around 30 paintings and 20 works on paper. It is also a mini history lesson of this time in Antwerp during the Twelve Years’ Truce, when the city was recovering from decades of violence and the Catholic Church was eagerly commissioning art to replace works destroyed by iconoclasts. Standout pieces range from the beautiful but brutal Massacre of the Innocents (around 1610); to the pleading, gorgeously-lit Daniel in the Lions’ Den (around 1614-16), apparently the favourite work of school children visiting the National Gallery of Art in Washington, which has lent the work; to a bizarre and arresting cut-out of a giant angel (its original shape) made for the Church of Saint Walburga. Kimono Refashioned at the Asian Art Museum “is not a kimono show”, the museum’s director and chief executive, Jay Xu, says in a statement for the exhibition (until 5 May), but demonstrates “how a simple item of clothing can contribute to meaningful exchanges of ideas” through around 35 men’s and women’s outfits from the 19th century to the present, on loan from the Kyoto Costume Institute. For instance, the kimono was among the foreign influences for the trailblazing early 20th-century French designer Paul Poiret as he made clothing that rejected a restrictive, corseted style, like a silk crepe dress (1920-30) on view. A silk dress from London (around 1875) has the typical corseted waist and large bustle of Western dresses at the time—but was made from a dismantled kosode (the precursor of the modern kimono). The largely chronological show does take the liberty of deliciously juxtaposing the dress with a pair of embroidered and studded Christian Louboutin boots from 2017. Take a trip 100 miles north of the city via the San Francisco Museum of Modern Art (SFMOMA) exhibition The Sea Ranch: Art, Architecture and Idealism (until 2 June). The show looks at The Sea Ranch, a unique community created in the 1960s by a group of Bay Area architects along ten miles of rugged Sonoma County coast. “Nature predominates, not buildings” in the landscape, reclaimed from a former ranch, where part- or full-time residents live in simple, Modernist timber-frame houses sided in wood or shingles, gathered around communal areas. The genesis of the project is well-documented by1960s design sketches and drawings, and Morley Baer’s stunning black-and-white photographs of the Sea Ranch’s early years, which capture the feel of the remote bluffs, and graphic works like a design brochure by Barbara Stauffacher Solomon from around 1965. An almost shockingly modest full-scale replica of a house at the centre of the gallery allows visitors to take a seat and contemplate a “view” of the Sea Ranch shoreline.
https://selectednews.info/blog/three-exhibitions-to-see-in-san-francisco-this-weekend/
On This Page On This Page Do you have a few hours to spare? Have you been trying to write a synthesis essay but can't seem to get started? This blog post will discuss how to write a good synthesis essay and provide tips on what makes this kind of essay unique. The first step is to develop an outline to write a successful synthesis essay. Unfortunately, most people struggle because they don't know where to start or what information they should include. This blog will give some examples of topics and a sample synthesis essay appropriate for this assignment. These will help you create an interesting and impressive synthesis essay. We hope these guidelines help! The synthesis essay definition combines and mixes different data points to form a new idea. The end goal is to make up ideas from sources that have been reviewed, which can be difficult for those who are not used to writing this type of paper. Writing a synthesis paper is an art form - it's just as important to get your message across as it is how eloquently you deliver the said message (arguably more so). There are two major types of synthesis essays: Expository Synthesis Essay In an informative/expository synthesis essay, the writer comprehensively plains a concept or idea and leaves many questions behind. For instance, medical reviews fall into this category because one collects different studies to synthesize conclusions that may help answer many of the reader's questions. Argumentative Synthesis Writing An argumentative synthesis essay proves a thesis statement with different sources of evidence. For example, let’s say your topic is: Do video games trigger violence in teenagers? Once you know the subject, start researching it and collecting both supporting and disproving evidence. Before you start writing your essay, do the following: Next, create a synthesis essay outline! Whether you are writing a 5-6 paragraph long summary or an in-depth analysis of the issue at hand, outlining will help ensure that all arguments and points flow smoothly. Take time to create a 4 -5 sentence introduction with a thesis statement for each point made and notes on argumentation that clarifies why this is important. Organizing ideas and showing under headings such as ‘What's Important,’ ‘Reasoning & Evidence,’ then assigning conclusion statements addressing whether additional research needs to be done or what has been learned from previous reasoning/evidence supporting it. Here are the steps you can follow for writing a great synthesis essay. Choosing an essay focus is the first step of writing a successful piece. When you choose your topic, make sure to consider who will be reading it and how much they know about that subject. If you're unsure where to start looking for topics, ask yourself these questions: Choose an interesting essay topic and then collect data to write your thesis statement. Be sure to read the sources carefully you research, so they are easy for you when developing a strong, persuasive argument. Synthesis writing includes a thesis statement, the main argument for your essay. Thesis statements summarize an idea and provide supporting arguments to make it more convincing so readers can get on board with you. The introduction paragraph of the synthesis essay is an opportunity for you to catch readers' attention and ensure they have a clear idea of what your paper will cover. Therefore, the first sentence should be catchy yet informative; it needs to grab their interest without giving away too much or too little information about the direction of your argument. After the introduction, write the essay body paragraphs and use the MEAL approach - Main Idea, Evidence, Analysis, Link Back. The following passage is all about making a persuasive argument and claiming a topic more interesting to be engaging. The first step of making this happen is with an intro paragraph that will introduce your main idea, which will go well if you can create new information or provide fresh insights into old material. After you have introduced what you’re going on about, then proceed by giving some strong facts/evidence so as not only to show but also prove why it is worthwhile writing such content (thesis statement) because people are more attracted to knowledge-related conversations than anything else. The conclusion of an essay is the most important part, as it summarizes what you were talking about in the body. However, if there are any major themes or facts worth remembering that have not yet been mentioned in your paper, this would be a great place to mention them. After writing your essay, dive into the proofreading stage. First of all, consider removing any complex words or sentences that are difficult for readers to understand; and eliminate grammar mistakes like missing commas or confusing sentence structures. Below six structures are highlighted to help you put your thoughts together. |Structure||Explanation| |Climactic order||Here, you will present your arguments logically and engagingly. The reasoning behind this is that the reader will remember your last argument more, which means they'll be able to put it all together at once and have you say what needs to be said most of all.| |Chronological order||This is for an argumentative paper, but it can be the most helpful when organizing ideas and showing how they dovetail together. Whether building off of each other or an effect following a cause, order helps readers follow your line of thinking - especially if one idea builds on another.| |Logical order||This technique is especially helpful when the ideas build upon one another. If the first idea isn't too complicated, you need to understand it to get a more complex later on point. Similar to an essay that's ordered chronologically, this can't apply to argumentative essays because they're always written as counterarguments of each other.| |Anticlimactic order||This is the opposite of the climax order. You will typically put your most important points at the top then get to less significant ones as you go on, ensuring that no one point gets overlooked in an argumentative essay. This way, you can start with a killer sentence and stay strong from for all readers before moving on to more difficult ideas later.| |Problem/solution order||Just like the name suggests, you begin an essay by presenting a problem. All of the remaining parts are spent giving solutions to that particular issue in whatever order is most appropriate for your argumentation style and topic at hand.| |Comparison and contrast order||Sometimes when writing a synthesis essay, you have to compare and contrast ideas. If this is the case, then there are two ways of doing it: summarize each source's main idea before discussing the similarities and differences, or present both sides in blocks with each one discussed completely as they come up. You can move point by point or even back and forth between points for an interesting effect.| The following is a helpful synthesis essay example pdf that you can go through before beginning your writing process. Below you can find some interesting synthesis essay topic examples for getting started. There are many tips for writing a synthesis essay, and here is the best advice from our experts. A synthesis essay is a thoughtful and in-depth analysis of multiple sources compiled into one document. The author asserts their claim and selects information from various sources to show that it's true. Learning how to write this type of paper prepares you for the current state we live in, where so many different opinions are expressed all at once on every topic imaginable. It teaches you to go through these available resources and then develop your logical conclusion based on what everyone has said. The writing process can be a difficult one. If you are struggling with writing your synthesis essay, we can help! We provide a professional ‘write my essay’ help that you can count on for any type of academic paper. Contact us for professional assistance from experienced writers. For writing a synthesis essay, the five-to-six paragraph structure is essential. So, make sure you have it down pat! In rare cases, there may be more paragraphs if necessary. This essay evaluates your ability to construct an argument using sources. You can use information from the sources, but you need to cite it. If text in a source was copied and pasted into the paper, you need to add quotation marks; then credit needs to be given for that specific piece of work as well. WRITTEN BY Nova A., Literature, Marketing Nova Allison has eight years of experience writing both technical and scientific content. As a Digital Content Strategist, Nova focuses on developing online content plans that engage audiences. She strives to write pieces that are not only informative but also captivating. Nova Allison has eight years of experience writing both technical and scientific content. As a Digital Content Strategist, Nova focuses on developing online content plans that engage audiences. She strives to write pieces that are not only informative but also captivating.
https://www.writemyessay.help/blog/synthesis-essay
compensation: $100K — $150K * industry: specialty: experience: Best Buy’s Digital and Technology team is seeking a Senior Dynamics Engineer. We are looking for professionals in this capacity who will act as functional experts of Dynamics 365 CE. The ideal candidate will have experience in a large enterprise with a highly customized environment to deliver complex solutions. The purpose of this role is to work with internal customers to define clear and concise functional requirements and design IT solutions to meet business needs. This role must effectively partner across teams with various staffing models of internal and external resources to deliver successful solutions. Key responsibilities will include: What is required for this role? The most successful candidate will be an exceptional leader of large projects, demonstrating confidence, ability to influence without authority, and collaborate in a respectful and courteous style is consistent with the values of the Best Buy brand. We are looking for someone who can develop and grow relationships inside and outside of the organization. In addition, individuals who have an entrepreneurial spirit, are forward-thinking, progressive, understand the technology, and has a past track record of significant accomplishments in this space. Minimum Requirements: Preferred Qualifications:
https://www.theladders.com/job/sr-ms-dynamics-engineer-bestbuy-minneapolis-mn_44737397
Sub-Saharan Africa and the Sustainable Development Goals Recently, Dining for Women’s Board reaffirmed our commitment to the UN-mandated Sustainable Development Goals (SDGs). In the next nine months, a number of DFW featured grantees are from the Sub-Saharan Region of Africa. This offers DFW members the opportunity to learn about individual challenges faced by individual countries and communities in the vast region. This blog provides an overview of Sub-Saharan Africa in the context of the UN’s SDGs. Sub-Saharan Africa is comprised of the 48 countries geographically located below the Sahara Desert and distinguished from the Northern African countries that are part of the Arab World. This beautiful region that makes up the bulk of the African continent consists of deserts, Sahel, savanna, swamps, rainforests, plateaus, mountains, rivers and lakes and enormous diversity in flora and fauna that has shaped human evolution in our geological past. Today, the region has a combined population of close to 1 billion (the lowest population density of all the major continents) with hundreds of ethnic groups and close to 1,000 languages. The socio-political, economic, and human development landscape of this region is very diverse with considerable variability within countries. Agriculture is still a major occupation for most people in the region but since 1940, occupations have diversified with considerable migration to rapidly-changing urban areas. The average human lifespan for the region as a whole is only 58 years and several countries in Sub-Saharan Africa struggle to make progress on health and economic indicators. The 17 SDGs adopted by the UN General Assembly in September 2015 are an unprecedented opportunity for countries and citizens of the world to forge pathways to improve the lives of all people everywhere and to combat climate change by 2030. According to the Overseas Development Institute, as we project progress of Sub-Saharan Africa towards the SDG Agenda of 2030, several key points are worth noting. For several of the SDG goals and targets, low starting points and inequality that exists between countries and within countries makes reaching these goals difficult by 2030. This region has 40 percent of its population who live in extreme poverty with a rate of undernourishment of 23 percent. There have been declines in poverty and undernourishment in the past decade but much more remains to be done. Large gains have been achieved in youth literacy and primary education, but poverty, armed conflict, child marriage and gender discrimination continue to be barriers for secondary and tertiary education, especially for girls. Women’s access to paid employment is the most impressive progress in Sub-Saharan Africa and women continue to gain power in politics especially in Rwanda. There has been remarkable progress in bringing down the absolute rates of Maternal Mortality from a high of 990 per 100,000 in 1990 to 510 in 2013. Similarly, Child Mortality has seen huge declines from 179 per 1,000 in 1990 to 86 in 2013. It is notable that some of these declines have occurred in low-income countries like Eritrea, Ethiopia, Guinea, Liberia, Madagascar, Malawi, Mozambique, Niger, Rwanda, Uganda and Tanzania. Challenges remain to bring down these rates further, but experts in the field are heartened by the fact that low income in these countries is not a barrier to saving the lives of mothers and children. For a region that has been hit the hardest during the HIV epidemic, the rate of new infections have been dropping steadily and the availability of anti-retroviral therapy since 1995 has averted at least 4.8 million HIV-related deaths. Challenges remain in the region where only a third of those between the ages of 15-24 have a comprehensive understanding about HIV. A major focus of the SDGs is the impact of rising temperatures, rising sea levels, changing rainfall patterns, and the impact of weather-related disasters on health, water supply and sanitation, agriculture and food security, forestry and fisheries, energy, industry and trade. The impact of these macro indicators can be very severe on vulnerable communities such as those living in poverty in rural and urban areas, subsistence farming communities, and pastoral and nomadic communities that rely on the animals they herd for sustenance. The Sub-Saharan region has 50 million pastoralists who live in arid and semi-arid regions. In most vulnerable communities, women play key roles in managing the natural resources in their environment and, as such, are more impacted by climate change and its rippling effects. According to the Overseas Development Institute, based on current trends with reference to the SDGs, Sub-Saharan Africa’s progress towards economic growth and domestic resource mobilization looks promising. Ending extreme poverty, reducing maternal mortality and access to energy require a redoubling of efforts. On the goals of reducing slum populations, reducing waste, reducing violent deaths, marine conservation and combatting climate change, trends in the region are headed in the wrong direction. Progress on these goals will require innovative solutions and strong efforts. A vast region like Sub-Saharan Africa comprising of 48 different countries each with their own political systems, natural resources and political will to effect change collectively face challenges to reach their individual SDG goals and targets by 2030. DFW’s collaboration with grassroots efforts to bring about change in their communities is a drop in the bucket, but together we are part of that pathway to change. Sources: Collins, Robert O. and Burns, M. (2007). A history of Sub-Saharan Africa. New York: Cambridge University Press. Mulinge, M.M. (2013). Climate Change: The Challenge of the 21st Century. In Mulinge, M.M & Getu, M. (Eds.), Climate Change and Variability on Pastorilist Women in Sub-Saharan Africa. Kampla: Fountain Publishers. Nicolai, S., Hoy, C., Bhatkal, T., and Aedy, T. (2016). Projecting progress: The SDGs in sub-Saharan Africa. London: Overseas Development Institute. United Nations. (2015). The Millennium Development Goals Report 2015: Regional Backgrounder Sub Saharan Africa.
https://diningforwomen.org/sub-saharan-africa-and-the-sustainable-development-goals/
Introduction {#s001} ============ A[ging is commonly]{.smallcaps} associated with deficits in cognitive domains, including speed of processing, working memory capacity, and long-term memory. Age-associated memory impairment (AAMI) is a nonpathological condition that is frequently observed as a result of normal brain aging.^[@B1]^ With the number of older adults (\>65 years of age) worldwide expected to more than double by the year 2030 and average life span predicted to extend by 10 years by 2050, cognitive decline threatens quality of life and creates challenges for healthcare systems.^[@B2]^ Thus, the need for effective interventions that are aimed at maintaining cognitive health or slowing cognitive decline is critical. Various nutrients and botanical ingredients have been investigated for their neurocognitive benefits, with studies reporting varying degrees of efficacy.^[@B3]^ A few studies have reported positive acute effects on cognition after the consumption of plant extracts from the Lamiaceae family,^[@B10]^ which some research suggests may be attributed to the polyphenols contained in these plants and their extracts. Specifically, polyphenols found in plants within the Lamiaceae family, such as rosmarinic and salvianolic acids, have been shown to have anticholinesterase and antioxidant activity, as well as additional neuroprotective and neurotrophic effects both *in vitro* and *in vivo*,^[@B13]^ all which provide biological plausibility for the potential cognitive benefits of extracts derived from this plant group. Systemic accumulation of free radical and oxidation end products have been inversely correlated with cognitive function.^[@B16]^ Extracts from plants within Lamiaceae family have been shown to have antioxidant capacity and the ability to reduce systemic and local inflammation.^[@B17],[@B18]^ Specifically, rosmarinic acid (RA) has been shown to promote antioxidant status in both neuronal cells and hippocampal tissue.^[@B13],[@B15]^ In addition, salvianolic acid, an RA dimer and compound detected in the spearmint extract tested, has been shown to promote anti-inflammatory and antioxidative effects in a mouse model of Alzheimer\'s disease.^[@B19]^ Therefore, it is plausible that other phenolic compounds within the spearmint extract, in addition to RA, may contribute to the observed benefits. Spearmint (*Mentha spicata* L.) lines were developed through traditional breeding techniques to produce significantly higher levels of bioactive polyphenols, such as RA,^[@B20]^ to study the effects of these polyphenols on cognitive function. These spearmint lines are distinct from typical commercially available spearmint because they do not contain certain constituents, such as carvone, and they contain 8--9% RA compared with 0--6% RA on a dry weight basis reported for other plants within the Lamiaceae species.^[@B20],[@B21]^ The first indications that the dried aqueous extract from this spearmint could support cognitive performance were obtained by using a senescence accelerated mouse-prone 8 (SAMP8) model of aging.^[@B22]^ When the spearmint extract was administered to SAMP8 mice for 12 weeks at 320 mg/kg body weight, improvements in learning and memory occurred that corresponded to reduced protein carbonyls and 3-nitrotyrosine in the hippocampus. This reduction in oxidation byproducts in the hippocampus is a plausible mechanism of action for the cognitive effects of spearmint extract supplementation. Further, since working memory is reported to be hippocampally dependent,^[@B23]^ it is plausible that spearmint extract could favorably impact working memory. These initial findings were subsequently corroborated by an open-label clinical study in which healthy older subjects with self-reported memory impairment consumed the extract for 30 days. This study confirmed that the extract was well tolerated and improved cognitive performance.^[@B24]^ Based on these positive findings, we hypothesized that chronic daily consumption of the spearmint extract would favorably impact cognition. Therefore, this study investigated the effects of this dried aqueous spearmint extract on cognitive performance, sleep, and mood in healthy older subjects with AAMI. Materials and Methods {#s002} ===================== Study design {#s003} ------------ This randomized, double-blind, placebo-controlled study was conducted in accordance with Good Clinical Practice Guidelines, the Declaration of Helsinki,^[@B25]^ and the United States 21 Code of Federal Regulations.^[@B26]^ An Institutional Review Board (Quorum Review IRB, Seattle, Australia) approved the study protocol as shown in [Figure 1](#f1){ref-type="fig"}. ![Study design overview. This double-blind, placebo-controlled, parallel study included one telephone screen, two screening visits (days −14 and −7), a baseline visit (day 0), and two treatment visits (days 45 and 90). Subjects were randomly assigned one of three treatments: 600 mg spearmint extract, 900 mg spearmint extract, or placebo, which was consumed each day with breakfast over a 90-day treatment period. During baseline and treatment visits, subjects completed the CDR System^™^ computerized cognitive function test battery (days 0, 45, and 90, at −0.75, 0.5, 2, 4, and 6 h), computerized Profile of Mood States (days 0 and 90 only; at −0.75 h), and computerized Leeds Sleep Evaluation Questionnaire (days 0 and 90 only; at −0.75 h). After their predose assessments, subjects consumed a standardized breakfast and one dose of their assigned study product (0 h) followed by postdose computerized CDR test battery. CDR, Cognitive Drug Research. Figure modified from Lasrado et al.^[@B27]^ and reproduced with permission.](fig-1){#f1} Subjects {#s004} -------- Generally healthy men and women were recruited by the Biofortis Clinical Research team by using an established database of volunteers and local advertisements. Study visits were conducted in the clinical research center in Addison, IL, and eligible participants were identified based on the inclusion and exclusion criteria outlined in [Table 1](#T1){ref-type="table"}. ###### [Subject Inclusion/Exclusion Criteria]{.smallcaps} ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- *Inclusion criteria* *Exclusion criteria* -------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 50--70 Years of age Uncontrolled hypertension Body--mass index between 18.5 and 35.0 kg/m^2^ Abnormal laboratory test results of clinical significance Possessing at least a high school diploma History or presence of cancer, except nonmelanoma skin cancer Subjects with AAMI were eligible based on the following National Institute of Mental Health criteria,^[@B1],[@B45]^ specified as scoring:\ History or presence of clinically important cardiac, renal, hepatic, endocrine, pulmonary, biliary, gastrointestinal, pancreatic, or neurologic disorders (including sleep disorders, head injuries, Alzheimer\'s disease, Parkinson\'s disease, stroke, inflammatory brain disease)  ≥25 on the MAC-Q^[@B46]^\  ≤29 or ≤9 on the VPA I and II portions of the Wechsler Memory Scale IV, respectively^[@B47]^\  ≥24 on the MMSE^[@B48]^ Willing to maintain their habitual diet and exercise routines History within previous 12 months of alcohol or substance abuse Willing to maintain consistent sleep duration the evening before study visits History of depression within past 24 months or use of psychotropic medications within 1 month of screening   History of heavy smoking (\>1 pack/day) within past 3 months   History of heavy caffeinated beverage consumption (\>400 mg caffeine/day) within past 2 weeks   Women who were pregnant, lactating, or planning to be pregnant during the study period or of childbearing potential and unwilling to use a medically approved form of contraception   Occupations that resulted in disruption of sleep-wake cycles   Use of medications or supplements known to alter cognitive function within past 2 weeks   Inability to complete or understand the cognitive function practice tests ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- AAMI, age-associated memory impairment; MAC-Q, Memory Assessment Clinic Scale Questionnaire; MMSE, Mini Mental State Examination; VPA, Verbal Paired Associates. Study product and treatment {#s005} --------------------------- The water-extracted dry proprietary spearmint (*M. spicata* L. \[aerial parts\]) extract contained a minimum of 14.5% RA and 24% total polyphenols (Kemin Foods, L.C., Des Moines, IA).^[@B20],[@B27]^ In addition, a compositional analysis of this spearmint extract revealed the presence of other polyphenols and their derivatives, including, but not limited to, RA, lithospermic, caftaric, and salvianolic A and B acids.^[@B29]^ Study capsules contained microcrystalline cellulose (placebo), or 300 or 450 mg of the spearmint extract (Five-Star Pharmacy, Clive, IA). Subjects were instructed to consume two capsules with breakfast equivalent to 0, 600, or 900 mg/day of extract for 90 days. Dose levels were identified based on previous preclinical and clinical studies.^[@B22],[@B24],[@B28]^ Compliance was calculated as a percentage of study product consumed according to the returned quantity of study product and confirmed by a diary that subjects completed daily. Cognitive assessments {#s006} --------------------- Cognitive performance was assessed by using the Cognitive Drug Research (CDR) System^™^ (Bracket, LLC, Wayne, PA). This computerized testing battery is validated for populations with AAMI and has been shown to be sensitive to acute and chronic nutritional interventions.^[@B4],[@B10],[@B30]^ The entire assessment was completed on laptop computers, with the exception of the word recall test, which was completed on paper. The cognitive performance assessment was administered at −0.75, 0.5, 2, 4, and 6 h, where *t* = 0 h was the time of product consumption at each visit (days 0, 45, and 90) based on previously published studies evaluating botanical extracts in both humans and preclinical mouse models of accelerated aging.^[@B4],[@B12],[@B22]^ Practice sessions, allowing each subject to plateau, were completed at screening to overcome any initial practice effects.^[@B31]^ In addition, parallel forms of the test were administered at each session to reduce training effects.^[@B32]^ The assessment system consisted of 11 individual tasks to assess attention and information processing, episodic and working memory, executive function, and motor control. The tasks were performed in the following order: immediate word recall, simple reaction time, digit vigilance, choice reaction time, numeric working memory, spatial working memory, delayed word recall, word recognition, picture recognition, tracking, and executive function. These tasks have been previously described in detail,^[@B4]^ with the exception of the executive function task. The executive function task requires judgments about the value or number of digits in identical digit strings. Each battery took 30--45 min and was completed in an environment where temperature, lighting, and noise were controlled. Composite factors were calculated by combining individual task outcome scores as previously described and depicted in [Figure 2](#f2){ref-type="fig"}.^[@B4]^ ![Cognitive performance assessments diagram. The computerized cognitive performance test battery (CDR System; Bracket, LLC, Wayne, PA) is summarized, indicating the tasks, outcome measures from each task, and the outcome measures that contribute to the composite factors. CDR, Cognitive Drug Research. Figure modified from Pengelly et al.^[@B12]^ and reproduced with permission.](fig-2){#f2} Mood assessments {#s007} ---------------- The Profile of Mood States (POMS^™^ Standard Form) questionnaire was also incorporated into the computerized assessment system and administered at days 0 and 90 during the −0.75 h assessment to evaluate chronic differences in mood.^[@B33]^ Ratings were combined into six factor composites: tension-anxiety, depression-dejection, anger-hostility, vigor-activity, fatigue-inertia, confusion-bewilderment, and a total mood disturbance (TMD) score.^[@B33]^ Sleep assessment {#s008} ---------------- The Leeds Sleep Evaluation Questionnaire (LSEQ) was incorporated into the computerized assessment system and administered at days 0 and 90 at the −0.75 h timepoint. This validated questionnaire is a subjective evaluation of sleep and results in four domains: ease of getting to sleep, quality of sleep, awakening from sleep, and behavior following wakefulness.^[@B34]^ Study procedures {#s009} ---------------- Eligible subjects arrived at the clinic in the morning for each test day (days 0, 45, and 90) after fasting (10--14 h) and body weight, compliance, and vital signs were assessed. Subjects then completed the CDR test battery, POMS questionnaire (days 0 and 90 only), and LSEQ (days 0 and 90 only) at the timepoints previously described. After that, subjects consumed a standard breakfast meal (670 kcal: 59% carbohydrates, 20% protein, 21% fat) with the assigned treatment. Subjects were asked to avoid vigorous physical activity (24 h), alcoholic beverages (24 h), caffeine (10--14 h), and tobacco use (1 h) before and for the duration of all test visits. Statistical analysis {#s010} -------------------- Sample size calculations were performed to test the difference between each active treatment and placebo. An evaluable sample size of 27 subjects per group was expected to provide 80% power (two-sided, α = 0.05) based on ability to detect a 10% difference in quality of memory or power of attention, independent domains of cognitive function utilizing standard deviations from the CDR in healthy individuals older than 65 years of age after *Salvia Officinalis* supplementation.^[@B10]^ A sample of 30 subjects per group (*N* = 90) was randomized to account for attrition and noncompliance ([Fig. 3](#f3){ref-type="fig"}). Randomized subjects were stratified based on smoking status. ![Study flow diagram. A total of 198 subjects were screened. Men and women with age-associated memory impairment were randomly assigned to one of three treatments: 0 (placebo), 600, or 900 mg/day spearmint extract (*N* = 90; *n* = 30/group). A total of 29, 28, and 30 subjects completed the trial in the placebo, 600 mg/day spearmint extract, and 900 mg/day spearmint extract groups, respectively. Three subjects withdrew from the study due to adverse events, including knee pain, myalgia, headache, worsening of oily scalp, cystic acne, and heartburn. All adverse events were deemed "not related" with the exception of heartburn, reported by one subject in the 600 mg/day spearmint extract group, which was deemed "probably related" to study product consumption. All available data were included in the intent-to treat population (*n* = 28--30/group). AE, adverse event(s). Figure modified from Lasrado et al.^[@B27]^ and reproduced with permission.](fig-3){#f3} Statistical analyses were conducted by using SAS version 9.2 (SAS Institute, Cary, NC) on the intent-to-treat (ITT) population, which included all subjects who were randomized into the study, consumed at least one dose of study product, and had at least one post-randomization outcome data point. Baseline comparability of demographic variables and all other outcomes were assessed by the analysis of variance model. Changes from baseline (day 0) for cognitive performance were evaluated by using daily averages of scores at −0.75, 0.5, 2, 4, and 6 h of each visit. For outcome measures administered once on a given test day (POMS and LSEQ), change from baseline (day 0) was used for comparisons. Change scores were evaluated by a mixed-model repeated-measures analysis containing the between-group effect of treatment, the repeated-measures effect of time, and the treatment × time interaction. All tests of significance were completed at α = 0.05, two-tailed without adjustment for multiple comparisons; thus, the possibility of Type I error exists. Results {#s011} ======= Subjects {#s012} -------- Subjects were recruited between August 2013 and January 2014 ([Fig. 3](#f3){ref-type="fig"}), with baseline characteristics presented in [Table 2](#T2){ref-type="table"}. Compliance was 98.1% ± 0.9%, 99.1% ± 0.8%, and 100.1% ± 0.4% for the placebo, 600 mg/day spearmint extract, and 900 mg/day spearmint extract groups, respectively. There were no statistically significant differences in compliance between treatment groups over the 90-day period. A total of 198 subjects were screened; 90 subjects were randomized to treatment, consumed at least 1 dose of study product, and had at least 1 post-randomization outcome data point that constituted the ITT population ([Fig. 3](#f3){ref-type="fig"}). Three participants did not complete the study due to reported adverse events. Complete results from the safety assessments are published elsewhere.^[@B27]^ ###### [Baseline Characteristics of Subjects in the Intent-to-Treat Population]{.smallcaps} *Parameter* *Overall* *Placebo* *600 mg Spearmint extract* *900 mg Spearmint extract* p*^[\*](#tf5){ref-type="table-fn"}^* --------------------------------------------------------- ------------- ------------- ---------------------------- -------------------------------------------- -------------------------------------- Gender, *n* (%)         0.4581  Male 30 (33) 9 (30) 8 (27) 13 (43)    Female 60 (67) 21 (70) 22 (73) 17 (57)   Ethnicity, *n* (%)         0.6125  Hispanic/Latino 5 (6) 1 (3) 1 (3) 3 (10)    Non-Hispanic/Latino 85 (94) 29 (97) 29 (97) 27 (90)   Race, *n* (%)         0.3453  Non-Hispanic White 81 (90) 27 (90) 25 (83) 29 (97)    Black/African American 8 (9) 3 (10) 4 (13) 1 (3)    Asian/Pacific Islander 1 (1) 0 (0) 1 (3) 0 (0)   Smoking status, *n* (%)^[a](#tf2){ref-type="table-fn"}^         0.9565  Nonsmoker 51 (57) 17 (57) 18 (60) 16 (53)    Current smoker 5 (6) 1 (3) 2 (7) 2 (7)    Past smoker 34 (38) 12 (40) 10 (33) 12 (40)   Age (years), mean (SEM) 59.4 (0.6) 58.2 (1.2) 59.1 (1.0) 60.8 (1.0) 0.2482 Body--mass index (kg/m^2^), mean (SEM) 26.9 (0.4) 25.9 (0.7) 27.1 (0.7) 27.9 (0.7)^[b](#tf3){ref-type="table-fn"}^ 0.1368 SBP (mm Hg), mean (SEM) 121.8 (1.3) 120.1 (2.3) 121.1 (2.5) 124.3 (2.2) 0.4150 DBP (mm Hg), mean (SEM) 74.7 (0.9) 73.2 (1.2) 73.1 (1.8) 77.7 (1.6)^[c](#tf4){ref-type="table-fn"}^ 0.0680 Heart rate (bpm), mean (SEM) 65.1 (1.0) 63.1 (1.2) 64.8 (1.0) 67.4 (1.8) 0.1760 MAC-Q score, mean (SEM) 29.2 (0.3) 29.1 (0.6) 29.2 (0.6) 29.1 (0.5) 0.9697 MMSE score, mean (SEM) 28.5 (0.2) 28.5 (0.3) 28.6 (0.3) 28.3 (0.3) 0.4746 VPA I score, mean (SEM) 23.7 (0.7) 23.2 (1.4) 24.2 (1.3) 23.8 (0.9) 0.8886 VPA II score, mean (SEM) 7.0 (0.2) 7.0 (0.3) 6.6 (0.4) 7.2 (0.3) 0.5187 Participant smoking status was defined as nonsmokers, current smokers (current use or use ≤6 months before screening), and past smokers (use \>6 months before screening). Although the overall comparison of all three groups was not significant, body--mass index (placebo vs. 900 mg/day spearmint extract) did reach significance (*p* = 0.0482). Although the overall comparison of all three groups was not significant for DBP, placebo versus 900 mg spearmint did reach significance (*p* = 0.048). *p*-Values for the overall comparison were generated from an analysis of variance model without adjustments for multiple comparisons (*n* = 30/group and an overall *N* = 90). bpm, beats per minute; DBP, diastolic blood pressure; MAC-Q, Memory Assessment Clinic Scale Questionnaire; MMSE, Mini-Mental State Exam; SBP, systolic blood pressure; SEM, standard error of the mean; VPA, Verbal Paired Associates. Cognitive assessments {#s013} --------------------- Composite factor scores on each test day are included in [Table 3](#T3){ref-type="table"}. The CDR battery identified an overall treatment effect in quality of working memory \[F(2,84) = 3.25, *p* = 0.0435\] for subjects supplemented for 90 days with spearmint extract ([Fig. 4](#f4){ref-type="fig"}). Pairwise comparisons of the change from baseline indicated that subjects who consumed 900 mg/day extract had improved scores compared with subjects who consumed either 600 mg/day \[*t*(84) = −2.35, *p* = 0.0212, *d* = 0.546\] extract or placebo \[*t*(84) = 2.02, *p* = 0.0469, *d* = 0.473\]. The improvement in the 900 mg/day spearmint extract group over the 90-day supplementation period was 22% compared with 5% and 7% in the 600 mg/day and placebo groups, respectively. Similarly, there was an overall treatment effect after 90 days of spearmint extract supplementation \[F(2,84) = 3.42, *p* = 0.0373\] in spatial working memory (distractor items correctly identified, [Fig. 5](#f5){ref-type="fig"}). This improvement from baseline was significantly greater for subjects consuming 900 mg/day (17%) extract than subjects consuming either 600 mg/day \[3%, *t*(84) = −2.43, *p* = 0.0172, *d* = 0.563\] extract or placebo \[6%, *t*(84) = 2.03, *p* = 0.0456, *d* = 0.483\] over the 90-day supplementation period. No additional statistically significant cognitive effects were detected. ![Quality of working memory scores after 90 days of spearmint supplementation. Supplementation with the spearmint extract at 900 mg/day resulted in improved (overall treatment effect, \**p* = 0.0435) quality of working memory versus subjects consuming either placebo (*p* = 0.0469) or 600 mg/day (*p* = 0.0212). Data are expressed as mean difference from baseline (day 0) for the daily averages ± standard error of the mean (*n* = 28--30/group).](fig-4){#f4} ![Spatial working memory distractor items correctly identified after 90 days of spearmint supplementation. Subjects supplemented for 90 days with spearmint extract at 900 mg/day had improved (overall treatment effect, \**p* = 0.0373) accuracy of spatial working memory versus subjects consuming either placebo (*p* = 0.0456) or 600 mg/day spearmint extract (*p* = 0.0172). Data shown are the mean difference from baseline (day 0) for the daily averages ± standard error of the mean (*n* = 28--30/group).](fig-5){#f5} ###### [Cognitive Composite Factor Scores Before and After 45 and 90 Days of Supplementation with Spearmint Extract]{.smallcaps} -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------   *Placebo* *600 mg Spearmint extract* *900 mg Spearmint extract*     -------------------------------------------- ----------- ---------------------------- ---------------------------- ---------- ---------- ---------- ---------- ---------- ---------------------------------------- ------------ --- Power of attention (msec) 1275.56\ 1291.00\ 1308.77\ 1308.11\ 1338.47\ 1345.09\ 1278.83\ 1307.07\ 1316.91\ 0.9312 ↑ (26.46) (25.90) (28.48) (22.23) (24.73) (25.22) (16.87) (17.85) (21.11) Continuity of attention (No.) 66.11\ 65.51\ 67.80\ 67.50\ 67.86\ 70.35\ 66.86\ 68.80\ 68.38\ 0.8881 ↑ (3.00) (3.13) (2.95) (2.17) (2.26) (1.60) (2.19) (1.68) (2.67) Quality of working memory (No.) 1.72\ 1.79\ 1.82\ 1.77\ 1.83\ 1.84\ 1.61\ 1.80\ 1.81^[b](#tf10){ref-type="table-fn"}^\ **0.0435** ↑ (0.04) (0.03) (0.03) (0.03) (0.03) (0.02) (0.06) (0.03) (0.02) Quality of episodic secondary memory (No.) 126.69\ 143.06\ 133.64\ 133.33\ 143.18\ 139.91\ 127.89\ 137.83\ 129.25\ 0.8082 ↑ (5.88) (6.06) (9.16) (5.29) (5.98) (6.20) (7.28) (7.37) (7.80) Speed of memory (msec) 3829.22\ 3681.86\ 3564.54\ 3824.15\ 3679.49\ 3559.19\ 3939.63\ 3740.41\ 3653.68\ 0.6460 ↑ (109.90) (122.25) (111.07) (104.82) (108.44) (93.16) (123.86) (102.85) (99.13) Quality of memory (No.) 298.38\ 321.51\ 315.54\ 310.20\ 325.22\ 323.66\ 288.19\ 316.93\ 309.93\ 0.2296 ↑ (8.30) (8.51) (11.15) (6.71) (7.28) (7.29) (10.33) (8.73) (9.01) ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Bold values indicate overall treatment effects, *p* \< 0.05. The computerized cognitive performance battery (CDR System^™^; Bracket, LLC) was administered at baseline (day 0) and after 45 and 90 days of spearmint extract or placebo supplementation. The arrow notes the direction of change that suggests improvement in the associated outcome. 900 mg/day spearmint extract versus placebo, *p* = 0.0469; 900 mg/day spearmint extract versus 600 mg/day spearmint extract, *p* = 0.0212. *p*-Values for the overall and pairwise comparisons in the intent-to-treat sample were generated from a mixed-model repeated-measures analysis of variance model based on the average daily difference from baseline (*n* = 28--30/group). CDR, Cognitive Drug Research; SEM, standard error of the mean. Mood {#s014} ---- Administration of the computerized POMS questionnaire identified significant treatment effects in the vigor-activity factor \[F(2,82) = 3.35, *p* = 0.0399, [Table 4](#T4){ref-type="table"}\] and the composite TMD \[F(2,82) = 3.42, *p* = 0.0374\] after 90 days of supplementation. However, significant differences in pairwise comparisons between either of the spearmint dose levels and placebo were not evident. A trend for improvement after 900 mg spearmint, relative to placebo, was observed in the vigor-activity factor \[*t*(82) = 1.87, *p* = 0.646, *d* = 0.502\]. Further, a significant effect in vigor-activity was also evident for subjects administered the 900 versus 600 mg/day dose level of spearmint extract \[*t*(82) = −2.49, *p* = 0.0149, *d* = 0.729\]. No additional significant findings were observed in the other individual mood parameters from the POMS. ###### [Subjective Ratings of Mood, from the Profile of Mood States Questionnaire, Before and After 90 Days of Supplementation with Spearmint Extract]{.smallcaps}   *Placebo* *600 mg Spearmint extract* *900 mg Spearmint extract*     ------------------------ -------------- ---------------------------- ---------------------------- -------------- -------------- ----------------------------------------------- ------------ --- Tension-Anxiety 3.53 (0.53) 3.48 (0.51) 4.13 (0.59) 4.39 (0.95) 6.10 (0.89) 5.04 (0.62) 0.3411 ↓ Depression-Dejection 1.80 (0.42) 2.10 (0.59) 1.30 (0.48) 2.11 (0.66) 3.83 (1.14) 2.32 (0.79) 0.0862 ↓ Anger-Hostility 0.73 (0.35) 0.86 (0.28) 0.53 (0.27) 1.25 (0.54) 2.07 (0.58) 1.54 (0.48) 0.1935 ↓ Vigor-Activity 17.47 (1.26) 18.07 (1.30) 16.80 (1.42) 16.11 (1.66) 15.90 (1.27) 19.82 (1.17)^[b](#tf16){ref-type="table-fn"}^ **0.0399** ↑ Fatigue-Inertia 3.40 (0.84) 3.79 (0.93) 2.50 (0.51) 3.75 (0.79) 4.30 (0.68) 3.86 (0.79) 0.2111 ↓ Confusion-Bewilderment 5.63 (0.67) 5.10 (0.73) 4.40 (0.43) 4.32 (0.53) 5.37 (0.63) 5.00 (0.67) 0.8448 ↓ Total Mood Disturbance 2.87 (1.93) 3.38 (2.58) 1.87 (1.50) 6.07 (2.85) 10.60 (3.49) 5.04 (2.28)^[c](#tf17){ref-type="table-fn"}^ **0.0374** ↓ Bold values indicate overall treatment effects, *p* \< 0.05. The Profile of Mood States (POMS^™^ Standard Form) questionnaire (65-item) was administered at baseline (day 0) and after 90 days of spearmint extract or placebo supplementation. Subjects were asked to rate how they had been feeling in the past week as follows: not at all (0), a little (1), moderately (2), quite a bit (3), extremely (4). The arrow notes the direction of change that suggests improvement in the associated outcome. 900 mg/day spearmint extract versus placebo, *p* = 0.0646; 900 mg/day spearmint extract versus 600 mg/day spearmint extract, *p* = 0.0149. 900 mg/day spearmint extract versus placebo, *p* = 0.0832; 900 mg/day spearmint extract versus 600 mg/day spearmint extract, *p* = 0.0123. *p*-Values for the overall and pairwise comparisons in the intent-to treat sample were generated from a mixed-model repeated-measures analysis of variance model based on the difference from baseline in mood ratings (*n* = 28--30/group). SEM, standard error of the mean. Sleep {#s015} ----- Subjects were administered the LSEQ to evaluate getting to sleep, quality of sleep, ease of awakening from sleep, and alertness and behavior following wakefulness ([Table 5](#T5){ref-type="table"}). An overall treatment effect \[F(2,82) = 4.29, *p* = 0.0170\] was evident in ratings of getting to sleep. Further, between-group comparisons showed that subjects consuming 900 mg/day spearmint extract reported improved ability to get to sleep versus subjects consuming placebo \[*t*(82) = 2.91, *p* = 0.0046, *d* = 0.805\]. An overall treatment effect was also observed for behavior following wakefulness \[F(2,82) = 3.31, *p* = 0.0415\]. The pairwise comparison suggests that subjects consuming spearmint extract at 900 mg/day had improved behavior following wakefulness relative to subjects consuming 600 mg/day of spearmint extract \[*t*(82) = −2.52, *p* = 0.0137\]. No significant differences were observed in quality of sleep or ease of awakening from sleep. ###### [Subjective Ratings of Sleep, from Leeds Sleep Evaluation Questionnaire, Before and After 90 Days of Supplementation with Spearmint Extract]{.smallcaps}   *Placebo* *600 mg Spearmint extract* *900 mg Spearmint extract*     ------------------------------------------ -------------- ---------------------------- ---------------------------- ----------------------------------------------- -------------- ----------------------------------------------- ------------ --- Ease of getting to sleep 49.83 (0.95) 45.48 (2.15) 51.30 (0.87) 50.36 (1.70) 47.63 (0.91) 51.11 (1.36)^[b](#tf23){ref-type="table-fn"}^ **0.0170** ↑ Quality of sleep 50.27 (0.37) 48.62 (3.20) 50.97 (1.12) 52.04 (2.23) 49.83 (0.57) 53.25 (1.98) 0.4267 ↑ Ease of awakening from sleep 49.40 (0.40) 52.69 2.84) 48.63 (1.29) 50.54 (2.75) 52.10 (1.31) 54.14 (1.76) 0.9016 ↑ Alertness and behavior after wakefulness 52.20 (2.13) 59.31 (2.89) 55.03 (2.64) 53.50 (3.44)^[c](#tf24){ref-type="table-fn"}^ 52.07 (1.83) 63.46 (2.78) **0.0415** ↑ Bold values indicate overall treatment effects, *p* \< 0.05. The Leed\'s Sleep Evaluation Questionnaire was administered at baseline (day 0) and after 90 days of spearmint extract or placebo supplementation. Subjects were asked to rate aspects of sleep by using 100 mm visual analog scales flanked with antonyms (i.e., a rating of 50 mm is neutral). The arrow notes the direction of change that suggests improvement in the associated outcome. 900 mg/day spearmint extract versus placebo, *p* = 0.0046; 900 mg/day spearmint extract versus 600 mg/day spearmint extract, *p* = 0.0879. 600 mg/day versus placebo, *p* = 0.0892; 600 mg/day versus 900 mg/day spearmint extract, *p* = 0.0137. *p*-Values for the overall and pairwise comparisons in the intent-to-treat sample were generated from a mixed-model repeated-measures analysis of variance model based on the difference from baseline in ratings of sleep (*n* = 28--30/group). SEM, standard error of the mean. Discussion {#s016} ========== This study shows that supplementation with this dried aqueous spearmint extract at 900 mg/day for 90 days significantly improved quality of working memory and spatial working memory versus placebo in healthy subjects with AAMI. Further, subjects taking the 900 mg daily dose also reported improvements in the ability to fall asleep and demonstrated trends for improved ratings from subjective mood assessments, including vigor-activity and TMD. These data corroborate initial findings from a single-arm trial in which supplementation with 900 mg/day of this extract for 30 days showed improvements in components of working memory.^[@B32]^ Working memory pertains to the ability to use and manipulate information stored within short-term memory. Current evidence indicates that working memory decreases with age, beginning in early adulthood.^[@B35]^ Wesnes reported a decrease in working memory of roughly 10% per decade after the age of 40 in healthy individuals (*n* = 2282; 18--87 years of age).^[@B36]^ Given this decrease with age, the improvements observed in the current study are promising as quality of working memory and spatial working memory improved by ∼15% and 9% over placebo, respectively. The quality of working memory score at day 0 was lower in the 900 mg/day spearmint group relative to the other treatments; however, evaluation of the change from baseline incorporates this value and suggests improvement over placebo. These data suggest that this extract could improve working memory equivalent to that which may have diminished over a decade of life. The identified improvements in working memory, a hippocampal-dependent task, are further supported by the previously reported reduction in oxidation status in the hippocampus of SAMP8 mice after spearmint extract supplementation.^[@B22]^ To our knowledge, this is the first randomized, double-blind, placebo-controlled study to evaluate the effects of a dried aqueous spearmint extract with high levels of RA (≥14.5%) on cognitive performance after chronic administration in a parallel design. There are indications that compounds present within plants of the Lamiaceae family could be beneficial for cognition as suggested by previous research. Extracts of rosemary (*Rosmarinus officinalis* L.), sage (*Salvia officinalis* L.), and lemon balm (*Melissa officinalis* L.), all members of the Lamiaceae family, have been shown to benefit secondary memory, quality of memory, and speed of memory, respectively, after acute dosing.^[@B10]^ However, there have been no published studies with similar plant extracts (aqueous or otherwise), which have reported working memory benefits after chronic supplementation. These previous studies reported acute benefits utilizing a crossover design after a single dose of the extracts. Reduced sleep efficiency and quality have been correlated with cognitive decline that occurs with age.^[@B37]^ Therefore, the findings showing improvement in getting to sleep with 900 mg/day spearmint supplementation are notable given the age of the subjects (50--70 years) and the consistency of these effects with improvements in working memory. The reported differences in sleep ratings on the LSEQ after 90 days of supplementation for subjects taking 900 mg/day of extract were an average of 7.8 mm greater than the placebo group. This improvement is consistent with effects reported after administration of commonly used sleep aids typically administered before bed.^[@B38]^ While other studies have reported improved quality of sleep after supplementation with extracts from plants within the Lamiaceae family, these studies typically use a blend of extracts administered before bedtime.^[@B39],[@B40]^ Corroboration of these novel findings for spearmint extract using more objective sleep measurement tools is warranted. Mood may play a role in cognitive decline with aging^[@B41]^; therefore, the potential mood benefits were not surprising given the observed improvements in both working memory and sleep. There are limited data reporting the effects of plant extracts within the Lamiaceae family on mood after oral supplementation. Studies evaluating the effects of lemon balm (*M. officinalis* L.) extract on mood identified differences in calmness but inconsistent findings in alertness.^[@B11],[@B42]^ In addition, administration of sage (*Salvia lavandulaefolia* and *S. officinalis*) in both oil and dried forms resulted in improved measures of calmness, alertness, and contentedness.^[@B43],[@B44]^ A notable difference in the published studies on lemon balm and sage is the inclusion of young adults (18--30 years of age), crossover design, and acute administration. In contrast, the current study included older adults in a parallel design after chronic administration and identified improvements in vigor-activity and TMD. The major strength of this study is the randomized, double-blind, placebo-controlled, parallel-group study design. Compliance with study product consumption was greater than 98% in all groups. The CDR testing battery utilized is validated for populations with AAMI and shown to be sensitive enough to detect the effects of acute and chronic nutritional interventions. The computerized tests were carried out in a parallel format to reduce practice effects, and training sessions allowed subjects to acclimate to the testing battery. Finally, subjects completed these tools in a supervised environment where lighting and noise were controlled. The limitations of this study include potential confounding factors such as diet and lifestyle; however, to minimize these factors, subjects were asked to maintain their habitual diet, exercise routines, and sleep duration throughout the study. Cognitive outcomes measured at multiple time points on each test day were analyzed by using average daily values. One criticism of this approach is that utilization of daily averages may allow any acute effects from the predose assessment to confound the chronic analysis. However, since acute differences were not evident for the individual tasks or composite cognitive performance factors at any visit, to improve the reliability of the measurements, outcome scores were averaged across the −0.75, 0.5, 2, 4, and 6 h timepoints. Therefore, the differences measured and reported within this study best reflect what an individual might expect after a chronic dosing regimen. In addition, it is important to note that since this intervention included healthy older individuals, caution should be taken when extrapolating the observed benefits to those with more advanced stages of cognitive dysfunction. In summary, healthy older subjects with AAMI taking 900 mg/day of the spearmint extract improved their working memory and self-reported ability to get to sleep. Taken together, these findings suggest that this dried aqueous spearmint extract, containing more than 50 phenolic compounds including higher RA relative to native spearmint species, shows promise as an ingredient for improved cognitive performance, sleep and possibly mood, all of which may improve quality of life. Acknowledgments {#s017} =============== The authors would like to thank Barbara Anderson, MS, RD, for her contribution to protocol development; Eleanor Espinosa, BS, and Tressa Mattioli-Lewis, MPH, for their dedication to the coordination of this trial; Kathleen M. Kelley, MD, and Andrea L. Lawless, MD, for their medical oversight; and the entire clinic staff at Biofortis Research Services/Merieux NutriSciences for their commitment to this study. The authors would also like to thank Jim Rogers, PhD, and Maria Molina at Summit Analytical, LLC, for their contribution to the study design and data analysis. Kemin Foods, L.C., funded this study. Author Disclosure Statement {#s018} =========================== The authors acknowledge that they have either received research funding from or are employees of Kemin Foods, LC, the manufacturer of the product studied. [^1]: *Current affiliation:* Katalysis, LLC, Ankeny, IA. [^2]: *Current affiliation:* Midwest Biomedical Research Center for Metabolic & Cardiovascular Health, Glen Ellyn, IL. [^3]: *Current affiliation:* Wesnes Cognition Ltd., Streatley-on-Thames, United Kingdom.
PACE ahead is a space adapted in the modern educational models that ordains the 21st century. We believe in the redefinition of educational methods of teaching and in the development that these involve for everyone occupied in the training process. For these we create an environment that is possessed by creativity, wisdom, determination, flexibility, self-monitoring, politeness, sensitivity, joy, self-confidence, sincerity, love, devotion, insistence, friendliness, aid and spirituality. Pace ahead is staff by experienced trainers full of enthusiasm and innovative ideas and offer in the space of education full enthusiasm and innovative ideas while offers multiple educational and advisory services to persons that wish and aim to develop at a personal and professional level.
http://www.paceahead.edu.gr/who-we-are/
The general perception about presentations is that it is a time-consuming, mundane and boring activity. A presentation is perceived to be nothing more than a necessary evil that we have to sit through while someone else flips through the PowerPoint slides. The reason presentations are perceived with such negativity is due to the manner in which the components of presentations are designed. There are methods which cannot only make presentations more effective, but also make them more appealing to the audience. The first major component of a presentation session is the PowerPoint presentation itself. The PowerPoint presentation is the set of slides that is projected to convey the information to the audience in a succinct and concise manner. Let’s take a look as to how these PowerPoint presentations can be made more effective. Maintaining a logical flow Effective PowerPoint presentations are those that follow a structured flow and sequence. The slides should be neatly arranged and must be in the right chronological manner. The transition from one slide to another should represent a natural flow of the concept or the content of the presentation. The slides must be well scripted and follow the sequential pattern. The flow of the language, information and the message must be consistent and logical and the presentation slides must convey the idea in a coherent manner. The slides must be well connected and should not be disjointed. Check our blog post Preparing and Organizing the Content to get idea how should you organize your content in a logical order. Precision A PowerPoint presentation contains several slides and at times you might have to make presentations that need to convey a large amount of the information. While this might require adding a significantly large number of slides, it is essential to ensure that each slide must represent a single idea or message. Human eyes and minds have a tendency to easily lose focus and perceive the peripheral information. If there is more than one type of information in a slide, it hampers the focus of the audience. Keeping the information limited and specific to one topic on a single slide helps maintain the focus of the audience as well as maintaining their interest in the presentation. Precise information helps in making effective presentations. Pointers One of the biggest mistakes people make in creating PowerPoint presentations is that they write lengthy paragraphs in the slides. This needs to be strictly avoided since a presentation is only a tool for keeping the audience reminded of the key points. It is the speaker who does the talking and convey the idea. Writing long paragraphs makes the presentation boring and the words spoken by the speaker do not make an impact over the audience since they have already read what is being spoken and the curiosity to listen to the speaker is lost. It is important to use the pointers which convey the ideas in brief and important sentences. The speaker can then build around these pointers and use them as reference points to generate a sense of curiosity among the audience. Design and images Depending upon what the subject matter of the presentation is, the design and images need to be selected. A well-designed presentation with relevant graphs and figures can convey more information than mere words. Slide transition, background images, music, colors and slide designs help create an impact and make presentations more attractive to the audience. Similarly, images need to be used in a judicious manner. Images can convey much more information than words and therefore, using the right images is crucial. However, it needs to be ensured that the images are limited, specific and relevant to the content.
https://prezentr.com/blog/keys-for-creating-effective-powerpoint-presentations/
One of the most significant fault lines in the modern challenge to democratic stability is the reliability of information. The COVID-19 pandemic highlights this fault line and points to the need for greater media literacy. In essence, how do we know what we are reading or seeing is credible? Consider some of these COVID-19 findings: As the pandemic started to escalate across the world, the April 4-10 edition of the Alliance for Securing Democracy’s “Hamilton Weekly Report” highlighted how state-run media sites in Russia and China constantly put out information about the coronavirus. In that week alone, Russian government and diplomatic sites published 13,000 tweets. According to the report, about 5,200 of those tweets contained the words “corona,” “virus,” or “COVID-19.” And eight of the top 10 Twitter hashtags were about the virus. China’s government and diplomatic sites put out 13,000 tweets as well. The Hamilton Weekly tallied slightly more than 6,700 with the words “COVID,” “virus,” or both. And five of the 10 leading hashtags were related to the pandemic. Naturally, COVID-19 is the top story line around the world. And not all of those Russian/Chinese tweets were trying to destabilize democracies with falsehoods. But let’s not be naïve. As Nina Jankowich, a Wilson Center disinformation fellow, said during a recent webinar, there is “fertile ground for ‘disinformers’ of all stripes” because of the novelty of the virus. The Hamilton Weekly highlighted examples in its April 4-10 report: “Chinese state-funded media continued messaging about China’s medical aid, disputing any claims that it carries geopolitical motivations. Some content also emphasized narratives about the return to normal life in China, contrasted with coverage of serious coronavirus outbreaks elsewhere.” In doing so, China can spin out “positive information” that takes away from the realities about the virus. Russia used the same technique. As an example, Russian sites focused that week on how Russia is getting food aid to other nations. The subtext was making their country look good and the U.S. look bad. More recent Hamilton Weekly reports show a decline in some of the volume of COVID-19 posts from Chinese and Russian sites. But the numbers are still dominant. And the State Department released a report in late April warning Americans that Russia, China and Iran are using the COVID-19 pandemic to wage a major propaganda and disinformation campaign. One point of the information warfare is that the coronavirus is an American bioweapon. There may be little we can do as individuals to stop governments from waging disinformation campaigns. But there is plenty we can do as consumers of news to block their impact. It starts with being “media literate.” A cottage industry has grown up around how to discern credible information. For example, the State University of New York at Stony Brook’s Center for News Literacy developed a curriculum for undergraduates so they can discern the truth of the information they are reading. The center also offers a free online program for university students elsewhere, including in Hong Kong and Russia. It offers a free program for middle- and high-school students so they can learn how to discern fact from fiction in the information they get from social media, their peers and elsewhere. And, responding to the blizzard of disinformation about COVID-19, it has developed a special lesson for schools so students can they distinguish reliable information from disinformation. Here are some key tips to look for in what you are reading: Sign up for our new health newsletter The best of health, hospital and science coverage in South Carolina, delivered to your inbox weekly. Email Does the story have multiple sources? Does it provide context? Is the story balanced and nonpartisan? Does the site or publication have an open, transparent way of acknowledging its ownership? Does the publication run corrections? And think of these three questions about information you come across or that comes your way, which University of Washington professors Carl Bergstrom and Jevin West focus on in their frankly titled “Calling Bullxxxx in the Age of Big Data” class: Who is telling me this? How do they know it? What’s in it for them? As a consumer, also check stories with responsible fact-checking operations like AP’s Fact Check and Poynter’s #CoronaVirus FactsAlliance. This site, part of an International Fact-Checking Network, draws upon the work of 100 fact-checkers around the globe. It is updated daily, and reports on false or misleading information, such as the whopper that HIV created the coronavirus. Beyond the pandemic, there are ample reasons to make sure the information you receive is trustworthy. We are in an election year where foreign as well as domestic sources will dabble in false or misleading information. Sites like PolitiFacts constantly check statements for accuracy. But the coronavirus is its own unique and dangerous breeding ground for disinformation. So much so that the World Health Organization terms this an “infodemic.” For the sake of truth, our own understanding, and the health of our democracy, we all need to become better consumers of information. William McKenzie is the senior editorial adviser at the George W. Bush Institute. He wrote this for InsideSources.com.
An essential skill in today’s world This isn’t exactly the Information Age we were promised. Instead of a bottomless well of the wisdom of the ages, we find ourselves wading through a swamp of misinformation and ignorance. Maybe we should be calling it the Misinformation Age. In the Misinformation Age, distinguishing between fact and fiction is an essential skill. We should teach fact-checking in schools. For all the talk about “fake news,” very little guidance on how to sift through what we are reading and hearing is available. In the Misinformation Age, we have to take it upon ourselves to check the info we are consuming. The information we circulate decides elections. It destroys relationships. It ends friendships. Family members become estranged. We just cannot afford to be flippant about it anymore. TL;DR Main points, which I will expand on below: - Be humble enough to know that your first impulse to believe or disbelieve something will not always be right. Your impulse of whose authority to rely upon will not always be right. - Before the fact-checking can begin, you need to be honest with yourself and recognize your own biases. Our brains are wired to be clan-based. The more someone is like us, the more likely we are to assume that what they say is true. - Confirmation bias is your single greatest enemy. Confirmation bias is when our brains automatically ignore any new information that contradicts what we already believed and hold on like a vise to whatever new information reinforces what we believe. If a statement reinforces your worldview you need to question it just as much as – if not more than – if it doesn’t reinforce your worldview. Confirmation bias is in our DNA. That’s why this is so hard. We have to fight against the way our brains have evolved in order to truly have a claim on a factual understanding of anything at all. - Related, the more emotional something makes you, the more you need to question it. If you become angry at someone or a group of people based upon some information you receive, you better be damn sure that information is accurate before you hold on to a grudge. - Distinguish between statements of opinion and claims of fact. “The moon is made of cheese. Hey, agree to disagree. That’s just my opinion.” Nope. That is a claim of fact for which you need proof or a reliable source. - Take responsibility for the claims of fact that you make. When you spread misinformation on social media, you are responsible for anyone downstream from you that is now misinformed. In the modern world, we cannot take the transmission of information lightly. - First step in fact-checking: Google (or whichever search engine you prefer). So much misinformation can be dispelled by a simple Google search. Do not post a claim of fact if you are just regurgitating it from somewhere else without at the very least Googling it. A lot of “facts” you won’t find anywhere outside of meme form. For the love of all that is good and true, please do not post these things. - It’s not about Google. If you don’t trust it, try another search engine. Google just provides sources for you to sift through. If you don’t like the first results, first check yourself to make sure you’re not experiencing confirmation bias (i.e. you’re not trusting it just because it’s not saying what you want it to say), and then keep digging. - If Google turns up other sources making the same claim, the next step is to assess the sources. Most of the time, claims of fact on the Internet will come from a news source. This is not optimal, but it is what it is. If you are relying solely upon a news outlet’s statements of fact, be very discerning. Keep in mind the bias of that outlet. Not just the ones you perceive to be biased in the opposite direction of your bias. Question the sources that lean the way you do just as much (confirmation bias again!). There is a handy chart below that maps out a general idea of how different media outlets lean and the professional rigor with which they work. - The next step in fact-checking is to find more sources that say the same thing, or sources that contradict it. You can then assess which of those sources is the most reliable. Maybe they’re both the same level of reliable. Then the thing that you’re researching is not an established fact and you cannot claim that it is. - The holy grail for any scientific claims that might be thrown out is peer-reviewed, academic research. If an article online speaks of any scientific claim of fact, they should have some indication of where they got that information from – or they’re not a source you should be using. - Become comfortable with ambiguity. Sometimes your fact-checking won’t come up with a clear and certain answer. And it’s okay to admit when that happens. But don’t then repeat the statement you’re not sure about as fact. - Sometimes it just comes down to what “feels right” to an individual. In some contexts, that’s okay. Just be honest about it. Don’t say it like it’s an absolute truth. - Normalize changing our minds and adapting to new information. Normalize admitting that we don’t know. Become comfortable citing sources as often as possible in everyday life. Normalize saying things like “According to…” in casual conversation and social media. - For Pete’s sake, take it seriously! Humility The first step is being humble enough to realize that your first thought or impression is not going to be right much of the time. A lot of research on political psychology shows that our brains are just not wired for thinking objectively about every claim of fact that we receive. (I’m getting some of this from this book, but there’s a broad range of research that has come to the same conclusions.) We rely to a large degree on the authority of the person or people giving us the information. We get an impression in our heads that this person or that media outlet is trustworthy and then that’s that. If that person speaks, you are going to believe what they say the vast majority of the time. And a lot of the time, that’s fine. Parents tell a child that it’s unacceptable to lie, steal, and cheat, and the child believes them and acts accordingly. Your teacher tells you that Japan exists and that two and two make four, and you believe her or him. Our brains being wired that way makes sense. But no one was really telling you that stealing was okay and that Japan doesn’t exist (hopefully). So what happens when you have two contradicting claims? Well, the first thing to know is that our brains are wired to be clan-based. For example, the single greatest predictor of your political affiliation is not your economic status, education, gender, or race. The single greatest predictor of your political affiliation is the political affiliation of your parents. (This book again.) Obviously, many people form different opinions than their parents eventually, but it is our default mode to trust our clan, and the family is the base unit of our clan. From there, our clan can widen out to include those around us. Our extended family, our church, the people at school, the people in our town or city. From there we can widen out to any other type of identity we might have. (Of course, political identity is one of the strongest ones out there these days.) These are the people we expect to give us accurate information. The people we perceive to be like us are always going to be assumed to be more trustworthy sources of information than those who are not like us. That’s just the way we’re wired. So if you have someone that you perceive to be like you and who speaks definitively – like they have all the answers – you’re probably going to believe him or her. Beating Our Wiring So we have to be aware of our wiring in order to think our way around it. That person who is like us and talks like he or she has all the answers is not always going to, in fact, have all the answers. We need to be able to think critically about the information we are receiving even if we like who it’s coming from. You like your Uncle Frank. He’s a nice guy, he’s a good dad to your cousins, and he’s really great at his accounting job. That does not mean that his every Facebook pontification should be taken as gospel. This may sound obvious, but we don’t think about it when it’s happening. One of the most important lessons we can learn is just to be aware of the situations in which we are taking things as fact when we have no real reason to. It takes conscious effort. It’s hard and, honestly, intellectually exhausting to constantly be checking ourselves for every single thing we believe. Opinions vs. Facts Opinions are subjective statements. You can state them as a fact without it being disingenuous. For example, if I said, “‘The Room’ is the best film ever made,” you wouldn’t think that I was trying to state this as an absolute truth. We all know statements of preference like this are opinion. A person doesn’t need to cite a source for their dubious taste in movies. Claims of fact are objective. They are either true or they are not. It should be possible to fact-check them. We should have some way to prove these statements, or else how can we say that they are objective truth? How can you know that thing is true if a reliable source didn’t tell you about it, or if you didn’t somehow prove it yourself? Opinions: - “The government has gotten too big.” - “Guns should be outlawed.” Someone might ask you what you mean by that or why you feel that way, but you don’t need to prove those statements. They are your opinion, and that’s fine. Claims of fact: - “10% of all immigrants are criminals.” - “Most gun deaths are caused by white people.” You better be able to prove those last two statements if you’re going to say them out loud or online. And if you hear someone else say things like that, your first thought should be, “Where did they get that from?” Suppositions are trickier. For example, when Syrian refugees began pouring into Europe around 2015, some Europeans supposed that some radical Islamic terrorists were sneaking in with the masses. Now this is a claim of fact, and it’s theoretically one that could be proved or disproved at some point. But at that moment there was no way to prove it or disprove it. The problem here would not be making statements you can’t fact-check. The problem would be stating them as if they were fact and not being honest about not knowing those things for certain. It’s okay to make suppositions; it’s not okay to act like they are absolute truth. Of course, some suppositions are vague enough to be unhelpful. “You know, a lot of immigrants are criminals.” This statement supposes something that in a way could be proved or disproved, except that it’s too vague. How many is “a lot”? Yes, of course, some portion of any population is going to be criminal. The statement is implying that immigrants are to be feared, which is an opinion. Is it implying that a higher proportion of immigrants are criminals than the rest of society? Because that’s definitely a claim of fact that we could prove or disprove. A vague supposition like that is sneaking an opinion in under the guise of a provable statement. Fact-checking Sources “But Jeremy, none of these sources can be trusted. All news is fake news, and scientists lie about everything.” Well, then you are living in a post-modern world devoid of objective truth where no statement of fact can ever be made. Let’s say you post something saying “The moon is made of cheese.” I respond with a couple sources that say that is not true. You say, “All sources of information are unreliable.” That does not then default to your statement of moon cheese being true. Because you believe I cannot prove your statement false does not mean that you are proving it true. You’re saying that nothing can be presented as a fact ever, including your own statements. If you think all sources are 100% unreliable, chances are you’re experiencing confirmation bias because they’re not saying what you want them to say. Journalists do not get into journalism with the ambition of fooling all of society. Scientists do not go into their fields in order to mislead people. They are generally well-intentioned, though of course flawed, human beings. For the rest of us: News Sources As stated above, much of what we consider to be objective truth is based upon various news sources. This isn’t ideal, but it’s the world we live in. The idea is to find reputable sources. No, this chart is not absolute truth. The two that are most controversial here will be CNN and Fox News. If you don’t agree with where those two are placed, that’s fine; the rest is still a pretty good layout. If you want to see why various outlets are placed where they are, you can read about their methodology on their website. Frankly, it’s not very scientific but it also doesn’t really claim to be. I will say that it aligns pretty closely with my experience of these sources. Do not try to prove something to me with Occupy Democrats or Breitbart. Something else to note about the chart: there is a very important difference between sources that lean one way or the other and those that care about journalism or don’t. The New York Times and the Wall Street Journal may have some bias – and it’s important to know that – but it’s unlikely that either of those sources will just make things up out of thin air. The thing you need to be more conscious of in cases such as these is the choice of which information they present and how it is presented. If you are unfamiliar with a particular news outlet, you can Google “news source X reviews” and you should get some useful information. You should be able to get a feel for any bias that source might have and if it generally has a good reputation or not. Scientific/Academic Sources For scientific claims, the person reporting needs to say where they got their information. Most reporters do not have scientific training sufficient to make scientific claims. Most of the time, that just means quoting an expert they’ve interviewed. The problem with that is that you can find some scientist somewhere who will say just about anything. “Joe Blow, a PhD from University X, has found evidence that the moon is, in fact, made of cheese, but the scientific community is suppressing his findings.” Concerned about an expert’s credibility? Give them a Google and see what their credentials and reputation are. If you don’t turn up any research they’ve ever done, that’s a red flag. Did you find there are a bunch of other scientists lining up to talk about how their methodology is flawed and findings are unreliable? That’s more than a red flag. If you ignore all red flags about an “expert” because they are saying what you believe, you are experiencing confirmation bias. It’s your choice it you want believe it anyway, but don’t repeat it as established fact. More ideally, it would be great if a reporter cites a specific piece of research that can be double-checked. Get comfortable using JSTOR (jstor.org), which is a giant repository of scientific publications. Google Scholar can be a good resource as well. If you’re able to find the actual research, you may not be able to read the whole thing because it’s behind a paywall. But some information is generally on the journal listing, at least enough to know if the article citing that research is citing it accurately. Peer-reviewed academic research generally goes through a pretty intensive vetting process. Other experts in the same field look over how the researcher/researchers conducted their research and how they interpreted the results. It’s common for a journal to send an article back for revisions, sometimes multiple times, before they will publish it. No, this does not make it infallible, but it’s a good way to establish the credibility of a particular scientific statement. Other Fact-checkers and Wikis Yes, Snopes is useful. No, it is not the arbiter of all truth. What’s great about Snopes and Wikipedia and other sites that serve as aggregators of information is that they provide links to their own sources. They can be a great kicking-off point. Follow their links to their sources and then follow those sources to their sources. If you really want to become confident in the information you’re getting, you need to get comfortable following the source rabbit hole, assessing the reliability of each layer as you go. It’s hard. It takes time. Polls News outlets are obsessed with polls. They interrupt their regular schedules for “Breaking News” about a new poll coming out. I think we’re all aware of the limited usefulness of polls at this point, but they can still provide some useful information. Fact-checking polling data is usually pretty simple. You just have to verify on the polling agency’s website, like pewresearch.org. It’s important to note the margin of error. You can check to see how many people were asked the questions and how the questions were worded. Just generally, keep in mind the limits of polling. Ambiguity Our brains crave absolute certainty. Humans want everything to be put in a nice little box and set aside so that we can move forward. That’s the allure of cults and fundamentalist religion. Someone says they know the absolute truth about everything, and we want so badly to think that’s possible we end up believing crazy things. Like, say, the moon is made of cheese. But even if you subscribe to these belief systems, not every issue has been settled within them. I don’t think a ton of religions have come down firmly on one side or the other on the moon-cheese theory I’ve mentioned a number of times now. A lot of questions do not have clear answers that we can state with absolute certainty. And yet we state them that way anyway. We all pretend to know things we don’t. We just need to be more honest with ourselves and others about it. Be upfront when you’re just making a supposition. Tell your friend that what you just said is something you read somewhere, and then try to find the source and the two of you together can decide if it’s reliable information. Be not sure sometimes. Change your mind sometimes. It’s not a competition. No one gets a prize for not backing down from the thing they said at the beginning of the conversation. Conclusion If you are interested in a case study in what I’ve talked about here, I created one for you here. We just don’t have the luxury of not taking fact-checking seriously. The stakes are too high. In the Misinformation Age we have to put in some work to make sure that we – and our friends and families – don’t come out thinking the moon is made of cheese.
https://aforay.com/fact-checking-101/
How Much Cash Should You Keep In The Bank? Bank accounts can make paying bills and managing spending easier. And a savings account provides a convenient place to keep cash you may need to tap in an emergency. But how much money should you keep in checking and savings? Is it possible to have too much cash in the bank? Finding the right balance is key to managing your bank accounts. How Much Cash Does the Average Bank Account Have? When figuring out how much cash to keep in the bank, it helps to have some perspective on how other people approach it. According to Federal Reserve data, 98% of American households had at least one transaction account in 2019. Transaction accounts include: Checking accounts Savings accounts Money market accounts Call deposit accounts, for investment funds Prepaid debit cards The mean or average value of those accounts was $42,000 in 2019. The median value was $5,300. This means that if you take out the high end and the low end of bank account balances, the typical person landing in the middle keeps just over $5,000 in cash in those kinds of accounts. One thing to keep in mind is that these numbers don’t include people who are unbanked or underbanked, which includes 22% of American households. The unbanked and underbanked either don’t have bank accounts at all, or they rely on alternative financial products and services. How Much Cash Can You Keep in the Bank? Banks and credit unions can impose limits on the amount of money you can keep in a checking, savings, money market or CD account. These limits can be imposed per account or as an aggregate across all your accounts. For example, you might be capped at a $1 million limit for a single deposit account and a total maximum of $3 million across all of your accounts. Depending on your bank, the limits may be higher, lower or nonexistent. If you’re unsure whether your bank limits how much cash you can keep in your accounts, this should be spelled out in your account or customer agreement. Aside from the bank’s limits, however, there are other limits to keep in mind. Specifically, this means the limits imposed by the Federal Deposit Insurance Corporation (FDIC). These guidelines can influence how much cash you decide to keep in the bank at any given time. FDIC Limits and Bank Account Balances The FDIC insures deposits for banks, including brick-and-mortar banks and online banks. Not every bank participates in FDIC insurance and not every account type is covered. But the FDIC does insure: The standard insurance amount provided for FDIC-insured accounts is $250,000 per depositor, per insured bank, for each account ownership category, in the event of a bank failure. For example, if you have a checking account, savings account and a money market account at the same bank that are all owned by you and you alone, the combined balances for those accounts would be insured up to the “per depositor” $250,000 limit. If, at the same bank, you also have a joint account that you share with a spouse or other person, then applying the “per ownership category” part of the FDIC coverage definition, another $250,000 coverage limit applies to your half of the funds in that joint account. Anything over that amount would exceed the FDIC coverage limits. So if you keep more than $250,000 in cash at a single bank, then you potentially run the risk of having some of those funds be unprotected if your bank fails. The good news is that bank failures are generally rare; there were just four bank failures in 2020. If you’re trying to decide how much cash to keep in the bank, you could use both your bank’s account limits and the FDIC limits as a starting point. Remember that these limits are applied at the individual bank level. If you have more than $250,000 to keep in cash at the bank, you could open multiple accounts at different banks to spread those funds out. This could make it easier to stay under any bank-imposed account limits, as well as the FDIC coverage limits. What’s a Good Amount to Keep in a Checking Account? Checking accounts allow you to pay bills electronically or by writing checks. When your checking account comes with a linked debit card, you can use it to make purchases online or in person. And you can link a checking account to a savings account to make transferring funds between the two quick and easy. But what is a good amount of money to keep in your checking account? The answer can depend on several things including: How you budget your money each month Whether your checking account allows you to earn interest on balances What your bank charges for checking account fees Let’s consider the budget angle first. Say you budget by paycheck, for example, and are paid biweekly. To help ensure that your bills are paid, you’d need to keep at least half a month’s worth of expenses in your checking account to cover yourself until the next payday. If you want to create a wider buffer, you might increase that to a full month’s worth of expenses or even two. Next, consider whether your bank offers an incentive to keep more money in checking in the form of interest earnings. While interest-bearing checking accounts are less common than standard checking accounts, quite a few banks offer them. The interest rate you could earn may not be as much as you’d get with a savings or money market account, but it’s essentially free money you get just for keeping cash in checking. That’s something that could motivate you to keep more money in your checking account. In some cases, the decision to keep more cash in checking is all about avoiding a fee. At traditional banks, for instance, it’s common to have a monthly maintenance fee for checking accounts. But you may be able to avoid this fee by maintaining a minimum balance in checking or a minimum combined balance across all your bank accounts. How Much Cash Should You Keep in Savings? Savings accounts are typically designed to hold money you don’t plan to spend right away. This could be money you need for a short-term goal, such as planning a vacation, or a longer-term financial goal, like buying a home. And savings accounts or money market accounts are also helpful for stashing away your emergency fund until you need it. If you’re opening a savings account for a specific goal, such as a vacation, buying a home or planning a wedding, the amount you’d keep in it would be dictated by that goal. For instance, you may need to save $3,000 for a trip, $10,000 for a new-to-you car or $20,000 for a wedding. But emergency funds don’t necessarily have a set number you should aim for. That’s because everyone’s rainy day fund needs are different. So how much cash should you keep in a savings account or money market account for emergencies? One rule of thumb often recommended by financial experts is keeping three to six months’ worth of expenses in emergency savings. So if your monthly expenses are $3,000, then you’d want to have between $9,000 and $18,000 in a savings or money market account that’s readily accessible when you need it. But what if your expenses or income fluctuates month to month because you’re self-employed or do gig work? In that scenario, you could use the average of your monthly spending as a guideline. According to the Bureau of Labor Statistics, the average American household spent $63,036 in 2019. That’s $5,253 per month. If you were to use that number as a baseline, the amount of cash you’d need to keep in the bank for emergencies would range from $15,759 to $31,518 if you’re saving up three to six months’ worth of expenses. The more you can pare back your budget and spending, the less money you may need to keep on hand. But consider how long a financial emergency might last. In March 2020, what seemed like a temporary crisis specific to Covid-19 was only beginning. Nearly a year later, many Americans have exhausted their emergency savings because of the financial strain created by the coronavirus pandemic. If you’re worried that a financial emergency could stick around, you might consider increasing your emergency savings to nine or 12 months’ worth of expenses instead. Choose Bank Accounts Wisely When keeping cash in the bank, whether it’s a larger amount or a smaller one, it’s important to make sure you’ve got the right account for your needs. With a checking account, for instance, consider things like minimum balance requirements, monthly fees and whether you can earn interest. These same things matter with savings accounts, money market accounts and CD accounts. Checking the annual percentage yield, or APY, for deposit accounts is particularly important when banks are slashing interest rates. When rates for deposit accounts are falling across the board, you shouldn’t abandon saving altogether. Instead, you should carefully compare traditional and online banks to find the best interest rates for checking, savings, money market and CD accounts. Online banks can offer higher rates than brick-and-mortar banks, which you can benefit from, once rates begin to rise again.
Most of us use ATMs to withdraw cash, but some people — such as gig workers or restaurant workers who rely on tips — often use ATMs to make cash deposits. But did you ever wonder if there is any risk to that? One Avondale man said he just found out how risky it can be. Eric Morton said he's out a large amount of money after what he believes was an ATM malfunction. "I walked into the ATM kiosk and put my card in," he said, pointing to PNC's free-standing ATM kiosk on Linn Street in Cincinnati's West End. He said he then deposited $1,300 cash, mostly in $20 bills, into the ATM's cash slot. "I heard it counting the money, counting the money," he said. "But as it was processing, an error hits the screen." Confused, he reinserted his card and checked his account. "I then follow up, and check my account, thinking maybe the money is in there," he said. "But it was not in there." His account showed no deposit. No answers from bank security department Morton owns a courier company and said he frequently deposits cash, but he said when he called the bank's security department, he claims the agent questioned whether he was telling the truth. "So I feel like I am defending myself more than you are trying to help me," he said. "I am trying to find out where my $1,300 went, and no one can tell me anything." Morton said he's not asking the bank to take him at his word; he's just asking the bank to look at the footage from the camera on the machine and the two bubble cameras around the ATM. "That's all I have been asking for," he said. "Check the camera footage." So, don't let this happen to you. When depositing cash, Bankrate.com says: - Use an ATM at a physical bank that is frequently checked, not a freestanding one with no bank nearby. - Don't deposit cash to an out-of-network ATM where they would not have your account information if something goes wrong. - Consider using a live teller if it's a very large amount of cash. We sent Morton's case to PNC, which promised to do a full investigation in the coming days (see full statement below). Meantime, Morton said he will never again do an after-hours cash deposit. As always, don't waste your money. _________________________ Don't Waste Your Money" is a registered trademark of Scripps Media, Inc. ("Scripps"). Like" John Matarese Money on Facebook Follow John on Instagram @johnmataresemoney Follow John on Twitter (@JohnMatarese) For more consumer news and money saving advice, go to www.dontwasteyourmoney.com ______________________________ FULL PNC BANK STATEMENT We have escalated Mr. Morton's claim to our Client Relations group who will look into it and will contact him directly to discuss it further. If a customer suspects an ATM has malfunctioned, we encourage them to contact their local branch or our Customer Care Center as soon as possible to file a claim. The bank will conduct a full investigation and offer a resolution within 10 business days. ATMs are designed to offer convenience to customers whenever they are able to bank. ATMs can accept up to 50 bills at a time for deposits. Before finalizing a transaction, customers are given the option to confirm or reject the amount of the transaction. Customers may always come into their nearest branch if they prefer to make their deposits with a banker. ATM BANKING Skip to main content Banking that works for you. Find an ATM near you quickly and easily, online or in the app. Find one now As a U.S. Bank customer, you have access to one of the largest ATM networks in America. U.S. Bank ATMs are designed to accommodate your most common banking needs. With access to your U.S. Bank checking, savings and credit card accounts, you can quickly transact and be on your way. It’s your money. We make it quick and easy to move it and use it – 24/7/365. What can I do at U.S. Bank ATMs? Most U.S. Bank ATMs offer the following features.1 Go cardless. With a new contactless feature, use a U.S. Bank ATM near you without inserting your card. Add it to your digital wallet and simply wave your device over the ATM reader. Or wave your newly-issued, contactless U.S. Bank card over the ATM reader. Check your balances. Enter your PIN and see a quick balance summary. You can easily view or hide your account balances during a transaction. Deposit cash and checks in a flash. Insert up to 30 checks and 50 bills at a time without an envelope, and cash deposits are credited to your account instantly. Simply put your money in, confirm your deposit and be on your way.1 View cash deposit tutorial Get cash the way you want it. Do you prefer large or small bills? You choose. Withdraw your cash the way you want.1 View tutorial Transfer money between your U.S. Bank accounts. Transfer your money easily from one U.S. Bank account to another. You can use this feature to reduce the outstanding balance on your line of credit or credit card. Make payments. Transferring your money from one U.S. Bank account to another is easy – and so is making payments on your U.S. Bank credit cards. Just insert the card you want to pay and then transfer the payment. View tutorial Customize your ATM settings. Choose your primary language and set up your Fast Cash preferences. And to make your stop even faster, you can choose to decline printed receipts for all your ATM transactions. Learn more about Fast Cash Reset your card PIN. To safeguard your security, it’s a good idea to change your card PIN regularly. Set your card PIN and change it as often as you wish at a U.S. Bank ATM. View tutorial Difficulty seeing at the ATM? You can adjust screen contrast before entering your card PIN. Select “High Contrast” to make it easier to read during bright daylight. You can also use headphones to have the ATM read the words on the screen to you. Access to more ATMs For ATM Banking options while you’re on the go, U.S. Bank partners3 with other ATM providers, including the MoneyPass® ATM Network2, which allows our customers to transact at thousands of additional ATMs across the country; fees and functionality vary by location.1 Functionality at most of these ATMs includes cash withdrawal, balance inquiries and transfer to accounts linked to your card. Find a location Frequently asked questions U.S. Bank ATMs1 To find the nearest ATM, visit the Locations section of usbank.com or use the U.S. Bank Mobile App. Once there, enter your location and select the ATM checkbox filter for a list of nearby U.S. Bank ATMs or partner ATMs.3 As a U.S. Bank customer, you also have access to transact at MoneyPass Network ATMs without a surcharge fee.2 It's easy to find MoneyPass ATMs in your area. Select “Show MoneyPass ATM Network locations” in the dropdown at the top of your search results for a list. Your daily ATM withdrawal limit depends on the type of account you have at U.S. Bank and on your account status. To see your limit amounts, log in to Online Banking or the U.S. Bank Mobile App and choose your debit card on the My Accounts page. Or give us a call at 800-USBANKS (800-872-2657). If you are a U.S. Bank account holder with ATM access as a feature of your account, there are no ATM Transaction fees to use a U.S. Bank ATM.2 Partner ATM Transaction fees and functionality may vary. You can transact at ATMs in participating 7-Eleven stores without ATM Transaction or surcharge fees. At participating Moneypass Network ATMs, you'll avoid surcharge fees when you use your U.S. Bank card. However, transactions may be subject to U.S. Bank ATM Transaction fees.3 Please reference the U.S. Bank locator to differentiate between U.S. Bank ATMs and partner ATMs that you have access to. Some may have limited transactions available and fees may apply. Navigate the ATM network with the U.S. Bank locator.1 Cash deposits made at a U.S. Bank ATM not requiring an envelope, are credited to your account the same business day. Checks deposited before 8 p.m. local time are posted the same day. Checks deposited after 8 p.m. local time will typically be processed and posted to the account the next business day. If you make a deposit using an envelope ATM, please note that the cutoff time is 6pm local time. Cash and checks will be processed next business day. See the Funds Availability section of Your Deposit Account Agreement for more details.4 Many of our ATMs can accept up to 50 bills and 30 checks in one transaction. If you need to deposit more than 50 bills and 30 checks, you will need to complete a new transaction. No, U.S. Bank ATMs cannot accept coins. Folded or damaged checks or bills may not be legible by the ATM scanner. In those cases, you can visit a branch to make your deposit with a teller. You can also deposit checks using mobile check deposit4 in the U.S. Bank Mobile App. Yes, a signature is required on all checks you deposit at the ATM. Please make sure checks are payable to and endorsed by the account holder. If the check is not properly endorsed, there may be a delay in processing and posting the funds to your account. No, U.S. Bank ATMs cannot accept foreign checks or foreign currency. Please visit any of our branch locations to discuss available options for foreign checks or currency. At this time, you can only deposit the full amount into one account. You may transfer any available funds to your other accounts anytime at the ATM. Funds deposited may not be available for immediate use or withdrawal. Please refer to the Funds Availability section of Your Deposit Account Agreement for more details. For questions regarding your experience at a U.S. Bank ATM, please contact us at 800-USBANKS (800-872-2657) or visit your nearest branch. ATM Access & FAQs All VACU locations are closed on 11/25. Back to Debit Cards Bank at your convenience and get cash 24 hours a day at ATMs worldwide. Your credit union helps you save on ATM fees, too! Virginia Credit Union ATMs - Withdraw cash - Make deposits at our image-enabled, envelope-free ATMs - Transfer money between accounts - Check your account balances - Change your debit card PIN - ADA Voice Guidance Capable for the visually impaired Use the Branch & ATM Locator. Savings on fees at other ATMs Your credit union helps you save two ways on ATM fees for checking withdrawals when you need to get cash at non-VACU ATMs. - You get 4 checking withdrawals per month at non-VACU ATM free of network ATM fees from VACU. (Other ATM owners may have a fee, but learn about rebates below.) - You can also enjoy up to $8 per month in rebates for ATM fees assessed by other ATM owners if you have either a qualifying direct deposit or 15 debit card purchase transactions that month1. More tips for avoiding ATM fees - Use fee-free ATMs at VACU and all Wawa and Sheetz stores in Virginia. - Get cash back at stores when you use your debit card and PIN for purchases. - Pay with your debit card to reduce the need for cash. - Avoid a lot of small withdrawals – get more cash per trip to an ATM. Thank you for using fee-free VACU, Wawa and Sheetz ATMs or other cash alternatives when possible. You avoid ATM fees and you help your credit union control costs for the membership. - Insert a stack of up to 50 bills flat, in any direction, into the cash deposit slot (bills only—no coins). - The ATM automatically counts your cash. - Your total cash amount appears on the screen for you to verify. - The number and bill denominations appear on your receipt. - Insert your check into the check deposit slot face up. The ATM shows you the scanned check image on screen. - Manually enter the amount of the check for verification. - Repeat this for each check you wish to deposit. Then verify the amount on the screen. - Your receipt lists each check you deposited and your total deposit. You may choose to either have check images printed on your receipt or print just a summary of the deposit. No, coins will jam the machine and damage it. Yes. You can deposit both during the same transaction, but you will do so one at a time, in their individual check and cash slots. Yes. You will see each check on the screen and be asked to verify the amount. For cash deposits, total cash is displayed for your acceptance. A check may be rejected if the account and/or routing number is printed too lightly for the scanner to verify or if the written amounts are not legible enough for the ATM to read. If a dollar bill is worn, torn, folded or has extraneous marks on it, it may be rejected by the ATM. Please contact Member Services at 804-323-6800 or 800-285-6609 or a member of the branch staff. Did you find the answer you were looking for? Scroll to top Current is a financial technology company, not a bank. Banking services provided by Choice Financial Group and Metropolitan Commercial Bank, Members FDIC. The Current Visa Debit Card is issued by Choice Financial Group and Metropolitan Commercial Bank pursuant to a license from Visa U.S.A. Inc. and may be used everywhere Visa debit cards are accepted. ¹Faster access to funds is based on comparison of traditional banking policies and deposit of paper checks from employers and government agencies versus deposits made electronically. Direct deposit and earlier availability of funds is subject to payer's support of the feature and timing of payer's funding. *Overdrive™ is available only on Current Premium Accounts and requires $500 in qualifying direct deposits on Current each month. Members will be notified by Current when they are eligible and must opt-in to Overdrive™. The Overdrive™ limit starts at $25, allowing members to overdraft their accounts up to $25 on debit card purchases without any fees, and accounts are reviewed periodically for increases up to $100 at Current’s discretion. Your limit may change based on your account history, spending activity, or other risk-based factors. You will receive a notification of any changes to your limit and your limit may change at any time at Current’s discretion. Your limit and remaining balance will be displayed to you in the Current app. When you receive your next deposit, Current then will apply funds towards your negative balance. Overdrive™ will not cover any non-debit card purchases, including ATM withdrawals, ACH transfers, P2P services (PayPal, Venmo, Cash App, or similar services), Current Pay transfers and checks. See terms and conditions. ²Out-of-network cash withdrawal fees apply. Third-party and adding cash fees may apply. "Metropolitan Commercial Bank" and "Metropolitan" are registered trademarks of Metropolitan Commercial Bank ©2014.
https://traitortrump.us/how/how-to-deposit-cash-in-atm.php
Councillors will visit a unique group of houses built in the 1930s to agree whether or not one can be demolished to make way for a large, modern home. One of the close neighbours of the house at Mannerston Holdings – a group of smallholdings on the outskirts of Blackness – came to Falkirk Council’s planning committee to argue that although the houses are all different, they are all similar in character and fit in well with the unique landscape. A retired architect and member of the community council, Merville Archibald said the proposed two-storey house would be very much out of keeping. In his view, it was entirely wrong to say that the old house it would replace was “substandard”, as Bo’ness councillors David Aitchison had argued in support of the application. “Since they were built, they have all evolved and many have been extended but by relatively small amounts,” Mr Archibald said. Depute Provost Ann Ritchie also addressed the meeting to support the proposed new house. Speaking on behalf of the owners, Peter and Karen Mushet, agent Billy Smith claimed the 85-year-old house was substandard because it was not suitable for modern living and could not be redesigned. He said the proposed building had been designed to look like a modern farmhouse with a natural stone and slate finish and while the house was substantially larger because it was over two storeys the footprint was not too much bigger. The owners are also seeking permission to change the use of the ground from agricultural to garden ground although they heard that as it hadn’t been used as a smallholding for ten years this was unlikely to be a problem. Bo’ness councillor Lynn Munro was backed by her colleague David Grant and supported by other members who felt they should see the area to make a decision.
https://www.linlithgowgazette.co.uk/news/people/councillors-to-visit-unique-blackness-houses-1-5033198
Akash Dutta, Dept. of ECE, JISCE Debabrata Debnath, Dept. of ECE, JISCE Goutam Sutradhar, Dept. of ECE, JISCE Dibyendu Paul, Dept. of ECE, JISCE Arindam Banerjee, Dept. of ECE, JISCE Abstract In this paper, a desktop application has been developed to perform virtual laboratory experiment for the creation of Pulse Width Modulation (PWM). This experiment can be performed at home in the PC or laptop. This application can be downloaded to perform the virtual experiment. In the application, there are provisions for the parameter selection to change the pulse width of a square pulse. When the program is run then the waveform is generated in a separate window. The desktop application has been developed by Python language. Moreover the application is interfaced with a Liquid Crystal Display (LCD) screen to show the amplitude and the duty cycle of the PWM signal. Keywords Desktop Application, Numpy, Matplotlib, Scipy, Python, Microcontroller, Liquid Crystal Display - INTRODUCTION In the Pandemic situation caused by COVID-19, the students as well as the teachers are confined at home. Classes are going on virtually but it is quite difficult to perform the laboratory experiments virtually. Therefore an initiative has been taken to perform laboratory at home such that the students can have the technical knowledge about the experiments. Many institutions have created their own virtual labs [1-3] and from their website it can be accessed. These are the web applications. Getting inspired by their initiative, we have also started to design our own virtual labs. But the major difference of our virtual laboratory experiment with respect to the earlier reported virtual laboratories is that it is in the offline mode which means without the internet connection the experiment can be performed. The application and the datasheet is downloaded by the students and the experiment can be performed by running the application. If one time the application is downloaded then it can be performed multiple times as required. The students need not worry about the internet issues. The novelty of the work is the creation of desktop application for performing the laboratory experiments virtually at home and also the parametric results can be displayed in the LCD screen to participants which was not done earlier. In this respect, the work is totally new to the best of the knowledge of the authors and therefore can not be compared with other similar works. The paper has been organized as follows. Section II describes the desktop application. Section III describes the hardware application that is the interfacing of the application with the hardware. Section IV is the conclusion. - DESKTOP APPLICATION The application has been developed in Python. Here we have used a well known library tkinter to create the user application. To create user interface at first we have to import the class from tkinter import * to include all existing methods. In this experiment we perform PWM using the well known 555 Timer integrated circuit. The circuit diagram has been drawn in the paint app and it has been included in the main application as a file dialog. The code from tkinter import filedialog as fd indicates the inclusion of the image as file dialog in the main application. The image is included either in a canvas or in a label. Here we have included the image in the label. The image file is at first taken from the file dialog box using the code fg=fd.askopenfilename(). This image file is included in the label as a photo image with the following code fig=PhotoImage(file=fg). Next to create the application, a window is created with the following codes tk=Tk(), tk.title("Pulse Width Modulation using 555 Timer") and tk.geometry("1200×700"). The first code is to create the class, second code is to create window title and the third code is to assign the size. Then a label is created with the following code Label(master object,figure=fig).grid(row=value,column=value) where the figure is displayed. tk.mainloop() maps the application interface in the main loop. In this application we aim to design a pulse width modulator circuit using 555 timer IC. In 555 timer circuit, a square wave can be generated with the time period given by the following equation. = 0.69 × (1 + 2 × 2) × (1) Here the high and the low time intervals can be expressed with the following equations as follows. = 0.69 × (1 + 2) × (2) = 0.69 × 2 × (3) There is another term in PWM which is very important and that is the duty cycle. Duty cycle can be defined as follows. = × 100% = 0.69×(1+2)× × 100% = 0.69×(1+2×2)× The major limitation of the work is the database maintenance. To store the result data, local database system (1+2) (1+2×2) × 100% (4) (like Microsoft Excel or Access) is used. Central database can not be maintained such that the observer or the laboratory demonstrator can observe the results obtained by the participants. To achieve a perfect square wave, R2 is taken to be far greater than R1 i.e. 2 1. But in PWM, we need to vary the pulse width. Therefore R1 needs to be varied. Therefore in the application, There is a provision for varying R1. Figure 1 Application window for the virtual experiment In the application window, there is a slider by which R1 can be varied. To create a slider, the following code can be written sld=Scale(tk,from_=0.1,to=10,resolution=0.1,variable=x,l ength=300,orient=HORIZONTAL) and sld.grid(row=2,column=1). The first code creates a scale (slider) with the starting value (from_=0.1) 0.1 and the ending value (to=10) 10 with an increment of 0.1 (resolution=0.1). A variable x has been taken which is of double type (x=DoubleVar()). It takes the value after each sliding. The option length gives the size of the slider. There is another option orient which sets the alignment of the slider (horizontal or vertical). The second code is to set the position of the slider onto the application window. There are different layouts for positioning: (i) Grid layout, (ii) Box layout. Here grid layout has been used. To set the amplitude, a spinbox has been used. The spinbox can be created with the following codes spb1=Spinbox(tk,from_=1,to=10) and spb1.grid(row=1,column=1). The first code creates a scale (slider) with the starting value (from_=1) 1 and the ending value (to=10) 10. The second code is to set the position of the slider onto the application window. Here also grid layout has been used. To simulate for the waveform, there is a button. The following code can create the button Button(tk,text="Simulate",command=simulate).grid(ro w=3,column=1). The button caption can be set by the option text. When the button is triggered then command option is triggered which calls the method simulate(). Inside the simulate() method, the calculation for the pulse width is performed and the waveform is generated. To generate the waveform, three libraries are needed numpy, matplotlib and scipy. numpy is used to create the timing array for the waveform plotting. scipy is used to generate the square wave based on the timing array created by the numpy library. Finally matplotlib is used to plot and show the waveform. Figure 1 shows the application window for the virtual lab. Figures 2 and 3 show the application window before and after simulation. At firstthe amplitude and the resistor value (R1) is set. Then the Simulate button is pressed. Inside the button, the code for interfacing the hardware and the application is given. Figure 4 shows the waveform window after the simulation. It is created using the matplotlib library. When the button is pressed then the corresponding reading of the experiment is displayed in the LCD screen. To interface the application with the hardware pyserial library has been used. In the serial class, port number and the baud rate is given. The following code is to identify the hardware board=serial.Serial(COMX,baudrate). board.write(stringdata.encode()) converts the Unicode string (UTF-8 format) to byte and transfers to the microcontroller serial port. Figure 2 Parameters (amplitude, resistor value etc.) setting inside the application before simulation Figure 3 Results (amplitude, frequency and duty cycle) display inside the application after simulation (after the button is pressed) Figure 4 PWM waveform - HARDWARE APPLICATION USING MICROCONTROLLER - Microcontroller Programming Fundamentals In this work, as a microcontroller Arduino Uno AtMega328P has been used though Arduino Mega 2560 can also be used. Figure 5 shows the diagram for the microcontroller board. It is a 16MHz microcontroller and run by 5V volt DC power supply. The programming language used here is embedded C. For serial communication, the code Serial.begin(9600) is used. Here 9600 is the baud rate or the data transfer rate. Serial.readString() converts the byte code to Unicode string (UTF-8). The simulation reading from the application is taken as a string value. Here at a time duty cycle percentage and the amplitude are converted into integer and then into string inside application. The two string values are then concatenated (duty cycle + amplitude) and converted to byte form with the encode() method inside the application. In embedded C code, readString() method again converts byte code to string. This string is then converted to integer with the help of toInt() method which is inbuilt in the String class. The percentage of duty cycle and the amplitude is then separated from the integer reading and it is fed to the LCD module. row number. For our case, the device address is 0x27 (27Hex). The LCD module has 16 columns and 2 rows. At first we need to initialize the device with the method .init(). .backlight() method turns on the backlight for the display. .setCursor(column index, row index) sets the printing position of the LCD. .print(string or integer data) prints the data onto the screen. Figure 6 shows the duty cycle and the amplitude reading after the simulation when the Simulate button in the application is pressed. Figure 6 Amplitude and Duty Cycle Reading in LCD The following equation converts Celsius reading in Fahrenheit scale. = 32 + ×9 = 32 + 1.8 × (1) 5 where C and F are the values in Celsius scale and Fahrenheit scale respectively. Figure 5 Arduino Uno AtMega328P microcontroller board - Liquid Crystal Display (LCD) Liquid Crystal Display is used to display the reading following the command given by the application. Figures 7, 8 and 9 show the reading display of the LCD module. Basically LCD has 8 pins but here another I2C (Inter Integrated Circuit) module has been interfaced with the LCD such that the data from the 6 pins (excluding supply and ground pin) can be easily transferred by serial communication. In I2C module there are SDA (Serial Data Adapter) and SCL (Serial Clock) pins for serial communication. The library used for LCD display is LiquidCrystal_I2C.h. Here three parameters are required (i) device address, (ii) column number and (iii) - - CONCLUSION In this paper, we designed a virtual platform for PWM waveform generation. A desktop application was developed to create the virtual laboratory experiment. Moreover the reading of the experimental data was displayed onto a LCD screen through the microcontroller. The application was developed in python and the hardware interfacing with the microcontroller was achieved with the application was achieved with the help of a predefined library. The work was totally new to the best of the knowledge of the authors and so could not be compared with any other existing works. ACKNOWLEDGMENT The authors express their heartiest gratitude to the authorities of JIS College of Engineering for giving the opportunity to perform the research. REFERENCES - IIT Kharagpur, "Virtual Lab," [Online]. Available: https://www.vlab.co.in/participating-institute-iit-kharagpur. - IIT Guwahati, "Virtual Lab," [Online]. Available: https://www.vlab.co.in/participating-institute-iit-guwahati. - IIT Bombay, "Virtual Lab," [Online]. Available: http://vlabs.iitb.ac.in/vlab/.
https://www.ijert.org/virtual-laboratory-for-pulse-width-modulation-using-python-based-desktop-application
Background: The COVID-19 pandemic has highlighted prosocial behavior as a professional healthcare core competency. Although medical students are expected to work in the best interests of their patients, in the pandemic context, there is a greater need for ethical attention to be paid to the way medical students deal with moral dilemmas that may conflict with their obligations. Methods: This study was conducted in the spring semester of 2019 on 271 students majoring in health professions: medicine, dentistry, and veterinary medicine. All participants provided informed consent and completed measures that assessed utilitarian moral views, cognitive reflections, cognitive reappraisal, and moral judgment. Results: The healthcare-affiliated students who scored higher on the instrumental harm subscale in the measurement of utilitarian moral views were more likely to endorse not only other-sacrificial actions but also self-sacrificial ones for the greater good in moral dilemma scenarios. In particular, those engaged in deliberative processes tended to make more self-sacrificial judgments. The mediation analysis also revealed that the effect of deliberative processes on self-sacrificial judgments was mediated by cognitive reappraisal. Conclusions: These findings suggested that cognitive reappraisal through deliberative processes is involved when the students with utilitarian inclination make prosocial decisions, that it is necessary to consider both moral views and emotional regulation when admitting candidates, and that moral education programs are needed in the healthcare field.
https://snucm.elsevierpure.com/en/publications/the-effect-of-deliberative-process-on-the-self-sacrificial-decisi
Reading time: ~2 m Today, April 4, the well-known business publication Cointelegraph published the results of a recent study, the subject of which was the active development of the digital asset industry around the world. According to reports, the initiators of the survey were the founders of the Gemini crypto exchange – brothers Cameron and Tyler Winklevoss. Between November 2021 and February 2022, they managed to interview about 300,000 respondents in 20 countries. Given that the researchers’ primary goal was to gain insight into the rapidly growing digital asset ecosystem, all survey items included probing questions about the types and methods of investment preferred by citizens. Most notably, more than half (53%) of residents from India, Brazil and Hong Kong purchased their first cryptocurrency in 2021. This suggests, the report says, that the highest “influx” of new crypto users in the entire history of virtual money took place last year. The report, dubbed “The Global State of Crypto in 2022,” also speaks of an increase in the activity of crypto traders in Latin America and the Pacific region. Last year, about 46% and 45% of respondents, respectively, purchased cryptocurrency for the first time in their lives. The lowest number of traders added in 2021 was in regions where digital assets have always enjoyed high popularity. Thus, in the United States and European countries, the number of new cryptocurrency holders increased by only 40%. As for which countries are leading in terms of the number of crypto-supporters living in them, Brazil and Indonesia have become such. There, according to a survey, about 40% of all citizens are actively investing in digital assets. It is noteworthy that in the US this figure is 20%, and in Europe and Australia – 17%. In conclusion, it is worth adding that a fairly high level of ownership of cryptocurrencies is recorded in Singapore, Israel and the United Arab Emirates. In these countries, about 35% of the population owns virtual money. As a reminder, we previously reported that, according to a recent survey, the number of crypto-supporters in Germany has significantly increased over the past year.
https://bt-crow.com/2022/04/04/in-india-brazil-and-hong-kong-the-number-of-holders-of-digital-assets-has-reached-an-all-time-high-report/
From Tom Morello's MasterClass Aimed towards beginner players, Tom demystifies the pentatonic scale and the blues scale to help you start improvising solos. Topics include: Find the Key Center The Pentatonic Scale • Moving the Pentatonic Scale • The Blues Scale Aimed towards beginner players, Tom demystifies the pentatonic scale and the blues scale to help you start improvising solos. Topics include: Find the Key Center The Pentatonic Scale • Moving the Pentatonic Scale • The Blues Scale When it comes to playing guitar, what you put into it is what you get out of it. You practice technique to get your fingers to go where you want them to go. You practice theory to understand where they can go and why. If you want to get a level of technique and ability and skill, you really have to put in the work. There's no two ways about it. You can't escape from doing that. Now, that's not to say that a guitar player like Joe Strummer or Johnny Ramone, who are two of my favorite guitar players, who had no technique and no theory but had a great rock-and-roll spirit and vibe are not spectacular musicians. And if you want to be one of them, then please do. And I look forward to listening to your record. But what we're talking about here is pushing through to a different level of an understanding of the instrument to unlock a kind of creativity and ability that will allow you to have no boundaries and no horizons to what it is that you can play. So first of all, is music theory necessary? Well, I'd say formal music theory absolutely is not. I was a pretty fine guitar player without having any idea what any note, chord, mode, triad was called on the guitar. I played probably 10,000 hours before ever learning the name of a scale that I was playing. During that time, I did stumble on by just sort of following my ear the stuff that made sense to me later on I found had names that were applicable in music theory. I'm quite confident that Angus Young has never cracked a music theory book. And he's probably one of the greatest of all time. So is it necessary? No. But is it an option that you can use to make music that you might hear in your head or make music that you haven't imagined yet? Then absolutely. There are channels to do that, and that's what we'll talk about now. Use them as you see fit. I found that when I began putting names and filling in the blanks of what I had stumbled upon as music theory, it was tremendously helpful in my songwriting, in my soloing, in my love and appreciation of playing guitar. [MUSIC PLAYING] I was a person that disdained and feared music theory. And so if you're fearful of music theory, then this is the correct time to listen, because I'm going to teach it to it in a way that's going to be a lot of fun. And it's going to unlock the fretboard that's going to allow you to play solos and write songs and riff from one end to the other with a minimal amount of suffering. What we're going to talk about now is the practical application of scales. And the first part is going to be for beginners, and what I also taught to my guitar students back in the day. On the very, very first day, I would have them improvising guitar solos. So I'm going to teach you beginners how to improvise a guitar solo right now, OK? So the first thing we're going to do that you always have to do in order to play a solo that sounds musical is identify the key center. So we're going to play one of the bits of music that ... Tom Morello is a two-time Grammy winner and one of Rolling Stone’s "greatest guitarists of all time." In his first online guitar class, the co-founder of Rage Against the Machine will teach you the riffs, rhythms, and solos that launched his career and sent his music to the top of the charts. Tom will share his approach to making music that challenges the status quo and teach you how to create your own musical style. Outstanding course. Tom teaches you how to become an artist through the use of guitar. Ideas and inspiration rule the day here! Thanks Tom! Very practical masterclass, Tom is very clear, direct and honest. Theoretical and practical information very useful. I learned more about the process of becoming a better guitar player. I was also reminded of how important it is to be creative and authentic with my writing and performance. A truly masterful masterclass. Tom Morello is equal parts inspirational, educational, and sensational. A very well-spoken teacher gifted at getting to the heart of the matter, no matter the topic. Tom mentions Joe Strummer here. "Joe Strummer: The Future is Unwritten" is a great documentary, if you haven't seen it. After banging away at E minor pentatonic for awhile, I couldn't get my head around what you do with it. TM helped a lot by show-do method. Nice one, and thanks. This was my favorite lesson so far. I played with the back track and had so much fun on the pentatonic scale. Fun to have that kind of a homework assignment. This is my first ever experience at playing guitar....ever. Its been 6 weeks and the lesson on practice was daunting, but Tom is so right. Such a joy in my life to take time to learn electric guitar. I'll never get to 8 hours like Tom in his prime, but my goal is 30 mins a day! Thanks Tom! This is the first scale I learned about 25 years ago and I still use it a lot. Tom did a great job at explaining something complex in a very simple way. Some comments, I would like to share about the pentatonic: 1) It has 5 notes (that is the reason of the name ) 2) A key center naturally attracts 7 notes, and among those 7 notes, there are 5 that tend to work better in the different chords that belong to that specific key center. Those 5 notes are the pentatonic scale and therefore that is the first scale every guitar player learns! 3) The shape of the scale presented by Tom in A, is in fact a minor pentatonic shape, that will work well in Aminor and Cmajor. I’ve been playing for 25 years, and I never took the time to study and dig into scales and theory. This is probably why I have not been able to elevate my skill level and innovation. I’ve learned more in the last 24 hours than I have in the last decade, and can’t wait to see the world that scales and theory opens up for me moving forward. Oh, and my new whammy pedal practically makes me a member of RATM. Off topic, but as soon as I heard that opening melody from "Settle for Nothing" I had to bust out my notebook and ended up with a page of verse I can't help but hear in Zach's voice... Probably not a finished song (I may have to tweak on POV/verb tense) but it's my proudest verse to date and that alone was worth $90 to me! I know we’re not strictly focussing on music theory, but the A# in the G pentatonic is actually a Bb. It’s the same sounding pitch, but the name is wrong in context. There’s no benefit to giving it the wrong name even if people are being free and easy with the music theory side of things. One of the most exciting things for a beginner is to be able to play a solo first time out. Of course it assumes you can hold down strings without buzzing and be able to pluck with a pick. But to be able to move into solos can be an eye-opener for someone who only knew how to play chords. I'm lovin this class! Is there somewhere where you can download the audio tracks that you would solo over? I see that the workbook has the chords for those tracks and I thought he said something about being able to play over a continuous loop. I am sure I can find something on You Tube but wanted to check here. Thank you Tom!!! I just have a question in regards to the workbook, where it displays the diagrams of the 5 patterns are they the 5 different pentatonic patterns only? Im just not sure as it says "Study and learn the different positions of the pentatonic and blues scales as shown in the below diagrams." And is there only 1 pattern for the Blues Scale in which Tom discusses during the lesson? I'd immensely appreciate any advice.
https://www.masterclass.com/classes/tom-morello-teaches-electric-guitar/chapters/beginner-theory-pentatonic-and-blues-scales
Data visualization can help you see the trends in your data. Through custom dashboards or other schematic forms, you can truly see what’s affecting your business and how to bring about positive change. Trends, information, insights, and other business analytics can be conveyed more clearly and effectively with graphical representations used in data visualization. This allows you to get the point across more quickly to enable greater internal collaboration and better decision-making. Below are just a few samples of different ways you can view data.
https://essextec.com/big-data-analytics/business-intelligence-reporting/data-visualization
Spencer interviews producer Bonnie Arnold from the animated adventure How to Train Your Dragon 2 at SIFF 2014. Bonnie Arnold, Dances with Wolves, Dean DeBlois, Disney, DreamWorks Animation, How To Train Your Dragon, How to Train Your Dragon 2, How to Train Your Dragon 3, Jeffrey Katzenberg, John Lasseter, Over The Hedge, Pixar Animation Studios, Steve Jobs, The Addam's Family, The Last of the Mohicans, The Mosquito Coast, Toy Story, Walt Disney Studios Motion Pictures About Spencer Fornaciari Spencer was born and raised in New Mexico. He grew up with the many great films of the 1980’s before having his world rocked after seeing The Usual Suspects. He moved to Washington State to go to the University of Washington, and currently any free time he currently has is split between working on film projects and watching films. Follow him on Twitter or email him.
https://macguff.in/macguffin-content/siff-interview-bonnie-arnold-train-dragon-2/
Sanassee Ingrid (°1982, Port-Louis, Mauritius) creates media artworks, drawings and conceptual artworks. By manipulating the viewer to create confusion, Ingrid finds that movement reveals an inherent awkwardness, a humour that echoes our own vulnerabilities. The artist also considers movement as a metaphor for the ever-seeking man who experiences a continuous loss. Her media artworks isolate the movements of humans and/or objects. By doing so, new sequences are created which reveal an inseparable relationship between motion and sound. By using popular themes such as sexuality, family structure and violence, she makes works that can be seen as self-portraits. Sometimes they appear idiosyncratic and quirky, at other times, they seem typical by-products of American superabundance and marketing. Her works are saturated with obviousness, mental inertia, clichés and bad jokes. They question the coerciveness that is derived from the more profound meaning and the superficial aesthetic appearance of an image. By investigating language on a meta-level, she often creates several practically identical works, upon which thoughts that have apparently just been developed are manifested: notes are made and then crossed out again, ‘mistakes’ are repeated. Her works focus on the inability of communication which is used to visualise reality, the attempt of dialogue, the dissonance between form and content and the dysfunctions of language. In short, the lack of clear references are key elements in the work. By contesting the division between the realm of memory and the realm of experience, she wants the viewer to become part of the art as a kind of added component. Art is entertainment: to be able to touch the work, as well as to interact with the work is important. Her collected, altered and own works are being confronted as aesthetically resilient, thematically interrelated material for memory and projection. The possible seems true and the truth exists, but it has many faces, as Hanna Arendt cites from Franz Kafka. By questioning the concept of movement, she tries to grasp language. Transformed into art, language becomes an ornament. At that moment, lots of ambiguities and indistinctnesses, which are inherent to the phenomenon, come to the surface. Her works are based on inspiring situations: visions that reflect a sensation of indisputability and serene contemplation, combined with subtle details of odd or eccentric, humoristic elements. By creating situations and breaking the passivity of the spectator, she often creates work using creative game tactics, but these are never permissive. Play is a serious matter: during the game, different rules apply than in everyday life and even everyday objects undergo transubstantiation. Her works are characterised by the use of everyday objects in an atmosphere of middleclass mentality in which recognition plays an important role. By parodying mass media by exaggerating certain formal aspects inherent to our contemporary society, she absorbs the tradition of remembrance art into daily practice. This personal follow-up and revival of a past tradition is important as an act of meditation. Her works often refers to pop and mass culture. Using written and drawn symbols, a world where light-heartedness rules and where rules are undermined is created. By taking daily life as subject matter while commenting on the everyday aesthetic of middle class values, she touches various overlapping themes and strategies. Several reoccurring subject matter can be recognised, such as the relation with popular culture and media, working with repetition, provocation and the investigation of the process of expectations. Her works are on the one hand touchingly beautiful, on the other hand painfully attractive. Again and again, the artist leaves us orphaned with a mix of conflicting feelings and thoughts. Sanassee Ingrid currently lives and works in Paris.
https://500letters.org/form_15.php?naam=ingrid_sanassee
Gait Trainer Market Growth Probability, Leading Vendors and Future Scenario up to 2020 Future Market Insights (FMI) presents its new, comprehensive study on the Global Gait Trainer Market spanning from 2020 to 2028. Researches at FMI have no left no stone unturned in bestowing readers a comprehensive view of the market, by studying the drivers, trends, challenges, and restraints. Backed by historical data and projected data, the report breaks down the vast study into numerous geographies and end-use segments, among others to condense the research. Analysts at FMI have employed in-depth analysis to offer a lucid understanding of the market and the factors shaping its growth trajectory. Ranging from macro socio-economic factors to micro geography-specific trends, the research has taken into consideration every facet that is likely to play a vital role in the growth of the market in the years to come. Presenting a plethora of valuable information, the report will serve as an effective tool, guiding the market players in making fruitful decisions in the forthcoming years. To ease the understanding of the reader, the report uses CAGR to represent the growth of the market and individual segments. According to the study, the global Gait Trainer market is forecasted to grow at a CAGR of ~4.9% during the assessment period. Sample of Research Report @ https://www.futuremarketinsights.com/reports/sample/rep-gb-2213 Impact of COVID-19 on Gait Trainer Market The unforeseen outbreak of COVID-19, which swiftly metamorphosed into the pandemic of unexpected proportions, has shifted the world’s focus towards the healthcare sector. National governments are closely working with healthcare institutions and pharmaceutical companies to provide effective treatment to patients suffering with the infection. As a result, there has been a reorientation of medical priorities across healthcare institutions with treatment for COVID-19 patients being the utmost priority. This is sure to impact the growth of the Gait Trainer market through the pandemic period. FMI’s report includes a dedicated section expounding both the short-term and long-term impact of the pandemic on the Gait Trainer market. The study is shaped to bolster stakeholders in making the right decisions to mitigate challenges and leverage opportunities through the pandemic. Why Choose Future Market Insights? - Serving domestic and international clients 24/7 - Prompt and efficient customer service - Data collected from reliable primary and secondary sources - Highly trained and experienced team of research analysts - Seamless delivery of tailor-made market research reports Gait Trainer Market: Segmentation To simply the gargantuan study, the report is segregated on the basis of different segments. End User - Hospitals - Rehabilitation Center - Homecare Setting Product Type - Gait Trainer Walker - Adult - Pediatric - Treadmill System - Exoskeleton By Region: - U.S. - Canada - U.K. - Germany - France - Italy - Netherlands - WesternEurope - EasternEurope The aforementioned segments are studied with respect to each individual region, considering the region-specific trends, drivers and restraints. Request for covid19 Impact Analysis @ https://www.futuremarketinsights.com/ask-question/rep-gb-2213 Key Questions Answered in FMI’s Gait Trainer Market Report - Which region is anticipated to hold a prominent market share over the forecast period? - What will be the key driving factor propelling the demand for Gait Trainer during the forecast period? - How current socio-economic trends will impact the Gait Trainer market? - What are the growth strategies implemented by prominent players in the Gait Trainer market to maintain their foothold in the competitive landscape? ABOUT US: Future Market Insights is the premier provider of market intelligence and consulting services, serving clients in over 150 countries. FMI is headquartered in London, the global financial capital, and has delivery centers in the U.S. and India. FMI’s research and consulting services help businesses around the globe navigate the challenges in a rapidly evolving marketplace with confidence and clarity. Our customized and syndicated market research reports deliver actionable insights that drive sustainable growth. We continuously track emerging trends and events in a broad range of end industries to ensure our clients prepare for the evolving needs of their consumers. CONTACT US: Mr. Abhishek Budholiya Unit No: AU-01-H Gold Tower (AU), Plot No: JLT-PH1-I3A, Jumeirah Lakes Towers, Dubai,
https://www.pharmiweb.com/press-release/2020-10-21/gait-trainer-market-growth-probability-leading-vendors-and-future-scenario-up-to-2020
Fannie Mae has provided clarification and additional information regarding the new valuation risk management tool, Collateral Underwriter (CU). Fannie Mae has created a fact sheet, FAQs, and On-Demand eLearning courses recommended for industry stakeholders that are provided through Fannie Mae’s CU web page. Clarification about the tool includes: - CU is only offered by Fannie Mae. - CU does not issue credit decisions. - CU does not provide an estimate of the value. - CU identifies risk factors using a numerical risk score of 1.0 to 5.0 and returns a message, or flag, which specifies the aspects of the appraisal that may need further attention. - The analysis provided by CU is for exclusive use by the lender and may not be used in a way which may interfere with the independent judgment of the appraiser. Lenders are not allowed to provide any CU report to the appraisal management company or appraiser according to the CU licensing terms. Appraisers who provide accurate data to make their valuations should not feel a negative impact as a result of the implementation of this tool. CU is provided at no cost to lenders and is a voluntary tool available to Fannie Mae-approved lenders. It was created to provide an automated appraisal risk assessment to help lenders more effectively judge the quality of the appraisal. Additional information is provided through Lender Letter LL-2015-02, which is available on the Fannie Mae website. We look at industry happenings and updates every week.
https://www.mortech.com/mortechblog/fannie-mae-provides-clarification-regarding-collateral-underwriter
The beginning of Pixar is traced back to 1984 when John Lasseter the Chief Creative Officer of Disney and Pixar joined the computing machine artworks division of Lucasfilms. Two old ages subsequently Steve Jobs bought this unit and renamed it Pixar that went on to bring forth award winning short movies, commercials and docudramas. The Company expanded its originative potencies to do its first computing machine animated film, Toy Story in 1995 that marked the beginning of a new epoch in life movie industry. Pixar re-defined the significance of success with major victory in the signifier of The Incredibles, Finding Nemo, Toy Story 2, and many others to follow. The Company was acquired by Disney in the twelvemonth 2006, a strategic confederation that expanded the originative potencies of Pixar to farther highs. The success of the company has been termed as dramatic and inspirational for other houses in the originative industry section. The much talked about Pixar civilization provides an interesting penetration into how an organisation can foster the originative endowments of its employees across different degrees. Research issue The research paper explores the different dimensions of the Pixar civilization and its unfastened door policy to understand the ways in which the organisation has expanded its originative potencies to go one of the most advanced organisations in the industry. The aim of the paper is to analyze the impacts of the people direction patterns adopted at Pixar in advancing a originative work environment. Theoretical analysis model Theoretical analysis provides any research work with the necessary facts and grounds that support the research findings and deductions. In this subdivision, the paper will concentrate on analyzing the organisational civilization of Pixar through two typical theoretical accounts – the “ organisational aesthetics theoretical account ” and “ Handy ( 1985 ) or Harrison ( 1972 ) Model of civilization. ” The survey of these two theoretical dimensions enable a deeper penetration and apprehension of how the structural design and patterns within an organisation shapes its workplace environment and employee attitudes. The survey and apprehension of these two theoretical dimensions have been used to analyze the Pixar civilization that promotes creativeness through an enabling work civilization. Organizational aesthetics theoretical account “ Aestheticss offers a new expression into organisations, and a expression at alternate ways of showing and doing significances that deeply influence organisational interactions, behaviors, and apprehensions ” ( Taylor & A ; Hansen, 2005 ) . Aesthetics relate to our senses and contextual experiences that shape our cognition and beliefs. Organizational activities and schemes are to a broad extent influenced by the societal and contextual environment in which they exist. “ The implicit in premise of the aesthetic attack to the survey of organisations is that, although an organisation is so a societal and corporate concept, it is non an entirely cognitive one but derives from the knowledge-creating modules of all the human senses ” ( Linstead & A ; Hopfl, 2000 ) . Harmonizing to this attack organisations are created through the re-definition and application of cognition processing accomplishments that are harnessed for productive additions. Since the organisational procedures are widely impacted by the single perceptual experiences, attitudes, beliefs, sentiments, values and contemplations of the work force that drive operational efficiencies. These are indexs of organisational aesthetics that bind the assorted elements into a more cohesive construction that helps in the production of goods and services for the larger community. Recent Trend in Organization Aestheticss The significance of such theoretical accounts is underlined by the increasing diverseness of the work force in present concern environment and the troubles faced in incorporating the accomplishments of persons from varied cognition sectors to develop a individual merchandise. Research surveies have established that an apprehension of the organisational aesthetics can assist in bettering managerial abilities to take the squad towards a more effectual public presentation. Surveies have revealed that the apprehension of organisational aesthetics can assist directors to place the parametric quantities of how to analyze and near any issue. This peculiar facet enables the organisation to prosecute a scheme good defined and supported by an apprehension of human values and dimensions that impact work public presentation. Organization Aestheticss in Pixar Bill Capodagli, the writer of “ Innovate the Pixar Way: Lessons from the World ‘s most Creative Corporate Resort area ” in an interview with the Enterpriseleadership.org ( 2010 ) stated that Pixar has “ a set of deeply rooted values that title-holder excellence, tap invention, and promote coaction. ” Following this observation, it can be inferred that the organisational patterns and schemes adopted by Pixar have been a critical factor in advancing its originative endowments. The inquiry that this observation raises is what sort of organisational design and patterns Pixar has that promotes such creativeness. Organizational construction plays a critical function in fostering single endowment and supplying the employees with the chance to present their true potencies Edgar Schein in 1985 observed that organisations can be loosely categorised into two types – Organization A that adopts an unfastened environment facilitated by free flow of communicating and less formal ambiance ; and organisation B that supports a closed door construction featured by formal work processs and low interactivity among employees. Pixar belongs to the Organization A type that exhibits an unfastened civilization ( Schein, 2004 ) . This sort of organisation supports squad based work civilization. The success expression of Pixar is based on squad work, coaction and free flow of communicating between persons. The high degree of interaction and flow of communicating within the organisation is promoted by its level organisational construction. The organisation is founded on singular direction patterns that discourage hierarchal system of describing. The non hierarchal organisational construction promotes duties and motivates the employees to set in their best at work ensuing in high acting organisations. However, such work civilization demands strong committedness and high degree of energy from the employees. The operating rules of Pixar is based on freedom to pass on with anyone, a work environment that is safe for everyone to offer thoughts, and remaining near to inventions go oning in the academic community ( Catmull, 2008 ) . The originative focal point of the organisation has been on tackling its human resource potencies to the optimum through the application of aesthetic organisational rules ( McElroy & A ; Morrow, 2010 ) . This involves supplying its employees with a work environment that is most informal with all comfortss and luxuries that enable the stimulation of the originative senses of the work force ( Buzalka, 2006 ) . The company adopts a non-hierarchical organisation construction that encourages associates to actively take part in the determination devising procedure at all phases. The organisation supports employee authorization in the signifier of supportive direction patterns that focuses on employee accomplishments development and advancing participative leading manner. The deficiency of formal coverage lines and answerability of employees is compensated with wise mans who assist the new comers into the organisation and steer them through assorted phases of calling patterned advance. The ability of the organisation to make and prolong invention at work is dependent on velocity, transparence and answerability ( Hamilton, 2005 ) . Organizational design is to a big extent guided by the flow of information across assorted degrees and sections. Entrepreneurs re-engineer concern processes to suit a level signifier of organisation construction that necessitates free flow of information and cognition to the work force. Organizational construction plays a polar function in finding organisational civilization and values, communicating lines and the extent of employee engagement in determination devising procedure. The degrees of coverage and answerability model of a company determine the corporate civilization and work environment bing within the company. In current concern context, entrepreneurs re-engineer concern processes to suit a level organisation construction that necessitates free flow of information and cognition to the work force. Knowledge and learning civilization forms the key to concern success in today ‘s competitory industry. Pixar has managed to leverage bing engineering tools to make competitory advantage through heightening its competences and accomplishments to accommodate to new systems and innovate work procedures for establishing and making new thoughts. The effectivity of such work procedures is mostly impacted by employee accomplishments, competences and entree to relevant information. In the organisational context, cognition is a tool that helps the organisation to accomplish strategic ends and aims. These ends include bring forthing a repute for proficient expertness, interpreting expertness into new concern thoughts, deriving new experience in specific countries to accomplish cost advantage and optimal usage of internal resources. At Pixar the unfastened organisation design facilitates interaction between employees that promotes teamwork. Such enterprises contribute to organisational productiveness by supplying the employees with a suited physical environment to work in. Pixar presents a all right blending of acquisition and squad work assisted by an unfastened organisational design that enables the company to turn over out new thoughts and originative merchandises for their mark audience. Advantages of Organizational Aestheticss Workplace design and physical office environment plays a important function in heightening organisational productiveness and public presentation. Research surveies have concluded that “ betterments in office design and direction are non the lone consideration for organisational productiveness, but they have an of import function to play ; offices should be considered as a possible plus instead than merely a infinite to house employees ” ( Charles & A ; Zweirzchowski, 2004 ) . Organizational aesthetics take into history the demand for planing workspaces to run into the work procedure demands. Adequate infinite planing for privateness of work, unfastened office programs to advance teamwork and interaction between colleagues support the organisational ends by supplying the employees with the coveted workspace. Technology has created new outlooks and influenced consumer behaviour to include a broad gamut of options and possibilities that can be explored by organisations to establish new tendencies and scope of merchandises. Such concern theoretical accounts are supported by increased coaction and interaction between employees across different sections. The unfastened design office construction supported by Pixar enables the employees to pass on and discourse freely the work issues and inside informations. Discussions and deliberations on work issues are effectual in advancing work efficiency and enable the companies to come up with million dollar thoughts. The right mix of design and functionality while be aftering office infinites can hold a positive impact on organisational productiveness and public presentation through reduced operational costs in the signifier of shared resources and effectual teamwork. Types of office design The conventional office design and workplace layout have undergone monolithic transmutations over the past few decennaries. The old subdivisions have elaborated on the significance of organisational aesthetics in developing originative potencies within the house and the analysis highlights the impacts that structural design has on employee productiveness and public presentation. Efficient workplace design can positively impact employee motive degrees and satisfaction. Theoretical models in this context have emphasized the significance of workplace design and office layout programs in back uping organisational ends, work procedures, advanced civilization and concern values. Bill Capodagli in an interview with the Credit Union Magazine late commented that the success behind Pixar lay in its conceptualization of a corporate resort area that enabled its employees to loosen up and bask within the organisation. “ When you go at that place, you may see people playing football or swimming in an Olympic sized pool. It has created an ambiance where work is fun – working difficult and playing difficult ” ( Capodagli – Credit Union, 2010 ) . Pixar has adopted an unfastened office design that enables its employees to portion thoughts, gestate new designs and originate new patterns for effectual consequences. An analysis of the effectivity of the office design theories put frontward by Duffy ( 1997 ) reveals interesting penetrations into the Pixar theoretical account. Duffy ( 1997 ) in his plants had proposed four distinguishable types of office design viz. – lair, nine, hive and cell. The matrix given below illustrates the extent to which these four office design types support interaction and liberty in organisations – The work civilization at Pixar shows a high grade of squad work and interaction between employees. The organisation as studied in the old subdivisions supports a participative determination doing procedure. The day-to-day work of the employees is reviewed by equals and directors for measuring the effectivity of results ( Capodagli, 2010 ) . Hence the work environment at Pixar supports limited liberty combined with high degree of interactivity that is characterized by the Den office design as postulated by Duffy ( 1997 ) . The effectivity of such office design is emphasized by its part in motivation and animating employees towards creativeness. Such workplace design harmonizing to Van der Voodt ( 2004 ) promotes a crystalline organisational construction, enables employee authorization, encourages squad work, promotes larning, facilitates free flow of information, allows increased coaction at work and creates a motivational environment. It can be inferred from the above treatment that organisational design and workplace layout must concentrate on enabling increased collaborative environment within the sections and hierarchies. Organization Culture and Workplace Environment The old subdivision highlighted the significance of organisational aesthetics and workplace design in determining the Pixar work civilization. However, the analysis of the success mantra of Pixar can non be complete without an penetration into its organisational civilization that is reflected in its workplace environment. Organization civilization defines the organisational belief, values and norms shared by the employees. An organisation is shaped by the civilization that predominates in work environment, employee behavior and managerial attitude. Pixar adopts an organisation civilization that defies all traditional theories related to pull offing and running a concern constitution. Conventional direction patterns focused on bureaucratic controls and centralized determination devising system that demarcated typical functions for each persons. The germinating constructs of organisational civilization and patterns focus more on employee public assistance and development programs that inspire the work force to expose proactive behavior at work. One of the typical challenges faced by all organisations today is actuating its employees to accomplish higher degrees of public presentation and construct a work clime that induces positive attitude to work amongst its employees. Motivation is a cardinal country where the organisational direction demands to stand out in order to accomplish a high grade of employee creativeness accomplishments in work outing concern jobs. Opportunity oriented, wages oriented, freedom to research and work on their ain are some of the factors which contribute to a high grade of motive which gives solidarity to the company and promotes a good organisational civilization. A high grade of employee motive ensures that employees work freely and without reserves in accomplishing their coveted ends. They are besides given the freedom to work on their ain to let originative thoughts and therefore advanced patterns to turn. This would non be possible in a restricting environment where the employees do non hold the room to develop and turn their intrinsic creativeness accomplishments. Pixar adopted the advanced and originative attack to spread out its market potencies and derive new evidences in an emerging industry. The boosters of the Company ensured that the squad based work attack promoted originative endowments of its employees and nurtured the potencies of the work force through an enabling corporate acquisition environment. “ This is a new sort of film studio that non merely invents its ain engineering, much like a whiz-bang Silicon Valley Company, but besides comes up with new production methods and organisational inventions that conveying unheard of subject to the brainsick concern of doing films ” ( Schlender, 2004 ) . Model of civilization Different theoretical accounts of organisational civilization have been proposed by research workers and academicians. Such theoretical accounts provide the footing for understanding the context in which organisations operate within the bing concern environment. One of the theoretical accounts proposed by Roger Harrison ( 1972 ) suggested that organisational civilization is chiefly of four types that include power, function, task/achievement and person/support ( Cartwright & A ; Cooper, 2000 ) . This theoretical account was farther researched by Handy to supply four typical classs of organisation civilization. The four classs have been identified as function civilization, power civilization, individual civilization, and task civilization. The function civilization reflects bureaucratic organisation that takes into history the processs and place of employees to specify the bing work civilization. The power civilization is influenced by the control of persons at the caput who run the whole show for the concern. The individual civilization is shaped by the leader-subordinate relationship that accounts for the bing work civilization. The task civilization is based on impact of single cognition and expertness that influences the work civilization and environment ( Itzen & A ; Nerwman, 2005 ) . The organisational civilization displayed at Pixar focuses on increased coaction and squad work civilization. The creativeness at Pixar is “ fostered day-to-day by an unfastened collaborative ambiance in which every member of the squad is engaged in the procedure and commited to a common end – in this instance, a good entertaining narrative ” ( Kiedaisch, 2010 ) . The company adopts an incorporate attack towards its people development schemes based on group larning enterprises and squad work focal point. One of the mechanisms adopted by organisations today is the support of squad work that provides the persons with the liberty and freedom to move harmonizing to the demand of the hr. Teams at Pixar are an built-in portion of operational procedures and the organisation relies extensively on squads to execute strategic maps. The squad acquisition procedure is non merely advanced and animating to the members but it besides helps the organisation invent new schemes and originative thoughts that can work admirations for the concern. Hence it can be concluded that Pixar shows undertaking civilization where single expertness and accomplishments are integrated with organisational capablenesss and resources to bring forth new thoughts and merchandise designs. The task civilization brings persons working on specific undertakings together to lend to the completion of a bigger undertaking. The work attack focuses on finishing the occupation at manus successfully and more accent is given to a collaborative attack that necessitates the coming together of otherwise skilled people to carry through the end. Hence this sort of work civilization promotes an informal work environment where determination devising is normally reached through treatments and consensus between the employees. This type of work civilization is besides characterized by increased interaction and exchange of information between members. Suggested applicable solutions “ In order for an organisation to stay relevant and to vie in chase of its mission, direction of organisations must pay attending to both terminals of the procedure, bring forthing originative thoughts often and using its invention procedure to recognize the possible value of those thoughts ” ( McLean, 2005 ) . Organizations operating in a competitory concern environment depend on invention and creativeness through the acceptance of latest engineering tools and applications to drive market advantage in their favor. Management of engineering and its wise application in work procedures facilitate the houses to present high quality merchandises and superior work public presentation that is driven by an enabling work civilization. Adopting work patterns that promote creativeness and invention within houses can be a ambitious undertaking since the application of such concern theoretical accounts are impacted by the human resource schemes, managerial capablenesss and resource handiness ( Gilmartin, 1999 ) . Studies of such concern theoretical accounts in originative organisations have proved the effectivity of these schemes that promote invention and a positive work civilization within the work force. An analysis of the competitory industry environment provides a clear image on the bing market environment and its current tendencies. The impulsive economic forces that guide the market motions and emergent engineering tendencies are important to the analysis of markets and assist organisations like Pixar to specify appropriate schemes to retain competitory advantage. Futuristic engineerings are envisioned to make better and increased public-service corporation of bing merchandises and services for improved applications and heightened consumer satisfaction. However, the effectual use of such engineering tendencies depends on the creativeness of its work force. Creativity contributes to the coevals of new thoughts and aid companies in separating their merchandises and services from their rivals in the market. Prosecuting a originative organisation attack must concentrate on developing the human resource of the organisation. Decision The analysis of Pixar work civilization and organisational aesthetics have highlighted some important points in context of beef uping the advanced capablenesss of a company. While office workspace design and construction play a important function in act uponing a positive work environment the function of organisational civilization and strategic patterns affecting squad work, participative leading attack and employee authorization in advancing creativeness among employees can non be ignored. The guiding rule behind managerial schemes and focal point of the organisation has been fostering relationships and edifice trust among employees that helps in making an good-humored and originative work environment. “ If we get that right, the consequence is a vivacious community where talented people are loyal to one another and their corporate work, everyone feels that they portion of something extraordinary, and their passion and achievements make the community a magnet for gifted people coming out of schools or working at other topographic points ” ( Catmull, 2008 ) .
https://graduateway.com/the-company-culture-of-pixar-animation-studios/
PURPOSE: To realize the substrate holder which can retransfer a substrate from a substrate holder to a substrate washing jig with a simple operation and the substrate washing 1 CONSTITUTION: This substrate holder 1 consists of a pair of clamping bands 11, 12. These clamping bands 11, 12 respectively have three pieces of projecting parts 15 to 20. The two clamping bands 11, 12 are fastened to each other by means of fastening bolts 13, 14 and nuts 13a, 14a, by which the respective projecting parts 15 to 20 are brought into pressurized contact with the outer peripheral edge W of the substrate W. The respective projecting parts 15 to 20 project by a prescribed extent inward in the diametral direction of the above-mentioned clamping bands 11, 12 and intermittent annular space parts A having a width t are formed between the clamping bands 11, 12 and the substrate W. Supporting rods 35, 36 of the substrate washing jig are inserted into these space parts A and after the substrate is supported by these rods, the substrate holder 1 is removed from the substrate W at the time of retransferring the substrate W from the substrate holder 1 to the substrate washing jig. COPYRIGHT: (C)1994,JPO&Japio
Interested in taking lessons with Jacalyn? My name is Jacalyn (Jacki) McNeil. I have lived in the Folsom area, with my husband of 47 years, since 2004. We share our home with our miniature schnauzer, BeckyJo. (Becky is crated during lessons.) I have taught piano for the past 19 years. When I was in the fourth grade, I received a piano for my birthday. An elderyly lady in our church, Mrs. Bollier, was looking for a good home for her piano, and my parents decided it would be ours. What excitement I felt when I saw that PINK piano on the back of a pick-up truck. Yep--pink! Of course, it wasn't long before my mother refinished it; after all, it was in our living room! When I was in high school in Western New York, students needed to have a major to graduate. Mine was music. During my four years of high school, I was the accompanist for the Advanced Chorus. I've also been a church pianist/organist and have accompanied choirs, soloists, vocal groups and played at weddings and funerals. I attended Cedarville College (now University) in Ohio for music, with a major in voice and minor in organ. My passion is teaching. To see the light in a student's eyes when a concept is grasped is the utmost reward for me. Most students are going to take piano lessons because they just want to have fun. I love to teach the younger kids, but my students are also teenagers, moms, dads, singles; I even had a retired female Army officer several years ago! That was sure a challenge--loved every minute of it, and by the way, we're still good friends. In the past, I have taken very young students (ages 5 and 6). Due to my current student load, the earliest age I now accept is 7 years, or second grade. My goals for each student are to learn responsibility, by forming a regular practice schedule; respect (as well as manners) through interaction with me; and most of all, to have fun with music. The last thing I want is for a student to think that practicing and attending a lesson are torture! I desire a stress-free atmosphere in the home when it comes to practicing, as well. Therefore, if necessary, I will work with the parents to establish a doable practice schedule. Lessons are $25 for 30 minutes. I count the number of lessons taught during the year (September through May), multiply that number by $25 and divide by 9 months. Example: 32 lessons x $25 = $800 ./. 9 = $89.88. I round it up to $90/month. A three-lesson month will cost the same as a five-lesson month, each $90.00. Due to my student load, no make-up lessons are given, unless there is a cancellation by another student. I have a different set up during the summer months of June, July and August. During each one of those months, I take a week of vacation. The choices for summer lessons are: 1. take the summer off; 2. take lessons 2x/month ($50); or, 3. take lessons 3x/month ($75). Payments can be by personal check, cash, bank check mailed directly to me, PayPal or Venmo. The monthly fee is due at the first lesson of each month. I currently teach using the Faber's Piano Adventures Method Series and "Succeeding at the Piano" Series (Helen Marlais); both programs include Theory. I also enjoy it when students bring their own music. My students perform an annual Christmas recital, which has been held at the Harris Center-Three Stages Recital Hall, Folsom Lake College, for the past five years. The recital is scheduled on the second Thursday in December. I do not have spring recitals. A recital fee is charged: $25/student or $40/two siblings. I teach in my home, which is in the Broadstone area of Folsom (Oak Avenue and Riley). I do not teach in students' homes. I do not teach group lessons, but prefer to teach one-on-one. An interview with the student and parent(s) is required prior to scheduling a lesson day and time. I do not charge for the interview and also do not have any registration or set-up fees. Students reimburse me for any music I buy them. I do require each student to have a metronome. Please contact me, and I'll be happy to set up an interview time with you and/or your child. I am contracted as an outside vendor with Charter University Prep, Visions in Education (home-schooled children) and Innovation Education Management (South Sutter Charter School) and can be paid through their voucher programs, if you so choose. I have a City of Folsom business license and have passed the Live Scan, which means I have been cleared by the FBI and the DOJ to teach children in my home. I am excepting new students, though at this time, space is very limited. References are available upon request.
http://www.learningmusician.com/Jacki
17 December 2019 Continually logging and re-growing tropical forests to supply timber is reducing the levels of vital nutrients in the soil, which may limit future forest growth and recovery, a new study suggests. This raises concerns about the long-term sustainability of logging in the tropics. “Old-growth tropical forests that have been... 12 December 2019 We are laying waste to the biosphere. If we're serious about saving millions of species, then it's our own that must change how it thinks about, lives off and values the planet it inhabits. Read whole article here 29 November 2019 Chemical and microbial diversity covary in fresh water to influence ecosystem functioning ( Andrew J. Tanentza p, Department of Plant Sciences). Freshwater lakes have been identified as a potential “ticking time bomb” amid fears greenhouse gases contained in the water could double as a result of climate change, scientists... 29 October 2019 Largest study yet to compare protected with “matched” unprotected land finds “significantly higher” increases in human pressure – primarily through agriculture – in protected areas across the tropics. "Our study shows that agriculture is the driving force behind threats to protected areas, particularity in the tropics:"... 21 June 2019 The Environment and Energy section is currently looking for members of staff or students in your department who would be interested in running biodiversity-related activities to boost local biodiversity and help promote wellbeing activities within the department. Such events could include, but are not restricted to, nature... 28 May 2019 More and more universities are embracing interdisciplinary research, recognising that it is vital for tackling complex global problems. However, interdisciplinary working is yet to become embedded in academia. Conventional academic systems are not designed to support interdisciplinary research, and traditional structures... 22 September 2018 Collaborators in Cambridge have launched a new tool designed to help conservation practitioners engage with the Sustainable Development Goals (SDGs) and, within this framework, the wider human and societal benefits of their work. This tool launches on the same day as the Cambridge Conservation Initiative hosts an event... 21 September 2018 UCCRI has launched an online tool that allows conservation professionals to look at how biodiversity projects contribute to the SDG targets, and a new paper examining the potential of REDD+ projects to make a greater contribution towards SDG targets. UCCRI is part of a new, multi-university network that will explore... 22 July 2018 July 2018 Congratulations to PhD student Charlotte Payne , who has been awarded one of the Vice-Chancellor’s Public Engagement with Research Award from Cambridge University for her work around edible insects. The University said “Working together with farmers and scientists at every stage, Payne developed a participatory... 22 May 2018 Professor Bhaskar Vira awarded Busk Medal for interdisciplinary research on economy, environment and development May 2018 Congratulations to UCCRI Director Professor Bhaskar Vira , who has been awarded the Royal Geographical Society's Busk Medal in recognition of his interdisciplinary research on economy, environment and...
https://www.conservation.cam.ac.uk/news
Developing Core Capabilities for Local Health Departments to Engage in Land Use and Transportation Decision Making for Active Transportation. Academic Article Author's Version View record in Web of Science ® Overview Grants Identity Additional Document Info Overview Abstract OBJECTIVE: To develop a core set of capabilities and tasks for local health departments (LHDs) to engage in land use and transportation policy processes that promote active transportation. DESIGN: We conducted a 3-phase modified Delphi study from 2015 to 2017. SETTING: We recruited a multidisciplinary national expert panel for key informant interviews by telephone and completion of a 2-step online validation process. PARTICIPANTS: The panel consisted of 58 individuals with expertise in local transportation and policy processes, as well as experience in cross-sector collaboration with public health. Participants represented the disciplines of land use planning, transportation/public works, public health, municipal administration, and active transportation advocacy at the state and local levels. MAIN OUTCOME MEASURES: Key informant interviews elicited initial capabilities and tasks. An online survey solicited rankings of impact and feasibility for capabilities and ratings of importance for associated tasks. Feasibility rankings were used to categorize capabilities according to required resources. Results were presented via second online survey for final input. RESULTS: Ten capabilities were categorized according to required resources. Fewest resources were as follows: (1) collaborate with public officials; (2) serve on land use or transportation board; and (3) review plans, policies, and projects. Moderate resources were as follows: (4) outreach to the community; (5) educate policy makers; (6) participate in plan and policy development; and (7) participate in project development and design review. Most resources were as follows: (8) participate in data and assessment activities; (9) fund dedicated staffing; and (10) provide funding support. CONCLUSIONS: These actionable capabilities can guide planning efforts for LHDs of all resource levels.This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work cannot be changed in any way or used commercially without permission from the journal.
https://findscholars.unh.edu/display/publication457731
STOREandGO, Innovative large-scale energy STOragE technologies AND Power-to-Gas concepts after Optimisation, H2020 The presented project STORE&GO is funded under the umbrella of the EU programme "Horizon 2020" and its topic "Large scale energy storage" (LCE-09-2015). The project will demonstrate three innovative Power to Gas storage concepts at locations in Germany, Switzerland and Italy in order to overcome technical, economic, social and legal barriers. The demonstration will pave the way for an integration of PtG storage into flexible energy supply and distribution systems with a high share of renewable energy. Using methanation processes as bridging technologies, it will demonstrate and investigate in which way these innovative PtG concepts will be able to solve the main problems of renewable energies: fluctuating production of renewable energies; consideration of renewables as suboptimal power grid infrastructure; expensive; missing storage solutions for renewable power at the local, national and European level. At the same time PtG concepts will contribute in maintaining natural gas or SNG with an existing huge European infrastructure and an already advantageous and continuously improving environmental footprint as an important primary/secondary energy carrier, which is nowadays in doubt due to geo-political reasons/conflicts. So, STORE&GO will show that new PtG concepts can bridge the gaps associated with renewable energies and security of energy supply. STORE&GO will rise the acceptance in the public for renewable energy technologies in the demonstration of bridging technologies at three "living" best practice locations in Europe. No References for this article. No Supplementary Data. No Article Media No Metrics Keywords: ENERGY STORAGE; GAS STORAGE; H2020; HORIZON2020; NATURAL GAS; POWER TO GAS; RENEWABLE ENERGY Document Type: Research Article Publication date: March 1, 2018 More about this publication? Impact is a series of high-quality, open access and free to access science reports designed to enable the dissemination of research impact to key stakeholders. Communicating the impact and relevance of research projects across a large number of subjects in a content format that is easily accessible by an academic and stakeholder audience. The publication features content from the world's leading research councils, policy groups, universities and research projects. Impact is published under a CC-BY Creative Commons licence.
https://www.ingentaconnect.com/content/sil/impact/2018/00002018/00000001/art00027
The kids and I played hookey last week and went camping! This was a very last minute trip, and we were gone for six days during which I learned a lot. I learned that it is possible to plan, shop and pack for a week in less than 24 hours. Continue Reading » Tips for Visiting SeaWorld with Kids Ask anyone who has ever been to San Diego and they will rattle off an endless list of fun things to do with kids in San Diego. During our 5-day visit to this southern California city, the sheer number of amazing adventures we could experience was in fact, overwhelming. We Continue Reading » 6 Great Camping Meals and Treats to try this Weekend! My son ascribes to the belief that everything tastes awesome when it comes in a taco format. I wholeheartedly approve. So when we went camping recently with another family, we sat there open mouthed and drooling as they made breakfast one morning. It was a simple concoction of eggs scrambled Continue Reading » Family Travel: How to Survive a Family Roadtrip Our family is a road trip family. Sure, if we’re short on time or going from, say, Calgary to Florida, we’ll fly, but we’ve discovered over the years that our favourite way to travel is by car. We tend to drive from our home in Calgary to Vancouver just about Continue Reading » Travelling with kids? 4 Regulations you Need to Know Looking to drive across the border or jump on a plane with the kids this summer? Better be prepared – and not just with snacks, colouring books and earplugs! I’ve flown into the United States with my kids, without my husband, on numerous occasions. While the Government of Canada doesn’t Continue Reading » Cheap Eats: 12 Ways to Save Money on Vacation Meals When I looked at the damage from my last vacation, I was surprised to see that our meals cost more than our airfare. Yikes! So before our next adventure, I’m bringing back some tried and true ways to save money while eating out. Cook for yourself While not much of Continue Reading » Power to Go: How to Keep your Devices Charged on the Road Technology is supposed to make our life easier right? We have the sum knowledge of the world at our fingertips through a smartphone and with this magical device we can figure out how to change a tire, make a soufflé, or soothe a crying child by letting them watch cat Continue Reading » The Long Haul: 5 Ways to Make Trailer Camping Easy My husband and I bought our first camping trailer when we were both just 17 years old. It was a 1963, 13 foot Scamper and it had survived a small fire and years of mothballs. It was not pretty by any stretch of the imagination, and to be perfectly honest,
https://www.familyfuncanada.com/tag/travel-tips/
Common probiotics side effectsMost probiotics supplements contain combinations of beneficial bacteria and yeasts from various sources. Fermented foods like sauerkraut, kimchi and yogurt also contain probiotics, which play a role in the fermentation process. When you ingest probiotics from either of these sources, they interact with your body’s own microbiome--the trillions of microbes that colonize your body, specifically your gut. These interactions are often beneficial but can occasionally cause: - Digestive discomfort - Bloating - Gas - Constipation - Thirst Can probiotics side effects be dangerous?Healthy people should be able to take probiotics without any severe reactions or long-term problems. Side effects like bloating often resolve within a week or two of starting a supplement as the body adjusts to the new microbial strains. However, healthcare experts recommend avoiding probiotic supplements if you:
https://www.vitacost.com/zahler-biodophilus100
What is patellofemoral pain syndrome? Patellofemoral pain syndrome (PFPS), is one of the most common causes of knee pain. It is commonly presented as a diffuse ache around the knee cap that is worse with knee movements, particularly with loaded activities such as climbing stairs or running. Sometimes, prolonged sitting can also cause pain, known as the “theatre sign”. Crackling or popping sounds may also suggest PFPS due to malalignment or instability of the kneecap with movements. Typical onset of PSPS is usually gradual with recent change in training frequency or load. The pain is caused by an imbalance of forces on the kneecap which causes malalignment Risk factors of patellofemoral pain Many other risk factors can also contribute to PFPS, including: - Altered biomechanics (e.g. foot rolling inward) - Previous injury or surgery - Quadriceps weakness - Reduced kneecap mobility - Poor lower limb flexibility - Change in footwear Therefore, a thorough examination by a physiotherapist is recommended to explore the underlying cause of your knee pain and to also rule out other conditions such as patellar tendinopathy or fat pat syndrome. How can physiotherapy help? Studies have shown that physiotherapy can help with PFPS and that good outcomes are maintained after long-term follow-up. Effective treatment of PFPS involves a thorough physical assessment to target the underlying cause. Initial treatments may involve resting from aggravating activities, soft tissue massage, manual therapy to improve joint mobility, taping or strength and flexibility exercises. Orthotic devices may also be beneficial for some people to address biomechanics of the lower limb. However, there is no one-size-fits-all treatment as an individually tailored program is essential to address the underlying cause of your knee pain. See one of our physiotherapists for a thorough assessment and specific exercises to help you get back to previous level of function as quickly as possible.
https://blog.anytimephysio.com.au/knee-pain-patellofemoral-pain-syndrome
The true history of the most famous holy relic from Biblical times. Skeptoid Podcast #327 Today we're going to travel back to Biblical times, and cast our skeptical eye upon one of the most enduring legends in all of Christianity: the Ark of the Covenant, the holy box in which the stone tablets of the Ten Commandments were said to have been stored by Moses himself. It's a particularly interesting story, because unlike its fellow icon the Holy Grail — which existed only as a literary device in Arthurian legend and has no historical basis — the Ark of the Covenant may have been (and in fact probably was) a real physical object. In appearance, the Ark was very much like the version depicted in Raiders of the Lost Ark, just a bit smaller: 2.5 cubits long, and 1.5 cubits high and wide. It was made of acacia wood, completely gilded with gold leaf, and had two golden cherubs atop its lid. It was carried only by two gold-plated acacia staves, and was not to be touched itself. There are many replicas of the Ark, even surviving today; and we'll talk about some of those in a moment. But what are they copies of? Following the threads of the various Ark legends backwards through history, they soon fade into stories known only from the Bible, plus some corroborating mentions in other ancient texts such as the Quran and the Books of the Maccabees. The original Ark is said to have been constructed upon instructions from Moses during the Exodus, and this is problematic, as we now know from numerous lines of evidence that the Exodus was a Bible story and not a historical event. Moving forward through history from there, the chronicle of the Ark becomes increasingly less fuzzy. There are all kinds of Bible stories about where the Ark went and which army had possession of it, but because there is no archaeological evidence of any of these stories, they can't be verified. It is said to have eventually come down to King Solomon sometime in the 10th century BCE, but even King Solomon's very existence has no compelling evidence outside of scripture, despite many efforts by Biblical literalists to interpret various pieces of archaeological and anthropological evidence. Most famously, Solomon built Solomon's Temple in Jerusalem. Solomon's Temple is not proven to have existed either. It's said to have been destroyed in 586 BCE. Some archaeologists believe they've uncovered evidence of its structure; others find insufficient reason to support that identification. Inside Solomon's temple was a special room called the Holy of Holies, in which the Ark of the Covenant was kept. Since we can't verify that the temple existed, we certainly can't say that the Holy of Holies did, and we can't say that there was an Ark inside of it. However, there is a wealth of non-empirical evidence supporting the idea that Solomon, his temple, and the Ark within probably did exist. Historians going back through ancient Rome, such as Josephus, and ancient Greece, such as Herodotus, have all provided accounts that are generally consistent with the Biblical history of Solomon's temple. I believe it's fair to say that the existence of Solomon's temple, and a gilt wooden ark hidden inside of it, are the null hypothesis. We've no compelling reason to doubt it. The pivotal moment in the Ark's history is the sacking of Jerusalem by the Neo-Babylonians under Nebuchadnezzar in 586 BCE. This is a factual historical event, and it's the best point at which the Bible-based history of the Ark ends and its evidence-based history begins. Nebuchadnezzar destroyed the Temple of Solomon. Anything in it fell into the hands of the Neo-Babylonians. Whether this booty included the Ark of the Covenant is unknown. One further Bible verse states that the haul was taken to Babylon, including "the Ark of God", but of what became of it thereafter there is no mention. In all likelihood, if the raiders had found a large gold-plated box, they would have opened it, found nothing of value inside, and set fire to it along with the rest of the temple. Assuming an original Ark of the Covenant ever did exist, this was probably its ultimate fate. But as a holy object, the Ark inevitably became the subject of rumor and passion. The Jewish tradition holds that the Ark was secreted to an underground chamber on the Temple Mount (where Solomon's Temple is believed to have been) during Nebuchadnezzar's attack where it remains safe to this day, but the political situation has prevented any archaeology from validating this story. Another story from the second Book of Maccabees holds that the prophet Jeremiah rescued the Ark, took it out of Jerusalem, and hid it in an unknown cave which he then sealed, where it has remained ever since. There's never been any way to evaluate this tale either. And over the ensuing years, a whole raft of scholars and authors have proposed alternate versions: That the Knights Templar took it somewhere, that's it's hidden at the Vatican, that it burned in another basilica in Rome, that it's buried in Ireland, and even a story from Zimbabwe that resulted in the find of a replica ark carbon dated to 1350. But the best known modern-day claim about the Ark of the Covenant is that it lies in a small Ethiopian temple belonging to the Ethiopian Orthodox Church. This story exists because the church has long publicly proclaimed it. In fact, you can visit any one of the church's temples throughout Ethiopia and actually view the Ark for yourself. But, contain your excitement: all of the Arks that the church displays are replicas. The town of Aksum lies in the highlands in the very northern end of Ethiopia, and at the upper end of town, in a gentle valley between two green hills, stands the Church of Our Lady Mary of Zion. It was originally built in the 4th century, but has been rebuilt a number of times. Kings of Ethiopia have been crowned here ever since it has existed. Church tradition holds that the Ark of the Covenant has resided in Ethiopia for a long time, and the story of how this happened is told in an Ethiopian book written in the 13th century called the Kebra Nagast, or the Glory of Kings. It tells the story of King Menelik I, described as the son of King Solomon and the Queen of Sheba. At the age of 22 in about 950 BCE, Menelik visited Jerusalem to meet his father. While there, Menelik's companions stole the Ark from the Holy of Holies, and replaced it with the replica ark that they were supposed to take back with them. Solomon and Menelik both discovered the switch, but only after Menelik was already most of the way back home. Nevertheless, the Ark brought Menelik good fortune in Ethiopia. Armies fell before the Ark. It was secreted in a few other locations through the various centuries, until it was brought at last to Aksum, and there it has sat ever since, at Our Lady Mary of Zion. The current church was built in the 1950s by Emperor Haile Selassie. Selassie's wife ordered the construction of the tiny Chapel of the Tablet adjacent to the church. The Chapel of the Tablet was to be the final, permanent resting place for the Ark; and to assure that it could never leave, the chapel was actually built around the Ark, using cinder-block passageways with corners too narrow and sharp for the Ark to fit through. A single Guardian spends his entire life inside the quarter-acre fenced enclosure surrounding the chapel, and nobody is ever permitted to see the Ark. Thus a bloodline is established for all Ethiopian kings to trace their ancestry all the way back to Solomon, and the most holy relic on the planet serves as absolute proof of the fact. To this day, Rastafarians regard Selassie as the reincarnated messiah based on this bloodline, even taking their name from him ("ras" meaning head or duke, and "Tafari" which was Selassie's birth name). Selassie's title of Conquering Lion of the Tribe of Judah (Rastafarian dreadlocks represent the lion's mane) is based in part on the Kebra Nagast version of history as well, which holds that the first Jewish immigrants into Ethiopia were companions of Menelik. But it turns out that the Kebra Nagast may not stand up very well to historical scrutiny. The Kebra Nagast first appeared in the 13th century at about the same time that two rival dynasties contended for the Ethiopian throne. The Zagwe dynasty, which was currently in power, claimed authority based on lineage from Moses. The Aksumites pointed to the Kebra Nagast to prove their own lineage from Solomon, backed up by the Ark of the Covenant. What better basis for divine kingship could there be? Thus the Zagwes were out, and the Aksumites were in. This finding that the Kebra Nagast was essentially created as political propaganda is bolstered by the total lack of corroborating evidence of any kind prior to the 13th century. No archaeological or documentary evidence has ever surfaced that indicate the story of Menelik existed at all before that date. It also contains a number of outright errors. The book is said to have been translated into Arabic from its original Coptic in 1225 by a team of Ethiopian clerics, and the strongest theory is that these Ethiopian clerics were in fact the original authors, and no original Coptic edition — or its hero Menelik — ever actually existed. Most likely there is a crumbling, dusty wooden ark speckled with the remnants of gold leaf inside the Chapel of the Tablet, and it's a fact that Ethiopians firmly believe it to be the original. But whether it is anything other than just another replica, built by the Aksumites 800 years ago or at some other time, only eventual carbon dating may be able to tell. In summary, the most likely history of the Ark of the Covenant is that, sometime prior to 586 BCE, one or more Arks were constructed in the Holy Land. Whether they were intended as ceremonial replicas, or as the original, or were for some other purpose, it's unlikely that we'll ever know. One example was likely inside the Temple of Solomon when it was destroyed, and met its end there. Possibly more than one copy made its way into the world. Other replicas were built in later years. Some are in Ethiopia, a few have been collected into museums, and some are still out there, undoubtedly waiting to be discovered, perhaps in some remote cave. About the only thing we can say for certain is that no one ark, replica or original, extant or long destroyed, can trace its history back to a legendary Exodus that's known not to have been a literal event. But somewhere, sometime, there was a first. Correction: An earlier version of this gave the erroneous pop-culture version of the Ark's contents as "The original stone tablets that Moses brought down out of Mount Horeb and smashed, if you believe in that sort of thing," in the words of Indiana Jones. Not true. The story says replacement tablets were placed in the Ark after Moses calmed down. —BD Cite this article: ©2023 Skeptoid Media, Inc. All Rights Reserved.
https://skeptoid.com/episodes/4327
Transcription 1 IT-ENABLED HEALTHCARE INTEGRATION: THE CASE OF NATIONAL ELECTRONIC HEALTH RECORDS IN SINGAPORE Yap Hwee Wee, School of Computing, National University of Singapore, Singapore, Ya Zhou, School of Computing, National University of Singapore, Singapore, Giri Kumar Tayi, State Universtiy of New York at Albany, United States of America, Abstract Information Technology (IT) is considered as an important enabler towards achieving integrated health care. Consequently, Electronic Health Record (EHR) systems, which serve as the foundation for integrated care across organizations, regions, or nations, have received much attention globally. However, many EHR systems have failed to be implemented successfully. The buy-in of different stakeholders has been identified as an important factor to smoothen the IT healthcare integration process. By employing stakeholder and institutional theories as theoretical lenses to examine the influence of different stakeholders in EHR implementation, we aim to form a deeper understanding of how EHR initiatives can be managed for healthcare integration. A positivist, exploratory, case study approach was chosen to analyze the till date successful implementation of the National Electronic Health Record (NEHR) initiative in Singapore. Based on both primary and secondary data, we report preliminary findings about the salience and institutional influences for key stakeholders in this context. This study contributes to research by extending stakeholder theory through including the dynamic view of institutional theory. Moreover, it can provide practictioners with insights to implement EHR programs for healthcare integration effectively. Keywords: healthcare integration, National Electronic Health Record (NEHR), institutional theory, stakeholders, healthcare IT 2 1 INTRODUCTION The past two decades in global healthcare have seen an aging of the population and increase in the average life expectancy (Lutz et al. 2008) alongside the rise of chronic diseases (Huber et al. 2011). Correspondingly, this has resulted in greater consumption of healthcare services, resources and hence expenditure (Porter 2013). The Organization for Economic Co-operation and Development (OECD) predicts that by 2060, healthcare expenditure of member countries will reach 9.5% of their Gross Domestic Product (GDP), up from the current 6% (OECD 2013). In tandem, patient centered care, recognized as being able to reduce financial costs (Bertakis and Azari 2011) and improve the quality of care (Robinson et al. 2008) has gained traction (Davis et al. 2005). However, this requires a level of coordinated care (Davis et al. 2005), which is challenging given the fragmented state of most countries healthcare systems (Van Lerberghe 2008). Fragmentation also leads to degradation of care quality (Cebul et al. 2008) and increase in preventable medical errors (James 2013). In response, efforts have been made to explore healthcare integration as a viable solution (Economist 2010), which can be defined as having a high degree of collaboration and communication between healthcare providers (APA 2014). Integration can improve delivery efficiency and cost efficiency by increasing interconnectivity among departments and organizations (Currie et al. 2011). It can also improve the effectiveness and quality of care for patients by fostering a continuum of care (Suter et al. 2009). Increasingly, these efforts have been leveraging on Health Information Technology (HIT) as seen in the increase of HIT assuming central roles in healthcare (Ryan et al., 2011). Electronic Health Record (EHR) systems are a foundational HIT for healthcare integration, which seeks to support healthcare integration by facilitating the electronic transfer of patient medical information among different organizations (AHRQ 2014) so that health care encounters of each patient across a longitudinal period are seamlessly linked. Countries have invested large amounts of resources in EHR systems. For example, the UK National Health Service (NHS) has spent more than 10 billion on a patient medical record system so far (Syal 2013). However, even with the anticipated benefits and government-led initiatives for the implementation of EHR systems, their adoption and diffusion are persistently low and slow (Hung et al. 2014). For example, only 23.5% of physicians in the US had fully functional EHR systems in 2012 (Hsiao and Hing 2014). A key challenge during the healthcare integration process is managing different stakeholders involvement, their influences on each other (Shirey 2012) and potential change resistance (Hung et al. 2014). Consequently, there have been attempts to understand stakeholder relationships in healthcare integration (Yeow and Faraj 2011). However, these studies analyzed HIT issues within a specific organization such as a hospital (Hung et al. 2014) instead of at an inter-organizational, regional, or national context. Moreover, these studies focussed more on cases where HIT was not able to realize its envisioned potential, with a lack of understanding from successful cases (Hanseth et al. 2012). In order to address the above gaps, we propose the following research question: How can EHR implementation among key stakeholders be managed for healthcare integration? To address the research question, we chose to study the case of National Electronic Healthcare Record (NEHR) implementation in Singapore, as its healthcare system has been rated as the most efficient in the world by Bloomberg (2014). We are in the process of conducting a positivist, exploratory study on NEHR by employing the lenses of stakeholder and institutional theories. Specifically, stakeholder theory guides our identification of stakeholders and their salience, while institutional theory explains how stakeholders influence each other in NEHR implementation for healthcare integration. Our analysis shows how the relationships among stakeholders evolve during the NEHR implementation. In terms of theoretical contributions, this study employs stakeholder theory to explain healthcare integration on a regional and nationwide basis, and hence extends the extant literature based on this theory. Moreover, we supplement stakeholder theory by incorporating the dynamic view of institutional theory. The expected practical implications include informing involved practitioners in order to enhance their understanding and management of the influences and inter-relationships of stakeholders in NEHR implementation for healthcare integration. 3 2 LITERATURE REVIEW AND THEORETICAL BACKGROUND Stakeholder theory offers insights for healthcare integration by guiding the identification and priorization of stakeholders. This is particularly important for healthcare integration, where multiple stakeholders with diverse interests are involved. On the other hand, institutional theory, which investigates the influence of external forces on organizations in a historical way, supplements the stakeholder view by incorporating the dynamics of healthcare integration (Currie 2009). In this section, relevant literature based on stakeholder and institutional theories will be reviewed followed by the creation of an integrative framework to explain the inter-relationships among stakeholders. 2.1 Stakeholder Theory Stakeholder theory s origins have been largely credited to Freeman (1983). A stakeholder can be either an individual or a group (such as an organization) that can affect or is affected by an organization s actions (Brugha and Varvasovszky 2000) and resultantly have a stake or claim (Donaldson and Preston 1995). Considering the concurrent existence of various stakeholders, organizations need to weigh the priority of different stakeholders so that they can achieve clear management objectives. Mitchell et al. (1997) further discussed this issue and identified 3 attributes that each stakeholder can be characterized by. The first attribute is power, with which one party can get another to do something that they would not normally have done. The second attribute, urgency, refers to the degree to which stakeholder claims call for the immediate attention of the organization based on time sensitivity and criticality. The third attribute, legitimacy, refers to a generalized perception or an assumption that actions of a party are desirable and proper within some socially constructed system of norms, values, beliefs and definition. Even though prior literature on healthcare integration has employed a stakeholder view (Hung et al. 2014), these studies analyzed HIT issues from an individual organization s perspective instead of at an inter-organizational, regional, or national level. Moreover, the studies largely focused on cases where HIT or EHR did not achieve the intended benefits and suffered failure. Thus, prior research has paid less attention to successful cases, which can provide useful insights about how to manage EHR implementation (Hanseth et al. 2012). In this study, we aim to address the above gaps by using the stakeholder lens supplemented by institutional theory to examine the implementation of NEHR, which is a national EHR program that has achieved initial success. 2.2 Institutional Theory Institutional theory fundamentally seeks to explain the similar behaviors of organizations in a given environment even though initially there may have been greater diversity or that such behaviors may not be efficient and hence appear illogical (DiMaggio and Powell 1983). Institutions as defined by Hodgson (2006) are systems of established and embedded social rules that structure social interactions. This relates to organizations in that they are interactive participants in such an institution given their established boundaries. Isomorphic pressures exerted on organizations are proposed to determine these interactions, where there exist three kinds of pressures: coercive, mimetic, and normative pressures (DiMaggio and Powell 1983). Coercive pressure refers to pressure from entities who have resources on which an organization depends. Mimetic pressure refers to pressure to imitate or copy other successful organizations when an organization is uncertain about what to do. Normative pressure refers to pressure to follow professional standards and practices established by education and training methods, professional networks, and movement of employees among firms. Researchers have observed isomorphic pressures in healthcare IT implementation e.g., Currie (2009), Jensen et al. (2009). However, the prior work has utilized this perspective to explain how hospitals influence each other in healthcare IT adoption, rather than for examining the implementation of healthcare IT in a large scale e.g., national, effort as in our study. Seen from the perspective of a focal organization, external power or pressures can be reflected through the institutional enviroment. In addition to isomorphic pressures from other entities, the existence of institutional logics, which are defined as principles held by individual stakeholders collectively, also influence the behaviors, 4 beliefs and daily activities of stakeholders (Reay and Hinings 2009). Yeow and Faraj (2011) note that in any healthcare environment, there exist two vastly polarized institutional logics: professionalism and market-managerialism logics. The former priotizies patient issues and healthcare as a profession while the later perceives healthcare from a business perspective. Currie and Guah (2007) used these logics to explain the stagnation of the National Programme for IT within an organization in the UK, which impeded the subsequent implementation of EHR. 2.3 Integrative Framework The combination of institutional and stakeholder theories is mutually advantageous because they share commonalities (Doh and Guay 2006). Accordingly, we suggest that stakeholder theory provides attributes to describe the salience of stakeholders, while institutional theory helps to identify the pressures through which organizationl stakeholders mutually influence each other. For example, the power attribute of stakeholder salience is related to coercive pressures the stakeholder exerts in its external environment, while legitimacy can be used to explain normative pressures related to institutional logics. By weaving these theoretical lenses together, we aim to form a comprehensive viewpoint of national healthcare integration, especially for the implementation of NEHR. Figure 1 shows our theoretical framework integrating stakeholder and institutional theories. Institutional Environment generate Organizational Stakeholders Individual Stakeholders Institutional Logics Professionalism Market Managerialism Stakeholder Attributes Power Urgency Legitimacy Influence Institutional s Figure 1 Theoretical Framework 3 METHODOLOGY Healthcare integration through NEHR reflects a "complex real-life activity" within the context or environment of a country or an area. To investigate this process, the case study approach was selected because of its ability to study a phenomenal occurrence in a given context (Yin 2014). Based on stakeholder and institutional theories, a positivist approach is followed to form a substantial ground for a systematic study of relevant issues while at the same time an exploratory view is also adopted to enrich the findings. In Bloomberg s annual ranking of countries with the most efficient health care in 2014, Singapore was ranked as having the most efficient healthcare in the world (Bloomberg 2014) 1, which provides an appropriate success case for our study. Singapore is implementing the National Electronic Healthcare Record (NEHR) in an integrated care vision of Regional Health Service (RHS) clusters. Currently it has achieved initial success and is moving towards the next stage for a wider implementation. The success of the NEHR roll out thus far is considered a revelatory case, one that warrants a single case study design (Yin 2014). 1 The criteria for this ranking are life expectancy, healthcare cost as percentage of GDP, healthcare cost per capital, change in life expectancy, change in healthcare cost per capital, change in healthcare cost per capital (percentage), change in GDP per capital, and inflation of a country. Singapore has achieved high life expectancy while keeping healthcare cost as percentage of GDP low, thus obtaining the topmost rank in 2014. 5 In order to gain a holistic understanding of the case (Noor 2008) as well as to instantiate our framework of Figure 1, data from both primary and secondary sources are being collected. Primary data is being collected through interviewing key personnel of different organizations involved in the NEHR implementation, while secondary data is obtained from public documents, such as policies, presentations, and news articles. To augment the collected secondary data, we have interviewed 10 personnel at management level or higher across the Ministry of Health (MOH), Ministry of Health Holdings (MOHH), Agency of Integrated Care (AIC), Integrated Health Information Systems (IHIS) and Acute Public Hospitals. In addition, we have also interviewed 3 doctors among General Practitioners practices (GP) and from Family Medicine Clinics (FMC). These interviews serve to uncover additional perceptual information and personal stakeholder viewpoints absent in the secondary data, refine issues to be explored for subsequent interviews and enable findings triagulation so that the study remains objective and biasness is reduced. The analysis is being carried out through an inductive process. Prior to data collection, a set of a-priori codes were compiled from existing literature of stakeholder and institutional theories to form our preliminary research framework of Figure 1. Thereafter, through an iterative process, findings emerging from our analysis of primary and secondary data sources are being used to instantiate and refine the initial research framework (Eisenhardt 1989). This rigorous process ensures our research quality. 3.1 Case Description Singapore is a developed Asian city state with a population of 5.47 million (DOS 2014) and is regarded as having an effective healthcare system even when contrasted to other developed nations (Abeysinghe et al. 2010). This can be attributed in part to the government's policies that attempt to balance both the public and private healthcare interests (Abeysinghe et al. 2010). Singapore aims to achieve its national integrated care vision through the RHS framework. The framework encompasses 6 clusters that are spread across the island ( regions ) with each cluster offering a comprehensive set of healthcare services (from primary to long term care). Thus, patients need not travel outside each region to seek further medical services. Each region will be anchored by an acute public hospital that works closely with other healthcare organizations, government agencies, and volunteers, with participants from both the public and private sectors. Critical to this integrated care vision is the implementation of a NEHR, an EHR system which would allow patients to transit seamlessly between care organizations as per NEHR s One Patient One Record mission (Kwee 2009). NEHR seeks to build a longitudinal care dossier centered around each patient (Kwee 2009) by extracting and consolidating all relevant healthcare information through the secure flow of information between organizations. As NEHR is provider agnostic, it is intended to be used by all public and private healthcare providers (Muttitt et al. 2012). As of September 2014, NEHR has been rolled out to all public hospitals, specialist centres, polyclinics, several community hospitals, nursing homes and 230 GPs (CNA 2014). In total, 280 healthcare institutions and 14,000 clinicians have access to the NEHR (CNA 2014). In terms of its time, cost, and scope goals, currently the NEHR implementation can be considered as an intial success. By examining how the NEHR is being implemented and managed among different stakeholders, we aim to form a better understanding of how IT can be implemented to support healthcare integration among multiple healthcare stakeholders. 4 PRELIMINARY FINDINGS At first, we identified the stakeholders involved in the healthcare integration through NEHR. At the organization level, there are: (1) Acute public hospital systems, which are at the center of the RHS cluster; (2) Other healthcare providers in each cluster, such as Community Hospitals, FMCs, GPs, Nursing Homes, and Polyclinics; (3) Public agencies in charge of the implementation of NEHR, such as MOHH, MOH, and IHIS. We also identify individuals who are salient in the NEHR implementation, such as CMIOs (Chief Medical Information Officer) of hospitals, healthcare 6 professionals (e.g., doctors) and patients. We also identified influence relationships among organizational stakeholders based on our data, which are summarized in Figure 2. MOH MOHH IHIS GPs FMCs Acute Public Hospitals Figure 2 Relationship of Stakeholders Furthermore, in order to gain historical insights in our institutional analysis of the implementation of NEHR, we divide its progress into four phases. The first phase is pre-nehr (before 2009), with a focus on NEHR planning and requirements collection. The second phase, NEHR Phase 1 (beginning in 2010), mainly focused on involving public healthcare providers. The third phase, NEHR Phase 2 which was started in 2012, is aimed at bringing private healthcare providers on board. In the last phase, NEHR Phase 2+ (2015 onwards), the emphasis is to utilize the healthcare information in NEHR to provide clinical analytics and better decision support tools for clinicians. At the start of our case study, we first analysed the linkage between MOHH and the acute public hospitals, which are the most salient stakeholders during the NEHR phase 1. We will describe this dyad first followed by complete analysis of the other linkages in our continuing research. Here we derive and show in Figure 3 the influences between MOHH and acute public hospitals during phase 1 as an instance of how stakeholder attibutes influence institutional pressures for the implementation of NEHR (the interview quotes as evidence are provided in Table 1). Institutional Environment NEHR Phase 1 Managers Professionalism Market Managerialism MOHH Stakeholder Attributes Normative Normative Acute Public Hospitals Coercive CMIO and Doctors Professionalism Stakeholder Attributes Figure 3 Stakeholder Attributes and Institutional s of MOHH and Acute Public Hospitals Before we clarify the institutional pressures, we describe the stakeholder attributes, which partly determine the institutional pressures as per the theoretical framework. Since the focus of this phase is on how MOHH engaged (bought-in) public healthcare providers in the NEHR effort, we choose MOHH as the focal organization to examine the salience of acute public hospitals in this effort. In terms of power, on one hand, since the content of EHR is largely obtained from acute public hospitals, these hospitals hold higher power in the NEHR implementation than other healthcare providers. On the other hand, in terms of this dyad, as MOHH has been appointed by the MOH to be the holding company of all public healthcare assets and the leader for the NEHR effort, acute public hospitals hold lower power than MOHH. In terms of urgency, in order to alleviate the rapidly increasing healthcare burden, acute hospitals have high urgency to achieve integrated healthcare for successful 7 transfer of care to other providers (e.g., FMCs) and hence implement NEHR. Moreover, whether NEHR can provide accurate information and ensure work efficiency is critical for doctors in acute public hospitals, since they need to serve many patients everyday and have limited time for each patient. In terms of legitimacy, since acute public hospitals are explicitly claimed as the anchor for RHS and serve as the hub for each cluster, they hold high legitimacy in the NEHR effort. Further, as most of Singapore s population uses public healthcare services and public institutions hold the majority of health records, acute hospitals with the necessary data are best positioned to contribute to the NEHR. In sum, acute public hospitals hold high salience in the first phase of NEHR implementation. We now describe the institutional pressures from the perspectives of both MOHH and acute public hospitals. For acute public hospitals, since MOHH holds higher power in the public healthcare systems, and these hospitals depend on the resources from MOHH to implement NEHR, they experience coercive pressure from MOHH to join the NEHR effort. On the other hand, for MOHH, since acute public hospitals have high legitimacy and urgency during this phase, and CMIO and doctors hold professional skills in healthcare, they can place normative pressure on MOHH, which drives MOHH to improve the NEHR design according to their professional requirements. This normative pressure from acute public hospitals benefits the design of NEHR to make it fit healthcare demands better and hence enhances the odds of successful implementation of NEHR. Moreover, it also alleviates the conflicts between the institutional logic of acute public hospitals and that of MOHH managers. Specifically, CMIO and doctors in acute public hospitals mainly subscribe to professionalism logic, while MOHH managers follows both professionalism and market managerialism logics. At the same time, doctors in acute public hospitals also experience normative pressure from CMIOs to increase the use of NEHR, as the CMIO is professional in both healthcare and technology. Sample quotes for these findings are listed in Table 1. Stakeholders Code Quote Source MOHH Power It (MOHH) is the effector arm of policies. 1 Acute Public Hospitals MOHH -> Acute Public Institutional Logics Power Urgency Legitimacy Institutional Logics Coercive It (MOHH) is the holding company of Singapore s public healthcare assets. (- from presentations) Professionalism: We re (Ministry) investing in a base system and doing it because we believe that it is the right thing to do (for healthcare). Market Managerialism: If it is going to cost us significantly to build another polyclinic, cheaper to just partner with private provider. (What you going to put into NEHR) will depend very much on all these hospitals (Acute public hospitals) and what they put in there. Doctors need to turn around very fast... As such constrained during that short time, it is very critical to have the appropriate, right information. They need selective information. At the same time, doctors have limited time to add all details. (- from meeting minutes) It has a set of primary care services, community services that build around the RH (regional hospital) to provide a core set of providers. The NEHR is successful thus far because a lot of Singaporeans go to public health institutions It (NEHR) started off with public health institutions and initially captured more than 90% of the population s healthcare data. (- from meeting minutes) From my perspective, patient care comes first, and we aim to do that and then if they can pay us, that s good. When the instruction/the policy directions have been made at the government level you re with it 8 Hospitals Acute Public Hospitals (CMIO, Doctors) -> MOHH CMIO -> Doctors Normative Normative Table 1 Examples of Quotes for Codes It was planned, designed and managed, top-down from here (MOHH). (CMIO) They will specify... their requirements on what they want, right down to how things are displayed on screens. (- from meeting minutes) Every time they (MOHH) launch one version they make us (Doctors) test it. I (CMIO) am also supposed to be the change champion (in the hospitals). ( *Source 1-MOH Senior Clinician; 2-MOHH Manager A; 3-MOHH Manager B; 4-GP Doctor; 5-IHIS Senior Manager A; 6-MOHH Senior Clinician; 7-MOHH Senior Manager; 8-Acute Public Hospital Senior Clinician) 5 EXPECTED CONTRIBUTION This study intends to contribute to both theory and practice. In terms of research contributions, this study aims to extend the stakeholder theory through employing it to explain healthcare integration through NEHR on a national basis. Stakeholder literature in healthcare integration has typically focussed on single organizations (Hung et al. 2014), rather than examining HIT implementations across multiple organizations. Additionally, we aim to supplement the perspective of stakeholder theory by incorporating the dynamic view from institutional theory, which guides us in understanding the NEHR implementation. On the other hand, our study will also provide practical implications for healthcare integration through IT. First, this study aims to clarify how various stakeholders are influenced in the implementation of NEHR, so practitioners can gain insights from this study to better understand the ways to garner buyin from stakeholders for such large-scale healthcare integration efforts, e.g., utilizing different institutional pressures to engage different stakeholder so as to realize desired integration outcomes. Second, this study will provide government agencies with insights into the appropriate integration policies. Last, aspects of our proposed framework can be adapated for future, larger scale healthcare integration implementations. 6 FUTURE WORK At first, more data will be collected from stakeholders and clusters involved in the various NEHR phases to enrich our findings. Second, the codes derived from stakeholder and institutional theories will be employed to analyze the collected data. Specifically, the theoretical framework used in the previous section will be expanded to capture NEHR issues and challenges, enacted resolutions and the resulting outcomes. By instantiating this framework for the various NEHR phases, analysis of other linkages among the remaining stakeholders can be realized. This can then form a comprehensive picture of how stakeholders influence and are influenced in the implementation of NEHR across a longitudinal period through multiple phases. This process will also reflect the linkages between stakeholder and institutional theories alongside with HIT related matters. Last, we intend to carry out a comparison with NEHR implementations in other countries e.g., the UK, to supplement our findings. References Abeysinghe, T., Himani, & Lim, J. (2010). Singapore s healthcare financing: Some challenges. Department of Economics, National University of Singapore. Retrieved from AHRQ. (2014). Health Information Technology Integration. 2014, from Adoption Theories in Enterprise Resource Planning (ERP) of Health Service for the 21st Century Sakonnan Huncharoen, Namon Jeerungsuwan King Mongkut's University of Technology North Bangkok, Thailand 0448 Singapore Type of Market: Moderate/Growing Singapore represents a significant market opportunity for U.S. Health IT companies. Singapore signed a contract with a consortium (including two U.S. companies) WHITE PAPER Healthcare Challenges and Trends The Patient at the Heart of Care Quality healthcare is one of the most important factors in how individuals perceive their quality of life. In most countries, Toward Systematic Identification of Stakeholders for Healthcare Information Systems: A Feature-Based Method Research-in-Progress Mohammed Sajedur Rahman The University of Texas at San Antonio [email protected] Cooperation, collaboration, influence and authority in leadership and the nurse as health service manager in rural Western Australia Dr Jan Lewis Curtin University Perth 1 Background In Western Australia, Briefing note: July 2012 The importance of nurse leadership in securing quality, safety and patient experience in CCGs Introduction For the NHS to meet the challenges ahead, decisions about health services Project Delivery in Business-as-Usual Organizations tim carroll Chapter 1 Introduction This book tackles the challenges of delivering business projects in support of a company s strategic agenda. It is 1 Doctor of Education - Higher Education The University of Liverpool s Doctor of Education - Higher Education (EdD) is a professional doctoral programme focused on the latest practice, research, and leadership Predictive Risk Modeling in the Healthcare Industry The Needs-awareness Gap Among Healthcare Payers The first in a series of peer-group reports A white paper based on independent research with senior managers PS035 Original research completed in 2010 Briefing Paper Introduction: Principal Investigator: Professor John Clarkson Should the NHS adopt a new system for predicting possible risks to patient safety? Fit work to people: How can national occupational health regulation work in practise Per Langaa Jensen Professor Department of Management Engineering Technical University of Denmark 13-02-2013 Who am I? RCN Policy Unit Policy Statement 16/2006 Acute and Multidisciplinary Working The Royal College of Nursing of the United Kingdom and the Royal College of Physicians (London) September 2006 Royal College The Way Forward: Strategic clinical networks The Way Forward Strategic clinical networks First published: 26 July 2012 Prepared by NHS Commissioning Board, a special health authority Contents Foreword... Research Agenda for General Practice / Family Medicine and Primary Health Care in Europe Summary EGPRN EUROPEAN GENERAL PRACTICE RESEARCH NETWO RK EGPRN is a network organisation within WONCA Region Europe GBMC HealthCare is Building a Better System of Care for Our Community John B. Chessare MD, MPH President and CEO GBMC HealthCare System Agenda The Challenges in our National and Local Healthcare Systems Educating for Practice Using collaborative leadership to improve health education and practice Institute of Medicine Global Forum on Innovation in Health Professional Education November 29 th, 2012 Sarita Introduction PUBLIC HEALTH LIMITED OPEN CALL SCHEME (LOCS) PHA202 RESEARCH BRIEFING Following publication of its new national health research strategy Best Research for Best Health (DH 2006a), the Department Improving Emergency Care in England REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 1075 Session 2003-2004: 13 October 2004 LONDON: The Stationery Office 11.25 Ordered by the House of Commons to be printed An Exploration of Remote Healthcare Service Adoption from multistakeholders in China preferred journal: MISQ Xitong Guo, School of Management, Harbin Institute of Technology, [email protected] Dominic POPULATION AGEING REQUIRES ADAPTIVE RESPONSES, NOT JUST TECHNICAL ONES DONALD LOW AND MELINDA ELIAS The Singapore government s Budget for 2012 has been widely lauded for its commitment to increase social A Patient Flow Model of Singapore s Healthcare System Abstract Objective: To develop an evidence-based dynamic model to simulate the likely impact of different supply-side and demand-side interventions Taking an aggressive stance on EMRs: lessons from the US and UK The US has an aggressive approach to meaningful use of electronic medical record (EMR) technology to deliver better patient outcomes. The American Academy of Family Physicians (AAFP) American Academy of Pediatrics (AAP) American College of Physicians (ACP) American Osteopathic Association (AOA) Guidelines for Patient-Centered Medical Home 2 of 22 Introduction and Invitation for Public Comment The Patient-Centered Outcomes Research Institute (PCORI) is an independent, non-profit health research organization. Its mission is to fund research INTRODUCTION 25 INTRODUCTION Policy makers in OECD countries are faced with ever-increasing demands to make health systems more responsive to the patients they serve, as well as improving the quality of Toward Meaningful Use of HIT Fred D Rachman, MD Health and Medicine Policy Research Group HIE Forum March 24, 2010 Why are we talking about technology? To improve the quality of the care we provide and National Health Research Policy The establishment of a Department of Health Research (DHR) in the Ministry of Health is recognition by the GOI of the key role that health research should play in the nation. MASTER THESIS MANAGERS AND MEDICAL PROFESSIONALS SITTING IN THE PSYCHIATRIC TREATMENT CHAIR Analysis of the impact of logics and (self-) efficacy of managers and medical professionals within psychiatric The positive are intended for use as a guide only and are not exhaustive. Not ALL will be applicable to ALL roles within a grade and in some cases may be appropriate to a Attribute 1: COMMUNICATION Level Data Driven Healthcare: the Canadian experience June 3, 2015 Presentation Overview What is Health Analytics? Why is HA important? Where are we at now in Canada? Who is doing this? What are the benefits? NI2009. Connecting Health and Humans The 10th International Congress on Nursing Informatics Nursing Informatics; is IT for all nurses? Carol S BOND a, Ruth LEWIS b and Ros JOY a a Bournemouth University, EUROPEAN COMMISSION Directorate-General for Education and Culture Life Long Learning: policy and programmes School Education; Comenius Education and Training 2010 programme Cluster 'Teachers and Trainers' Excerpt from: The Future of Nursing: Leading Change, Advancing Health http://www.nap.edu/catalog.php?record_id=12956 THE ROLE OF NURSES IN REALIZING A TRANSFORMED HEALTH CARE SYSTEM By virtue of its numbers Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit A FRAMEWORK FOR NATIONAL HEALTH POLICIES, STRATEGIES AND PLANS June 2010 A FRAMEWORK FOR NATIONAL HEALTH POLICIES, STRATEGIES AND PLANS June 2010 This paper reviews current practice in and the potential Premier ACO Collaboratives Driving to a Patient-Centered Health System As a nation we all must work to rein in spiraling U.S. healthcare costs, expand access, promote wellness and improve the consistency Integrated Care Organisations: the importance of integrated information systems 1 Introduction The NHS Next Stage Review i supports the development of more integrated services for patients and proposes Health LEADS Australia: the Australian health leadership framework July 2013 Health Workforce Australia. This work is copyright. It may be reproduced in whole for study purposes. It is not to be used for EMBEDDING SUSTAINABILITY SELF-ASSESSMENT Embedding Sustainability Self-Assessment This document is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. You are free to share Overview of the UK Health Sector: the NHS Frances Pennell-Buck AGENDA Healthcare Sector in the UK Overview of the National Health Service (NHS) Recent transition where are we now? NHS England Five Year Improve Customer Experience in healthcare Welcome Welcome to our report on healthcare customer experience. Much like R2D2, it s short and useful. In fact, this report is only 2,367 words and should take Human mobility and displacement tracking The importance of collective efforts to efficiently and ethically collect, analyse and disseminate information on the dynamics of human mobility in crises Mobility Investing in Health 2007: An update to the recommendations of Investing in Health: A Framework for Activating Primary Health Care Nursing (2003, Ministry of Health) September 2007 Investing in Health 2007: Chapter 2 The Control System of the Firm Abstract Purpose: The aim of this chapter is to review the arguments for internal control systems. This will be done by providing an account of theories that explain Irina M. Azu 21F.034 Final Paper OUTSOURCING IN THE UNITED STATES MARKET INTRODUCTION Outsourcing also known as contracting out is a business decision to export some to all of an organization s non-core National Society leadership and management development (supporting National Society development) Executive summary This is one of four sub-plans of the programme Supporting National Society development. CMS Physician Quality Reporting Programs Strategic Vision FINAL DRAFT March 2015 1 EXECUTIVE SUMMARY As the largest payer of healthcare services in the United States, the Centers for Medicare & Medicaid Key Priority Areas Key Priority Area 1: Improving access and reducing inequity Key Direction for Change Primary health care is delivered through an integrated service system which provides more uniform CCH III REGIONAL PROGRAMME AREA: HUMAN RESOURCE DEVELOPMENT GOAL: Human resources within the sector developed to respond to the needs of the people PRIORITIES OBJECTIVES NATIONAL EXPECTED RESULTS Movement HIT Report from KLAS reporting the performance of HIT vendors Computerized Physician Order Entry Usage in North America: The Doctor Is In Stacilee Oakes Whiting and Adam Gale While computerized physician Introduction Health Information and Quality Authority To drive continuous improvements in the quality and safety of health and social care in Ireland Background Health Act 2007, establishment 15 May 2007 How the council will use its information and technology assets to achieve successful change Contents Strategy Context 2 Digital Delivery and Citizen Engagement 4 Operational Excellence and Transformation Article by Peter Mihailidis, Rad Miletich and Adel Khreich: Peter Mihailidis is an Associate Director with bluevisions, a project and program management consultancy based in Milsons Point in Sydney. Peter
Limited data exist on the facilitators and barriers to implementing electronic systems for medicines management in hospitals. Whilst numerous studies advocate system use in improved patient safety and efficiency within the health service, their rate of adoption in practice has been slow. The aim of this doctoral research was to explore this under-researched area in three phases. Phase one: - Phase one focused on critically appraising and synthesising the available evidence on healthcare professionals’ perceptions, attitudes, and views of the facilitators and barriers to implementing electronic prescribing, electronic dispensing, and/or electronic administration of medicines in the hospital setting. The review protocol was registered with the Centre for Reviews and Dissemination and conducted according to best practice. Key facilitators included systems improved patient safety and provided better access to patients’ drug records and that team leadership and hardware/software availability and reliability were essential for successful implementation. Key barriers consisted of hardware and network problems, altered work practices, and weakened interpersonal communication between healthcare professionals and with patients. Phase two: - This phase employed a qualitative phenomenological design to gain original insight into the perceptions of local key stakeholders towards the facilitators and barriers to implementing prescribing, robotic pharmacy systems, and automated medication storage and retrieval systems in public hospitals in Ireland using Normalization Process Theory as a theoretical framework. Individual face-to-face semi-structured interviews were conducted in three public hospitals in Ireland with 23 consenting participants: nine nurses; four pharmacists; two pharmacy technicians; six doctors; and two hospital Information Technology managers. Enhanced patient safety and efficiency in healthcare delivery emerged as key facilitators to system implementation, as well as the need to have clinical champions and a multidisciplinary implementation team to promote engagement and cognitive participation. Key barriers included inadequate training and organisational support, and the need for ease and confidence in system use to achieve collective action. Phase three: - A similar qualitative methodology was employed in phase three of this research in order to explore the perceptions of national key stakeholders and eHealth leads towards the facilitators and barriers to system implementation. Sixteen consenting invitees participated: eight hospital leads, four government leads, two regulatory leads, and two academics. Key facilitators included enhanced patient safety, workflow efficiencies, improvements in governance, and financial gains. Perceived barriers included the introduction of new drug errors, loss of patient contact, initial time inefficiencies, and issues with the complexity of integration and standardisation of work processes. Overall, adequate technology, stakeholder involvement, and organisational leadership and support are required at a national and local level to drive the eHealth agenda forward. Testing at scale, contingency plans, and ongoing evaluations will assist in determining success or otherwise of system implementation. This research has generated novel findings with many potentially transferable themes identified which extend the evidence base. This will assist organisations to better plan for implementation of medication-related eHealth systems.
https://openair.rgu.ac.uk/handle/10059/2710
Google’s Report Shows How COVID-19 Has Affected Mobility in Pakistan In its attempt to aid public health officials, Google is using the location data gathered from Smartphones to identify the change in trends in terms of mobility. The data shown covers the past 48 to 72 hours, and the percentage reflects change between movement this month and late January. Google explains: As global communities respond to the COVID-19 pandemic, there has been an increasing emphasis on public health strategies, like social distancing measures, to slow the rate of transmission. In Google Maps, we use aggregated, anonymized data showing how busy certain types of places are, helping identify when a local business tends to be the most crowded. We have heard from public health officials that this same type of aggregated, anonymized data could be helpful as they make critical decisions to combat COVID-19. Of course, these reports use data from people who have opted for storing their location history with Google. The reports do not include personally identifiable information or show the number of visits to any particular category. The COVID – 19 Community Mobility Reports cover 131 countries. It also allows anyone to search regional data, examining reports for individual states, provinces, and counties. After the required geographic region is selected, Google generates a PDF will detail of the collected data. Movement patterns are divided into six categories in each report. These are: Parks, i.e., places like national parks, public beaches, marinas, dog parks, plazas, and public gardens. Transit stations, i.e., places like public transport hubs such as subway, bus, and train stations. Workplaces Residences However, Google says: We’ll leave a region out of the report if we don’t have statistically significant levels of data. Government agencies and health officials around the world have asked tech companies to share more data to aid in the coronavirus response. These reports may help officials in understanding how well people are complying with the quarantine rules. Mobility Report for Pakistan According to Pakistan’s mobility report by Google, there is, thankfully, a considerable change in the mobility trend. Retail and Recreational areas have seen a 70% fall in visits since 16 Feb 2020. As far as other categories are concerned, Grocery and Pharmacy, Parks, Transit stations, and Workplaces have seen 55%, 45%, 62%, and 41% downfall, respectively. Holistically speaking, this is by no means bad, but considering the situation even a 45% decrease in mobility in parks is extremely disappointing. People should avoid leaving the house unless it is absolutely necessary, and it is best to opt out of all recreactional activities. On the contrary, the Residential areas have seen an 18 percent raise, which, according to the ongoing situation, is not exactly ideal.
A quest for the holy grail: Tactile precision, natural movement and haptic feedback in 3D virtual spaces (2009)Three-dimensional immersive spaces such as those provided by virtual worlds, give unparalleled opportunities for learners to practically engage with simulated authentic settings that may be too expensive or too dangerous ... - Australian higher education institutions transforming the future of teaching and learning through 3d virtual worlds (2010)What are educators motivations for using virtual worlds with their students? Are they using them to support the teaching of professions and if this is the case, do they introduce virtual worlds into the curriculum to develop ... - Teaching and learning in virtual worlds: Is it worth the effort? (2010)Educators have been quick to spot the enormous potential afforded by virtual worlds for situated and authentic learning, practising tasks with potentially serious consequences in the real world and for bringing geographically ... - Teaching first-year studies in religion students in second life: UQ religion bazaar (2010)The UQ Religion Bazaar project was originally conceived in 2007 and developed through 2008. It consists of a Second Life island situated in the New Media Consortium educational precinct and boasts a number of religious ... - How Do Students Use Their Mobile Devices to Support Learning? A Case Study from an Australian Regional University (Ubiquity Press, Ltd., 2015)Though universities are eager to leverage the potential of mobile learning to provide learning flexibly, most balk at the cost of providing students with mobile hardware. The practice of ‘bring your own device’ (BYOD) ... - New applications, new global audiences: Educators repurposing and reusing 3D virtual and immersive learning resources (2019)There continues to be strong interest among established, experienced academic users of 3D virtual environments for their sustained educational use. Consistent with global trends, they plan to further develop and optimise ... - Delivering digital higher education into prisons: The cases of four universities in Australia, UK, Turkey and Nigeria (2016)Around the world, various correctional jurisdictions are struggling to enable the delivery of higher education into prisons. At a time when universities are moving increasingly online, very often access to the internet is ... - - How are Australian higher education institutions contributing to change through innovative teaching and learning in virtual worlds? (2011)Over the past decade, teaching and learning in virtual worlds has been at the forefront of many higher education institutions around the world. The DEHub Virtual Worlds Working Group (VWWG) consisting of Australian and New ... - - Digital equity: Diversity, inclusion and access for incarcerated students in a digital age (2019)ELearning has been touted as the way in which universities can enable participation by large numbers of students from non-traditional cohorts. There is no doubt that the flexibility of access that eLearning allows makes ... - Editorial 28(3): Preface to the special issue-Virtual worlds in tertiary education:An Australasian perspective (2012)In recognition of the considerable innovation, experimentation and dialogue that has been taking place in the virtual worlds arena across the tertiary education sector in Australasia (see Dalgarno, Lee, Carlson, Gregory ... - Virtual worlds in Australian and New Zealand higher education: Remembering the past, Understanding the present and imagining the future (2013)3D virtual reality, including the current generation of multi-user virtual worlds, has had a long history of use in education and training, and it experienced a surge of renewed interest with the advent of Second Life in ... - Mobile learning anytime, anywhere: What are our students doing? (Australian Journal of Information Systems, 2014)Recent developments in mobile technologies have provided unique opportunities for learning and teaching. This paper reports on recent research undertaken at a regional Australian university in order to understand how higher ... - Using digital technologies to implement distance education for incarcerated students: a case study from an Australian regional university (International Council for Open and Distance Education, 2014)As universities become increasingly reliant on the online delivery of courses for distance education, those students without access to the Internet are increasingly marginalised. Among those most marginalised are incarcerated ... - The Development of Virtual World Tools to Enhance Learning and Real World Decision Making in the Australian Sugar Farming Industry (International Association of Online Engineering (IAOE), 2014)In farming, the outcome of critical decisions to enhance productivity and profitability and so ensure the viability of farming enterprises is often influenced by seasonal conditions and weather events over the growing ... - Introduction to the 2014 Digital Rural Futures Conference Special Edition in association with the Regional Universities Network (RUN) (2015)In June, 2014, the Digital Rural Futures Conference, an initiative of the Regional Universities Network (RUN), was held at the University of Southern Queensland’s Toowoomba campus. RUN, a network of six universities ... - Virtual Discussions to Support Climate Risk Decision Making on Farms (2015)Climate variability represents a significant risk to farming enterprises. Effective extension of climate information may improve climate risk decision making and adaptive management responses to climate variability on ... - Virtual Worlds in Distance Education: Opportunities and Challenges (2015)Virtual worlds are providing opportunities for the development of innovative curricula to enhance distance education. In these environments, students can participate in authentic learning activities that resembles real ... - e-Learning Incarcerated: Prison Education and Digital Inclusion (Common Ground Research Networks, 2015)This paper explores an Australian trial of mobile learning technologies, including internet-independent eBook readers loaded with tertiary preparation materials, which attempted to improve access to tertiary courses and ...
https://ir.canterbury.ac.nz/handle/10092/160/recent-submissions?offset=20
). Perhaps the central reason for its wide applicability is the fact that it (provably, and with high probability) suffices to take only a small number of random samples from a large dataset in order to “represent” the dataset truthfully (the precise geometric meaning is explained later). Thus, instead of performing costly and sometimes infeasible computations on the full dataset, one can sample a small yet “representative” subset of a data, perform the required analysis on this small subset, and extrapolate (approximate) conclusions from the small subset to the entire dataset. The analysis of sampling algorithms has mostly been studied in the non-adaptive (or static) setting, where the data is fixed in advance, and then the sampling procedure runs on the fixed data. However, it is not always realistic to assume that the data does not change during the sampling procedure, as described in [MNS11, GHR12, GHS12, HW13, NY15]. In this work, we study the robustness of sampling in an adaptive adversarial environment. The adversarial environment. In high-level, the model is a two-player game between a randomized streaming algorithm, called , and an adaptive player, . In each round, - first submits an element to . The choice of the element can depend, possibly in a probabilistic manner, on all elements submitted by up to this point, as well as all information that observed from up to this point. - Next, probabilistically updates its internal state, i.e., the sample that it currently maintains. An update step usually involves an insertion of the newly received element to the sample with some probability, and sometimes deletion of old elements from the sample. - Finally, is allowed to observe the current (updated) state of , before proceeding to the next round. ’s goal is to make the sample as unrepresentative as possible, causing to come with false conclusions about the data stream. The game is formally described in Section 2. Adversarial scenarios are common and arise in different settings. An adversary uses adversarial examples to fool a trained machine learning model [SZS14, MHS19]; In the field of online learning [Haz16], adversaries are typically adaptive [SS17, LMPL18]. An online store suggests recommended items based on a sample of previous purchases, which in turn influences future sales [Sha12, GHR12]. A network device routes traffic according to statistics pulled from a sampled substream of packets [DLT05], and an adversary that observes the network’s traffic learns the device’s routing choices might cause a denial-of-service attack by generating a small amount of adversarial traffic [NY15]. A high-frequency stock trading algorithm monitors a stream of stock orders places buy/sell requires based on statistics drawn from samples; A competitor might fool the sampling algorithm by observing its requests and modifying future stock orders accordingly. An autonomous vehicle receives physical signals from its immediate environment (which might be adversarial [SBM18]) and has to decide on a suitable course of action. Even when there is no apparent adversary, the adaptive perspective is sometimes natural and required. For instance, adaptive data analysis [DFH15, WFRS18] aims to understand the challenges arising when data arrives online, such as data reuse, the implicit bias “collected” over time in scientific discovery, and the evolution of statistical hypotheses over time. In graph algorithms, [CGP18] observed that an adversarial analysis of dynamic spanners would yield a simpler (and quantitively better) alternative to their work. In view of the importance of robustness against adaptive adversaries, and the fact that random sampling is very widely used in practice (including in streaming settings), we ask the following. Are sampling algorithms robust against adaptive adversaries? Bernoulli and reservoir sampling. We mainly focus on two of the most basic and well-known sampling algorithms: Bernoulli sampling and reservoir sampling. The Bernoulli sampling algorithm with parameter runs as follows: whenever it receives a stream element , the algorithm stores the element with probability . For a stream of length the sample size is expected to be ; and furthermore, it is well-concentrated around this value. We denote this algorithm by . The classical reservoir sampling algorithm [Vit85] (see also [Knu97, Section 3.4.2] and a formal description in Section 2) with parameter maintains a uniform sample of fixed size , acting as follows. The first elements it receives, , are simply added to the memory with probability one. When the algorithm receives its element , where , it stores it with probability , by overriding a uniformly random element from the memory (so the memory size is kept fixed to ). We henceforth denote this algorithm by . Attacking sampling algorithms. To answer the question above of whether sampling algorithms are robust against adversarially chosen streams, we must first define a notion of a representative sample, as several notions might be appropriate. However, we begin the discussion with an example showing how to attack the Bernoulli (and reservoir) sampling algorithm with respect to merely any definition of “representative”. Consider a setting where the stream consists of points in the one-dimensional range of real numbers . receives these points and samples each one independently with probability . One can observe that, in the static setting and for sufficiently large , the sampled set will be a good representation of the entire points for various definitions of the term “representation”. For example, the median of the stream will be -close111The term “close” here means that the median of the sampled set will be an element whose order among the elements of the full stream, when the elements are sorted by value from smallest to largest, is within the range , with high probability where the parameter depends on the probability . to the median of the sampled elements with high probability, as long as for some constant (this also holds for any other quantile). Consider the following adaptive adversary which will demonstrate the difference of the adaptive setting. keeps a “working range” at any point during the game, starting with the full range . In the first round, chooses the number as the first element in the stream. If is sampled, then moves to the range , and otherwise, to the range . Next, submits as the middle of the current range. This continues for steps; Formally, ’s strategy is as follows. Set and . In round , where runs from to , submits to ; If is sampled then sets , and otherwise, it sets . The final stream is . Note that at any point throughout the process, always submits an element that is larger than all elements in the current sampled set, and also smaller than all the non-sampled elements of the stream. Therefore, the end result is that after this process is over, with probability 1, the sampled elements are precisely the smallest elements in the stream. Of course, the median of the sampled set is far from the median of the stream as such a subset is very unrepresentative of the data. Actually, one might consider it as the “most unrepresentative” subset of the data. The exact same attack on works almost as effectively against . In this case, the attack will cause all of the sampled elements at the end of the process to lie among the first elements with high probability. For more details, see Section 5. The good news. This attack joins a line of attacks in the adversarial model. Lipton and Naughton [LN93] showed that an adversary that can measure the time of operations in a dictionary can use this information to increase the probability of a collision and as a result, significantly decrease the performance of the hashtable. Hardt and Woodruff [HW13] showed that linear sketches are inherently non-robust and cannot be used to compute the Euclidean norm of its input (where in the static setting they are used mainly for this reason). Naor and Yogev [NY15] showed that Bloom filters are susceptible to attacks by an adaptive stream of queries if the adversary is computationally unbounded and they also constructed a robust Bloom filter against computationally bounded adversaries. In our case, we note that the given attack might categorize it as “theoretical” only. In practice, it is unrealistic to assume that the universe from which can pick elements is an infinite set; how would the attack look, then, if the universe is the discrete set ? splits the range to half for times, meaning that the precision of the elements required is exponential; The analogous attack in the discrete setting requires to be exponentially large with respect to the stream size . Such a universe size is large and “unrealistic”: for to memorize even a single element requires memory size that is linear in , whilst sampling and streaming algorithms usually aim to use an amount sublinear in of memory. Thus, the question remains whether there exist attacks that can be performed on elements using substantially less precision, that is, on a significantly smaller size of discrete universe. In this work, we bring good news to both the Bernoulli and reservoir sampling algorithms by answering this question negatively. We show that both sampling algorithms, with the right parameters, will output a representative sample with good probability regardless of ’s strategy, thus exhibiting robustness for these algorithms in adversarial settings. We note that any deterministic algorithm that works in the static setting is inherently robust in the adversarial adaptive setting as well. However, in many cases, deterministic algorithms with small memory simply do not exist, or they are complicated and tailored for a specific task. Here, we enjoy the simplicity of a generic randomized sampling algorithm combined with the robust guarantees of our framework. What is a representative sample? Perhaps the most standard and well-known notion of being representative is that of an -approximation, first suggested by Vapnik and Chervonenkis [VC71] (see also [MV17]), which originated as a natural notion of discrepancy [Cha01] in the geometric literature. It is closely related to the celebrated notion of VC-dimension [VC71, Sau72, She72], and captures many quantitative properties that are desired in a random subset. Let be a sequence of elements from the universe (repetitions are allowed) and let . The density of in is the fraction of elements in that are also in (i.e., ). A set system is simply a pair where is a collection of subsets. A non-empty subsequence of is an -approximation of with respect to the set system if it preserves densities (up to an factor) for all subsets . Definition 1.1 (-approximation). We say that a (non-empty) sample is an -approximation of with respect to if for any subset it holds that If the universe is well-ordered, it is natural to take as the collection of all consecutive intervals in , that is, (including all singletons ). With this set system in hand, -approximation is a natural form of “good representation” in the streaming setting, pointed out by its deep connection to multiple classical problems in the streaming literature, like approximate median, and more generally, quantile estimation[MRL99, GK01, WLYC13, GK16, KLL16] and range searching [BCEG07]. In particular, if is an -approximation of w.r.t. , then any -quantile of is -close to the -quantile of ; this holds simultaneously for all quantiles (see Section 1.2). 1.1 Our Results Fix a set system over the universe . A sampling algorithm is called -robust if for any (even computationally unbounded) strategy of , the output sample is an -approximation of the whole stream with respect to , with probability at least . Our main result is an upper bound (“good news”) on the -robustness of Bernoulli and reservoir sampling, later to be complemented them with near-matching lower bounds. Theorem 1.2. For any , set system , and stream length , the following holds. - with parameter is -robust. - with parameter is -robust. The proof appears in Section 4. As the total number of elements sampled by is well-concentrated around , the above theorem implies that a sample of total size (at least) , obtained by any of the algorithms, or , is an -approximation with probability . This should be compared with the static setting, where the same result is known as long as for , and for , where is the VC-dimension of and is a constant [VC71, Tal94, LLS01] (see also [MV17]). As you can see, to make the static sampling algorithm robust in the adaptive setting one solely needs to modify the sample size by replacing the VC-dimension term with the cardinality dimension (and update the multiplicative constant). Below, in our lower bounds, we show that this increase in the sample size is inherent, and not a byproduct of our analysis. Lower Bounds. We next show that being adaptively robust comes at a price. That is, the dependence on the cardinality dimension, as opposed to the VC dimension, is necessary. By an improved version of the attack described in the introduction, we show the following: Theorem 1.3. There exists a constant and a set system with VC-dimension 1, where such that for any : - The algorithm with parameter is not -robust. - The algorithm with parameter is not -robust. Moreover, for any , there exists as above where . The proof can be found in Section 5. Continuous robustness. The condition of -robustness requires that the sample will be -representative of the stream in the end of the process. What if we wish the sample to be representative of the stream at any point throughout the stream? Formally, we say that a sampling algorithm is -continuously robust if, with probability at least , at any point the sampled set is an -approximation of the first elements of the stream, i.e., of . The next theorem shows that continuous robustness of can be obtained with just a small overhead compared to “standard” robustness. (For one cannot hope for such a result to be true, at least for the above definition of continuous robustness.) Theorem 1.4. There exists , such that for any , set system , and stream length , with parameter is -continuously robust. Moreover, if only continuous robustness against a static adversary is desired, then the term can be replaced with the VC-dimension of . We are not aware of a previous analysis of continuous robustness, even in the static setting. The proof, appearing in Section 6, follows by applying Theorem 1.2 (or its static analogue) in carefully picked “checkpoints” along the stream, where . It shows that if the sample is representative of the stream in any of the points , then with high probability, the sample is also representative in any other point along the stream. (We remark that a similar statement with weaker dependence on can be obtained from Theorem 1.2 by a straightforward union bound.) The proof can be found in Section 6. Comparison to deterministic sampling algorithms. Our results show that sampling algorithms provide an -approximation in the adversarial model. One advantage of using the notion of -approximation is its wide array of applications, where for each such task we get a streaming algorithm in the adversarial model as described in the following subsection. We stress that for any specific task a deterministic algorithm that works in the static setting will also automatically be robust in the adversarial setting. However, deterministic algorithms tend to be more complicated, and in some cases they require larger memory. Here, we focus on showing that the most simple and generic sampling algorithms “as is” are robust in our adaptive model and yield a representative sample of the data that can be used for many different applications. The best known deterministic algorithm for computing an -approximating sample in the streaming model is that of Bagchi et al. [BCEG07]. The sample size they obtain is ; the working space of their algorithm and the processing time per element are of the form , where is the scaffold dimension222The scaffold dimension is a variant of the VC-dimension equal to . of the set system. The exact bounds are rather intricate, see Corollary 4.2 in [BCEG07]. While the space requirement of their approach does not have a dependence on , its dependence on and is generally worse than ours, making their bounds somewhat incomparable to ours. Finally, we note that there exist more efficient methods to generate an -approximation in some special cases, e.g., when the set system constitutes of rectangles or halfspaces [STZ04]. 1.2 Applications of Our Results We next describe several representative applications and usages of -approximations (see also [BCEG07] for more applications in the area of robust statistics). For some of these applications, there exist deterministic algorithms known to require less memory than the simple random sampling models discuss in this paper. However, one area where our generic random sampling approach shines compared to deterministic approaches is the query complexity or running time (under a suitable computational model). Indeed, while deterministic algorithms must inherently query all elements in the stream in order to run correctly, our random sampling methods query just a small sublinear portion of the elements in the stream. Consequently, to the best of our knowledge, Bernoulli and reservoir sampling are the first two methods known to compute an -approximation (and as a byproduct, solve the tasks described in this subsection) in adversarial situations where it is unrealistic or too costly to query all elements in the stream. The last part of this subsection exhibits an example of one such situation. Quantile approximation. As was previously mentioned, -approximations have a deep connection to approximate median (and more generally, quantile estimation). Assume the universe is well-ordered. We say that a streaming algorithm is an -robust quantile sketch if, in our adversarial model, it provides a sample that allows to approximate the rank333The rank of an element in a stream is the total amount of elements in the stream so that . of any element in the stream up to additive error with probability at least . Observe that this is achieved with an -approximation with respect to the set system where . For example, set to be the median of the stream. Since the density of the range is preserved in the sample, we know that the median of the sample will be -close to the median of the stream. This works for any other quantile simultaneously. The sample size is . Corollary 1.5. For any , well-ordered universe , and stream length , with parameter is an -robust quantile sketch. The same holds for the algorithm with parameter . A corollary in the same spirit regarding continuously robust quantile sketches can be derived from Theorem 1.4. Range queries. Suppose that the universe is of the form for some parameters and . One basic problem is that of range queries: one is given a set of ranges and each query consists of a range where the desired answer is the number of points in the stream that are in this range. Popular choices of such ranges are axis-aligned or rotated boxes, spherical ranges and simplicial ranges. An -approximation allows us to answer such range queries up to an additive error of . Suppose the sampled set is , then an answer is given by computing . For example, when consists of all axis-parallel boxes, and thus the sample size required to answer range queries that are robust against adversarial streams is ; for rotated boxes, one should replace with in this expression. See [BCEG07] for more details on the connection between -approximations and range queries. Center points. Our result is also useful for computing -center points. A point in the stream is a -center point if every closed halfspace containing in fact contains at least points of the stream. In [CEM96, Lemma 6.1] it has been shown that an -approximation (with respect to half-spaces) can be used to get a -center point for suitable choices of the parameters. For example, setting we get that a -center of the sample is a -center of the stream . Thus, we can compute a -center of a stream in the adversarial model. See also [BCEG07]. Heavy hitters. Finding those elements that appear many times in a stream is a fundamental problem in data mining, with a myriad of practical applications. In the heavy hitters problem, there is a threshold and an error parameter . The goal is to output a list of elements such that if an element appears more than times in the stream (i.e., ) it must be included in the list, and if an element appears less than times in the stream (i.e., it cannot be included in the list. Our results yield a simple and efficient heavy hitters streaming algorithm in the adversarial model. For any universe let be the set of all singletons. Now, pick and use either Bernoulli or reservoir sampling to compute an -approximation of the stream , outputting all elements with . Indeed, if then . On the other hand, if then . Corollary 1.6. There exists such that for any , universe , and stream length , with parameter solves the heavy hitters problem with error in the adversarial model. The same holds for with parameter . Clustering. The task of partitioning data elements into separate groups, where the elements in each group are “similar” and elements in different groups are “dissimilar” is fundamental and useful for numerous applications across computer science. There has been lots of interest on clustering in a streaming setting, see e.g. [GLA16] for a survey on recent results. Our results suggest a generic framework to accelerate clustering algorithms in the adversarial model: Instead of running clustering on the full data, one can simply sample the data to obtain (with high probability, even against an adversary) an -approximation of it, run the clustering algorithm on the sample, and then extrapolate the results to the full dataset. Sampling in modern data-processing systems. It is very common to use random sampling (sometimes “in disguise”) in modern data-intensive systems that operate on streaming data, arriving in an online manner. As an illustrative example, consider the following distributed database [OV11] setting. Suppose that a database system must receive and process a huge amount of queries per second. It is unrealistic for a single server to handle all the queries, and hence, for load balancing purposes, each incoming query is randomly assigned to one of query-processing servers. Seeing that the set of queries that each such server receives is essentially a Bernoulli random sample (with parameter ) of the full stream, one hopes that the portion of the stream sampled by each of these servers would truthfully represent the whole data stream (e.g., for query optimization purposes), even if the stream changes with time (either unintentionally or by a malicious adversary). Such “representation guarantees” are also desirable in distributed machine learning systems [GDG17, SKYL17], where each processing unit learns a model according to the portion of the data it received, and the models are then aggregated, with the hope that each of the units processed “similar” data. In general, modern data-intensive systems like those described above become more and more complicated with time, consisting of a large number of different components. Making these systems robust against environmental changes in the data, let alone adversarial changes, is one of the greatest challenges in modern computer science. From our perspective, the following question naturally emerges: Is random sampling a risk in modern data processing systems? Fortunately, our results indicate that the answer to this question is largely negative. Our upper bounds, Theorems 1.2 and 1.4, show that a sufficiently large sample suffices to circumvent adversarial changes of the environment. 1.3 Related Work Online learning. One related field to our work is online learning, which was introduced for settings where the data is given in a sequential online manner or where it is necessary for the learning algorithm to adapt to changes in the data. Examples include stock price predictions, ad click prediction, and more (see [Sha12] for an overview and more examples). Similar to our model, online learning is viewed as a repeated game between a learning algorithm (or a predictor) and the environment (i.e., the adversary). It considers rounds where in each round the environment submits an instance , the learning algorithm then makes a prediction for , the environment, in turn, chooses a loss for this prediction and sends it as feedback to the algorithm. The goal in this model is usually to minimize regret (the sum of losses) compared to the best fixed prediction in hindsight. This is the typical setting (e.g., [HAK07, SST10]), however, many different variants exist (e.g., [DGS15, ZLZ18]). PAC learning. In the PAC-learning framework [Val84], the learner algorithm receives samples generated from an unknown distribution and must choose a hypothesis function from a family of hypotheses that best predicts the data with respect to the given distribution. It is known that the number of samples required for a class to be learnable in this model depends on the VC-dimension of the class. A recent work of Cullina et al. [CBM18] investigates the effect of evasion adversaries on the PAC-learning framework, coining the term of adversarial VC-dimension for the parameter governing the sample complexity. Despite the name similarity, their context is seemingly unrelated to ours (in particular, it is not a streaming setting), and correspondingly, their notion of adversarial VC-dimension does not seem to relate to our work. Adversarial examples in deep learning. A very popular line of research in modern deep learning proposes methods to attack neural networks, and countermeasures to these attacks. In such a setting, an adversary performs adaptive queries to the learned model in order to fool the model via a malicious input. The learning algorithms usually have an underlying assumption that the training and test data are generated from the same statistical distribution. However, in practice, the presence of an adaptive adversary violates this assumption. There are many devastating examples of attacks on learning models[SZS14, BCM13, PMG17, BR18, MHS19] and we stress that currently, the understanding of techniques to defend against such adversaries is rather limited [GMP18, MW18, MM19, MHS19]. Maintaining random samples. Reservoir sampling is a simple and elegant algorithm for maintaining a random sample of a stream [Vit85], and since its proposal, many flavors have been introduced. Chung, Tirthapura, Woodruff [CTW16] generalized reservoir sampling to the setting of multiple distributed streams, which need to coordinate in order to continuously respond to queries over the union of all streams observed so far (see also Cormode et al. [CMYZ12]). Another variant is weighted reservoir sampling where the probability of sampling an element is proportional to a weight associated with the element in the stream [ES06, BOV15]. A distributed version as above was recently considered for the weighted case as well [JSTW19]. 1.4 Paper Organization Section 2 contains an overview of our adversarial model and a more precise and detailed definition than the one given in the introduction. In Section 3 we mention several concentration inequalities required for our analysis. In Section 4 we present and prove our main technical Lemma, from which we derive Theorem 1.2. This includes analysis of both and . In Section 5 we present our “attack”, i.e., our lower bound showing the tightness of our result. Finally, in Section 6, we prove our upper bounds in the continuous setting. 2 The Adversarial Model for Sampling In this section, we formally define the online adversarial model discussed in this paper. Roughly speaking, we say that is an -robust sampling algorithm for a set system if for any adversary choosing an adaptive stream of elements , the final state of the sampling algorithm is an -approximation of the stream with probability . This is formulated using a game, , between two players, and . Rules of the game: - is a streaming algorithm, which gets a sequence of elements one by one in an online manner (the sampling algorithms we discuss in this paper do not need to know in advance). Upon receiving an element , can perform an arbitrary computation (the running time can be unbounded) and update a local state . We denote the local state after steps by , and write . - The stream is chosen adaptively by : a probabilistic (unbounded) player that, given all previously sent elements and the current state , chooses the next element to submit. The strategy that Adversary employs along the way, that is, the probability distribution over the choice ofgiven any possible set of values and , is fixed in advance. The underlying (finite or infinite) set from which is allowed to choose elements during the game is called the universe, and denoted by . We assume that does not change along the game. - Once all rounds of the game have ended, outputs . For the sampling algorithms discussed in this paper, is a subsequence of the stream . is usually called the sample obtained by in the game. For an illustration on the rules of the game see Figure 1. Using the game defined above, we now describe what it means for a sampling algorithm to be (adversarially) robust. Definition 2.1 (Robust sampling algorithm). We say that a sampling algorithm is -robust with respect to the set system and the stream length if for and any (even unbounded) strategy of , it holds that The memory size used by is defined to be the maximal size of throughout the process of . A stronger requirement that one can impose on the sampling algorithm is to hold an -approximation of the stream at any step during the game. To handle this, we define a continuous variant of which we denote , presented in Figure 2. For the sampling algorithms that we consider, the state at any time is essentially equal to the sample . In any case, the definition of the framework given in Figure 2 generally allows to contain additional information, if needed. A sampling algorithm is called -continuously robust if the following holds with probability at least : for any strategy of , and all , the sample is an -approximation of the stream at time . Definition 2.2 (Continuously robust sampling algorithm). We say that a sampling algorithm is -continuously robust with respect to the set system and the stream length if for and any (even unbounded) strategy of , it holds that The memory size used by is defined to be the maximal size of throughout the process of . Reservoir sampling. For completeness, we provide the pseudocode of the reservoir sampling algorithm [Vit85, Knu97]. Here, denotes the (fixed) memory size of the algorithm, denotes the current round number, and is the currently received element. : - If then parse and output . - Otherwise, parse . - With probability do: choose uniformly at random and output . - Otherwise, output . 3 Technical Preliminaries The logarithms in this paper are usually of base , and denoted by . The exponential function is . For an integer we denote by the set . We state some concentration inequalities, useful for our analysis in later sections. We start with the well-known Chernoff’s inequality for sums of independent random variables. Theorem 3.1 (Chernoff Bound [Che52]; see Theorem 3.2 in [Cl06]). Let be independent random variables that take the value 1 with probability and 0 otherwise, , and . Then for any , and Our analysis of adversarial strategies crucially makes use of martingale inequalities. We thus provide the definition of a martingale. Definition 3.2. A martingale is a sequence of random variables with finite means, so that for , it holds that . The most basic and well-known martingale inequality, Azuma’s (or Hoeffding’s) inequality, asserts that martingales with bounded differences are well-concentrated around their mean. For our purposes, this inequality does not suffice, and we need a generalized variant of it, due to McDiarmid [McD98, Theorem 3.15]; see also Theorem 4.1 in [Fre75]. The formulation that we shall use is given as Theorem 6.1 in the survey of Chung and Lu [CL06]. Lemma 3.3 (See [Cl06], Theorem 6.1). Let be a martingale. Suppose further that for any , the variance satisfies , the variance satisfiesfor some values , and there exists some so that always holds. Then, for any , we have In particular, Unlike Azuma’s inequality, Lemma 3.3 is well-suited to deal with martingales where the maximum value of is large, but the maximum is rarely attained (making the variance much smaller than ). The martingales we investigate in this paper depict this behavior. 4 Adaptive Robustness of Sampling: Main Technical Result In this section, we prove the main technical lemma underlying our upper bounds for Bernoulli sampling and reservoir sampling. The lemma asserts that for both sampling methods, and any given subset of the universe , the fraction of elements from within the sample typically does not differ by much from the corresponding fraction among the whole stream. Lemma 4.1. Fix , a universe and a subset , and let be the sequence chosen by in against either or . - For with parameter , we have . - For with memory size , it holds that . Both of these bounds are tight up to an absolute multiplicative constant, even for a static adversary (that has to submit all elements in advance); see Section 6 for more details. The proof of Theorem 1.2 follows immediately from Lemma 4.1, and is given below. The proof of Theorem 1.4 requires slightly more effort, and is given in Section 6. Proof of Theorem 1.2. Let , , , be as in the statement of the theorem, and let and denote the stream and sample, respectively. We start with the Bernoulli sampling case, and assume that . For each , we apply the first part of Lemma 4.1 with parameters and , concluding that In the event that for any , by definition is an -approximation of . Taking a union bound over all , we conclude that the probability of this event not to hold is bounded by , meaning that with as above is -robust. The proof for is identical, except that we replace the condition on with the condition that , and apply the second part of Lemma 4.1. ∎ It is important to note that the typical proofs given for statements of this type in the static setting (i.e., when Adversary submits all elements in advance, and cannot act adaptively) do not apply for our adaptive setting. Indeed, the usual proof of the static analogue of the above lemma goes along the following lines: Adversary chooses which elements to submit in advance, and in particular, determines the number of elements from sent, call it . Then, the number of sampled elements from is distributed according to the binomial distributionfor Bernoulli sampling, and for reservoir sampling. One can then employ Chernoff bound to conclude the proof. This kind of analysis crucially relies on the adversary being static. Here, we need to deal with an adaptive adversary. Recall that at any given point is modeled as a probabilistic process, that given the sequence of elements sent until now, and the current state of , probabilistically decides which element to submit next. Importantly, this makes for a well-defined probability space, and allows us to analyze ’s behavior with probabilistic tools, specifically with concentration inequalities. Chernoff bound cannot be used here, as it requires the choices made by the adversary along the process to be independent of each other, which is clearly not the case. In contrast, martingale inequalities are suitable for this setting. We shall thus employ these, specifically Lemma 3.3, to prove both parts of our main result in this section. 4.1 The Bernoulli Sampling Case We start by proving the Bernoulli sampling case (first statement of Lemma 4.1). Recall that here each element is sampled, independently, with probability . At any given point along the process, let denote the sequence of elements submitted by the adversary until round , and let denote the subsequence of sampled elements from . Note that and , and hence, to prove the lemma, we need to show that . As a first attempt, it might make sense to try applying a martingale concentration inequality on the sequence of random variables , where we define . Indeed, our end-goal is to bound the probability that significantly deviates from zero. However, a straightforward calculation shows that this is not a martingale, since the condition that does not hold in general. To overcome this, we show that a slightly different formulation of the random variables at hand does yield a martingale. Given the above , for any we define the random variables |(1)| where, as before, the intersection between a set and a sequence is the subsequence of consisting of all elements that also belong to . Importantly, as is described in the next claim, the sequence of random variables defined above forms a martingale. The claim also demonstrates several useful properties of these random variables, to be used later in combination with Lemma 3.3. Claim 4.2. The sequence is a martingale. Furthermore, the variance of conditioned on is bounded by , and it always holds that . We shall prove Claim 4.2 later on; first we use it to complete the proof of the main result. Proof of Lemma 4.1, Bernoulli sampling case. It suffices to prove the following two inequalities for any satisfying the conditions of the lemma for the Bernoulli sampling case: |(2)| Indeed, taking a union bound over these two inequalities, applying the triangle inequality, and observing that , we conclude that , as desired. The first inequality follows from Claim 4.2 and Lemma 3.3. Indeed, in view of Claim 4.2, we can apply Lemma 3.3 on with parameters , , and . As , we have , and so The right hand side is bounded by when , settling the first inequality of (2). We next prove the second inequality of (2). Observe that . Since each element is added to the sample with probability , independently of other elements, the size of is distributed according to the binomial distribution , regardless of the adversary’s strategy. Applying Chernoff inequality with , we get that This probability is bounded by provided that . Conditioning on this event not occurring, we have that where the first inequality follows from the fact that densities (in this case, ) are always bounded from above by one, and the second inequality follows from our conditioning. This completes the proof of the second inequality in (2). ∎ The proof of Claim 4.2 is given next. Proof of Claim 4.2. We first show that is a martingale. Fix , and suppose that the first rounds of have just ended (so the values of are already fixed), and that now picks an element to submit in round of the game. If then and and so , which trivially means that as desired. When , we have Recall that uses Bernoulli sampling with probability , that is, is sampled with probability (regardless of the outcome of the previous rounds). Therefore, we have that The analysis of both cases and implies that , as desired.
https://deepai.org/publication/the-adversarial-robustness-of-sampling
It used to be divorce that everyone was worried about. But divorce rates are down: now, according to a new report, children are more likely to have unmarried parents than divorced ones. Are unmarried parents who live together the new risk to children? The University of Virginia’s National Marriage Project and the Institute for American Values say yes; their recent report states that the number of American parents who are cohabitating but not married has increased twelvefold since the 1970s. The report’s data, which comes from the Census Bureau and the Centers for Disease Control and Prevention’s National Survey of Family Growth, states that 42% of children had unmarried, cohabitating parents by age 12 while only 24% had divorced parents. The report went further to cite studies that assert that children with unmarried, cohabitating parents perform worse in school and have more psychological problems (Journal of Marriage and Family and Sociology of Education). Even further, it cites a 2010 report on child abuse that found that 57.2 of 1,000 children with an unmarried partner were abused while only 6.8 of 1,000 children with married parents were abused (federal Department of Health and Human Services). Where are we seeing cohabitating parents? W. Bradford Wilcox, director of the National Marriage Project, explains that the number of cohabitating parents began to quickly increase in poor communities in the late 1960s. Now, the phenomenon has moved to lower-middle-class families, with out-of-wedlock births among high-school-educated women up from 5% in 1982 to 34% in the 2000s. But Stephanie Coontz, director of public education for the Council on Contemporary Families, does not agree that marriage will help keep these parents together or that parents cohabitating without marrying hurts children. Coontz has researched families of the 1960s and found unhappy married couples who married because it was expected and ultimately did more damage to their children than unmarried couples do today. Does marriage help keep a couple together? Is there a reason—economic, philosophical or otherwise—to not get married? Does it make a difference to the child if her parents are married? Guests:
http://www.scpr.org/programs/patt-morrison/2011/08/24/20407/unmarriedparentscohabitingnationalmarriageproject/
Reef Check recently completed work on the baseline Marine Protected Area (MPA) monitoring in Brunei, a small nation located on the north coast of the island of Borneo, in Southeast Asia. Located at the edge of the Coral Triangle near the world center of marine biodiversity, the reefs exhibit a very high biodiversity. Reef Check was requested by the Brunei Department of Fisheries (DOF) to carry out a survey of its coral reefs, most of which were placed inside a new network of MPAs that was implemented January 1, 2012. Each of the reefs located within the MPAs is a no-take fishing area. The baseline survey will allow the DOF to track changes and hopefully improvements in the health of the country’s coral reefs over time. A team of six scientists from Reef Check International (RC), Reef Check Malaysia and the National University of Malaysia surveyed 36 reef sites in April 2012 using the Reef Check protocol augmented with video, still photographs and roving swims to document fish families. An additional 7 sites were previously surveyed in October and November 2011. These 44 sites covered all major reefs in Brunei waters and included sites from the three MPA areas, as well as Champion Oil Field which is currently not included in the MPA network. A second and more detailed round of surveys was carried out in October 2012 that added a great deal of new information about the condition of Brunei’s coral reefs and species living there. For this set of surveys more information was obtained on the distribution of coral genera and non-coral invertebrates that are not part of a standard Reef Check survey. In addition, fish surveys were carried out to determine the distribution and abundance of target species of interest to fishermen and biomass of populations of food fish was calculated. The October surveys confirmed the April findings that Brunei’s reefs are all structurally similar with a very low vertical profile and low relief due to geology and present day influences of freshwater, turbidity, sedimentation and wave action which all negatively affect the ability of corals to reproduce and grow in Brunei. Large (5 – 10 m diameter) “bommies” comprised of individual Porites coral colonies are found sporadically at most sites and provide habitat for resident reef fish including high value commercial fish such as Sweetlips (Haemulidae) and Grouper (Serranidae). | | Feather star and barrel sponge Reef Check indicator fish populations are quite low and most food fish are immature, indicating over fishing of these reefs. Enforcement of the no-take zones will be an important goal that will allow the reef fish populations to repopulate naturally. The coral cover ranged from a low of 9% at Otter Shoal to a high of 76% at Abana Rocks. The average coral cover of about 40% is consistent with reefs in the region. Nutrient Indicator Algae is low at most reefs but reached as high as 15% at some reefs, indicating a lack of herbivory. For no apparent reason, there are almost no sea urchins on Brunei reefs, exacerbating the lack of herbivorous fish. Coral consuming Crown-of-Thorns Sea Stars (Acanthaster) and the gastropod Drupella are present but not abundant. Two invertebrate indicators for food collection – spiny lobster and giant clams – were recorded in low numbers and most were small to medium size. The low numbers of small size classes of giant clams recorded indicates that there is little successful reproduction and recruitment occurring on Brunei reefs. Therefore it may be necessary to introduce aquacultured clams to build up the populations to the size where they can begin to reproduce naturally. Little trash was observed on Brunei reefs, however, ghost nets were found on almost all. At the Champion Oil Field sites, quite a lot of construction debris was found on most reefs. The underwater visibility during the surveys ranged from 6 to 20 m, and the water colour was typically green or yellow indicating a high density of phytoplankton. Prior to the baseline survey, very little was known about many of the reefs of Brunei and there had never been a comprehensive survey done. Annual re-surveys of the reefs are recommended so changes due to the implementation of the MPAs can be assessed.
https://www.reefcheck.org/reef-check-concludes-first-comprehensive-survey-of-brunei-reefs/
The Company aims at assuming responsibility for the society, environment and sustainable development according to its importance within the Hungarian economy. To this end, it endeavours to maintain an open and transparent dialogue and consultation with local communities, the civil society and the representatives of sports and scientific life, encouraging its employees to actively participate in the work and development of such communities and civil initiations. To express its awareness of social problems and to support extraordinary talents and events, the Company is engaged in responsible sponsorship, aid and donation activities in concert with the MVM Group. Donations and sponsorships may only be offered or granted in compliance with the relating rules of law. The Company explores opportunities to establish cooperation also with the national higher education and vocational institutions in order to maintain the operation of the energy industry in the long term. As to its social relations, the Company is committed to disclose full, comprehensible, regular and authentic information to the public with regard to its activities and aspirations, also establishing and maintaining generally positive and high-quality professional relationship with the media.
https://ceenergy.hu/en/TarsasagiAdatok/GazdalkodasiAdatok/TarsadalmiFelelossegvallalas
AMS would like to introduce you to our new 2016 Phoenix Fellow, Dr. Seema Marwaha. Seema is a Clinical Scientist and General Internist with Trillium Health Partners Institute for Better Health. She is also a Munk Global Journalism Fellow. We asked Seema a few questions to get a better understanding of what brought her to medicine, why she values compassionate care and the work that AMS Fellows are doing, and why she wanted to be involved. Here is what she had to say: Q. Why did you decide to become a healthcare professional? “I love hearing people’s stories and experiences – it’s why I was interested in film as early as high school. But I also was inquisitive and loved science. Healthcare seemed to be a great mix of the two passions. Not only do you get to apply science to make people feel healthier, but you also get to deeply understand their illness experience and life.” Q. What was the catalyst for your interest in compassion in healthcare? “I found my medical training focused more on being goal oriented and evidence-based than on connecting with and understanding my patients. I think we can do both- interweave compassionate care into all areas of patient care. It’s important to remember we are in the business of treating people, not just disease.” Q. How were you introduced to the Phoenix Program? “I am a photographer for a website called Faces of Health Care. The AMS foundation supports our photojournalism site and I was first introduced to the Phoenix Program then.” Q. What inspired you to apply for a Fellowship? “I was inspired to apply for a fellowship after I reviewed the past projects/bios on the website. I was impressed that AMS Phoenix supported unconventional and new projects about compassionate care that otherwise might not be funded by traditional research and quality improvement channels.” Q. What value does being an AMS Fellow bring to you professionally? “In addition to funding, AMS provides me with access to a network of like-minded professionals I can leverage for mentorship, collaboration and learning. This is invaluable in executing my own work, advancing myself professionally and understanding what other work is being done regionally. It’s also a platform I can use to showcase my projects and deepen my understanding of compassionate care practice.” Q. What one little thing could we do to make our healthcare system more compassionate? “I firmly believe there is a lot of ‘low lying fruit’ when it comes to compassionate care in our system. In my graduate school work, I experimented with empathetic design exercises in my classes – these are techniques used to really understand the people you are designing for and develop an awareness of how they see the world. I started doing these exercises to understand the patient populations I treat – elderly, non-English speaking, people with physical disability etc. And it changed the way I communicate with patients. I thought about the fonts on my discharge instructions, my posture and positioning when speaking to patients in bed, and challenges with way finding, just to name a few. These were easy things for me to change, but I had never considered the potential impact small tweaks in my practice can have on patient care. Our health care system would be more compassionate if every provider thought about how their patient’s experience care and made simple changes to the way they practice to try and make it better.” Q. Have you ever been given advice by a patient that changed the way you practice medicine? I discharged a patient home from the ER. He was extremely nervous to go home, but really didn’t need to be in hospital. I sensed his nervousness and called him at home, the day after his discharge. He was so grateful and happy that I was interested in his progress and improvements and indicated the only reason he was pushing to stay in the hospital was because he worried no one would follow up on his care. He wanted reassurance he was improving. I realized that for a lot of patients, small gestures that communicate you care go a long way. Just the awareness that someone is watching over their condition often makes them feel better. Whenever I have a difficult discharge or someone who is sick, I think about what small gestures I can do that communicate to them that I care and am a champion for them. Whether it’s a phone call or a note or a follow-up, I realize these actions go a long way.” Q. What advice do you have for healthcare professionals to avoid/overcome compassion fatigue and burnout? “Take time for self-reflection. It’s important to check-in with yourself and remember why you do what you do. I like getting to know my patients and connecting with them, but can burn out or get too involved if I don’t take time to self-reflect. It’s easy to lose sight of what your role is in someone’s circle of care if you don’t take time to reflect. To medical students I would say don’t prioritize learning the medical science over connecting with patients. Rather than choosing one or the other, finding a balance between the two is key.” Leave a Reply Want to learn more about AMS and the people and projects we fund? Follow us on twitter.
https://www.ams-inc.on.ca/get-know-2016-ams-phoenix-fellow-dr-seema-marwaha/
Franz Kafka, in his novel, The Metamorphosis describes the literal and metaphorical metamorphosis of Gregor Samsa, from a human to a hideous insect-like creature, but underneath the literal lies the more significant metamorphosis of the Samsa Family. In the novella, Gregor Samsa, the sole breadwinner and only son, transforms into a hideous creature. He is locked inside his room, and his only sister Grete takes care of him, while his father wants to get rid of him. Ultimately, the family come to the consensus that the creature is no longer Gregor, and decide to get rid of it. The literal metamorphosis of Gregor catalyzes the growth and development of Grete, from a meek little girl, to a decisive, mature, young woman. Although Grete’s change is the most significant, Mr. Samsa also undergoes a metamorphosis of his own, transforming from a dependent, broken shell of a man, to an independent, responsible man, with a sense of purpose and meaning. In the novella, The Metamorphosis, Kafka explores how traumatic incidents catalyze a positive transformation amongst the Samsa family. Kafka ultimately points to the hope and perseverance of humanity, regardless of the circumstances faced. The traumatic metamorphosis of Gregor triggered a transformation in Grete, from being a passive, and dependent girl, to a mature, authoritative, and responsible young woman. As Gregor’s metamorphosis progresses and he becomes more insect-like, the Samsa family become disgusted and appalled at his appearance, and the lack of his ability to contribute to the household. This sentiment grows until Grete becomes the only person who the metamorphosed Gregor has any communication and connection with. She starts to exercise her authority by: acting as a special expert with respect to their parents” (Kafka 44), with no consideration of his needs and desires regarding his confined environment and emotional well-being, illustrated through Grete’s decision SS1 to re-arrange Gregor’s room: They were clearing his room out; taking away everything he loved; the chest in which he had kept his fretsaw and other tools was dragged off; they were now loosening theSS2 writing desk which had almost sunk into the floor, the desk he had done all his homework when he was at the commercial academy, at the grammar school before that” (46) and how “Grete did not let herself be dissuaded from her mother” (45). Though Grete proclaims that she is acting for the brother’s behalf, she ends up separating Gregor from the few remaining physical attachments. These objects are a symbol and a reminder of his past and their absence furthers his detachment from the Samsa family. Through the metamorphosis, Gregor’s needs and abilities transitions form human to insect, the Samsa family’s actions forces him to adapt and change to his new physical form, without consideration for his resistance to detach from his human past, and his hope of returning to it. Through this Kafka depicts Grete’s transition and development from a young sister who cares for her brother and his preferences, to one that doesn’tSS3 . Through her role of an authoritative, mature, and considerate decision maker, in respect to Gregor’s needs, she displays maturity, and is completely independent in that matter. Through the portrayal of Grete’s role, the author seems to suggest that Grete undergoes a metamorphosis of her own, that is parallel to her brother’s. As Gregor’s physical and emotional state transform, Grete also has a respective transformation; she gains her independence and maturity. This progression in Grete’s role points to the positive caused by Gregor’s metamorphosis, the symbolic golden lining behind a storm cloud, that although the events that take place are tragic, it does lead to a development in Grete’s personality. At face value, after reading this novella, it may seem to depict the situation and the human condition as one of despair and isolation. but by focusing on the role of Grete, it is evident that Kafka could also be depicting the human condition as one of hope and rebirth. Although Grete’s love for her metamorphosed brother is well meaning, and genuine, it cannot survive the disparity cause by the metamorphosis, nor her personal transformation and the emergence from adolescence to adulthood. Although she honors the memory of her brother, Grete understands that “things can’t go on like this” (67). She stops cleaning his room and providing him food. Her detachment is evident when she refers to Gregor as it. Grete has reached the level of maturity where she can conclude that “the family must try to get rid of it, and that Gregor must go” (68) and that “if this were Gregor, he would have realized long age that communal life among human beings is not possible with such an animal and Gregor would have gone away voluntarily” (69). Through this statement, and her referral of Gregor as it, she has reached full maturity, as she is capable of detaching the memory of her brother from the metamorphosed creature, and make a logical and pragmatic decision to get rid of it. Through the significant transformation of Grete, Kafka demonstrates how traumatic and challenging events force one to become more mature, more responsible and make decisions where reason and the greater good must be weighed more than emotional attachment. SS1Might flag as plagiarized. Re write or something to make the rest of the essay original and not plagiarism. We Will Write a Custom Essay Specifically For You For Only $13.90/page!
https://aggieagora.org/franz-get-rid-of-him-ultimately-the-family-come/
Peranakan Babi Pongteh with Potatoes Babi pongteh is a popular dish among the peranakan household and usually served during festive occasions. Originally this dish was cooked with bamboo shoots but this recipe is with potatoes, as I already have a recipe for Babi Pongteh with bamboo shoots. Pork belly is used in this recipe and in most recipes the potatoes are pre-fried. I prefer to add the potatoes raw during the later stage so that it will soak up the flavour of the gravy better during simmering. Hope you like my version of this well-known peranakan dish. Please click on the image below to view my video tutorial. If you like my video, please support me by clicking on the red “Subscribe” button on my YouTube channel. Thank you very much. YouTube link: https://youtu.be/wgDHcO1X83U - 750 g pork belly - 300 g small onions shallots - 150 g garlic - 70 g dried shiitake mushrooms - 1 kg potatoes - 3 Tbsp tau cheo soybean paste - 200 – 300 ml cooking oil - 2 Tbsp dark soy sauce - 500 ml water - Soak dried shiitake mushrooms in hot water until softened. - Remove stems and set aside water from soaking mushrooms. - Peel potatoes and cut into halves. - Soak in water to remove the starch and prevent it from discolouring. - Cut pork into smaller pieces and blanch in boiling water for a few minutes to remove scum. - Remove blanched pork and place under cold running water to stop the cooking process. - Blend together small onions, garlic and tau cheo into a fine paste. - Pour a generous amount of cooking oil and add the spice paste in a hot wok. - Fry spice paste until the oil separates and fragrant. - Add the pork, dark soy sauce and mix well until thoroughly coated. - Add mushroom water, mushrooms, water and mix everything together. - Bring to boil and let it simmer for about an hour. - Add in the potatoes and simmer for another half an hour until the meat is tender. - Add dark soy sauce if you want a darker gravy. - Serve with sambal belacan. If you like, you may add green chillies to the dish.
https://www.shiokmanrecipes.com/2020/10/19/peranakan-babi-pongteh-with-potatoes/
Modernism began to take shape in the literary movement in the nineteenth and early twentieth centuries. It is a style or movement in the arts that aims to break with classical and traditional forms. This type of literary movement is evident in Tennessee Williams’ A Street Car Named Desire??”Happy Endings are Overrated. The way this play ended was very new during the era of Tennessee Williams, it was unexpected and a true form of modernism. Tennessee Williams was born in 1911 and described his childhood in Mississippi as very happy. As time passed, he and his family moved to St. Louis, Missouri where his happy childhood was taken away, which brought him to start writing. The home situation was not pleasant for him because of the troubles happening in his parent’s marriage. He was able to use the struggles he endured growing up by incorporating them into his writings. He used his parents as inspiration, in a sense, for character in some of his other plays. Once he finished his studies at the university, he moved to New Orleans and changed his name to Tennessee. He completely turned around his life and lifestyle by exploring the city and what it has to offer, which would eventually inspire his work for A Streetcar Named Desire. This proved to be a success and made him the country’s best playwright at the time. He also won a Drama Critics’ Award and his first Pulitzer Prize. In the 1960s things were not going his way with his writings, which eventually turned him to alcohol and drugs; he was hospitalized because it got too out of hand. In 1975 he was released and went right back to working on his writings. He was able to release new plays and Memoirs that told his life stories. Sadly, he couldn’t get over his addiction and ended up passing in an NYC hotel room in 1983. When it comes to traditional plays, there are usually three or four acts divided while also including some kind of intermission in between. Williams’ had a different idea when he wrote A Streetcar Named Desire. He decided to make it one long act that is divided into eleven scenes with little or no pause between the scenes. With modernism, he portrays his characters psychological state through interior monologue and stream of consciousness; you can clearly see this through his characters Blanche and Stanley (Stella’s husband). Blanche is the kind of person who is a very fixated, psychologically deluded character that is uncertain when comparing reality and the one she makes in her mind. When I think of her, Blanche seems likes the youth of our hearts which has to be put away for worldly considerations: poetry, music, the early soft feelings that we can’t afford to live under the naked light bulb which is now. (Tennessee Williams) This is Williams’ way of commenting on the conflict between Victorian thinking and Modernism. A reason why his work is considered modernist is because of the little redemption offered in the story. The way Blanche operates and carries herself does not coincide with the modern social setting. As made evident in the story, Blanches perception of reality is considered crazy whereas Stanley’s behavior is praised; does not really make much sense realistically speaking further proving the modernist work. Well, I never cared for wishy-washy people. That was why, when you walked in here last night, I said to myself “My sister has a married man!”??” Of course that was all that I could tell about you. (Blanche 2.114) Blanche may be misunderstood, but she is not dumb; especially when it comes to Stanley. She knows that he is all about his masculinity but also tried to work into his good graces. Another reason why his play is viewed as modernist work is because of the ending. Most people expect a happy and fulfilled ending but that’s not what Williams’ had in mind. Blanche ends up being institutionalized and the use of freedom does not guarantee a happy ending. A Streetcar Named Desire is way more than just for entertainment. It is full of social conflict connotations that give relevance, depth and meaning to the story of the play. Williams had a way with writing that he was able to pull at the hearts of those in the audience back then and up to present day. Modernism is a style or movement in the arts that aims to break with classical and traditional forms; this play is exactly that. From Stella being her reserved self, to Blanche and her alcoholism/mental illness, and lastly Stanley’s view of himself as a social leveler; all of this tie into the concept of modernism. A professional writer will make a clear, mistake-free paper for you!Get help with your assigment Please check your inbox Hi!
https://studydriver.com/the-concept-of-modernism/
When buying a property, the principle of caveat emptor – a Latin term – applies which simply means ‘let the buyer beware’. In straightforward terms, the basis of caveat emptor that applies to a property purchase serves as a caution to buyers that they will have no recourse with the seller if the property does not meet their expectations. Buyer’s responsibility When buying a house, the responsibility is with the buyer to inspect the property, services, appliances, fixtures and fittings as thoroughly as possible. This should include not just a visual inspection, but functional tests and checks of the services and any appliances. Before completion, check that the boiler and heating system is working as it should – does the heating work in all rooms, does the boiler provide hot water, ask the vendor when was the boiler last serviced – if this was not within the last 2-3 years it is entirely reasonable to ask the vendor that the boiler be serviced prior to exchange of contracts. However, bear in mind that if the vendor has the work undertaken, you need to make sure that any warranty provided can be passed to you. We see all too often a situation where a boiler for example is serviced prior to exchange, but then fails shortly after completion. If the vendor commissioned the service, do you have any come back on the engineer who carried out the work? We also highly recommend that you commission a survey of the property prior to exchange (at least a home buyer survey), and if it raises any concerns send it to your conveyancer to raise with the vendor. The valuation your mortgage company carries out to assess your mortgage application, if they even do one, isn’t a survey, and you cannot rely on its contents. It will be done just for the mortgage company, although out of courtesy they may send you a copy just for information. Check the electrics Depending on the age and condition of the property it may also be worth having an inspection of the electrical wiring, and associated light fittings and sockets to ensure everything operates and functions as it should. Caveat emptor generally applies unless there is a specific warranty or guarantee on a specific item or appliance, such a manufacturer’s warranty on a domestic appliance. Try before you buy Any tests, services and inspections must be done prior to completion. Once ownership of the property has been transferred, responsibility for the property and its appliances, fixtures and fittings is with the new owner. If you have any specific concerns, please raise them with your conveyancer so that they ask the questions before the problem is effectively yours. Once you’ve exchanged contracts, it’s too late to fix any issues, and the vendor is completely within their rights to not even respond to any further requests. In summary, test and try before you buy.
https://www.valentineandco.com/what-does-caveat-emptor-mean/
The concept LITERARY CRITICISM -- Books & Reading represents the subject, aboutness, idea or notion of resources found in University of San Diego Libraries. The Resource LITERARY CRITICISM -- Books & Reading Resource Information The concept LITERARY CRITICISM -- Books & Reading represents the subject, aboutness, idea or notion of resources found in University of San Diego Libraries. - Label - LITERARY CRITICISM -- Books & Reading - Source - bisacsh ContextContext of LITERARY CRITICISM -- Books & Reading Subject of No resources found No enriched resources found - A rationale of textual criticism - A reader on reading - Agent of change : print culture studies after Elizabeth L. Eisenstein - Agitations : essays on life and literature - American children through their books, 1700-1835 - American literature and the culture of reprinting, 1834-1853 - Anti-book : on the art and politics of radical publishing - Around the book : systems and literacy - Art and Craft: Thirty Years on the Literary Beat - Bibliography and the book trades : studies in the print culture of early New England - Bound to read : compilations, collections, and the making of Renaissance literature - British India and Victorian literary culture - British children's fiction in the Second World War - Companionship in grief : love and loss in the memoirs of C.S. Lewis, John Bayley, Donald Hall, Joan Didion, and Calvin Trillin - Dirt for art's sake : books on trial from Madame Bovary to Lolita - Forms and meanings : texts, performances, and audiences from codex to computer - From codex to hypertext : reading at the turn of the twenty-first century - Grand strategies : literature, statecraft, and world order - Hot books in the Cold War : the CIA-funded secret book distribution program behind the Iron Curtain - How to do things with books in Victorian Britain - In the Public Eye : a History of Reading in Modern France, 1800-1940 - Institutions of reading : the social life of libraries in the United States - John Dryden : a survey and bibliography of critical studies, 1895-1974 - Knowing books : the consciousness of mediation in eighteenth-century Britain - Literary Studies and the Pursuits of Reading - Literature of an independent England : revisions of England, Englishness and English literature - Making the modern reader : cultural mediation in early modern literary anthologies - More day to dawn : Thoreau's Walden for the twenty-first century - Neatness counts : essays on the writer's desk - Off the books : on literature and culture - Play and the politics of reading : the social uses of modernist form - Popular print and popular medicine : almanacs and health advice in early America - Pressing the fight : print, propaganda, and the Cold War - Protocols of reading - Reading Frames in Modern Fiction - Reading women : literacy, authorship, and culture in the Atlantic world, 1500-1800 - Removable type : histories of the book in Indian country, 1663-1880 - Renegade : Henry Miller and the making of Tropic of Cancer - Romantic readers : the evidence of marginalia - Southern bound : a Gulf coast journalist on books, writers, and literary pilgrimages of the heart - Still in print : the Southern novel today - The Harlem Renaissance and the Idea of a New Negro Reader - The crafty reader - The culture of the book in Tibet - The early Christian book - The event of literature - The power of knowledge : how information and technology made the modern world - The rub of time : Bellow, Nabokov, Hitchens, Travolta, Trump : essays and reportage, 1994-2017 - The woman reader - Thinking outside the book - Twentieth-century sentimentalism : narrative appropriation in American literature - Uncle Tom's cabin and the reading revolution : race, literacy, childhood, and fiction, 1851-1911 - Unpacking my library : writers and their books - Used books : marking readers in Renaissance England - What Middletown read : print culture in an American small city - Why Trilling matters Embed Settings Select options that apply then copy and paste the RDF/HTML data fragment to include in your application Embed this data in a secure (HTTPS) page: Layout options: Include data citation:
http://link.sandiego.edu/resource/afGv2JtYB3E/
Several sociologists suggest American survey results may be off because they tend to ignore prisoners: “We’re missing 1% of the population,” said Becky Pettit, a University of Washington sociologist and author of the book, “Invisible Men.” “People might say, ‘That’s not a big deal.’ “But it is for some groups, she writes — particularly young black men. And for young black men, especially those without a high-school diploma, official statistics paint a rosier picture than reality on factors such as employment and voter turnout. “Because many surveys skip institutionalized populations, and because we incarcerate lots of people, especially young black men with low levels of education, certain statistics can look rosier than if we included” prisoners in surveys, said Jason Schnittker, a sociologist at the University of Pennsylvania. “Whether you regard the impact as ‘massive’ depends on your perspective. The problem of incarceration tends to get swept under the rug in lots of different ways, rendering the issue invisible.” Further commentary in the article suggests sociologists and others, like the Census Bureau, are split on whether they think including prisoners in surveys is necessary. Based on this discussion here, I wonder if there is another issue here: is getting slightly better survey results through picking up 1% of the population going to significantly affect results and policy decisions? If not, some would conclude it is not worth the effort. But, Petit argues some statistics could change a lot: Among the generally accepted ideas about African-American young-male progress over the last three decades that Becky Pettit, a University of Washington sociologist, questions in her book “Invisible Men”: that the high-school dropout rate has dropped precipitously; that employment rates for young high-school dropouts have stopped falling; and that the voter-turnout rate has gone up. For example, without adjusting for prisoners, the high-school completion gap between white and black men has fallen by more than 50% since 1980, says Prof. Pettit. After adjusting, she says, the gap has barely closed and has been constant since the late 1980s. “Given the data available, I’m very confident that if we include inmates” in more surveys, “the trends are quite different than we would otherwise have known,” she says… For instance, commonly accepted numbers show that the turnout rate among black male high-school dropouts age 20 to 34 surged between 1980 and 2008, to the point where about one in three were voting in presidential races. Prof. Pettit says her research indicates that instead the rate was flat, at around one in five, even after the surge in interest in voting among many young black Americans with Barack Obama in the 2008 race. It will be interesting to see how this plays out.
https://legallysociable.com/2012/09/11/argument-we-could-have-skewed-survey-results-because-we-ignore-prisoners/
Geological scientists have decided that the Anthropocene has to be properly defined. The Anthropocene is, as yet, an unofficial name for the most recent geologic period of Earth’s history, in which human activity has become the most significant factor impacting our climate and ecosystems. It began almost as a joke, a tongue-in-cheek, quasi-scientific way of referencing the damage we were inflicting on our own environment. Now that evidence has shown that we have altered all the planet’s processes, its atmosphere, its geology, hydrology and biology, the scientific community is making it official: the Holocene, the 12,000 year period of stability that cradled all modern human civilisations, is coming to an end and we will enter the Anthropocene, a less stable and much more frightening place to be. An international body of scientists (Anthropocene Working Group) are trying to decide how and where to mark the beginning of the new period. The Holocene began when the last ice age ended; the retreating ice left scars on the landscape and strata in the geological record that we use to date its beginning. What indelible marks will we have left for future geologists to use to date the Anthropocene? There is the globally present layer of plutonium isotopes left by several decades of nuclear experiment in the middle of the last century or the equally ubiquitous layer of soot generated by all that sequestered carbon we pumped out of the ground and burned for a century or more. Then there is the plastic, which, in one form or another, has penetrated into the Earth’s farthest corners, from the bottom of the Marianas Trench to the top of Mount Everest and all the way into our brains. We have drenched the environment in fertilisers and pesticides, and moved 24 times as much material as is moved by natural processes. All of these events are registered in our geological record, safely stored in the sediments of lakes and seas. The AWG’s mandate expires in 2024. Their work will be published, the markers, references and sites named, and if their recommendations are accepted by the The International Commission on Stratigraphy, the Holocene will end and the Anthropocene will begin.
https://southwickcountrypark.com/2023/01/09/anthropocene-2/
Research on human embryonic stem cells (hESCs) and induced pluripotent (iPS) stem cells is currently a field of great potential in biomedicine. These cells represent a highly valuable tool for developmental biology studies, disease models, and drug screening and toxicity. The ultimate goal of hESCs and iPS cell research is the treatment of diseases or disorders for which there is currently no treatment or existing therapies are only partially effective. Despite the disproportionate short-term hopes generated, which are putting too much pressure on scientists, the international scientific community is making rapid progress in understanding hESCs and iPS cells. Nonetheless, great efforts have to be made to provide an answer to still quite basic questions concerning their biology. Moreover, translation to clinical applications in cell replacement therapy requires prior solution to ethical barriers. The recent development of iPS cells has provided a strong alternative to overcome ethical issues concerning hESCs. However, an in-depth characterization of their genetic and epigenetic features, as well as their differentiation potential still remains to be undertaken. This chapter will describe, precisely, what the critical issues are, where scientific and ethical barriers stand, and how we are to overcome them. Only then, we shall finally discover whether hESCs and iPS cells will allow building reproducible disease models, and whether they really are a safe tool, with great potential for regenerative medicine. KeywordsStem Cell Human Embryonic Stem Cell Inner Cell Mass hESC Line Cell Replacement Therapy Preview Unable to display preview. Download preview PDF.
https://rd.springer.com/chapter/10.1007/978-1-4614-2098-9_15
NASA's Kepler Spies Changing Phases on a Distant World (NASA) – NASA’s new exoplanet-hunting Kepler space telescope has detected the atmosphere of a known giant gas planet, demonstrating the telescope’s extraordinary scientific capabilities. The discovery will be published Friday, Aug. 7, in the journal Science. The find is based on a relatively short 10 days of test data collected before the official start of science operations. Kepler was launched March 6, 2009, from Cape Canaveral Air Force Station in Florida. The observation demonstrates the extremely high precision of the measurements made by the telescope, even before its calibration and data analysis software were finished. Exoplanet orbiting close to its sun. Image credit: NASA “As NASA’s first exoplanets mission, Kepler has made a dramatic entrance on the planet-hunting scene,” said Jon Morse, director of the Science Mission Directorate’s Astrophysics Division at NASA Headquarters in Washington. “Detecting this planet’s atmosphere in just the first 10 days of data is only a taste of things to come. The planet hunt is on!” Kepler team members say these new data indicate the mission is indeed capable of finding Earth-like planets, if they exist. Kepler will spend the next three-and-a-half years searching for planets as small as Earth, including those that orbit stars in a warm zone where there could be water. It will do this by looking for periodic dips in the brightness of stars, which occur when orbiting planets transit, or cross in front of, the stars. “When the light curves from tens of thousands of stars were shown to the Kepler science team, everyone was awed; no one had ever seen such exquisitely detailed measurements of the light variations of so many different types of stars,” said William Borucki, the principal science investigator and lead author of the paper. The observations were collected from a planet called HAT-P-7, known to transit a star located about 1,000 light years from Earth. The planet orbits the star in just 2.2 days and is 26 times closer than Earth is to the sun. Its orbit, combined with a mass somewhat larger than the planet Jupiter, classifies this planet as a “hot Jupiter.” It is so close to its star, the planet is as hot as the glowing red heating element on a stove. The Kepler measurements show the transit from the previously detected HAT-P-7. However, these new measurements are so precise, they also show a smooth rise and fall of the light between transits caused by the changing phases of the planet, similar to those of our moon. This is a combination of both the light emitted from the planet and the light reflected off the planet. The smooth rise and fall of light is also punctuated by a small drop in light, called an occultation, exactly halfway between each transit. An occultation happens when a planet passes behind a star. The new Kepler data can be used to study this hot Jupiter in unprecedented detail. The depth of the occultation and the shape and amplitude of the light curve show the planet has an atmosphere with a day-side temperature of about 4,310 degrees Fahrenheit. Little of this heat is carried to the cool night side. The occultation time compared to the main transit time shows the planet has a circular orbit. The discovery of light from this planet confirms the predictions by researchers and theoretical models that the emission would be detectable by Kepler. This new discovery also demonstrates Kepler has the precision to find Earth-size planets. The observed brightness variation is just one and a half times what is expected for a transit caused by an Earth-sized planet. Although this is already the highest precision ever obtained for an observation of this star, Kepler will be even more precise after analysis software being developed for the mission is completed. “This early result shows the Kepler detection system is performing right on the mark,” said David Koch, deputy principal investigator of NASA’s Ames Research Center at Moffett Field, Calif. “It bodes well for Kepler’s prospects to be able to detect Earth-size planets.” Kepler is a NASA Discovery mission. Ames is responsible for the ground system development, mission operations and science data analysis. NASA’s Jet Propulsion Laboratory in Pasadena, Calif., manages the Kepler mission development. Ball Aerospace and Technologies Corp. of Boulder, Colo., is responsible for developing the Kepler flight system and supporting mission operations.
Bogota man wins fight to pass law for missing wife A Bogota man, whose wife disappeared, finally won his fight Tuesday for better laws to help families of missing persons. Jim Viola says his wife, Patricia, vanished from their neighborhood nearly seven years ago on Feb. 13, 2001. For the past two years, Viola has been pushing to change New Jersey laws about missing persons cases. The new law, in Patricia?s name, is now on the books. ?They went right to the vote and then, showed the vote, 80 to 0,? Viola says. ?I was, just blown away ? so, so happy.? Patricia?s Law requires missing persons reports to be filed immediately. It also states that after 30 days, DNA samples will be taken from family members to compare with those from unidentified persons around the country. Meanwhile, Viola says he has no plans to give up his search for his wife. ?In Pat?s case, she has epilepsy and we have no evidence that something bad happened to her, so she could be out there somewhere,? Viola says.
http://newjersey.news12.com/story/34887840/bogota-man-wins-fight-to-pass-law-for-missing-wife
Our Sports program covers both the physical and the psychological aspects of a child’s healthy lifestyle education. It is well known that PE has a positive impact on a child’s physical health, stress management, sleep, and immune system. PE also helps children to develop discipline, confidence, self-esteem, emotional control, resilience, teamwork, communication and even make new friends. What Your Child Can Expect Instill the good habits of a healthy and active lifestyle in all our students early in life Build a solid foundation for our students’ character development and self-improvement Support students in finding their niche in which they can excel Why Our Program
https://www.xaa.edu.sg/programs/sports-program/
Our Philosophy: Har Sinai - Oheb Shalom’s Learning Ladder is a high-quality Jewish pre-school and child care center that approaches early education with a child-centered philosophy. We believe that each child is unique and, therefore, we offer our children individualized education. We empower our children to learn through their own experiences by utilizing play-based instruction and curriculum. We provide our children with a safe and stable environment in which they can develop socially, emotionally, intellectually, physically and spiritually. Our Program: The Learning Ladder offers child care and education to children from 10 weeks old to 5 years of age. We offer our children an exciting learning environment filled with individual and group activities focused on enhancing social, language, mathematical, scientific, and artistic skills. Our early childhood programs provide children with the care and support they need in order to foster their personal growth and development. The children are exposed to early literacy skills and age-appropriate activities that will expand their knowledge as independent learners and help enhance the many skills that are important for continued success in school. All preschool classes have assigned outdoor playtimes in the morning and afternoon of at least thirty minutes when the weather is above 32 degrees. Children younger than two years of age have their own playground (with shade cover) separate from the older children. Below are some of our testimonials from the families who are here now! We are so happy to be here with our friends and family.
https://www.hsosc-baltimore.org/ll-about
Ecological Risk Assessments Topics On this page: Ecological Risk Assessment Program Description The TCEQ ecological risk assessment program provides guidance and resources for regulated entities that must evaluate ecological risk at a site in one of the Remediation Division programs. According to the Texas Risk Reduction Program (TRRP) rule, some form of an ecological risk assessment is required to be conducted at all remediation sites under this rule. What is an Ecological Risk Assessment? The TCEQ defines an ecological risk assessment as a process that evaluates the likelihood that adverse ecological effects are occurring or may occur as a result of exposure to one or more chemicals of concern (COCs) from a remediation site. In general, the primary functions of an ecological risk assessment are as follows: - Determine whether actual or potential ecological risk exists at a remediation site; - Screen the chemicals of concern present to identify those that might pose an ecological risk, allowing for the focusing of further efforts; and - If necessary, determine ecologically protective concentration levels (PCLs) to be used in evaluating a response action. Ecological Risk Assessment Resources - Conducting Ecological Risk Assessments at Remediation Sites in Texas (RG-263) . This is the TCEQ's primary ecological risk assessment guidance document and has been updated to the most recent accessibility standards. In addition, a few changes have been made to some of the technical information as described in its Introduction section. It is the parent document to the companion documents described below. The ecological risk assessment guidance has also been designed to work with a database (see below) by providing subject-matter instructions for its use, which are dispersed throughout the document in relevant locations. - Ecological Benchmark Tables. The numeric benchmarks for surface water, sediment, and soil are provided as an Excel file. Benchmark tables last updated August 2020. Sites recently entering Remediation under TRRP should use the most current tables. - 2020 TCEQ Ecological Screening Benchmarks (August 2020) - 2019 TCEQ Ecological Screening Benchmarks (August 2019) - Supporting Documentation for the TCEQ’s Ecological Benchmark Tables (RG-263b). This document discusses the sources and the derivations of the media-based, screening-level benchmarks. - Case Study for the TCEQ's Ecological Risk Assessment Process (RG-263c) This document presents a hypothetical site and affected property, the releases of COCs from the associated facility, and how ecological risk can be evaluated through the Tier 1 Exclusion Criteria Checklist, the Tier 2 screening level ecological risk assessment (SLERA), and the ecological service analysis. The SLERA also demonstrates how the PCL Database (see below) can be used to help evaluate ecological risk and how the information can be presented to the TCEQ for review. - Supporting Excel Documentation for the case study includes: - Data tables by Media - Dioxin/Furan Toxic Equivalency Calculations for Birds , and Dioxin/Furan Toxic Equivalency Calculations for Mammals - ProUCL Output , including Upper Prediction limits, Upper Confidence Limits and Outlier Tests. - Supporting Excel Documentation for the case study includes: - Ecological Protective Concentration Level (PCL) Database. The TCEQ and its contractor (West Texas A&M University) have developed a database that provides default ecological PCLs for soil and sediment for a variety of wildlife receptors and COCs. Users may adjust the default PCLs based on site-specific inputs (e.g., home range). Additionally, the database can be used as a source for assessment levels, toxicity profiles, toxicity reference values, life history information, and uptake factors (e.g., bioaccumulation factors). Instructions and options for logging in to the database can be found by clicking the question mark on the login page. - Determining Representative Concentrations of Chemicals of Concern for Ecological Receptors (TRRP-15eco) . This guidance addresses aspects of ecological evaluations currently not discussed in detail in the ecological risk assessment guidance and is intended to be used in conjunction with the ERAG. Topics addressed include: ensuring that data used in ERAs are representative and appropriate for each exposure medium, defining representative concentrations and exposure areas for various ecological exposure pathways, and evaluating potential hot spots. - Determining PCLs for Surface Water and Sediment (TRRP-24) . This guidance describes processes for developing PCLs for ecological (and human) receptors that may be exposed to surface water and sediment affected by COCs. It also provides information for developing source media PCLs for soil and groundwater that may release COCs to surface water and sediment. - Useful Links for Developing Ecological Risk Assessments. Links to pages that have other useful information for developing ecological risk assessments. History of the Ecological Risk Assessment Program The TCEQ's ecological risk assessment program was established in 1995 to evaluate ecological reports submitted under various agency remediation programs (e.g., Superfund). In 1996, an Ecological Workgroup comprised of technical experts from industry, government, consulting firms, and academia was formed to assist in developing guidance that would interface with the ecological aspects of agency rules. The agency first released Guidance for Conducting Ecological Risk Assessments at Remediation Sites in Texas in 2001. This guidance provided a detailed description of how to conduct ERAs using the TCEQ's three-tiered approach. It also identified the participation and coordination processes with the Natural Resource Trustee Programs and outlined methods for establishing ecological PCLs for COCs. The 2018 versions of RG-263, RG-263b, RG-263c, and the release of the PCL Database reflect a more current state of the science and provide a significant improvement to the TCEQ’s ecological risk assessment program. The suite of guidance documents provide a comprehensive and user friendly toolbox for evaluating ecological risk in Texas.
https://www.tceq.texas.gov/remediation/eco
BSc. and MSc. Course Description In Coding IxD, we co-educate computer scientists and product designers. Beyond experiencing interdisciplinary work, we want students to envision interactive and responsible systems: by this, we mean a responsibility through code that is carefully using material, form, and context, while profoundly respecting both human capabilities and vulnerabilities. We understand this course as experimental space, where different perspectives meet, exchange, and evolve. Each semester, based on small project teams of up to four members, students are challenged to examine a specific application context. Within this context, the teams envision new application or product concepts. We guide this process through various carefully tuned methods that are used to spark their ideas. Students iterate through several rounds of ideation and refine their concepts in different prototype versions. The most compelling or promising interaction concept, the one that allows grasping the quality and essence of the product concept is implemented in a working prototype. Students are accompanied by a team of experienced designers and computer scientists but also by guest experts that provide feedback to the various design iterations. If needed, special workshops are organized to cover specific topics ranging from prototyping to project management. The whole course is evaluated continuously to enhance our methodological toolbox. This course offering is a cooperation of the Human-Centered Computing Research Group at the Institute of Computer Science at the Freie Universität Berlin and the Product Design Department at the Weißensee Kunsthochschule Berlin (KHB). Besides the regular weekly meetings, the KHB and FU Berlin provide complimentary workshops: - Arduino Workshop on Monday 24.10. and 31.10. | 10:00 am to 1:00 pm - AR Experience Workshop on Monday 14.11. | 1:00 pm to 5:00 pm Here you can find our Code of Conduct. Topic of this semester: Let’s get: PHYSICAL — Materializing Routines with Personal Data Find the course description for this year’s topic on Let’s get: PHYSICAL The course takes place in cooperation with the Weißensee Academy of Art Berlin. We meet every Wednesday in the laboratory of the Cluster of Excellence "Matters of Activity" at the Humboldt-Universität zu Berlin. www.matters-of-activity.de/en/ Literature Zimmerman, John, Jodi Forlizzi, and Shelley Evenson. "Research through design as a method for interaction design research in HCI." Proceedings of the SIGCHI conference on Human factors in computing systems. 2007. Pierce, James, et al. "Expanding and refining design and criticality in HCI." Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 2015. Jansen, Yvonne, et al. “Opportunities and Challenges for Data Physicalization.” Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, 2015, pp. 3227–36. https://doi.org/10.1145/2702123.2702180.
https://www.mi.fu-berlin.de/en/inf/groups/hcc/teaching/Winter-Term-2022_23/software_project_coding-ixd.html
This project will investigate innovative ways of dividing up and representing energy use in shared buildings so as to motivate occupants to save energy. Smart meters (energy monitors that feed information back to suppliers) are currently being introduced in Britain and around the world; the government aims to have one in every home and business in Britain by 2019. One reason for this is to provide people with better information about their energy use to help them to save energy. Providing energy feedback can be problematic in shared buildings, and here we focus on workplaces, where many different people interact and share utilities and equipment within that building. It is often difficult to highlight who is responsible for energy used and difficult therefore to divide up related costs and motivate changes in energy usage. We propose to focus on these challenges and consider the opportunities that exist in engaging whole communities of people in reducing energy use. This project is multidisciplinary, drawing primarily on computer science skills of joining up data from different sources and in examining user interactions with technology, design skills of developing innovative and fun ways of representing data, and social science skills (sociology and psychology) in ensuring that displays are engaging, can motivate particular actions, and fit appropriately within the building environment and constraints. We will use a variety of methods making use of field deployments, user studies, ethnography, and small-scale surveys so as to evaluate ideas at every step. We have divided the project into three key work packages: 'Taking Ownership' which will focus on responsibility for energy usage, 'Putting it Together' where we will put energy usage in context, and 'People Power' where we will focus on creating collective behaviour change. In more detail, 'Taking Ownership' will explore how to identify who is using energy within a building, how best to assign responsibility and how to feed that back to the occupants. We know that simplicity of design is key here, as well as issues of fairness and ethics, and indeed privacy (might people be able to monitor your coffee drinking habits from this data?). 'Putting it Together' will consider different ways of combining energy data, e.g. joining this up across user groups or spaces, and combining energy data with other commonly available information, e.g. weather or diary data, so as to put it in context. We will also spend time considering the particular building context, the routines that currently exist for occupants, and the motivations that people have for using and saving energy within the building, in understanding how best to present energy information to the occupants. Our third theme, 'People Power' will focus on changing building user's behaviour collectively. We will examine how people interact around different energy goals, considering in particular cooperation and regulation, in finding out what works best in different contexts. The project then brings all aspects of research together in the use of themed challenge days where we promote specific energy actions for everyone in a building (e.g. switching off equipment after use) and demonstrate the impact that collective behaviour change can have. Beyond simply observing what works in this context through objective measures of energy usage, we will analyse when and where behaviour changes occurred and speak to the users themselves to find out what was engaging.
https://gow.epsrc.ukri.org/NGBOViewGrant.aspx?GrantRef=EP/K002589/1
Do Witchcraft Beliefs Halt Economic Progress? Believing in witchcraft is a salient feature of daily life in many parts of the world. In worst-case scenarios, such beliefs lead to murder, and they may also cause destruction of property or societal ostracism of the accused witches. The first large-scale economics study to explore beliefs in witchcraft, broadly defined as the use of supernatural techniques to harm others or acquire wealth, links such beliefs to the erosion of social capital. Where witchcraft beliefs are widespread, American University Economics Professor Boris Gershman found high levels of mistrust exist among people. Gershman also found a negative relationship between witchcraft beliefs and other metrics of social capital relied upon for a functioning society, including religious participation and charitable giving. It’s long been argued that witchcraft beliefs impede economic progress and disrupt social relations, and Gershman’s statistical analysis supports that theory. From a policy perspective, Gershman’s results emphasize the importance of accounting for local culture when undertaking development projects, especially those that require communal effort and cooperation. Gershman and other social scientists believe that education can help foster improved trust and decrease the prevalence of witchcraft beliefs. “Education may contribute to an environment with higher levels of trust and mutual assistance, insofar as it helps to promote a rational worldview and reduce the attribution of any misfortune in life to the supernatural evil forces of other people in the community,” Gershman said. Witchcraft beliefs in Africa and beyond A major focus of Gershman’s findings involves regions of sub-Saharan Africa. The study draws on survey data on personal and regional witchcraft beliefs, primarily from the Pew Forum on Religion and Public Life. A respondent is assumed to believe in witchcraft if she claims to believe in either “witchcraft” or “that certain people can cast curses or spells that cause bad things to happen to someone.” Many anthropological case studies document how fears of witchcraft attacks and accusations erode trust and cooperation in African societies. Evidence on the corrosive effects of witchcraft beliefs comes from fieldwork conducted in Tanzania, South Africa, Cameroon, Namibia, Mozambique, Zambia, and other countries, where witchcraft-related fears manifest themselves in diminished cooperation, breakdown of mutual assistance networks, avoidance of joint projects, mistrust in community members, and general decline in social interactions. Gershman’s analysis of the Pew data documents that a systematic pattern of this sort exists in regions in 19 countries of sub-Saharan Africa. The relationship between witchcraft beliefs, trust and erosion of social capital extends to many places beyond sub-Saharan Africa. Using additional survey data from 23 nations (including those in Asia, Europe, North Africa, and the Middle East), Gershman compiled a broader country-level dataset on witchcraft beliefs. His analysis also reveals a negative association between witchcraft beliefs and generalized trust in the cross-section of countries, similar to that observed for African regions. Witchcraft may be alone among supernatural beliefs for having a negative correlation to trust. Beliefs in heaven, hell, reincarnation, angels, miracles, and evil spirits have no relationship to trust, Gershman found. Why believe in witchcraft? It’s difficult to understand why witchcraft beliefs persist and what purpose they serve. Noted economist and jurist Richard A. Posner theorizes that witchcraft accusations against wealthy community members force them to share their surplus, so witchcraft beliefs promote mutual insurance in societies that lack conventional methods for redistributing resources. Other theories suggest the belief in witchcraft reduces social tensions or de-escalates conflicts; yet that explanation doesn’t square with the fact that witchcraft accusations sometimes lead to cascades of ritual killings. “A belief in witchcraft may be a way to keep order in society, but it’s definitely not the best way,” Gershman said. “It forces one to conform to local norms because any deviation may lead to an accusation.” This type of forced conformity under fear leads to immobility and interferes with wealth accumulation and adoption of innovations. The consequences of such behaviors likely exceed any potential benefits, Gershman added. Gershman, who studies the social costs and benefits of culture, has also published research on the “evil eye,” a cultural belief that a person’s envious glance leads to property destruction. The evil eye belief is also harmful to economic progress but in a different way, Gershman said. “Witchcraft beliefs are likely to erode trust and cooperation due to fears of witchcraft attacks and accusations. The evil eye leads to underinvestment and other forms of unproductive behavior due to the fear of destructive envy, where envy is likely to manifest in destruction and vandalism involving those who own wealth,” Gershman said. “Witchcraft beliefs and the erosion of social capital: Evidence from Sub-Saharan Africa and beyond,” is published in the May issue of Journal of Development Economics and can be found online here.
https://www.american.edu/media/news/05092016-witchcraft-beliefs-and-trust.cfm
New hotline announced to help access drug addiction resources HARRISBURG — Gov. Tom Wolf and health agency secretaries today announced a decrease in opioid drug overdose deaths from 2017 to 2018 and provided an update on efforts moving forward, including tuition and loan financial assistance for substance use disorder medical practitioners, a new hotline to help grandparents and other guardians access resources, and upcoming free naloxone distribution days on Sept. 18 and 25. “Today, I’m proud to announce that data recently released by the Drug Enforcement Agency shows the number of overdose deaths in Pennsylvania was 18 percent lower in 2018 than in 2017,” Wolf said. “This is a good piece of news in our ongoing fight; however, new challenges, including the increase of overdoses from other drugs in the past few weeks and months, mean that our work must continue to address the devasting effects of substance use disorder. We remain laser-focused and committed to continuing to address substance use disorder in the commonwealth.” Teresa Miller detailed the creation of a helpline, KinConnector, for families in kinship care situations, including grandparents raising their grandchildren because of the opioid crisis. The KinConnector helpline can help kinship care families access local, state, and federal resources. “Kinship care guardians often make a selfless choice to care for a young child and ensure that they receive care and support with a person they know and trust, even when processing their own emotions around their family’s situation,” said Miller. “They are navigating a big change, often years after raising their own children. KinConnector will be the bridge that helps families identify resources that can ease this process for the entire kinship family.” KinConnector was established through Act 89 of 2018, which established a kinship navigator program for Pennsylvania. The Bair Foundation was selected as the kinship navigator through a competitive procurement and will work with kinship care families to help them access resources and supports and connect with families in similar situations around the commonwealth. “Pennsylvania’s Grandfamilies Workgroup has really helped us identify what kind of resources many older adults need when they suddenly find themselves as a caregiver for a grandchild or other family member, and the KinConnector helpline provides an immediate avenue to help,” said Torres. “For anyone acting as a caregiver, it?s crucial to have a central place you can go for support and to connect with people in similar circumstances.” Local News Coverage KinConnector can be reached by calling 1-866-KIN-2111 (1-866-546-2111). The KinConnector helpline is staffed by knowledgeable, empathetic social service professionals prepared to help kinship care families understand and access resources that may be able to help them. The helpline is the first step of KinConnector?s work. A website of resources is currently in development and will launch later this year. Work to address the opioid crisis focuses on three areas: prevention, rescue and treatment. Collaborative work with state agencies, local, regional and federal officials has resulted in substantial action to address the opioid crisis. A statewide naloxone giveaway in December 2018 focused on rescue and received significant participation, putting more than 5,000 free kits into the hands of Pennsylvanians. Since then, the Department of Health has been working to plan additional giveaway events. Dr. Levine announced that Sept. 18 and 25 will be used for statewide distribution of naloxone kits with additional details to be announced in the coming weeks. “The success of the first statewide naloxone giveaway day and the fact that we cannot treat someone for opioid use disorder if they are dead, prompted the department to plan two additional giveaway events to get even more of this life-saving medication into the hands of people across the state,” Levine said. Dr. Levine announced that the commonwealth has awarded 92 individuals with nearly $4.8 million in federal funding through Pennsylvania?s Substance Use Disorder Loan Repayment Program. The program, first announced in May, provides funding to repay education loans for health care providers who are providing medical and behavioral health care and treatment for substance use disorder and opioid addiction in areas where there is high opioid use and where there are shortages of health care practitioners. “Allocating this funding takes us one step closer to ensuring all those suffering from substance use disorder are receiving quality care,” Levine said. “By rewarding health care practitioners focused on the opioid crisis with educational loan repayment, we are ensuring these dedicated professionals can focus on care. The awardees will be able to provide medical and behavioral health care services to those affected by this crisis. We want to make sure that all Pennsylvanians with the disease of addiction have the ability to be treated at a location convenient to them.” A total of $1,892,948 was awarded to 34 medical care practitioners, and 58 behavioral and mental health practitioners received a total of $2,886,679 in awards. The funding comes from the $55.9 million Substance Abuse and Mental Health Services Administration grant meant to help states increase access to medication-assisted treatment of opioid use disorder, reduce opioid overdose related deaths through prevention, treatment and recovery and to reduce unmet treatment need. Drug and Alcohol Programs Sec. Jennifer Smith provided an update on the success of the department’s treatment and recovery efforts, including the tollfree helpline and warm handoff program, as well as noting what the department is seeing in terms of overdose numbers from other substances, such as methamphetamine and fentanyl. “We should be proud of the success we’re seeing across Pennsylvania counties through warm hand-offs, the acceptance and use of medication-assisted treatment as the standard of care, and declines in opioid-related deaths,” Smith said. “While this is great news, with the surge in stimulant usage we must continue to give treatment providers and communities the tools they need to effectively treat individuals, regardless of their drug of choice.” “The Opioid Command Center will continue to meet weekly to identify strategies that will help us make strides in our battle against the opioid crisis,” Wolf said. “And I am optimistic that with our ongoing collaborative efforts, we can continue to decrease overdose deaths, of all types, in our commonwealth and ultimately end this terrible scourge.”
RUMI, JALĀL-AL-DIN. viii. Rumi’s Teachings Jalāl-al-Din Moḥammad Balḵi Rumi’s (q.v.; d. 672/1273) magnum opus is his didactic poem, the Maṯnawi (q.v.), and his main prose work is the Fihe mā fihe, which was compiled from the notes of students at his teaching circle. These works, which represent the last two decades of his life, constitute the most substantial sources for his teachings without need for recourse to his many biographies. We do not have sources dating from his young adulthood, before he met his mystic mentor Šams-al-Din Tabrizi, though his later writings arguably provide insight into the world of scholarship he had been raised in. Accordingly the focus of this entry is Rumi’s mystical teachings. The Fihe mā fihe is the most important source for the actual situation of Rumi’s teaching, since it is a collection of the notes of students attending his circle. This work represents sessions at Rumi’s teaching circle that date from the mid- to late 1250s in all likelihood, when one takes into account the references to other living individuals (Mojaddedi, 2012, pp. 12-14). The full text, which forms the basis of Badiʿ-al-Zamān Foruzānfar’s edition, is found in a manuscript dating from 751/1350 and a manuscript containing approximately the first two-thirds of the other, dating from 716/1317. The component chapters are usually translated as “Discourses,” and though they mostly seem to be composite units themselves, they are nonetheless very consistent and even include some repetition. The first general observation that can be made is that the amount of material compiled after an extended effort is quite modest (71 discourses), and the comments that it includes about the difficulty of gaining access to Rumi’s oral teachings except when distinguished guests were present, further indicate that he was not a hands-on teacher of his disciples (Mojaddedi, 2012, pp. 1-18). The biographical tradition in this instance supports the textual evidence with its general portrayal of Rumi as a teacher withdrawing from his students after meeting Šams, and appointing deputies (e.g., Ḥosām-al-Din Čalabi) to represent him in that capacity instead. Rūmī’s primary mode of teaching in both of his didactic works is the teaching-story. In the Fihe mā fihe, his teaching typically consists of a story followed by a homily that draws out its teaching points. The Maṯnawi, which contains some of the same stories found in the Fihe mā fihe, is, in contrast, a highly interactive poem, in which Rumi alternates voice at a rapid frequency, for instance, breaking off midstream from a narrative to address the audience directly, or even to a new embedded narrative. This makes the Maṯnawi especially well-suited for the function of substituting for Rumi’s presence, which may explain the relatively small amount of teaching notes from students studying with him directly. The Maṯnawi is also informative about Rumi’s private sessions with his deputy Ḥosām-al-Din Čalabi, which are elaborated upon in the biographical tradition (e.g., Aflāki, pp. 496-97, 741-42). Moreover, the contents of the Maṯnawi, a work of some 26,000 verses, match the original reason given in Rumi’s biographical tradition (e.g., Aflāki, pp. 739-40) for its composition, namely, to satisfy his disciples, who already enjoyed the maṯnawi poems of Shaikh Farid-al-Din ʿAṭṭār (d. ca. 1221). This is because it is composed in the same mystical maṯnawi genre that his predecessor excelled in, and it contains a much higher theological content, which identifies his immediate audience as being in all likelihood the members of the madrasa that Rumi had inherited from his father. It is important to note that, while Rumi’s Maṯnawi cites the Qur’an and Hadiths at a much higher frequency than any other work of its genre, and also contains more technical jurisprudential and theological passages, such material is used as a means for imparting mystical teachings (Mojaddedi, 2006, pp. 364-68). Far from promoting a scholastic religiosity with such material, Rumi instead subverts basic religious tenets, including the sealing of prophethood with Moḥammad (Maṯnawi VI, vv. 171-74), the rituals such as communal prayer (Maṯnawi II, vv. 2780-90), and pilgrimage to Mecca (Maṯnawi II, vv. 2224-57). Rumi’s reference in the Fihe mā fihe to the common perception of his teaching circle being dangerously likely to make one abandon conventional scholarship (p. 156), as well as his emphatic dismissal of a more religious rival’s circle, which had managed to draw one of his disciples away (p. 136), further underline the point that his own teaching program at what was previously his father Bahāʾ-al-Din Moḥammad Walad’s madrasa in Konya, was uncompromisingly mystical. When one takes into account Rumi’s immediate audience, it should not be surprising to find that his teachings include, in addition to the Sufi preoccupation with the annihilation of the self, the subversion of orthodox religious teachings and practices and the limitations of rationalist scholasticism. His best-known teaching story is “Moses and the Shepherd” (Maṯnawi II, vv. 1720-800), which can serve as a good example of his teaching style as well as his actual teachings. This story begins with an orthodox critique of anthropomorphism from Moses after he overhears a shepherd praying in such a fashion. However, the twist in the plot comes when God rebukes Moses and points out that it is the inner intention and state of the worshipper that counts rather than what they profess or how they practice. Moses rushes in pursuit of the shepherd to clarify this to him, but meets a seemingly transformed man who has reached lofty mystical heights. The story ends with six couplets of commentary about the error of judging others as inferior based on your perception of their way of worship. At the center of the narrative, immediately following the major twist in the plot of God’s intervention, Rumi includes one of his idiosyncratic lyrical flights. Such passages are unprecedented in the maṯnawi form of poetry and make Rumi’s work so distinctively multi-vocal and intense. It is in the lyrical climax at the center of the Moses and the Shepherd story where one finds its most famous couplet: Mellat-e ʿešq az hama dinhā jodā’st; / ʿĀšeqān-rā mellat-o maḏhab Ḵodā’st (Beyond all the religions stands love’s nation; / God is their sole dogma and denomination” Maṯnawi II, v. 1774). This accurately represents the mystical teaching of the story about the legislative prophet Moses and the shepherd who becomes identified as a lover of God and, on that basis, transcends Moses’ knowledge. The widespread popularity of this story is, however, more likely due to the religious tolerance broadly expressed here rather than these more demanding mystical teachings. The teaching points in the story of Moses and the Shepherd are consistent with Rumi’s teachings elsewhere in the Maṯnawi. The best-known examples are in the story about the four Indians who spoiled their own prayers by finding fault in one another’s performance of that ritual (Rumi, Maṯnawi II, vv. 3027-45), and the story about the deaf man who visited a sick neighbor and felt very smug about doing what he thought was a good deed (Maṯnawi I, vv. 3360-409). In the Fihe mā fihe also, Rumi repeatedly stresses the importance of the inner state of the worshipper rather than the outward performance, even going so far as to argue in favor of ignoring the call to prayer in order to stay in meditation with one’s Sufi master (Fihe mā fihe, p. 12). He also berates a religious rival who has lured away one of his own disciples, saying: “He has trapped him with rosaries, litanies, and prayer-rugs” (p. 136), and criticizes the ulama for knowing all about the outward minutiae of religion while remaining clueless about the inner dimension, which in his view is what actually counts (p. 17). The frequency with which Rumi repeats such teachings is most probably due to his immediate audience of seminary students. Rumi’s teachings manifest his own extensive education, both in the religious and in the physical sciences. Yet he frequently critiques scholars, whether religious or non-religious, and stresses the superiority of mystical knowledge. His most famous teaching story about this point is probably The Grammarian and the Boatman (Maṯnawi I, vv. 2835-65). In this story, the grammarian’s smugness is mocked, because, in spite of his knowledge of grammar and condescension towards the boatman who is ignorant of it, he does not know how to swim, and the boat is sinking. Rumi also uses this story as an occasion to comment on the superiority of selflessness, using the analogy of a corpse floating on the sea, but there is no discussion of mystical knowledge here. Later in that same first book of the Maṯnawi, mystical knowledge is exemplified in the final pair of interweaving stories about Imam ʿAli b. Abi Ṭāleb (d. 661; Maṯnawi I, vv. 3721-4004). ʿAli is depicted as being in total surrender to God, which means that his every action is Divinely directed and in harmony with God. He neither takes revenge against an enemy soldier when sorely tempted to, nor tries to avert his own death when forewarned about it. Book Three of the Maṯnawi focuses specifically on epistemology, an open agenda that is discussed at length in its prose introduction and exordium (Maṯnawi III, vv. 1-68). Rumi’s approach is to discuss in ascending order different forms of knowledge, from the immediate, face-value interpretation of things to reasoned scheming, and ultimately divinely communicated knowledge. It is the last of these that represents his own understanding of certain knowledge, and he explains in various stories how selflessness is a prerequisite. For instance, in one story Moses is pestered by someone who wants to know the language of all the animals. After trying to dissuade him and consulting God, Moses reluctantly teaches him a limited amount, but this is enough for the man to discover that he cannot cope, and he ends up learning about his own imminent death from a clairvoyant rooster (Maṯnawi III, vv. 3266-400). In contrast, a dervish accepts the amputation of his hand for a crime he has not committed, because through divine communication he felt that he had earned this for another reason, and a court official feels compelled to return to his ruler, from whom he had previously fled, even though the latter wishes to execute him (Maṯnawi III, vv. 3686-4751). For Rumi, divine communication of the highest kind is not restricted to prophets. In the Fihe mā fihe, he teaches this explicitly, while at the same time acknowledging that it is in contravention of Muslim theological dogma: “When it is stated that after Moḥammad and the other prophets, waḥy (divine revelation) is not sent down to other people, that is not the case. It is simply not called waḥy; but this is what was meant when the Prophet said, “The believer sees by the light of God” (Fihe mā fihe, p. 121). In the fourth book of the Maṯnawi, he also states that the Sufi Bāyazid Besṭāmi (d. 261/874) received the same kind of divine communications as prophets, and that the Preserved Tablet (lawḥ-e maḥfuẓ) in heaven was the source of his knowledge. He explains in this context that Sufis may use different terms (e.g., waḥy-e del) for their divine communication in order to imply that theirs is inferior to that of the prophets, but this is just for the sake of hiding the truth from the non-mystic (az pay-e rupuš-e ʿāmma; Maṯnawi IV, v. 1854). What is most original about Rumi’s teachings on this subject as compared with those of other Sufis, however, is his encouragement of seekers on the mystic path to strive to follow such inspiration above other kinds of knowledge as much as possible (Maṯnawi II, vv. 160-66). Rumi associates“scent”(bu) with divine communication and frequently illustrates this point with the story about Jacob and Joseph’s shirt. His above-mentioned reference to the divine communication received by Bāyazid Besṭāmi is also found in a story about his perceiving through“a scent”the future birth at a specific location of a major Sufi, Abu’l-Ḥasan Ḵaraqāni (d. 424/1033; Mathnawi IV, vv. 1802-55). The significance of this point is that the teachings that Rumi wishes to impart to his disciples are not intellectual, but rather the development of their receptivity to and perception of divine communication for themselves. Those who succeed in this endeavor become fully surrendered to the divine will, such that they would not even retaliate against someone spitting in their face while lying at their mercy (Maṯnawi I, vv. 3735-4004). Since they are no longer directed by the self and its preoccupations, but simply carry out actions for God’s sake in the manner of the Qurʾanic Ḵeżr, they also cannot be judged morally. In fact, Rumi begins the entire Maṯnawi with a story (I, vv. 35-247) that is difficult to bear because of the ethical questions it raises, in spite of the fact that his poem contains many other more appealing stories. The story has a murder at the center of its plot, followed by an extended justification of the murder in the closing comments (vv. 229-46). The decision to start his poem with something that he acknowledges will be difficult for the general public to embrace is a clear indication that Rumi’s aim is not to give ethical teachings for a wider audience outside of Sufism. However, this does not preclude the opportunity for overlaps. Errors in judgment due to self-conceit, the paradoxical contradictions of self-motivated human behavior, falls through pride, judging on the basis of inner purity rather than outward appearance or status, and selfless abandon for the sake of love, which are frequently presented in all his didactic writings, have a universal appeal that has made the Maṯnawi popular for centuries. In common with other Sufi authors, for Rumi the aim of the mystical path is to overcome the self (nafs). Rumi explains at length that the way to achieve this is under the guidance of a Sufi master (pir; Maṯnawi I, vv. 2934-58) who has already completed the path, because no ones can overcome the self on their own. He specifically points out the superiority of this kind of discipleship to the fulfillment of ordinary religious requirements, because of its efficacy for this purpose (Maṯnawi I, vv. 2972-93). The master is needed at various stages in the path for advice about how to navigate the path, both to inspire the beginner (Maṯnawi I, vv. 1399-556), and also to assist at the later stages, when there is the hazard of a fall through pride after mystical accomplishments, as illustrated in the story about the Prophet Moḥammad and Zayd (Maṯnawi I, vv. 3514-720). There are many false masters, and the way to distinguish between them is through their inner purity, not their outward appearance, actions, and claims, though even disciples of a false master may succeed on the Path, if they are sincere, through God’s mercy (Maṯnawi I, vv. 2275-98). What is forbidden for a disciple may be correct for a master, so extra caution is required in discerning the genuine one and also in remaining loyal to him (Maṯnawi II, vv. 3311-439). Although Rumi frequently draws on material from his seminary educational background, the vision of Sufism which he conveys using that material is not one that is easily harmonized with scholastic Islam. His priority is overcoming the self in order to experience God directly, and he sees this as an endeavor that all his readers should aspire to according to their capacity. Scholars who join him are reassured that they will gain a “soul” for the corpse-like knowledge that they already possess, rather than have to abandon that knowledge altogether, but no suggestion is made that their education is beneficial for the Sufi path (Fihe mā fihe, p. 156). Rumi also draws on other fields of knowledge, such as medicine and astronomy, without any implication that they are inferior to scholastic religious knowledge. Rather, he uses such knowledge as a means to express his mystical vision of creation as being enchanted in its entirety, with even inanimate objects being in communication with the Divine (e.g., Maṯnawi I, vv. 2124-71). For a music sample, see Divāna šo. Bibliography: Šams-al-Din Aḥmad Aflāki, Manāqrb al-ʿārifin, ed. Tahsin Yaziji, 2 vols., Tehran, 1983; tr. Clément Huart, as Les saints des derviches tourneurs (Manâqib ul-ârifîn), 2 vols., Paris, 1978. William C. Chittick, The Sufi Path of Love: The Spiritual Teachings of Rumi, Albany, N.Y., 1983. Idem, “Rūmī and waḥdat al-wujūd,” in Amin Banani and Richard G. Hovanissian, eds., Poetry and Mysticism in Islam: the Heritage of Rūmī, Cambridge, 1994, pp. 70-111. Ahmet Karamustafa, “Speaker, Voice and Audition in the Koran and the Mathnawi,” Sufi, no. 79, January-June 2010, pp. 36-45. Franklin D. Lewis, Rumi, Past and Present, East and West: The Life, Teaching and Poetry of Jalâl al-Din Rumi, Oxford and Boston, 2000. Jawid Mojaddedi, “Rumi,” in Andrew Rippin, ed., The Blackwell Companion to the Qurʾān, Oxford, 2006. Idem, “Negāh-e Mawlawi be Ṣufiān-e Motaqaddem,” Iran Nameh: A Persian Language Journal of Iranian Studies 25/1-2, 2009, pp. 103-14. Idem, Beyond Dogma: Rumi’s Teachings on Friendship with God and Early Sufi Theories, Oxford, 2012. John Renard, All the King’s Falcons: Rumi on Prophets and Revelations, Albany, N.Y., 1994. Jalāl-al-Din Moḥammad Rumi, Ketāb Fihe mā fihe, ed. Badiʿ-al-Zamān Foruzānfar, Tehran, 1951; tr. Arthor J. Arberry, as Discourses of Rumi, London, 1961; tr., Wheeler M. Thackston, Jr., as Signs of the Unseen: The Discourses of Jalaluddin Rumi, Boston, 1994. Idem, Kolliāt-e Diwān-e Šams Tabrizi, ed. Badīʿ-al-Zamān Foruzānfar, 7th ed., Tehran, 1979. Idem, Majāles-e sabʿa: haft ḵeṭāba, ed. Tawfiq Sobḥāni, Tehran, 1986. Idem, Maktubāt-e Mawlānā Jalāl-al-Din Rumi, ed. Tawfiq Sobḥāni, Tehran, 1992. Idem, Maṯnawi, ed. and tr. Reynold N. Nicholson with commentary, as Ketāb-e Maṯnawi-e maʿnawi/The Mathnawí of Jálaluddín Rúmí, 8 vols., Leyden, 1925-24; ed. Moḥammad Esteʿlāmi, 7 vols., 2nd ed., Tehran, 1990. Annemarie Schimmel, The Triumphal Sun: A Study of the Works of Jalāloddin Rumi, 2nd ed., Albany, N.Y., 1993. Tawfiq Sobḥāni, “Fihe mā fihe wa jāygāh-e ān dar miān-e āṯār-e Mawlānā,” Iran Nameh: A Persian Language Journal of Iranian Studies 25/1-2, 2009. (Jawid Mojaddedi) Cite this article: Jawid Mojaddedi, "RUMI, JALĀL-AL-DIN viii. Rumi’s Teachings," Encyclopædia Iranica, online edition, 2014, available at http://www.iranicaonline.org/articles/rumi-jalal-al-din-teachings (accessed on 08 September 2014).
http://encyclopaediairanica.com/template.php?id=11468
WASHINGTON - Two "superplumes" of molten rock appear to be powering through the boundary between the Earth's upper and lower mantle, perhaps feeding volcanoes and affecting movement of the planet's crust. New evidence of the superplumes — located beneath the south central Pacific Ocean and southern Africa — comes from studies of seismic waves conducted by scientists at the University of California at Berkeley and reported in Friday's issue of the journal Science. Smaller regions of magma rising to the Earth's crust power volcanoes and other hot spots. But the superplumes come from far deeper, crossing the boundary between the upper and lower mantle about 400 miles deep, an area that had been thought by some scientists to impede the flow of material. "Emphasis so far has been on the cold down-moving subducted plates and their critical role in mantle dynamics. We think the superplumes play an important role as well," researcher Barbara Romanowicz said. When two of the planet's large surface plates collide, one slips beneath the other in a process called subduction. This can generate earthquakes and volcanoes along the boundary. The study seeks to focus attention on the hot material rising upward from the base of the mantle — the partially molten region that extends about 1,740 miles from the Earth's core to its crust, or lithosphere. "The hot material brought under the lithosphere by the superplumes then spreads out horizontally toward mid-ocean ridges," Romanowicz explained. The ridges are often active volcanic areas. The material heats up the region under the plates that cover the Earth's surface and thus may be an active contributor to their movement. "It's not hugely surprising to see upwellings at these regions, but it's nice to see they are distinct," he said. Romanowicz and Yuancheng Gung were able to develop images that indicate the presence of the superplumes by measuring the movement of seismic waves through the Earth. Romanowicz said they used elastic tomography, a process that measures the movement of seismic waves to chart the interior of the planet, somewhat like a CAT scan machine uses X-rays to look inside a person. She said that the exact temperature of the plumes has not been determined but they may be as much as several hundred degrees hotter than the surrounding material. "We do not know precisely because the images we have are still not very well resolved, and the actual temperature may depend on whether the superplumes are — like we see them now — wide, thick conduits several thousand kilometers across, or whether they are composed of several narrower plumes grouped together," she said. "Generally, it is assumed that only about 10 percent of the heat that comes out at the surface of the Earth comes from the earth's core. This number may thus be underestimated, perhaps as much as by a factor of two," she added. Regions above the superplumes tend to bulge upward. The plateaus of southern and eastern Africa are about 1,600 feet higher than most old continental areas in the world, she pointed out. This is referred to as the "African superswell." Also, she said, heat flow from the Earth's interior measured in a wide area of southern Africa is higher than expected, indicating that an unusually large supply of heat must be coming from underneath. There are volcanoes in Africa and in the southern Atlantic Ocean that could be related to the superplume in the same way as Hawaii and other hotspot volcanoes in the southern Pacific may be related to the Pacific superswell, she said.
http://www.berkeleydailyplanet.com/issue/2002-04-19/article/11479?headline=Superplumes-rumble-inside-Earth-UC-Berkeley-scientists-track-flow-of-molten-rock&status=301
Szalinski, who joined The Mustang as a sophomore and was a sports editor his senior year, described to the class how he “wasn’t sure about what he wanted to do in college” but thought it might have something to do with journalism. He attended the University of Illinois Springfield for both his bachelor’s degree (graduated in 2020) and master’s degree (graduated in 2021). During his time as an undergraduate, he majored in political science and minored in communications. For his master’s degree, he studied public affairs reporting. Now, Szalinski works as a reporter for the Northwest Herald, located in Crystal Lake, where he covers county government and several municipalities. In comparing his time on The Mustang to his current job, he said, “[The time of] putting the newspapers together and creating stories, it’s the exact same thing.” He clarified that the workload is different since he has to write at least one story every day. “[The job] gets a little more intensive and a lot more work with having to go find people to talk to,” he said, adding, “There is a lot more pressure on your stories since a lot of people read them and may be upset with your work.” While pursuing his bachelor’s degree, he also worked as a writing intern for the U.S. Department of Veterans Affairs, VSFS program, in which he wrote profiles on veterans for Veteran of the Day tributes and collaborated with government staff regarding other story topics. He then went on to be a marketing intern at the Illinois Policy Institute in Chicago where he researched and developed storylines about Illinois corruption and fiscal policy while also creating visual aids to analyze economic information. While pursuing a masters, Szalinski worked as a statehouse reporting intern for the State-Journal-Register, located in Springfield. As an intern he was part of the PAR program internship in which he reported on all areas of Illinois politics and in-depth legislative issues and wrote original stories about how these policies affected people’s lives. “As a journalist, your job is to hold public officials accountable, so scrutinizing what they do is really important,” Szalinski said. But he also said, “[Journalists] don’t expect to find [corruption]; [they] don’t look to find it,” [but journalists] can always be aware that there may be this deal that’s going on that violates the rules, policy, the law, so it is always something to watch out for.” He also shared his experience covering events at the state capitol when news broke in January of 2021 that State Democratic Representative Mike Madigan had stepped down as Speaker of the Illinois House. “There were several journalists who were waiting for politicians to go into work so we would get an answer for what they felt from them [about the news], and one of the Chicago Dems came over and went on talking about how great Madigan is, [but] lots of Democrats hate him, and I told her that much [via a question], and she lowered her glasses and gave me that death stare.” Ultimately, she was “very upset that I asked that question and dared to insult the speaker’s intelligence and her intelligence.” Now as a reporter at the Northwest Herald, Szalinski writes a variety of articles, sometimes even articles that might not be that exciting, but he told aspiring journalists that even those stories are “part of the job” and that they “still have to make an engaging story that the reader is going to click onto.” The advice he gave for writing exciting stories included the following: “Constantly think about ideas and look up whatever you think is interesting and take opportunities to cover stories that you like; [this] will keep you away from covering stories that you may not like as much.” Compared to his previous internship as a Statehouse Reporting Intern, Szalinski described his internship as “pretty similar” to his current job because his last internship was “a full journalism job.” “It was exactly what I do now– just different places and different people,” he said. He also expressed a similar thought about studying journalism in college. “When you study journalism to get these internships, they are really putting you in the position to be able to succeed as soon as you start your real job,” he said, and added, “There was no difference between finishing my internship and working at my current job. I thought I was well prepared.” At his current job, Szalinski has dealt with backlash from readers who have read some of his articles. He described how “it is easy to ignore because you already know the reader has an opinion” and that “sometimes the reader assumes that [a journalist] write[s] a story that makes one side look bad, and they may assume that [the journalist] had an opinion that that one side is bad.” But he reminded the journalism students that the job of a journalist is to remain as objective as possible and to just put the multiple perspectives about a topic out to the readers. “You have to believe that what you are doing is fair, and just have confidence in yourself,” he said. He also noted why he loves his role as a journalist.
https://mhsmustang.com/5456/features/alum-joins-newspaper-class-to-explain-his-journey-into-professional-journalism/?print=true
The Manager of Engineering will be leading a team of building engineers responsible for inspecting, maintaining and repairing mechanical, electrical, plumbing, and HVAC systems to ensure optimal operating efficiency and availability. This is a Full-time, Exempt role. Salary range 80k-90k. Responsibilities - Manage and oversee a team of maintenance engineers and technicians. Lead, coach, mentor, motivate, empower and challenge employees, promoting individual and team development. - Develop and manage personnel responsible for the day-to-day delivery of services, including technical training, management/supervisory training, performance appraisals and salary management. - Coordinate system repairs and monitor systems performance - Energy Management, ongoing Building Technology implementation - Execute equipment audits and record-taking policies - Coordinate safety initiatives and maintain equipment documentation including specifications, warranties, life-cycle, maintenance needs and operating instructions - Coordinate to ensure seamless delivery of all building services to employee population - Ensure compliance with all safety programs and protocols and compliance with local, state and federal regulations. - Provide detailed, proactive assessments of all elements of modern building operations including high and low voltage electrical systems; heating, ventilating, refrigeration and air conditioning systems; domestic water supply systems; fire protection and life safety; drainage, water treatment and Data Center environmental. - Responsible for developing and implementing specifications, procedures and quality standards for the multi-disciplinary engineering activities including contractual engineering services, design, equipment selection, procurement and construction associated with the operations and maintenance of the facilities. - Manage the effectiveness of facilities operations through continuous improvement efforts, management of KPI's and metrics and ongoing tracking and benchmarking. Responsible for compliance of workplace health, and safety and environmental regulations as dictated by OSHA and other governmental agencies while managing a safe working environment for employees. •Position requires "on-call" management responsibilities for weekends and response to emergency situations as appropriate during working and off-hours. - Partner with internal stakeholders to ensure reliable operation of systems including IT and Data Center environment. - Support preventative maintenance program, ensuring efficient and proper operation of building systems. •Ensure contractors comply with building-related and safety requirements and are in good standing with company contract and insurance requirements.
https://www.themuse.com/jobs/tribunepublishing/engineering-and-facilities-manager
2016 : WHAT DO YOU CONSIDER THE MOST INTERESTING RECENT [SCIENTIFIC] NEWS? WHAT MAKES IT IMPORTANT? We know that emotions can influence individual well-being. Indeed, scientific progress has unveiled how human emotions—from exuberance to sorrow and even compassion—can optimize as well as hinder individual-level health outcomes. Across numerous studies we see that the intensity and flexibility of our emotions has robust effects on a wide range of cross-sectional and longitudinal well-being outcomes for the individual person. Furthermore, an optimal diversity of (both positive and negative) emotional experiences in everyday life promotes greater subjective well-being and decreased psychopathology symptoms. But are the effects of emotion on well-being specific to these types of individual-level outcomes? Recent scientific news suggests the answer is no: Emotions (also) influence environmental well-being outcomes. These recent discoveries highlight that psychological processes, including our own emotional states, can play an important but previously understudied role in addressing pressing environmental issues. For example, exposure to scenes of environmental destruction, but not pristine landscapes, engages distinct neural regions (e.g., anterior insula) associated with anticipating negative emotions that, in turn, predicted individuals’ donations to protect national parks. Thus, negative rather than positive emotional responses may drive pro-environmental behaviors (as suggested by powerful work conducted by Brian Knutson and Nik Sawe). Such findings are critical on the heel of recent task force reports underscoring the necessity of an affective level of analysis given the collective impact of emotion relevant processes (such as emotion regulation and responding) on shaping broad-based environmental outcomes. Importantly too, are related advances from psychology providing recommendations for applying insights about individual affective reactions to increase public engagement in motivating pro-environmental behaviors. This recently burgeoning area of work at the intersection of affective science and environmental psychology provides initial proof-of-concept demonstrations that emotions can improve environmental health by shaping our emotional reactions towards environmental issues as well as the frequency and degree of conservationist behaviors. Yet much work remains to be done, and many scientific highlights are still on the horizon. These include mapping the reciprocal relationship between our emotions and environmental choices in everyday decision-making and policy planning. We also need to learn more about how rapid changes in immediate environmental surroundings (e.g., access to clean water, local air pollution) might have reciprocal downstream effects on affective states and motivated behaviors. In addition, it will be critical to further investigate whether and how individual judgments and real-world choice behaviors can scale to aggregate policy level as well. As pressing environmental concerns grow—including rapid deforestation, increasing carbon dioxide emissions, habitat destruction, and threats to critical areas of biodiversity—insights from affective science will become increasingly important. Thus, what appears at first glimpse as an interesting recent news topic has quickly transformed into an indefinitely critical and deeply urgent scientific focus. The time has come for social scientists to join the ranks of engineers, natural scientists, and policy makers seeking to preserve and enhance environmental well-being.
https://stage.edge.org/response-detail/26778
Maintains the Department's Crossroads traffic accident database and monitors the High Accident Locations (HAL) citywide. TED reviews accident data and patterns at critical locations and will begin pursuing safety improvements for the top 15 HAL spots. Traffic Signals CIP Projects Responsible for the planning and engineering design of traffic signals. TED will work on the Plans, Specifications, and Estimates (PS&E) for new traffic signals using consultant services. Citywide Transportation Planning Represents the City in inter-agency, multi-jurisdictional, and regional transportation planning initiatives. TED pro-actively works with: - Caltrans - Metropolitan Transportation Commission (MTC) - Napa County - Napa County Transportation and Planning Agency (NCTPA) - Neighboring cities and counties to plan transportation solutions for shared problems Citizen Requests on Traffic & Parking Responsible for the processing of citizen requests involving traffic and parking. Communicates with citizens and residents, conducts a field investigation, performs an engineering review, and make recommendations for potential improvements. Traffic Impact Review of Development Project Responsible for the technical review of traffic impact reports and studies conducted for private development projects seeking discretionary permits from the Planning Division. TED provides ongoing guidance to developers and their transportation consultants in preparing traffic impact reports that would satisfy California Environmental Quality Act (CEQA) and local regulatory guidelines. TMP Traffic Model Maintenance Responsible for maintaining the citywide TMP Traffic Model, which is composed of travel demand model (MinuTP) and traffic simulation model (Synchro Plus/SimTraffic). TED optimizes the transportation analysis from private development projects and external public agencies in generating future cumulative traffic volumes. TMP Implementation Support Provides technical review of proposed traffic detour plans and traffic management plans for the major construction involving the City's Capital Improvement Projects (CIP), flood control project, California Department of Transportation (Caltrans) projects and Encroachment Permits. City Guidelines are provided to assist in the preparation of plans for efficient review and approval, view the Traffic Control Guidelines (PDF) for details.
http://www.cityofnapa.org/573/Responsibilities
This study has empirically investigated the impact of macroeconomic factors on the performance of the pharmaceutical company’s profitability in Bangladesh. Data have been collected from four pharmaceutical companies in Bangladesh from the year 2000-2018. For analysis of data SPSS 22 has been used, and different statistical tools have used like, Descriptive Statistics, ANOVA, Regression, etc. Macroeconomic factors measured by Gross Domestic Product (GDP), Inflation rate (INF), Interest rate (IR), and Real exchange rate (RER), while company performance is indicated by Return on Asset (ROA). For this study, ROA has been selected as a Dependent variable and Gross Domestic Product (GDP) Inflation rate (INF), Interest rate (INT) and Real exchange rate (RER) selected as independent variables. ‘Multiple Linear Regression’ has been used to examine the degree of the relationship of macroeconomics factors towards the company’s performance. The results conclude that there has a positive relationship between GDP, INF, and RER with ROA but their relations are not statically significant. In the meantime, there is a significant negative correlation between INT and ROA as the p-value is less than the key level. Inflation rate which has been used as the substitute of macroeconomic variable, conversely influence on firm profitability and macroeconomic variable i.e., GDP growth rate has a positive consequence on the firm profitability. Article Details References Dewi VI, Soei CTL, Surjoko FO. The impact of macroeconomic factors on firms’ profitability (Evidence from Fast Moving Consumer Goods Firms Listed on Indonesian Stock Exchange). Academy of Accounting and Financial Studies Journal. 2019;22(1). Islam MS. Strategically determinants the impact of macroeconomic factors on import expenditures in Bangladesh. The Business and Management Review. 2019;10(5):198-203. Azizi S, Hosseninabdi V. A content analysis of the mission statements of Iran, Turkey, India and United States Pharmaceutical companies. Management & Marketing. 2014;XII:1. Islam MS, Khan MS. The determinants of profitability of the pharmaceutical industry of Bangladesh: A random effect analysis. International Journal of Financial Research. 2019;02. Rifat Hassan SM, SMR, Muniyat S. Factors influencing the profitability of pharmaceutical companies in Bangladesh. International Conference on Business and Management. 2019;770.
https://mbimph.com/index.php/AJOAIR/article/view/2139
Georgia’s move towards a green economy: possibilities, drawbacks and structural challenges Green issues are usually not the first thing that comes to mind regarding Georgian politics. Despite this, the signing of a recent treaty shows that the country is starting to take climate change seriously. Tbilisi must subsequently make sure that such promises now result in real change. August 16, 2022 - Lasha Gamjashvili - Articles and Commentary The best way to determine a country’s economic and political priorities is to examine what is stated in its key strategic documents. The Association Agreement and the Deep and Comprehensive Free Trade Area Agreement between Georgia and the European Union are the most significant legal agreements in the country’s recent history. Georgia and the European Union signed these treaties in June 2014, an ambitious move that lays the groundwork for Tbilisi’s future political and economic integration with the EU. The Association Agreement between the two parties entered into force two years after it was signed. These documents are of the utmost importance, but the role of other critical documents focusing on Georgia’s economic and political development should not be overlooked. It is worth highlighting that Georgia also signed another vital document: “Accession of Georgia to the Treaty Establishing the Energy community”. The country underlined its ambition and political goal to transform energy security and advance the development of renewable energy by signing this document. These agreements exhorted Georgia to fulfill all its obligations and actively transform its energy security system. In order to establish short, medium, and long-term goals for energy development with a focus on the use of the nation’s renewable energy resources, a new energy policy went into effect in 2015. Self-sufficiency and meeting customer demand for electricity were Tbilisi’s top priorities. The government decided to reduce imports and use locally available renewable energy sources to achieve this goal. A wealth of challenges To begin with, Georgia has great potential to utilize renewable energy resources. Speaking broadly, the country has a lot of hydropower potential. There are 26, 000 rivers in the nation, of which 300 are important for generating energy. It is estimated that there is a total of 15,000 megawatts (MW) of potential capacity. Moreover, wind energy has the potential to produce 1500 megawatts (MW) of electricity in these rivers. Georgia also has geothermal water reserves with an annual capacity of 250 million cubic metres. The country experiences high levels of solar radiation due to its geographic location. Most of the country’s regions experience 250 to 280 sunny days and 6,000 to 6,780 hours of daylight annually. Georgia can potentially save seven tons of conventional fuel in the near future if these resources are used wisely. Georgia has implemented ambitious environmental and energy reforms over the years as part of its Association Agreement with the European Union and the European Energy Community. After reviewing these strategic documents, it is easy to draw some conclusions. First and foremost, progress in energy transformation is visible, and international organisations have even acknowledged this development. However, several multifaceted challenges are also apparent. The following points should be considered the main challenges for Georgia as it moves toward a green economy: 1) There is a need to develop a long-term strategy that is based on solid analysis, and it is also critical to create proper implementation mechanisms. 2) It is also critical to ensure that the energy strategy aligns with Georgia’s development goals, such as being compatible with strategic climate change documents, sustainable development strategies, and economic, environmental, and social policies. 3) Georgia should also improve its national energy statistics collection. 4) It is worth noting that the country should strengthen its analytical capacity for energy market and policy analysis, as well as its collaboration with think tanks specialising in this field. 5) The government should pass legislation governing the electricity and gas markets in order to promote energy efficiency and renewable energy. 6) The country should concentrate on further development and creating a competitive energy market. 7) The government should protect vulnerable groups who do not have equal access to various services. 8) It is critical to promote transparency and effectively monitor various key sectors. To summarise these points, the main challenges are related to a lack of a comprehensive energy strategy and solid analysis. Proper monitoring and implementation are also critical to success on the road to a green economy. Potential for change Despite these obstacles, Georgia has the potential to transform its energy sector. Natural resources in Georgia are a significant source of the country’s wealth and have the potential to speed up inclusive socio-economic development. It should be noted that the country’s reliance on nonrenewable resources had a negative impact on agriculture and forest land, air quality, and the coastal zone. This clearly had a negative impact on the economy. For example, it is estimated that land degradation ended up costing the country 0.7 percent of GDP in 2018. The country is focused on developing its tourism sector. As a result, coastal damage directly affects this sector and has resulted in an estimated economic cost of five per cent of GDP in 2018. Evidently, air pollution has a negative impact on people’s health and raises mortality rates, which significantly reduce a nation’s GDP. Like any other country, Georgia faces a serious threat from climate change as it is directly impacting every part of the nation. It has a negative impact in areas such as agriculture, water resources, forests, coastal regions, and public health. A focused combination of enabling policies, effective incentives, and investments will be necessary to move Georgia toward sustainable development. In order to achieve this, Georgia should properly address structural problems, analyse the impact of losses in economic activity, and take appropriate action. A multisectoral approach to sustainable development should be developed, as well as improvements in forest and landscape management, coastal zone development, and pollution control. This will help Georgia accelerate its transition to green growth. Georgia’s environment is a valuable economic resource. However, the consistently high cost of environmental degradation shows the need for sustainable and greener economic development. There has been some development in the legal framework governing the forest sector. The Georgian government prioritises forest management. The government works to improve the management of degraded watersheds while also supporting sectoral reform and especially in forestry institutions. The country’s eastern regions, where land degradation is more problematic, also show signs of declining watershed quality. The government should seek out more funding to address this issue and direct it toward improving land management, repairing harmed landscapes, and enhancing environmental infrastructure. At the same time, the country’s coastal regions face a more severe challenge due to land degradation. This directly affects public health and the safety of Georgians living in the coastal regions, as well as harming the state’s economic development. In-depth geological research and specialised tools are required for the improvement of early warning systems. Georgia should follow the good example of other Black Sea Basin countries, which mainly rely on a healthy coastal environment for their fisheries and tourism industry. Georgia can reap additional benefits from fisheries, increase the number of jobs in these areas, and improve the socio-economic conditions of the populace, if it successfully addresses the issues related to coastal degradation. Climate change will exacerbate the situation. Erosion may accelerate, and more floods are likely. For this reason, the Georgian economy should become more resilient. It is important to note that the transition to a green economy will be futile unless pollution levels are reduced. Georgia should address this issue by regulating and monitoring air pollutants in all industries. A monitoring system of this type should also be created and developed. The country’s air protection legislation should be improved. Transport-related pollution is a significant source of air pollution in the country. Georgia has raised its fuel standards to meet EU standards, but inspections of fuel quality and monitoring systems must be improved. Mobilising the country Thanks to some reforms, Georgia has a good reputation as a “reformer state”. These reforms can provide a basis for the country’s new green economy. Tbilisi made several good decisions that made it a leading state in doing business ratings and other important ratings. Economic activities are largely conducted by the private sector, but the country has the potential to encourage such companies create even more jobs. As a former Soviet Union republic, everything in Georgia was once owned by the state. After the Rose Revolution, Georgia privatised many state-owned enterprises between 2004 and 2011. Despite this, further actions are needed. Currently, it can be said that forest land is primarily controlled by the state, whereas agricultural land is privately owned. To enable private companies to create jobs by responsibly using natural resources, they must be supported. Most importantly, in order to create “green jobs”, the country must improve workers’ knowledge and skills. The government should invest more in education and training for those who need to learn new skills. To summarise, Georgia has made significant progress in greening its economy, but this must become the country’s top priority in order to achieve better results. The country has implemented several environmental policies over the last few decades, but there is still much work to be done. While the legislation is still incomplete, the country needs a comprehensive green strategy that not only exists on paper. It needs to be actively implemented in order to achieve attainable goals like the reduction of air pollution and resource inefficiency. Finally, there should be a strong focus on enhancing public health, coastal zones, ecosystem sustainability, and the biodiversity of the nation. This article is published as part of a project to promote independent digital media in Central and Eastern Europe funded by the National Endowment for Democracy and coordinated by Notes from Poland. You can subscribe to the newsletter of the project or tune in to the VoiCEE podcast. Lasha Gamjashvili holds a bachelor’s degree of Social Sciences in International Relations from the International Black Sea University (Georgia) and the master’s degree in Social Sciences from Vytautas Magnus Univeristy (Lithuania). Lasha is a contributor of several think tanks and has worked on European and international events. Please support New Eastern Europe's crowdfunding campaign. Donate by clicking on the button below. Please support New Eastern Europe's crowdfunding campaign. Donate by clicking on the button below.
https://neweasterneurope.eu/2022/08/16/georgias-move-towards-a-green-economy-possibilities-drawbacks-and-structural-challenges/
Who invented the 0? Brahmagupta”Zero and its operation are first defined by [Hindu astronomer and mathematician] Brahmagupta in 628,” said Gobets. He developed a symbol for zero: a dot underneath numbers.. Is 0 a digit number? 0 (zero) is a number, and the numerical digit used to represent that number in numerals. It fulfills a central role in mathematics as the additive identity of the integers, real numbers, and many other algebraic structures. As a digit, 0 is used as a placeholder in place value systems. What is a single digit number? : having a number or percentage that is 9 or less a single-digit increase. Which is the smallest number 0 or 1? ❇If you take the whole numbers , they start with zero . So the smallest one digit whole number is 0. ❇if you take the case of natural number they start with one . so the smallest natural number is 1. Which is the least one digit number? The smallest one-digit number is 1 (one) and greatest one-digit number is 9. All the digits become numbers when used as a number. (ii) There are 90 numbers of two digits. Who is the smallest number? The smallest version of infinity is aleph 0 (or aleph zero) which is equal to the sum of all the integers. Aleph 1 is 2 to the power of aleph 0.
https://powersourcecountry.com/qa/question-is-0-a-single-digit-number.html
Pitfalls await those on the path of spiritual knowledge. Dr. Steiner's poignant depiction of self-love can be especially helpful. This love rises like a force of nature in one who follows a spiritual path. He also explores the encounter with the double, the influences of Lucifer and Ahriman, the role of fear, and the polar tendencies toward phenomenology and mysticism. Lecture 12 of 14 from the volume: Results of Spiritual Investigation The volume of the Complete Edition of the works of Rudolf Steiner containing the original text of the this lecture, among eight others, is entitled: Ergebnisse der Geistesforschung, (No. 62 in the Bibliographical Survey, 1961). 6 March 1913, Berlin Just as it is of great significance in every realm of human endeavor and investigation to know not only the path of truth but also the sources of error, so it is especially the case in the realm dealt with by our lectures here, the realm of spiritual science, of spiritual investigation. In this realm one has to do not only with sources of error that can be eliminated to a certain extent through judgment and reasoning but with sources of error that accompany every step of the spiritual investigation of truth. One has to do with errors that must be not only refuted but overcome, conquered. Only by knowing them in such a way that one keeps, as it were, a spiritual eye on these experiences in their character as error will it be possible to guard oneself against them. It is not possible in relation to this realm to speak of individual truths or errors, but it is necessary to be clear through which activity of the soul, through which confusion of the soul, man can fall into untruth on the path of spiritual investigation. It is easy to grasp that one wishing to penetrate to the super-sensible world first needs a healthy organ of perception, just as healthy sense organs are needed for outer sense observation. The second thing one needs, in addition to the organ of perception, is a corresponding development of clarity of consciousness, which can clearly oversee and judge the observations. Even in ordinary sense observation of life it is necessary that we have not only healthy senses but also a healthy consciousness, that is, a consciousness not befogged or confused, not paralyzed in a certain way. Both these qualities of the soul life in a higher stage come to be of even greater significance in the realm of spiritual investigation. A comparison from ordinary sense observation will help us to understand this. Suppose someone has an abnormally developed eye, for example. He will not be in a position to observe objects in as accurate and unprejudiced a way as they should be seen. From hundreds of possible examples let us consider just this one. A very significant natural scientist of our day, who is not in the least inclined to submit willingly to any delusion, had a certain eye condition, and he described in his biographical sketch how this eye condition misled him, particularly at dusk, causing him to see things unclearly and, through this unclear seeing, to arrive at false judgments. He described, for example, how he often walked through darkness and, due to his eye condition, would see a figure that he took to be real but that was nothing other than something called forth by his abnormal eye. He then related how he once went around the corner in a strange city and, because he believed the city to be unsafe, his eye induced him to see someone approaching and wishing to assault him; he even pulled out a weapon to defend himself. He therefore was not in a condition, despite complete knowledge of his organ impairment, to judge the situation correctly, to recognize that what his eye called forth was not there at all. Errors can occur in this way in all our sense organs. I bring this up only as a comparison. In the recent lectures it was described how the human being, through a certain inner cultivation, evolution, of his soul, can develop into a real spiritual investigator, how he brings into use real organs of spirit through which he can look into the super-sensible world. These spiritual organs must be developed in the right way to make it possible to behold — in an analogy with sense perception — not caricature and untruth but the truth, the reality, of higher spiritual worlds. As we have seen, this development of the higher spiritual organs, which can be brought about by a rightly applied concentration, contemplation, and meditation, depends upon the starting point in ordinary, everyday life. Every human being who wishes to evolve upward to a view of the spiritual world must, and this is quite natural and proper, take his starting point from ordinary soul development, from what is right and normal for everyday life and also for ordinary science. Only from this starting point, by taking into the soul those mental processes (Vorstellungsarten) that we have presented as meditations and as other exercises, can the soul ascend again to an observation of the spiritual world. The problem now is that at the starting point, that is, before the beginning of a spiritual training, the future spiritual investigator must be in possession of a sound power of judgment, a capacity for judgment proceeding from true conditions. Every starting point that does not result from a sound power of judgment, that surrenders itself to the object, leads to unsound organs of spiritual observation, which can be compared to abnormally developed sense organs. Here we are again at the point that we have often mentioned in previous lectures: the significance of what one can designate as the soul life of the spiritual investigator before he begins his development as a spiritual investigator, his training for spiritual investigation. An unsound power of judgment, lacking ability to observe objects in their reality, leads man to see facts and beings of the spiritual world as distorted or, as we shall see today, in many false ways. This is, as it were, the first important point in all development toward spiritual investigation. Spiritual scientific training makes it necessary to take as one's starting point a sound power of judgment, an interest in the true relationships of existence, even before the path to the super-sensible worlds is embarked upon. Everything that readily surrenders itself to illusion in the soul, that readily judges in an arbitrary way, that represents in the soul a certain unsound logic, leads also to the development of unsound spiritual organs. The other starting point that is of essential significance is the moral mood of soul. The moral ability, the moral force, is as important as sound logic and intelligence, for if unsound logic, if unsound intelligence, lead to faulty spiritual organs, so will a cowardly (schwachmuetig) or immoral mood at the beginning of the spiritual training lead one ascending into the spiritual world to a certain fogginess, a “stupor”, we could call it. One thus faces the higher world in a state of what one must designate as a kind of paralysis, even a loss of consciousness (Ohnmacht). It must be noted, however, that in the stage of soul development referred to here, that which is called losing consciousness, a stupor, cannot be compared with the loss of consciousness, the paralysis, of ordinary, everyday consciousness. In ordinary consciousness, losing consciousness occurs in relation to the areas of everyday life. Losing consciousness in the spiritual world means a stupor, a fogging; it means the saturation of consciousness with all that can stem from the ordinary sense world or from the ordinary experience of the day. The spiritual investigator who is in error cannot be befogged or unconscious to the same degree as in ordinary consciousness, but he can be unconscious in relation to the spiritual world by being filled in the spiritual field of consciousness with that which has justification only through its properties and way of appearing in ordinary sense and intellectual consciousness. By taking such elements along into the spiritual world, the spiritual investigator dims his higher consciousness. The matter can be presented in the following way. Dimming of consciousness, impairment of the ordinary behavior of soul in everyday life, is like a penetration of sleep or of the dreams into the clear, everyday consciousness. A stupor, a fogging of the higher, super-sensible consciousness, however, is like a penetration of ordinary, everyday consciousness — the consciousness that we carry around with us in the ordinary world — into that consciousness in which it no longer belongs, into the consciousness that should oversee and judge the facts of the higher, super-sensible worlds purely and clearly. Any kind of immoral or weak moral mood, any kind of moral untruthfulness, leads to such a fogging of super-sensible consciousness. Among the essential and most significant aspects of preparing for a spiritual scientific training, therefore, is a corresponding moral development, and, if you go through my book, Knowledge of the Higher Worlds and Its Attainment, you will find special practices for the soul through which this appropriate moral mood can be established. Of particular damage in this striving is everything that overcomes man in ordinary life in the way of vanity, ambition, the ordinary sense of self, and a particular sympathy for this or that experience. Inner tranquility, impartiality, a loving penetration of things and worlds, an attentive interest in everything life offers, but especially a certain moral courage, a standing up for what one recognizes as true, are proper starting points for a spiritual scientific training. From what has been said in preceding lectures, it should be clear that all spiritual training consists of an awakening of certain spiritual forces that exist in the soul but that slumber in ordinary life and must be developed. The spiritual organs and the super-sensible consciousness can be developed only when forces lying peacefully in the depths of the soul, forces that are weak or not at all developed in ordinary life, are really brought into consciousness. The following can be seen from what has been said. Two things appear when man, through appropriate meditation, through concentrating his whole life of soul on individual mental images called into consciousness by his free will, tries to draw forth these forces resting in the depths of his soul. First, a quality that is always present in the soul but that in ordinary life can be kept relatively in check will be intensified, along with the other slumbering qualities in the depths of the soul; spiritual development cannot take place in any other way than by the whole soul life becoming in a certain respect inwardly more active, more infused with energy. This quality that is intensified at the same time as the others that one is trying directly to intensify one can call human self-love, sense of self. One could say that one begins to know this human self-love, this sense of self, only when one goes through a spiritual scientific training; only then does one begin to know how deep within the human soul this self-love slumbers. As has been pointed out already, he who engages in the exercises described in past lectures, thus intensifying his soul forces, notices at a certain moment in his development that another world enters his soul life. He must be able to notice, to have the knowledge to recognize, that the first form (Gestalt) in which the new, super-sensible world appears is nothing other than a projection, a shadow image, of his own inner soul life. These forces that he has developed in his soul life appear to him first in a mirror image. This is the reason that the materialistic thinker easily mistakes what appears in the soul life of the spiritual investigator for what can appear in the unhealthy soul life as illusions, visions, hallucinations, and the like. That objections from this side rest on ignorance of the facts has often been pointed out; this distinction, however, must be alluded to again and again. The unhealthy soul life, which beholds its own essence as in a mirror image, takes its own reflections for a real world and is not in a position to eliminate these reflections through inner choice. By comparison, in a true spiritual training it must be maintained that the spiritual investigator recognizes the first phenomena that appear as reflections of his own being; not only does he recognize them as such, but he is able to eliminate them, to extinguish them from his field of consciousness. Just as the spiritual investigator is able through his exercises to intensify his soul forces so that a new world is conjured before him, so he must be able to extinguish this whole world in its first form; he must not only recognize it as a reflection of his own being but be able to extinguish it again. If he could not extinguish it, he would be in a situation comparable to something that occurs in sense observation and that would be unbearable, impossible in an actual development of the human soul. Imagine in ordinary sense observation that a person directed his eyes to an object and became so attracted to it that he could not avert his gaze. The person would not be able to look around freely but would be tied to the object. This would be an unbearable situation in relation to the outer world. With a spiritual development, it would mean exactly the same in relation to the super-sensible world if a person were not in the position to turn from his spiritual observation and extinguish what presents itself as image to his spiritual observation. He must pass the test expressed in the words, “You are able to extinguish your image,” overcoming himself in this extinguishing; if the image returns, so that he can know his reality in a corresponding way, then only does he face reality and not his own imaginings (Einbildung). The spiritual investigator therefore must be able not only to create his own spiritual phenomena and to approach them but also to extinguish them again. What does this mean, however? It means nothing less than the need for an immensely strong force to overcome the sense of self, self-love. Why does the abnormal soul life, which arrives at visions, hallucinations, and crazy notions, see these creations as realities and not as emanations from its own being? Because the human being feels himself so connected, so bound, to what he himself brings forth that he would believe himself destroyed if he could not look at what he himself brings forth as a reality. If a human being leaves the ordinary world with an abnormal soul life, his self-love becomes so intensified that it works like a force of nature. Within the ordinary soul life we can distinguish very clearly between so-called fantasy and what is reality, for within the ordinary soul life we have a certain power over our mental images. Any person is aware of this power whose soul has been capable of eliminating certain mental images when it recognizes their error. We are in a different situation in relation to the outer world when we are confronted with forces of nature; when lightning flashes, when thunder rolls, we have to let the phenomena take their course; we cannot tell the lightning not to flash or the thunder not to roll. With the same inner force, however, the sense of self appears in us when we leave the ordinary soul life; as little as we can forbid lightning to flash so little can we forbid self-love from appearing, developed into a force of nature, if it is only a reflection of one's own being, that which the soul presents as an image of its own being, perceived as a real outer world. From this one can see, therefore, that the self-education of the spiritual investigator must consist chiefly of overcoming piece by piece self-love, the sense of self. Only if this is accomplished at every stage of spiritual development through a strict self-observation will one come to be able at last to erase a spiritual world when it appears as described. This means to be in the position of allowing that which one has striven for with all one's might to fall into oblivion. Something must be developed through spiritual training (one can find this presented more precisely in Knowledge of the Higher Worlds) that actually does not exist at all in man's free will in ordinary life. If man in ordinary life undertakes to do something, he wants to do it if he neglects to do something, he doesn't want to do it. One must say that in ordinary life man is in the position of applying his will impulses. To extinguish, in the way I described, the spiritual world that appears, the will must not only have the described faculties but must be able, after the spiritual world appears, slowly to weaken itself bit by bit, to the point of utter will-lessness, even to the point of extinguishing itself. Such a cultivation of the will is accomplished only when the exercises for the soul, described in Knowledge of the Higher Worlds, are followed systematically. When we awaken the slumbering forces in our soul, self-love, the sense of self, are intensified. This intensification leads us under certain circumstances to consider as an outer reality that which we actually are ourselves, that which lies only within us. Another thing that is necessary when the soul undergoes appropriate exercises for a spiritual training is for man, at a certain level of this development, actually to forsake everything in his consciousness, everything that in his life up to now gave him in outer, everyday life and in ordinary science the content of truth, security in truth, everything that gave him the possibility of considering something as reality. As indicated already in previous lectures, all supports that we have for our judgments in ordinary life, all basic reference points given us by the sense world, which teaches us how we must think about reality, must be forsaken. After all, we want through the spiritual training to enter a higher world. The spiritual investigator at an appropriate stage of his development now sees, “You can no longer have a support in the world that you want to enter; you can no longer have the support of outer sense perception, of the intellectual judgment you have acquired, which otherwise guided you correctly through life”; when he has seen this, then comes the all-important, serious moment in the life of the spiritual investigator when he feels as if the ground is gone from under his feet, as if the support that he has had in ordinary life is gone, as if all security that has carried him up to now is gone and that he approaches an abyss into which with every further step he will surely fall. This must in a certain way become an experience in the spiritual training. That this experience not be accompanied by every possible danger is the primary concern of a true spiritual training today. An attempt has been made to explain this more fully in the book, Knowledge of the Higher Worlds. If one undergoes the exercises offered there, one comes step by step to a point at which one feels what has just been described; one feels oneself as if over an abyss. One has already become so tranquil in one's soul, however, that one beholds the situation with a newly acquired, special faculty of judgment; therefore the fear, terror, and horror that otherwise needs must overtake the human soul in a dangerous way — not an ordinary, everyday fear — do not appear. One learns to know the basis of the fear, terror, and horror, but one has already progressed so as to achieve a mood in which one can endure it without fear. Here we are again at a point at which it becomes necessary for the soul to recognize the truth and not fall into error, because the support that one has in ordinary life has disappeared, and the soul feels itself as if placed over an abyss. This must occur in order that, out of the emptiness, that which is fully spiritual in the world can approach the soul. What in ordinary life is called anxiety, fear, will be intensified through such a training, expanded, just as self-love and the sense of self are intensified and expanded, growing into a kind of force of nature. Something must be said here that perhaps sounds paradoxical. In ordinary life if we have not struggled through to a certain courage, if we are cowards, we are frightened by this or that event if we have courage, however, we can endure it. In the region of the soul life we have described, fear, terror, and horror will approach us, but we must be in the position, as it were, not to be afraid of the fear, not to be horrified by the horror, not to become anxious with the anxiety that confronts us. This is the paradox, but it corresponds exactly with an actual soul experience that appears in this realm. Everything that the human being experiences on entering the spiritual world is designated ordinarily as the experience with the Guardian of the Threshold. I tried to describe something concrete about this experience in my Mystery Drama, The Guardian of the Threshold. Here it only need be mentioned that at a certain stage of spiritual development, man learns to know his inner being as it can love itself with the force of an event of nature, as it can be frightened and horrified on entering the spiritual world. This experience of our own self, of the intensified self of that inner being that otherwise never would come before our soul, is the soul-shaking event called the Meeting with the Guardian of the Threshold. Only by having this meeting will one acquire the faculty to differentiate truth from error in the spiritual world. Why this experience is called the Meeting with the Guardian of the Threshold is easily comprehensible. It is clear that the spiritual world that man enters is always around us and that man is unaware of it in ordinary life only because he does not have the appropriate organs to perceive it. The spiritual world surrounds us always and is always behind that which the senses perceive. Before man can enter this world, however, he must strengthen his ego, his I. With the strengthening of the ego, however, the aforementioned qualities also appear. He therefore must learn above all else to know himself, so that when he is able to confront a spiritual outer world in the same way as he confronts an objective being he can distinguish himself from what is truth. If he does not learn to delimit himself in this way, he will always confuse that which is only within him, that which is only his subjective experience, with the spiritual world picture; he can never arrive at a real grasp of spiritual reality. To what extent fear plays a certain role on entering the spiritual world can be observed particularly in the people who deny the existence of such a world. Among such people are also many who have different reasons for denying this spiritual world, but a great portion of those people who are theoretical materialists or materialistically tinged monists have a definite reason for denying this spiritual world, a reason that is clearly visible for one who knows the soul. We must now emphasize that the soul life of the human being is, as it were, twofold. In the soul not only does there exist what man ordinarily knows, but in the depths of the soul life things are happening that cast their shadows — or their lights — into ordinary consciousness. Ordinary consciousness, however, does not reach down to this level. We can find in the hidden depths of soul hatred and love, joy and fear and excitement, without our carrying these effects into conscious soul life. It is therefore entirely correct to say that a phenomenon of hatred directed from one person to another, taking place within consciousness, actually can be rooted, in the depths of soul, in love. There can be a sympathy, a deep sympathy, of one person for another in the depths of the soul, but since this person at the same time has reasons — reasons about which he perhaps knows nothing — he is confused about this love, about the sympathy, deceiving himself with hatred and antipathy. This is something that holds sway in the depths of the soul, so that these depths look quite different from what we call our everyday consciousness. There can be conditions of fear, of anxiety, in the depths of the soul of which one has no conscious idea. Man can have that fear in the depths of his soul, that anxiety in face of the spiritual world — because he must cross the abyss that has been described before entering — and yet be aware of nothing consciously. Actually, all human beings who have not yet entered the spiritual world, but who have acquired an understanding of entering, have to a degree this fear, this terror in face of the spiritual world. Whatever one may think concerning this fear and anxiety that are within the depths of the soul, they are there, though they appear stronger with one person, weaker with another. Because the soul might be injured, man is protected by the wisdom-filled nature of his being from being able to look further into the spiritual world, from being able to have the experience of meeting the Guardian of the Threshold until he is ready for it. Before that he is protected. Therefore one speaks of the experience of the Guardian of the Threshold. We can note that a materialistically or monistically minded person, although knowing nothing of this experience, does have this fear in face of the spiritual world in the depths of his soul. There lives in such a person a certain antipathy to confronting the abyss that must be crossed; and to help him get past this fear, this anxiety in the soul in face of the spiritual world, the monist or materialist thinks out his theories and denies the spiritual world; this denial is nothing other than a self-induced anesthesia in face of his fear. This is the real explanation for materialism. As unsympathetic as it may sound, for one who knows the soul it is evident that in a meeting of materialistic monists, or those who deny soul and spirit, there prevails only the fear in the face of the spiritual world. One could say mockingly that fear-mongering is the basis of materialism, and although it is mocking it is nevertheless true. In materialistic literature, in the materialistic world conception, the spiritual investigator recognizes everywhere between the lines fear and anxiety in face of the spiritual world. What in ordinary life appears as materialism, however, as the soul condition present when a person is a materialist or a materialistically tinged monist, can also be present when a person arrives through definite measures at a certain spiritual vision. One can go through certain exercises in the soul and develop thereby from a more-or-less unhealthy soul condition to a more-or-less spiritual comprehension, yet one need not come by this means to a real understanding of the nature of the spiritual world. In a certain way one can carry up into the spiritual something of this fear about which one knows nothing, which has already been characterized and which underlies the materialistically minded person in the ordinary world. If one does not grasp this connection, one can carry up into the spiritual world something that is terribly widespread in ordinary life: the love of ease of thinking, the love of ease of feeling. Fear is closely akin to love of ease, to clinging to habit. Why is man afraid of changing his situation? Because he loves his ease and comfort. This love of ease is closely related to fear. We have already described the basis for hatred; in the same way one can also say that lassitude, love of ease, are closely related to fear. One can, however, carry this love of ease up into the spiritual world. No one ought to object that human beings show no evidence of fear or love of ease, for this is again characteristic; it is characteristic that the ordinary mood of soul knows nothing of these things rooted in the subconscious. If man carries fear into the spiritual world, already having developed to the point of acknowledging the spiritual world, then an error arises in a spiritual region, an error that is extraordinarily important to consider the leaning toward phenomenalism. People who become subject to this leaning become, rather than spiritual investigators, “specterseers” (to express it crassly), those who see ghosts (Gespensterschauer); they become possessed by a leaning toward phenomenalism. This means that they want to see the spiritual world in the same way as the sense world is to be seen; they do not want to perceive spiritual facts, spiritual beings, but something similar to the beings that the sensory eye can behold. In short, instead of spirits they want to behold specters, ghosts. The error of spiritualism (this is not to say that all spiritualism is unjustified) consists of this leaning toward phenomenalism. Just as the ordinary, everyday materialist wants to see only matter everywhere and not the spirit behind matter, so does he who brings to the spiritual world the same soul condition that actually exists in materialism want to see everywhere only ghostlike, condensed spirits. This is one dangerous extreme of error that can emerge. One must say that this tendency to carry the ordinary field of consciousness up into the super-sensible field of consciousness exists in the widest circles, even among those who fully recognize a “spiritual world” and want “proof” of a spiritual world. The error here, however, lies in considering a proof valid only if it takes place in the realm of phenomenalism; it lies in considering that everything should be like condensed ghosts. Here something arises that was called in the beginning of our study a stupor, losing consciousness in relation to the spiritual world. While losing consciousness in ordinary life is the penetration of a sleeping or dreaming condition into consciousness, losing consciousness regarding the spiritual world means wanting to give worth only to that which appears in the same way as things in the ordinary world, so that one is unconscious in relation to the spiritual world; it is demanded that proof be supplied that can be taken in the way appropriate only in the ordinary world. Just as one brings sleep into the ordinary world if one falls unconscious, so one falls unconscious in relation to the beings and processes of the spiritual world if one takes into the super-sensible world that which is only an extract of sense reality (das Sinnliche). The true spiritual investigator also knows those realms of the spiritual world that condense into the ghostlike, but he knows that everything arriving at such a condensation is merely the dying, the withering in the spiritual world. When, for example, with the help of a medium, something is brought to life as the thoughts of a deceased person, we are confronted only with what remains behind, as it were, of the deceased. We are not dealing with that which goes through the portal of death, which passes through the spiritual world and appears again in a new earthly life. We are concerned in such a case not with what is present in the individuality of the dead person but with the sheath that is cast off, the wooden part of the tree, or the shell of a shellfish, or the skin of the snake that is cast off. In the same way, such sheaths, such useless remnants, are continuously being cast off from the being of the spiritual world and then, by way of a medium, they can be made perceptible — although as visible unreality. The spiritual investigator knows, to be sure, that he is not confronting an unreality. He does not surrender himself to the error, however, that in encountering the described phenomenon he is confronted with something fertile, with something sprouting and budding; rather he knows it as something dying, withering. At the same time it must be emphasized that in the sense world, when one confronts error, one is dealing with something that must be ignored, that must be eliminated as soon as it is recognized as error, whereas in the spiritual world one cannot cope with error in the same way. There, an error corresponds to the dying, the withering, and the error consists of mistaking the dying and withering in the spiritual world for something fruitful or full of significance. Even in the life of the ordinary human being, error is something one casts off; in the spiritual world error arises when the dead, the dying, is taken for something fruitful, sprouting; one mistakes the dead remnants that have been cast off for immortality. How deeply the best individuals of our time have been entangled in this kind of phenomenalism, considering only such proof as valid, we can see in an individual who wrote so many excellent things about the world and now has written a book about these phenomena, about these different phenomena of spiritual investigation. I am referring to Maurice Maeterlinck and his book, About Death. We read there that he acknowledges a spiritual world but as proof acknowledges only what appears in phenomenalism. He does not notice that he tries to find in phenomenalism that which can never be found in phenomenalism. Then he criticizes the “phenomena” very acutely, very effectively. He does notice, however, that all this actually has no particular meaning and that the human soul after death does not exhibit a very intense vitality, that it behaves rather awkwardly, as though groping in the dark. Since he wants to admit only this kind of proof, he generally does not acknowledge spiritual investigation but remains stuck. We see how the possibility of error opens itself to someone who would gladly recognize the spiritual world but is unable to do so, because he does not demand spiritual investigation but rather “specter investigation” and does not make use of what reality can give. His newest book is extraordinarily interesting from this point of view. In the leaning toward phenomenalism we thus have the one extreme among the possibilities for error in spiritual investigation. The other extreme among the possibilities for error is ecstasy, and between phenomenalism and ecstasy, in knowing both, lies the truth, or at least truth can be reached if one knows both. The path of error, however, lies as much on the side of phenomenalism as on the side of ecstasy. We have seen what soul condition leads into the wish to acknowledge only phenomenalism. It is fear, horror, which man does not admit, which he tries to conceal. Because he is afraid to abandon all sense reality and to make the leap over the abyss, he accepts sense reality, demands the specters, and arrives thereby only at the dying, at that which destroys itself: This is one source of error. The other force of the soul, intensified through the exercises often described here is self-love, sense of self; self-love has as its polarity — one would like to say — the “getting out of oneself.” This “enjoying oneself in oneself” (pardon the expression; it is a radical choice but points exactly to what we are concerned with here) is only one side; the other side consists of “losing oneself in the world,” the surrender and dissolving and self-enjoyment in the other and the corresponding intensification of this self-seeking coming-out-of-one's self is ecstasy in its extreme. It is the cause of a condition in which man in a certain respect can say to himself that he has gotten free of himself. He has become free of himself, however, only by feeling the comfort of his own self in the being outside himself. If the one who knows the soul looks at the evolution of mysticism in the world, he finds that a large part of mysticism consists of the phenomena just characterized. As great, as powerful in soul experiences, as deep and significant as mysticism can be, the possibilities of error in ecstasy are actually rooted in a false cultivation of the mystical faculty of the human being. When man strives always to enter more and more into himself, when he strives through this for what is called the deepening of his soul life, strives, as he says, to find “God in himself” this God that man finds in his inner being is usually nothing other than his own I or ego made into God. With many mystics we find, when they speak of the “God within,” nothing other than the God imprinted with their own egos. Mystical immersion in God is at times nothing but immersing oneself into one's own dear ego, especially into the parts of the ego into which one does not penetrate with full consciousness, so that one surrenders one's self, loses one's self, comes out of one's self, and yet remains only within one's self. Much that confronts us as mysticism shows that with false mystics love of God is often only disguised self-love. The real spiritual investigator must guard himself on the one hand against carrying the outer sense world into the higher world; he must guard on the other hand against the opposite extreme, against false mysticism, the coming-out-of-oneself. He must never confuse “love for the spiritual being of the world” with self-love. In the moment that he confuses these, the following occurs, as the true spiritual investigator, who has developed himself correctly, can verify. Just as one who is compelled by phenomenalism beholds only the remnants, the dying of the spiritual world, so he who surrenders himself to the other extreme sees only individual parts of the spiritual world, not spiritual facts and beings. In the spiritual world he does not do what one who contemplates the flowers in a meadow does; rather, he does what the one does who takes what grows in the field, chops it up and eats it. This comparison is peculiar but absolutely to the point. Through ecstasy the spiritual facts are not grasped in their wholeness, their totality, but only in that which pleases and benefits one's own soul, that which the soul can consume spiritually. It is actually a consumption of spiritual substance that is cultivated in the human being through ecstasy. Just as little as one learns to know things of this sense world by eating them, so little does one learn to know the forces and beings of the spiritual world through giving oneself to ecstasy in order to warm one's own self with what feels good. One thereby comes to a definite knowledge only of one's own self in relation to the spiritual world. One lives only in a heightened sense of self, a heightened self-love, and because one takes in from the spiritual world only that which can be consumed spiritually, which can be eaten spiritually, one deprives oneself of that which cannot be handled in this way, of that which stands apart from the nourishment gained through ecstasy. What one deprives oneself of, however, is by far the greatest part of the spiritual world, and the mystic who clings to ecstasy is deprived more and more. We find with mystics who ascend to the spiritual world through ecstasy that it is exactly as if they were always indulging themselves through repeating feelings and sensations. Many presentations of such mystics appear not as objective presentations of the conditions of the spiritual world but as though the one who gives the presentation were indulging in what he presents. Many mystics are actually nothing but spiritual gourmets, and the rest of the spiritual world, which does not taste good to them, does not even exist for them. We see again how concepts change when we ascend from the ordinary world into the higher world. If in the ordinary world we occupy ourselves only with our own concepts, we become poorer and poorer, our logic becomes ever poorer. Finally we find that we can no longer find our orientation, and anyone who knows the facts can set us straight. In the ordinary world we correct this meagerness by widening our concepts. In the spiritual world, that which corresponds to ecstasy leads to something else. By taking into us realities, and not something unreal — but taking in only isolated parts, after picking out what suits us — we receive a view of the spiritual world that is only suited to ourselves. We carry ourselves into the spiritual world just as in the other extreme, in phenomenalism, we carry the sense world into the spiritual world. It can always be shown in the case of one who arrives at a false picture of the world through ecstasy that he began from an unsound force of judgment, from an incomplete factual logic. We thus see how the spiritual investigator always must avoid the two extremes that bring him to every possible source of error: phenomenalism on the one hand and ecstasy on the other. In order to avoid the sources of error, nothing will be more helpful than for the spiritual investigator to cultivate one particular mood of soul, through which he is in a position, when he places himself in the spiritual world, to exist in the spiritual world, to be able to observe calmly in that world. One cannot always remain in the spiritual world, however, so long as one is in the physical body; one must also live with the physical world; therefore this mood of soul that the spiritual investigator must cultivate allows him in the physical world to strive as much as possible to grasp the facts of life with common sense, without sentimentality and untruthfulness. It is necessary for the spiritual investigator, to a much higher degree than is ordinarily the case, to have a healthy sense for facts, a genuine feeling for truthfulness. All fanaticism, all inaccuracy, which make it so easy to skirt what is really there, are harmful for the spiritual investigator. One can see already in ordinary life, and it becomes clear immediately in the realm of spiritual training, that lie who lets himself indulge only the least bit in inaccuracy will notice that it is only a tiny step from inaccuracy to lies and untruthfulness. The spiritual investigator, therefore, must strive to feel himself obliged to hold firmly to the truth, to mix nothing with the unconditional truth that exists in ordinary life, for in the spiritual world such a mixing leads from error to error. In those circles wishing to have anything to do with spiritual investigation, the justified opinion should be spread that an outer, distinguishing characteristic of the true spiritual investigator must be his truthfulness; the moment the spiritual investigator demonstrates that he feels little obligation to test what he says, speaking rather of things he cannot know about the physical world, he becomes flawed as a spiritual investigator and no longer can merit a full trust. This is connected with the conditions for spiritual investigation itself. It must be brought to our attention again and again that, when the realms of spiritual investigation and spiritual science are spoken of today, it is unjustified to claim that only the spiritual investigator can see into the spiritual world and that one who is not yet a spiritual investigator is unable to know and understand and grasp it. You can learn from the descriptions in my book, Knowledge of the Higher Worlds, and from my presentation in An Outline of Occult Science that in our era to a certain degree every person, if only he makes the necessary effort, can become a spiritual investigator, no matter what his position in life is otherwise. Nevertheless, it is also possible for a person to understand the descriptions of the spiritual world without being a spiritual investigator. It is necessary to be a spiritual investigator not in order to understand the communications from the spiritual world but in order to discover them, to investigate what is present in the spiritual world. One must be a painter in order to paint a picture, but one need not be a painter to understand a picture; it is the same with understanding communications from the spiritual world with the sound human intellect. It is in order to investigate the spiritual world that the human being is endowed with the higher organs of observation. If what is investigated, however, is brought into the concepts of the ordinary world, as is often attempted here, the sound human intellect can, if only it is sufficiently unprejudiced and does not create obstructions for itself, grasp what is brought to light through spiritual investigation. One could say that with spiritual investigation it is the same as it is with what grows under the earth and is found only when one digs into the earth like a miner. Whatever one finds there can originate only as it exists within the earth, developing in those layers of the earth that are covered by layers above it. What is in the depths of the earth cannot develop on the surface of the earth, which is illuminated by the sun during the day. If we then make an opening in the earth, however, and let the sunlight shine in, illuminating what is underneath, everything can appear in the light of the sun. It is the same with what can be gained through spiritual scientific investigation: it can be brought to light only if the soul has transformed itself into an organ of perception for the spiritual world. If it is brought into the concepts and mental images of ordinary life, however, then the human intellect, if only it is sufficiently sound, can understand and illuminate everything as if with spiritual sunlight. All of spiritual science, therefore, can be grasped by the sound human intellect. Just as a painting is not made merely for the painter himself, so the communications about the spiritual world are not only for the spiritual scientific investigator. Nevertheless, paintings are able to originate only through the painter, and the spiritual world can be explored only by the spiritual investigator. He who believes that what comes from the communications of the spiritual investigator cannot be grasped by means of the ordinary intellect does not perceive at all correctly the nature and essence of the human capacity for thinking. In the human capacity for thinking reside faculties that stand in direct connection with the nature of the higher world. Because man is accustomed to approach only the ordinary sense objects with his concepts, he believes that the ordinary faculty of judgment vanishes in him if super-sensible facts are presented to him. He who develops his capacity for thinking, however, can cultivate this capacity in such a way that it can grasp what is brought to light through spiritual investigation. One must not have some notion beforehand, however, of how one can grasp such matters. This should result from the study itself. If one has a definite notion of how one should grasp these things, one surrenders oneself again to a serious error in relation to spiritual investigation. This is the second aspect that is especially noticeable in Maurice Maeterlinck's new book. He is an individual who wishes to direct his gaze to the spiritual world, who has made some fine observations about various things, and who has also tried to present the mysteries of the spiritual world dramatically; it is especially telling that this individual, in the moment in which he should approach the real science of the spirit, proves himself so inadequate. He demands a certain kind of understanding — not the kind given by the things themselves but the kind he imagines (ertraeumt), which he believes must appear to provide verification. In this way the greatest peculiarity arises: Maeterlinck takes to be merely a belief that which anthroposophy or spiritual science has to say when it speaks today about “repeated earthly lives” — when it speaks with a certain outer justification (not with a merely inner conviction, which would be akin to a certain primitive belief of humanity). He calls it a belief, because he cannot perceive that what we are concerned with here does not have to do with belief but with knowledge. He thus finds that the existence of that which develops further in man, moving from life to life, cannot be proved, because he has a definite idea of what constitutes proof. Maeterlinck can be compared in this realm to certain other people. Until recently, there existed a kind of belief, a certain mathematical-geometrical belief that is summarized in the words, the “squaring of the circle”; that is, one would seek by means of a mathematical-analytical, constructive thinking for that square which equaled the area or the circumference of the circle. This task of transforming the circle into a square was an ideal, as it were, toward which one always strove: the transforming of the circle into a square. Now, no one doubted that there could be a square exactly as large as a circle. In reality, of course, it is entirely possible for such a thing to exist, but it is impossible to show with mathematical constructions or with analytical methods just what the diameter of a circle would have to be to equal a particular square. This means that mathematical thinking does not suffice to prove something that is real, that is physical. There have been countless people who have worked on the solution of squaring the circle, until recent mathematicians proved that it is impossible to solve the problem in this way. Today anyone still trying to solve the problem of squaring the circle is considered not to know mathematics in this realm. Maeterlinck is equivalent to those people trying to square the circle in regard to what he is trying to prove. One can understand the spiritual world, can grasp that what is brought to light through spiritual investigation is real; one cannot prove the existence of this spiritual world, however, if one demands out of prejudice a particular kind of proof; one can prove it in this way as little as one can prove the squaring of a circle mathematically. One would have to reply to Maeterlinck, therefore, that he tries to square the circle in the spiritual realm, or he would have to be shown how the concepts by which he would like to prove the existence of the spiritual world disappear when man passes through the portal of death. How is one supposed to prove the existence of the spiritual world with concepts such as those taken from the sense world? This, however, is what Maeterlinck is trying to do, and it is extraordinarily interesting that when he gives in to his healthy feeling, he has no choice but to acknowledge repeated lives on earth. It is very interesting how he expresses himself about a knowledge that he calls a belief, and I would like to read to you his own words: ‘Never was there a belief more beautiful, more just, more pure, more morally fruitful, more comforting, and in a certain sense more probable than this. With its teaching of gradual redemption and purification of all bodily and spiritual inequities, of all social injustice, all terrible’ injustices of destiny, it alone gives meaning to life. The goodness of a belief, however, is no proof of its truthfulness. Although six hundred million human beings devote themselves to this religion, although it is closest to the origins that are shrouded in darkness, although it is the only one without hatred, it should have done what the others have not done: bring us indisputable evidence. What it has given us up to now is only the first shadow of the beginning of a proof.” In other words, Maeterlinck is trying in this realm to square the circle. We see especially clearly in this example how someone who can think that the benefit of spiritual science lies only in an extreme, in phenomenalism (all his writings show this), is totally unable to keep in view the significance and the real nature of spiritual scientific investigation. From such an example as Maeterlinck, we can learn a lot, namely that truth, which must be introduced into the world evolution of humanity, is really, when it first appears, in the position once characterized by Schopenhauer with the words, “In all centuries poor truth had to blush over being paradoxical.” To Maeterlinck, truth appears not just paradoxical but unbelievable, yet it is not the fault of truth. Truth cannot take on the form of the universally reigning error. Thus she looks sighing to her patron god, Time, which promises her victory and glory, but whose vast wings beat so slowly that she dies in the meantime. So it goes with the course of the spiritual evolution of humanity. It is most interesting and instructive that the best individuals today, those human beings who long to have their soul life connected with a spiritual world, are not capable of grasping the core of the actual science of the spirit. Instead, where it involves distinguishing the true path from the two possibilities for error, they stumble, because they do not dare leap over the abyss; they wish either to make use of their dependence on the ordinary world, in phenomenalism, or, if they do not do this, they seek an intensification of the sense of self in ecstasy. We cannot concern ourselves only with recognizing the character of the separate possibilities for error; we must concern ourselves with that which humanity must avoid if one is to recognize and close up the source of spiritual scientific error. From the way in which today's study has been undertaken, one conclusion can be drawn: spiritual investigation must know the sources of error. The temptation is always present in the soul to err in the direction of phenomenalism, and therefore to stand as though spiritually unconscious in relation to the spiritual world, or to err in the direction of ecstasy, which means wanting to enter the spiritual world with inadequate organs of spirit and thus receiving only isolated pieces and not related facts. The path goes between the two extremes. One must know the possibilities for error. Because they can appear with every step in spiritual life one must not only know them but overcome them. The revelations of spiritual investigation are not only results of investigation but also victories over error, victory by means of a way of looking that has been gained previously, victory over the sense of self and more. He who penetrates more deeply into what we have tried to describe only sketchily today will become aware that — even if everywhere where we embark on the investigation of spiritual life the possibilities for error can lurk frighteningly — we nevertheless must conquer error again and again. He will become aware that spiritual investigation not only satisfies an indomitable yearning for that which man needs for certainty in his life but that its goal must appear, to one who regards this movement with comprehension, as attainable to a sound human sense. To conclude what today's lecture was to offer on the level of feeling, I would like to say that in spite of all obstacles, in spite of all things that can stand in a hostile way on the path of spiritual investigation, those who penetrate with a sound sense into the results of spiritual scientific. investigation feel and sense that these results penetrate — through difficult hindrances of soul, through bewildering darknesses of spirit — to a solemn clarity, to a luminous truth.
https://rsarchive.org/GA/GA0062/19130306p01.html
Find out how you can help organizations protect their data and technological assets. You will learn best practices for cyber security, access control, configuration management, and more. This course is part of the Bachelor of Science in Information Technology program at the Forbes School of Business & Technology. In this course, students will learn how to manage the technology that affects organizations. Concepts covered include security best practices, access control, network components and services, change management, and configuration management. Students will gain an understanding of how the services offered by the various network components should be managed and protected. Prerequisite: INT 301. This course introduces students to the principles of information systems security (confidentiality, integrity, and availability) and the seven domains of the typical IT infrastructure. Risks, threats, and vulnerabilities will be defined. Creation of an IT security policy framework will be emphasized. The following topics will be introduced: the risk management process, cryptography, compliance laws, and information security standards. At the end of the course, students will be able to apply the security life cycle to an information system. This course introduces the risks associated with connecting to the Internet via web applications and social networking. Students will learn the Open Web Application Security Project (OWASP) Top 10 threats to web applications and the threat classifications of the Web Application Security Consortium (WASC). Instruction on how to maintain PCI-DSS compliance in e-commerce sites will be provided. At the end of the course, students will be able to secure web applications and mitigate vulnerabilities with web applications on the Linux and Windows platforms. This course expands upon the cryptography concepts learned in CYB 301 Introduction to Cyber & Data Security Technology. A history of cryptography will be presented. Topics include symmetric encryption algorithms, asymmetric encryption algorithms, and hashing functions. The protocols, tools, and techniques used in cryptography will be reviewed. Hacking techniques that use cryptography will be introduced. At the end of the course, students will be able to design a cryptography plan to safeguard information that is electronically transmitted. This course builds upon the risk management concepts learned in CYB 301 Introduction to Cyber & Data Security Technology. Topics presented are risk management standards, methods, and tools and IT governance and control frameworks. Methods to prepare a risk analysis will be reviewed. Upon completion of the course, students will be able to identify an organization’s threats and vulnerabilities, and the associated risks along with the probability that the risks will occur. This course builds upon the compliance concepts learned in CYB 301 Introduction to Cyber & Data Security Technology. Students will examine laws and/or regulations that may apply to an organization. The various types of evidence and how to protect the evidence via the chain of custody will be emphasized. Upon completion of the course, the students will be able to perform a digital forensic investigation. In the Cyber & Data Security Technology Capstone course, students will complete an original and significant project that integrates concepts, principles, and tools taught throughout the program. In this course, the student will design, implement, test, and document a secured solution of the seven domains of an organization’s IT infrastructure. A presentation will be made by the individual for evaluation and approval. Prerequisites: GEN 499. This course must be taken last in the program.
https://www.ashford.edu/online-degrees/online-courses/cyber-data-security-technology-courses
A January 20, 2021 news item on phys.org focuses on work designed to stop gold nanoparticles from clumping together (Note: A link has been removed), Hokkaido University scientists have found a way to prevent gold nanoparticles from clumping, which could help towards their use as an anti-cancer therapy. Attaching ring-shaped synthetic compounds to gold nanoparticles helps them retain their essential light-absorbing properties, Hokkaido University researchers report in the journal Nature Communications. … A January 20, 2021 Hokkaido University press release (also on EurekAlert but published Jan. 21, 2020), which originated the news item, elaborates on the work, Metal nanoparticles have unique light-absorbing properties, making them interesting for a wide range of optical, electronic and biomedical applications. For example, if delivered to a tumour, they could react with applied light to kill cancerous tissue. A problem with this approach, though, is that they easily clump together in solution, losing their ability to absorb light. This clumping happens in response to a variety of factors, including temperature, salt concentration and acidity. Scientists have been trying to find ways to ensure nanoparticles stay dispersed in their target environments. Covering them with polyethylene glycol, otherwise known as PEG, has been relatively successful at this in the case of gold nanoparticles. PEG is biocompatible and can prevent gold surfaces from clumping together in the laboratory and in living organisms, but improvements are still needed. Applied chemist Takuya Yamamoto and colleagues at Hokkaido University, The University of Tokyo, and Tokyo Institute of Technology found that mixing gold nanoparticles with ring-shaped PEG, rather than the normally linear PEG, significantly improved dispersion. The ‘cyclic-PEG’ (c-PEG) attaches to the surfaces of the nanoparticles without forming chemical bonds with them, a process called physisorption. The coated nanoparticles remained dispersed when frozen, freeze-dried and heated. The team tested the c-PEG-covered gold nanoparticles in mice and found that they cleared slowly from the blood and accumulated better in tumours compared to gold nanoparticles coated with linear PEG. However, accumulation was lower than desired levels, so the researchers recommend further investigations to fine-tune the nanoparticles for this purpose. Associate Professor Takuya Yamamoto is part of the Laboratory of Chemistry of Molecular Assemblies at Hokkaido University, where he studies the properties and applications of various cyclic chemical compounds. Here’s a link to and a citation for the paper, Enhanced dispersion stability of gold nanoparticles by the physisorption of cyclic poly(ethylene glycol) by Yubo Wang, Jose Enrico Q. Quinsaat, Tomoko Ono, Masatoshi Maeki, Manabu Tokeshi, Takuya Isono, Kenji Tajima, Toshifumi Satoh, Shin-ichiro Sato, Yutaka Miura & Takuya Yamamoto. Nature Communications volume 11, Article number: 6089 (2020) DOI: https://doi.org/10.1038/s41467-020-19947-8 Published: 30 November 2020 This paper is open access.
https://www.frogheart.ca/?tag=university-of-tokyo
Withdrawing from the University A withdrawal is defined as canceling your entire enrollment within a particular semester. If you withdraw, you are no longer associated with the university. A drop is defined as canceling registration of an individual course or courses while maintaining enrollment in at least one course. Withdrawing has an effect on your financial aid, for both the current and future semesters, and on your academic progress which could result in your dismissal from the university. Caution: Withdrawing may significantly impact your financial aid! Check with the financial aid office before you withdraw. Undergraduate and School of Professional Studies students must contact the appropriate office below to initiate the process: - Undergraduate Students (Broadway Campus) >> E-mail [email protected]. You must include the term and year ( ex. Spring 202X, Maymester 202X, Summer I 202X, Summer II 202X, Fall 202X), full name, student ID number, phone number, best email, and a brief explanation for the possible withdrawal. - School of Professional Studies (SPS) Students >> Contact your academic advisor - Graduate students need ONLY submit the online withdrawal form, but can direct related form or processing questions to the Office of Research and Graduate Studies at (210) 805-3555 Consequences of Withdrawing A withdrawal affects both a student’s bill as well as any financial aid the student may have received. Students may or may not be eligible for a refund or a reduction of charges based upon the date of the withdrawal. The refund schedule defines the amount of tuition and fees (if any) to be refunded based on the date of withdrawal. A separate Return of Title IV calculation must be processed on any financial aid the student has received and may result in the student having a balance with the University after withdrawing. - A student’s withdrawal from the University will be considered as occurring the day the student turns in the withdrawal form to the Office of Student Success (for undergraduate students) or to the Office of Research and Graduate Studies (for graduate, doctorate, and professional students). The student must obtain a signature from the appropriate office before the student’s withdrawal will be considered official. - If you attend class in any semester and then withdraw or earn zero credit after aid has been disbursed, you may be required to return any funds received, including funds credited to pay tuition and fees. - Financial aid must be used for educationally related expenses during your dates of enrollment. Federal regulations require the Financial Aid Office to calculate the amount of aid you “earned” for the number of days you attended. Any “unearned” aid for when you did not attend classes or were not enrolled must be repaid. - If you withdraw before the start of the semester or never attend any classes, 100% of aid disbursed to you must be repaid. If a repayment is owed, you will be billed by the Business Office. You may not register and are not eligible for further aid until repayment is made in full. Additionally, we may also report you to a collection agency until we receive full funds and your balance is cleared. Exit interviews are required to complete the withdrawal process. If you received a Perkins loan, complete the exit interview online. If you received the Stafford and/or Graduate PLUS loans, complete an exit interview online at Mappingyourfuture.org (choose Stafford Exit or Stafford and Grad PLUS Combined Exit).
https://my.uiw.edu/registrar/withdrawing-from-the-university.html
Sir James Paul McCartney, known professionally as Paul McCartney, is a singer, songwriter, poet, bass player and animal rights activist. He is best known for his work with the English rock band The Beatles. During his 63-year-long ongoing career that revolutionized the world of music, McCartney has amassed a fortune of over $1 billion. This drove him to begin making significant charitable donations to organizations. McCartney’s humanitarian work emphasizes spreading awareness about causes for which he advocates. 5 Facts About Paul McCartney’s Humanitarian Work - As of June 2020, Paul McCartney has supported 45 charities. Throughout his life, he has donated millions to several charities and has participated in many benefit concerts, such as Live 8 and Change Begins Within. Change Begins Within was a 2009 benefit concert in Manhattan, New York, hosted by the David Lynch Foundation. It helped raise money and awareness for at-risk youth and encouraged the use of meditation to combat stress and achieve success. Other significant charities and organizations that McCartney has supported include Adopt-A-Minefield, Cruelty Free International, Everyone Matters, Greenpeace, PETA, Red Cross and the St. Francis Food Pantries and Shelters. McCartney is a patron for Adopt-A-Minefield, an organization dedicated to raising awareness about the problems of landmines, raising funds to help survivors of landmine accidents and helping clear landmines. From 2001 to 2005, McCartney performed in five benefit galas for the organization. In total, he helped raise $17 million for the now-inoperative charity. - Paul McCartney is a huge advocate for providing aid for childhood diseases. McCartney has four biological children, Mary, Stella, James and Beatrice, and an adopted daughter, Heather, who is the biological daughter of the late Linda McCartney. McCartney also has eight grandchildren and used them as inspiration for his children’s book “Hey, Grandude!”, which was published in September 2019. His devotion to his own children and grandchildren is evident, but it is also apparent that he cares a great deal for the welfare of children around the world. McCartney’s humanitarian work has included donations to the Barbara Davis Center for Childhood Diabetes, Keep a Child Alive, Children with Leukemia and Teenage Cancer Trust. These are organizations dedicated to focusing on the needs of children affected by significant diseases or disorders. Additionally, in 2012, McCartney performed at the Royal Albert Hall in London for the Teenage Cancer Trust, helping raise over $382 million. - Paul McCartney’s humanitarian work dates back over 40 years. In 1979, McCartney was one of the lead organizers of the Concerts for the People of Kampuchea, a series of concerts that ran from December 26-29, 1979 and took place at the Hammersmith Odeon in London. The concerts raised awareness and donations for the victims of war-torn Cambodia (then known as Kampuchea) at the start of the Cambodian-Vietnamese War. The proceeds went directly toward United Nations agencies’ emergency relief work in Cambodia. In addition, in 1989, McCartney participated in a charity version of the song “Ferry Cross the Mersey.” The proceeds made from the single were used to aid victims of the Hillsborough disaster, a human crush that occurred at a soccer match in the Hillsborough Stadium in South Yorkshire, England, killing nearly 100 people. The song held the number one spot on the U.K. chart for three weeks after its release. - Paul McCartney supports the eradication of poverty. McCartney’s humanitarian work also includes dedicating time and money toward helping those who are socioeconomically disadvantaged. His most notable involvement with an organization dedicated to ending poverty was when he performed at a Live 8 concert in 2005. Live 8 was a series of benefit concerts organized in support of the U.K.’s Make Poverty History coalition and the international Global Call to Action Against Poverty campaign. The goal of the concerts was to raise $50 billion in aid toward impoverished African countries by 2010 (the concerts raised about $30 billion). McCartney has also supported the Worldwide Orphans Foundation, Aid Still Required and the Prince’s Trust. These organizations assist people in underdeveloped countries and unfavorable socioeconomic situations. - In April 2020, Paul McCartney performed in the One World: Together at Home benefit concert. The current international COVID-19 outbreak has affected people worldwide. Global Citizen, a worldwide movement dedicated to ending poverty by 2030, hosted a charity special in the form of a virtual benefit concert starring many famed musicians. The concert was titled One World: Together at Home. It raised $127 million for the COVID-19 Solidarity Response Fund and for charities providing food, shelter and healthcare to those in need. McCartney sang a solo rendition of the Beatles’ song “Lady Madonna” while playing the piano. Paul McCartney’s humanitarian work proves his unwavering dedication toward improving the welfare of humans and animals alike. His aid has made him one of the celebrities best known for generous donations. His championship for nearly 50 charities and organizations proves how one can use their wealth to better the state of the world.
https://borgenproject.org/tag/the-beatles/
More than 40 private sector leaders, from a diverse range of companies, gathered on the sides of the Partners’ Forum in Johannesburg on 29th June to reflect on the role of the private sector, both in the lead up to the 2015 deadline for the MDGs and the post-2015 environment. Mrs Graça Machel, Chair of PMNCH and the Partners’ Forum, was also present at the meeting. She noted the important contribution of the private sector in improving women’s and children’s health, and urged it to define the role that it sees itself playing in the future. In recent years, the private sector has come to play a more dominant role in financing women’s and children’s health initiatives. For example, private sector commitments constituted nearly 40% of the total commitments announced during the Partners’ Forum towards the advancement of the Every Newborn Action Plan (ENAP). These included: Ayzh Inc., Beckton Dickson, International Pharmaceutical Federation (FIP), Glaxo Smith Kline, GSMA, Johnson & Johnson, Laerdal Global Health, Masimo & Newborn Foundation, McCann Health, Medtronic Philanthropy, Merck, Novartis, Pfizer and Premier Medical Systems Nig. Ltd. More companies are expected to announce their commitments in September 2014. Alongside significant commitments from others, including the Islamic Development Bank, this adds up to a huge boost for the start-up phase of the ENAP. Several speakers emphasized that the private sector can do much more than just providing funding. The private sector has been typecast in a niche role, whereas the potential is unlimited if private sector expertise can be leveraged more effectively. The private sector wants to, and can do, much more. Global and national companies are already contributing through their employees; sales and distribution networks; ability to innovate and scale-up, marketing and advertising capacity; and relationships or networks at the community level. Participation of several companies in the Innovation Working Group has already led to significant progress in some areas. Collaborating more effectively across the private sector was identified as a key priority by several speakers. While the private sector has to build trust with other constituencies such as donors and governments, companies also need to trust each other to form strategic partnerships. More effort is required to recognise ways in which private sector companies can collaborate with each other and have a unified voice about what the private sector, as a constituency, can bring to the table. Private sector leaders present also acknowledged that African and Asian companies need to be engaged in bigger numbers to scale up impact in countries. Several local companies and small scale social enterprises are active in these countries and their efforts will be critical in reaching the most underserved populations. Looking to the future, some expressed a concern that the private sector has had limited opportunity to engage in the post-2015 discussions that are seeking to establish priorities for the future. The United Nations Foundation is leading one particular initiative in consultation with civil society groups to develop a framework for private sector engagement vis-a-vis the post-2015 goals. PMNCH has a large working group with about 80 individuals/institutions/governments working on a consensus position across all constituency groups, but the private sector representation in this group needs to be bolstered. Such efforts will need to be strengthened in the coming months. The private sector meeting also heard from representatives of the NGO and Donors & Foundations (D&F) constituencies. As the largest constituency of PMNCH, and one with extensive last mile reach, the NGOs are a valuable partner for private sector companies. The constituency’s focus in the coming months will include: accountability; post-2015; improving engagement within the constituency; and, influencing future strategy for PMNCH as a partnership platform. The D&F constituency, while expressing interest in working more closely with the private sector in countries, acknowledged its lack of familiarity with the private sector and requested more information on what different companies are doing.
http://www.who.int/pmnch/about/governance/partnersforum/pf2014/en/index26.html
The Information Technology Industry Council (ITI) recently responded to the National Telecommunications and Information Administration’s (NTIA) request for public comments on “Big Data and Consumer Privacy in the Internet Economy.” In the request, NTIA, an agency within the Department of Commerce, posed a series of questions to stakeholders relating to big data and privacy to solicit input on challenges and possible policy solutions. In our comments, we discuss some of the findings of the inter-agency working group on big data that delivered a report to President Obama on May 1. ITI appreciates the report’s recognition of the many opportunities and benefits created by big data. An important big data policy consideration identified in the report is preventing inappropriate discriminatory outcomes, and ITI agrees that this is an area that warrants further examination. In its written submission, ITI offers a number of recommendations to address privacy in the big data context: - First, ITI advocates for a responsible use framework—built upon risk-based assessment and mitigation—to address privacy risks in the big data context. This type of framework, which puts greater attention on how data is used, and less on its collection, provides a mechanism to enable organizations to fully consider the privacy issues involved in decisions about data. - Second, ITI encourages an “accountability” approach, where companies develop and implement processes that foster compliance with their privacy-related commitments. - And finally, ITI advocates for a uniform national breach notification framework to allow businesses to notify consumers more efficiently when a breach of sensitive personal data occurs by easing the confusion and duplication that results from the current patchwork of state laws. Big data offers tremendous opportunities in a variety of fields, including health care, agriculture, energy efficiency, transportation, and education. As policymakers continue to examine big data and develop related policies, it is important that they take into account the data environment as it exists today, and recognize that this ecosystem continues to evolve. We look forward to continuing to engage with the administration and other stakeholders to ensure that big data continues to provide consumers with benefits previously unimaginable. ITI’s full set of comments to NTIA can be found here.
https://www2.itic.org/news-events/techwonk-blog/protecting-innovation-privacy-in-big-data
Feb 23, 2016 Spotlight News Senior Columns, Senior Spotlight My supervisor keeps asking me about when I will retire. Does that count as harassment? An employer’s inquiry about when an employee will retire can be unnerving, especially if the employee is not ready. Depending on the frequency of retirement inquires and whether they were accompanied by age-related statements, they may violate state or federal laws against age discrimination. While the federal Age Discrimination in Employment Act (ADEA) protects employees from age discrimination so long as they are 40 years of age or older, New York’s Human Rights Law prohibits age discrimination, regardless of age. It is important to note that under certain circumstances, employers can ask employees about their retirement plans or offer early retirement incentives. “The ADEA does not make all discussion of age taboo,” the 2nd Circuit U.S. Court of Appeals said in Raskin v. Wyatt Co. (1997). In Raskin, for example, the president of the employer expressed concern that the plaintiff, who was 55 years old and seeking promotion to a managerial position, “would not remain with [the company] long enough to learn the manager’s job.” The 2nd Circuit said the employer “had a legitimate reason to confirm [the plaintiff’s] interest in a career change notwithstanding the possibility that [he] would have the option of taking early retirement.” Similarly, in Roundtree v. School Dist. Of City of Niagara Falls (2002), the New York Supreme Court, Appellate Division, found the employer was justified in asking the nearly 65-year-old plaintiff about his retirement plans “in light of the magnitude of the workforce reductions.” However, not all retirement comments or inquiries are legitimate. Encouraging a 63-year-old waitress to retire, calling her a “stupid old yaya” and refusing to allow her to dress like younger waitresses could create a hostile work environment, the New York Supreme Court, Appellate Division, Third Department found in Anagnostakos v. New York State Div. of Human Rights (2007). Similarly, in Kassner v. 2nd Avenue Delicatessen Inc. (2007), the 2nd Circuit found comments made by a supervisor and co-workers to a 79-year-old waitress, such as “retire early,” “drop dead,” and “take off your wig,” could support a hostile work environment claim under the ADEA. Employees who believe they have been subjected to age discrimination should immediately consult with an experienced employment law attorney. Greg T. Rinckey, Esq., is a founding partner at Tully Rinckey PLLC, a full-service law firm located in Colonie. For more information about the firm’s estate planning, personal injury, employment law, real estate, family and matrimonial law, or bankruptcy practices, please visit www.1888Law4Life.com. If you would like your legal question or topic answered in the next issue, please contact Greg Rinckey at 218-7100 or askthelawyer@1888 law4life.com. The inform ation in this column is not intended as legal advice. Oct 31, 2016 0 Aug 01, 2016 Comments Off on Legal Chat: Keeping a leased car through bankruptcy Jun 02, 2016 0 May 01, 2016 0 Dec 01, 2018 0 Nov 01, 2018 0 Oct 01, 2018 0 Oct 01, 2018 0 2 hours ago REMINDER!!! The #EmpireSkatePlaza Ice Rink is CLOSED today, January 20 ❄️ ... See MoreSee Less Capital District Transportation Authority - CDTA 11 hours ago With the snowy weather blanketing the Capital Region be sure to allow extra time if you’re riding with us this weekend. Stay up-to-date at www.cdta.org for the latest on service and follow the conversation on social media. For detailed questions please call our customer service center at 518-482-8822. ❄️❄️Service Updates:❄️❄️ 🚌 All service is running with slight delays, except the 450 which is running 30-40 minutes behind. Please use Real Time information on your Navigator app or Google maps to know before you go. 🚌 Albany: Mt Hope is closed due to road conditions. Using Corning Hill. 🚌 Troy: Stow Avenue is closed. Using Mill Street both directions. ... See MoreSee Less Great job by all the drivers today....stay safe out there Empire State Plaza Events added 2 new photos. 20 hours ago #BTS! We are busy setting up for the 2019 NYS Dr. Martin Luther King, Jr. Memorial Observance on Monday at the #EmpireStatePlaza! Join us to celebrate Dr. King #MLK90 Learn more: empirestateplaza.ny.gov/nyking ... See MoreSee Less 1 day ago Due to the snow storm, the #EmpireSkatePlaza Ice Rink is CLOSING at 4p today and will remain CLOSED all day on Sunday, January 20, 2019 ❄️ ... See MoreSee Less What weather Our friends at CAP COM Federal Credit Union are holding a food drive to help those affected by the federal government shut down. If you want to help, full details below. ... See MoreSee Less Temporary Assistance | CAP COM FCUCAP COM Federal Credit Union provides financial and banking products and services including free checking accounts, credit cards, auto loans and mortgages. Be prepared for the snow coming this weekend and make sure to have your Navigator card loaded and ready to go! Visit cdta.org for service alerts and updates. Stay warm and safe! ... See MoreSee Less BIG Thanks to all of the businesses that help by giving us bus riders a safe warm place to wait for the bus. (I’m not out in this though!) Kinderhook Bank added 2 new photos.
https://www.spotlightnews.com/capital-district-senior-spotlight/2016/02/23/legal-chat-when-does-it-become-harassment/
Breathing is a vital process which starts at the time of birth and stops at the death. The important Oxygen is provided to all the parts, organs and cells of the body. The maximum time a person can survive without oxygen is about 4 minutes. All the metabolic processes require oxygen. Oxygen is life, a vital force. This vital energy is called Prana. The process of controlling the Prana is called Pranayama. So pranayama is the science related to vital force supplying energy and controlling the body mind complex. Breathing is the process of taking in this vital energy and removing the waste products out of our body and mind. Generally breathing includes inhalation and exhalation but pranayama includes retention of breath (known as 'Kumbhaka' in Sanskrit) as well. This is a very important process. The air can be retained in the lungs or out of the lungs. The ancient texts say that retention of air, increases the level of prana (energy) in the body, also it regulates the flow of pranic energy through out the body. So pranayama helps remove all the ailments and also can stop the aging process of the body. The mind, consisting of thoughts and emotions is closely related to the breath. When the mind is calm and relaxed, the breathing is smooth and slow. If you are stressed breathing is fast & shallow but mostly through chest. When one gets angry, the breathing becomes fast and forceful, in depressed states sighing, when in pain gasping, in anxiety shallow and rapid. In this way, the mental and emotional states affect breathing. All the processes and organs like heart, brain, digestive organs, endocrine glands in the body have rhythms. Also the breathing has specific rhythms. Pranayama is Rhythmic breathing, bringing the breath in natural rhythm by controlling the process of inhalation, exhalation and retention. In process of breathing, one uses diaphragm, intercostals muscles in the chest. The diaphragmatic breathing is called vertical breathing and is considered a more efficient way to inhale air than inhaling while expanding the chest which is called horizontal breathing... In pranayama, one should utilize the diaphragm efficiently to get more oxygen without making more efforts. The diaphragm is attached to the organs like heart and lings, also the liver, spleen, pancreas and stomach from the bottom side. Efficient movement of the diaphragm makes the functioning of these organs more efficient.sss We will see Deep breathing & Fast breathing from Pranayama Perspective in next article.
http://www.yogapoint.com/pranayama/yogic-breathing.htm
Class Descriptions The course will provide the student with an overview of issues related to energy and renewable energy, including usage trends, historical patterns, social responses to energy changes, economic factors, market forces, geographical concerns, the various forms and sources of energy including renewable energy and bio-energy, how these sources may affect the environment, and recent developments in energy policies in the U.S. and the world. Energy, power, energy sources, as well as usage patterns by societies over history will be presented. Prerequisite: ENGL1230, Components: Lecture, GE: Social Science Traditional, renewable, and bio-energy sources and their characteristics. Advantages and disadvantages of existing and future sources of energy and bio-products. Economic and environmental impact comparisons of various energy sources including wind, photovoltaic, hydrogen, geothermal, and bio-fuels. Field trips may be required. Prerequisite: ENERGY 2130. Lecture, Lab An open-ended comprehensive research or design project will be done on renewable energy, bio-energy, or bio-products, by multi-disciplinary teams. Discussion and experiences in project management, team work, and ethics will be included. A written report and formal presentation are required. Laboratory. Prerequisite: ENERGY 3240 and senior standing History of Biorenewable resource utilization. Fundamental principles of thermodynamics and chemisty as applied to bioenergy and biorenewable resources including discussion of biopolymer structure and routing of these biopolymers to dedicated energy production models. Current and projected biorenewable resource base, including waste materials and dedicated energy crops. Coverage of genetic efforts to engineer biomass possessing higher energy densities and yields. Overview of production practices of dedicated energy crops. Description of process heat, stationary power, fuels, chemicals, and fibers derived from biorenewable resources. Heat and power conversion processes including combustion, gasification, and anaerobic digestion. Environmental impacts, sustainability, and economics of biorenewable resource use. Traditional, renewable, and bio-energy sources and their characteristics. Advantages and disadvantages of existing and future sources of energy and bio-products. Economic and environmental impact comparisons of various energy sources including wind, photovoltaic, hydrogen, geothermal, and bio-fuels. Field trips may be required. Prerequisite: ENERGY 2130. Lecture, Lab Students will study emerging delivery systems for high performance green buildings. The concept of integrated design is introduced together with emphasis on the main sustainable elements of the building including building site, water, energy, building construction, and Economics and Life-Cycle Costing Analysis. An overview provided on the different rating systems available including LEED, Green Globes, and other available international systems. Emphasis is given on the certification process of the USGBC Leadership in Energy and Environmental Design LEED systems as well as an introduction to energy modeling software. This course will provide the student with an overview of issues related to project management as it pertains to renewable energy projects. This will include defining what a project and project life cycle is and discussing what project management is as well as the role of the project manager. The five Process Groups will be defined as it relates to renewable energy: Initiating, Planning, Executing, Monitoring and Controlling, and Closing. Finally a student will be provided with an overview of the nine Project Management Knowledge Areas: Integration, Scope, Time, Cost, Quality, Human Resource, Communications, Risk, and Procurement. This is an upper division course that brings together business-minded students with STEM-minded students who are interested in project management, particularly understanding how to justify selecting projects, and sustainable aspects related to project management. Students appreciate the roles of business and sustainability in project management to benefit triple bottom line (economic, social and environmental) consideration. The course is designed as a field experience that will take place in the specific country. Each course will provide students the opportunity to travel and learn in another country. The course will broaden student awareness on governmental, cultural, and societal issues in the country of travel as they relate to energy consumption, production and efficiency. Enhancement of the educational experience through the placement of a student with a business, industry, or institution under the direction of the director of renewable energy program. During co-op, the student is expected to be away from his/her studies at UW-Platteville and work for a company or institution for a semester. (Spring or Fall) ​Enhancement of the educational experience through the placement of a student with a business, industry, or institution under the direction of the director of renewable energy program. Internship is designed to provide experiential learning experience to the student during the summer period. (Summer) Examination of sustainability practices in business concerns; the use of CERES and LEEDS standards for evaluating responsiveness to sustainability concerns. Policy initiatives at the government level, sustainability as a business practice, and the relationship between sustainable business practices and the triple-bottom line of finance, social, and ecological considerations. Advanced study of biofuels with emphasis on bioethanol and biodiesel. Historical development of the bioethanol industry. Chemistry, biochemistry and microbiology of lignocellulosic biomass. Industrial-scale bioethanol production including biotechnology, biochemical engineering, process management, economics, and sustainability. Production of other bio-based fuels from various biorenewable resources, including biodiesel, methanol, glycerol, and butanol. Emerging biofuel technologies including algae-derived diesel and hydrogen, and microbial fuel cells. Discussion of integrated processes and the biorefinery concept. Students will learn about the fundamentals and objectives of energy management for residential buildings. Topics include energy auditing, rate structures, economic evaluation and lifecycle costing, lighting efficiency improvement, HVAC optimization, control systems and computers, and renewable energy and water management. Students will also be introduced and work with widely used software application in the area of energy management including eQuest and BLCC (Building Life Cycle Costing). This hands-on laboratory course will familiarize the students with systems used to monitor and control renewable energy systems. Students will explore devices and circuits used in solar hot water and photovoltaic systems, wind systems, and bioenergy systems. Sensors commonly used, signal interfacing, measurement electronics, and various types of control devices will be used and tested. Students will design and build basic controls and interfaces. Computer and/or microcontroller based controls will be explored, as time and student preparation permits. An open-ended comprehensive research or design project will be done on renewable energy, bio-energy, or bio-products by multi-disciplinary teams. Discussion and experiences in project management, team work, and ethics will be included. A written report and formal presentation are required. IMPORTANT NOTE: The Council is continuing its evaluation of courses from other programs and will update the list as it approves more courses. It is anticipated that this list will be significantly larger when the Council completes its work with regard to elective courses for the minor.
Objective: It is commonly recognized that genetic, environmental, behavioral, and social factors are involved in the development of obesity. The family environment may play a key role in shaping children's eating behaviors. The purpose of this study was to estimate the degree of familial resemblance in eating behavioral traits (cognitive dietary restraint, disinhibition, and susceptibility to hunger). Research Methods and Procedures: Eating behavioral traits were assessed with the Three-Factor Eating Questionnaire in 282 men and 402 women (202 families) from the Quebec Family Study. Familial resemblance for each trait (adjusted for age, sex, and BMI) was investigated using a familial correlation model. Results: The pattern of familial correlation showed significant spouse correlation for the three eating behavior phenotypes, as well as significant parent-offspring and sibling correlations for disinhibition and susceptibility to hunger. According to the most parsimonious model, generalized heritability estimates (including genetic and shared familial environmental effects) reached 6%, 18%, and 28% for cognitive dietary restraint, disinhibition, and susceptibility to hunger, respectively. Discussion: These results suggest that there is a significant familial component to eating behavioral traits but that the additive genetic component appears to be small, with generalized heritability estimates ranging from 6% to 28%. Thus, non-familial environmental factors and gene-gene and gene-environmental interactions seem to be the major determinants of the eating/behavioral traits.
https://profiles.wustl.edu/en/publications/familial-resemblance-in-eating-behaviors-in-men-and-women-from-th
Walloon Region and EON Reality’s Interactive Digital Center (IDC) in Liège, Belgium, lays the groundwork for a regional deployment of the EON Augmented Virtual Reality (AVR) Platform in Belgium, as well as the Netherlands, Germany and Austria. The IDC will contain an AVR Showroom, containing cutting edge AR and VR technology, a VR Innovation Academy, and an AVR Development Lab. The VR Innovation Academy will train local students to become AR and VR professionals through a 10-month course consisting of three months of study and seven months of project based learning. These students will learn the underpinning of AR and VR, 3D content creation, coding, and project management. The center will create content and applications tailored to the regional market and localize existing EON Reality content. As the Walloon Region’s economy evolves, Augmented and Virtual Reality will accelerate the training of workers through contextual knowledge applications and experiential training. The VR Innovation Academy in Liège teaches the skills needed to be successful in creating Virtual Reality and Augmented Reality content and applications for industry, education, and training. These skills will also enable students to work with product visualization, game creation, multimedia design, and broadcast media.
https://www.eonreality.com/offices/belgium/
Q: Diophantine relations using an equation with polynomials of degree at most 4 I'm completely stuck at exercise 5.8.5 of Mathematical Logic, Chiswell & Hodges: Here are the mentioned definition and theorem: I'm stuck because I failed to use the hint given in the exercise. I can't figure out how to use such a property of functions on a relation (a function is a relation but the opposite isn't true). Also, I couldn't even figure out how this can be true for the following diophantine relation: "$x_1+x_2$ is a power of $5$". The equation $\phi(x_1,x_2,y)$ for such a relation is $x_1+x_2=y^5$. Could you please help me? A: You probably mean "$x_1+x_2$ is a fifth power", that is, $\exists y(x_1+x_2=y^5)$. We want to say this: There exist $y, s, t, u, v$ such that $s=y^2$ and $t=sy$ and $u=ty$ and $v=uy$ such that $x_1+x_2=v$. This is equivalent to $$\exists y\exists s\exists t\exists u\exists v((s-y^2)^2+(t-sy)^2+(u-ty)^2+(v-uy)^2+(x_1+x_2-v)^2=0).\tag{1}$$ Note that the polynomial in (1) has degree $4$. Call it $P$. We are not quite finished, since $P$ contains minus signs. But we can rewrite $P=0$ as $Q=R$, where $Q$ and $R$ have positive coefficients (just bring the minus stuff in $P$ to the right-hand side). The idea will work in general. We replace $z=y^{n+1}$, where $n$ is a fixed positive integer, by $$\exists t_1\cdots\exists t_{n}((t_1=y^2)\land (t_2=yt_1)\land \cdots \land (t_{n}=yt_{n-1})\land (z=t_n)).$$ Then (over the naturals, or the integers, or $\dots$) we use the sum of squares trick, $(a=b)\land (c=d)$ if and only if $(a-b)^2+(c-d)^2=0$. Remark: This trick for avoiding high degree polynomials, but at the cost of introducing additional variables, occurs first, I believe, in the work of Skolem.
Please use this identifier to cite or link to this item: http://hdl.handle.net/1946/21041 Recent advances in sensor technology have led to an increased availability of hyperspectral remote sensing images with high spectral and spatial resolutions. These images are composed by hundreds of contiguous spectral channels, covering a wide spectral range of frequencies, in which each pixel contains a highly detailed representation of the reflectance of the materials present on the ground, and a better characterization in terms of geometrical detail. The burst of informative content conveyed in the hyperspectral images permits an improved characterization of different land coverages. In spite of that, it increases significantly the complexity of the analysis, introducing a series of challenges that need to be addressed, such as the computational complexity and resources required. This dissertation aims at defining novel strategies for the analysis and classification of hyperspectral remote sensing images, placing the focal point on the investigation and optimisation techniques for the extraction and integration of spectral and spatial information. In the first part of the thesis, a thorough study on the analysis of the spectral information contained in the hyperspectral images is presented. Though, independent component analysis (ICA) has been widely used to address several tasks in the remote sensing field, such as feature reduction, spectral unmixing and classification, its employment in extracting class-discriminant information remains a research topic open to further investigation. To this extend, a profound study on the performances of different ICA algorithms is performed, highlighting their strengths and weaknesses in the hyperspectral image classification task. Based on this study, a novel approach for feature reduction is proposed, where the use of ICA is optimised for the extraction of class-specific information. In the second part of the thesis, the spatial information is exploited by employing operators from the mathematical morphology framework. Morphological operators, such as attribute profiles and their multi-channel and multi-attribute extensions, are proved to be effective in the modelling of the spatial information, dealing, however, with issues such as the high feature dimensionality, the high intrinsic information redundancy and the a-priori need for parameter tuning in filtering, which are still open. Addressing the first two issues, the reduced attribute profiles are introduced, in this thesis, as an optimised version of the morphological attribute profiles, with the property to compress all the meaningful geometrical information into a few features. Regarding the filter parameter tuning issue, an innovative strategy for automatic threshold selection is proposed. Inspired by the concept of granulometry, the proposed approach defines a novel granulometric characteristic function, which provides information on the image decomposition according to a given measure. The approach exploits the tree representation of an image, allowing us to avoid additional filtering steps prior to the threshold selection, making the process computationally effective. The outcome of this dissertation advances the state-of-the-art by proposing novel methodologies for accurate hyperspectral image classification, where the results obtained by extensive experimentation on various real hyperspectral data sets confirmed their effectiveness. Concluding the thesis, insightful and concrete remarks to the aforementioned issues are discussed.
https://skemman.is/handle/1946/21041?locale=en
Q: Branches or taxonomy of dimensionality reduction? I need a high-level taxonomy of dimensionality reduction approaches. I need your help to unify what I have found: 1) according to wikipedia, dimensionality reduction can be divided into: feature selection (select subset of original variables) and feature extraction (transform the original space into lower-dimensional space). 2) according to this post on Cross Validated, Two broad categories of dimensionality reduction , there is parametric and non-parametric dimensionality reduction. For example, PCA is parametric, with linear mapping. 3) according to https://www.analyticsvidhya.com/blog/2015/07/dimension-reduction-methods/ , the most common methods are: Missing values - this is basically feature selection, we decide if we should remove some of the existing variables, due to too many missing values. This is basically Feature Selection. Low variance - remove a variable with very low variance or maybe even constant values for all training examples, because it can't tell us much about the variance in other variables. This is basically Feature Selection. Decision Trees - can be used to tell us which variables are significant, so we know which variables to keep and which to remove. Again, this is Feature Selection. Random Forests - quote: "to select a smaller subset of input features." Again, this is Feature Selection. High Correlation - remove a variable if it is highly correlated with another variable, because more or less, they carry the same information. Again, this is Feature Selection. Backward Feature Elimination - quote: "Then, identifying variables whose removal has produced the smallest increase in the SSR and removing it finally, leaving us with n-1 input features.". Again, this is Feature Selection. Factor Analysis - group highly correlated variables into a so called factor variable. This is not feature selection. Here we combine more variables into one, and in that way we reduce the number of dimensions. Not sure what to call this, it is neither feature selection, nor feature extraction. PCA - this is Parametric Feature Extraction. The original variables are transformed by linear function f into new variables. CONCLUSION: We can divide dimensionality reduction into: Feature Selection -remove one or more of the original variables according to some criteria. Combine more variables into one. Not sure what to call this one ??? Feature Extraction - a mapping transforms the input space to a lower-dimensional space. A: OK, I decided to divide the area of dimensionality reduction into: feature selection and feature extraction (both explained in the original post).
Color name Yellow Green, hex code #c3e585, contains symbol # and 6 letters or numbers. These numbers are in hexadecimal numeral system. This page lists more detailed analysis and information about the hex color code #c3e585. In a RGB color space, HEX #C3E585 is composed of 76.5% red, 89.8% green and 52.2% blue. In the CMYK color model (used in the printing process), the composition is 15% Cyan, 0% Magenta, 42% Yellow, and 10% key (black). In the HSL color space #c3e585 has a hue of 81° (degrees), 65% saturation and 71% lightness. Its decimal value is 12838277. A 20% lighter version of the original color is #aacc6c and #6e9030 is the 20% darker color. Color Schemes with Yellow Green (#c3e585) In color theory, a color scheme is the choice of colors used in design. They are colors that are next to each other on the color wheel. Analogous colors tend to look pleasant together, because they are closely related. The triadic color harmony groups three colors that are evenly spaced from another and form a triangle on the color wheel. Split-complementary colors differ from the complementary color scheme. The scheme consists of three colors, the original color and two neighbours of the complement color. Color spaces of #c3e585 Yellow Green The hexadecimal triplet #c3e585 definition is: Red = 195, Green = 229, Blue = 133 or CMYK: Cyan = 15, Magenta = 0, Yellow = 42, Black = 10 Yellow Green - #c3e585 Color Conversions This table contains information about #c3e585 color values in the most popular color spaces: RGB, HSV, HSL. - 195 R - 229 G - 133 B - 81 H - 42 S - 90 V - 81 H - 65 S - 71 L #c3e585 Color Codes for CSS3/HTML5 and Icon Previews Hex Code #c3e585 web previews. Sample HTML/CSS paragraph codes using Yellow Green color. A selection of SVG images/icons using the hex version #c3e585 of the current color.
https://abouts.co/color/c3e585
After reading a question by rus9384 Why is faulty generalization called an informal fallacy? I wondered whether induction can be part of any argument in first order logic (FOL). rus9384 symbolized an example of an inductive argument: ∃x: F(x) ∴ ∀x: F(x) Given the rules for existential elimination and universal introduction, I don't think this argument can even get started, but I may be wrong. Clearly, we can go in the opposite direction. Here is a proof of going from a universally quantified sentence to an existentially quantified one: ∀x: F(x) ∴ ∃x: F(x) I am not concerned with whether induction is a fallacy, formal or informal, but to what extent induction arguments can be symbolized or made at all in FOL. QUESTION: Can inductive arguments be made in FOL and, if not, why not? If they can, an example of their use would be helpful.
https://philosophy.stackexchange.com/questions/54112/can-inductive-arguments-be-made-in-first-order-logic-and-if-not-why-not
Mount Tabor Oak is a tree that may reach a height of more than ten meters, and a trunk with a circumference of 6 meters. The branches form a spherical crown. The bark of the branches and the trunk is gray-dark brown and it is hard with deep grooves. The leaves are 5 to 10 cm long. They are stiff, ovate, with dentate-thorny margins. They are carried on a short petiole. The leaf arrangement is alternate. The upper side of the leaf is shiny, its lower side is covered with felt-like hairs (hirsut) that do not come off upon rubbing. Often there are typically shaped galls on the leaves. The tree is deciduous, but there are great differences between individual trees in the dates of abscission and sprouting. The oldest tree in Israel, near the tomb of Rabbi Abba Halfeta in the Lower Galilee, was dated to a little over 500 years. Quercus ithaburensis blooms during March-April, upon sprouting. The flowers are single-sex, tiny, green, not prominent and pollinated by wind. The trees are monoecious, i.e. male flowers and female flowers bloom on the same individual. The male flowers are arranged along limp branches that are about 5 cm long. They are light green in color and are called catkins. They are arranged in groups and disperse large amounts of pollen that is carried by the wind. The female flowers are arranged in groups of up to 3. They are very small and are carried on short pedicles. The fruit is an acorn, and contains a single large seed, enveloped on its lower part by a cup-shaped lignified structure called a cupule. Development of the acorns from fertilization until the fruit ripens lasts 18 months. The acorn is large, up to 5 cm, but there are large differences between trees. The acorn is thick and truncated. More than half of it protrudes out of the cupule. The acorns appear singly or in pairs. The scales of the cupule are long, bent backwards or even involuted. The acorns ripen and fall in autumn. They lose their ability to germinate within a few weeks. Acorns covered by a layer of litter which protects them from drying germinate readily. Some of the acorns are dispersed by Eurasian Jays (Garrulus glandarius) which bury them in the soil as a cache, and thus “sow” them at the proper depth, and sometimes forget to collect them. During germination the cotyledons remain within the shell and the seedling sends a long radicle into the substrate and a shoot with leaves upwards. Mount Tabor Oak is the dominant tree in the Oak-Officinal Styrax association and in the Oak-Atlantic Pistacia association which create an open forest. In this plant formation the trees are distant from each other, with herbaceous patches or meadow between them. This association is well-developed in expansive areas of the western Lower Galilee (the Alonim-Shefaram hills) and in the central Golan Heights (Yehudiya Forest). In the past, Mount Tabor Oak forests covered large areas also on the Coastal Plain, but these have been greatly reduced by felling. Remnants of this forest are found in the Sharon Park south of the Hadera Forest and in other places. Famous groups of large trees of this species that survived near holy places are found at Hurshat Tal in the Hula Valley and Khirbatal-Chearkas in the Sharon region. This thermophilic species usually grows at elevations below 500 meters. It has no special preferences for soil, and grows in lime soil, basalt, sand, etc. The global distribution of the species is limited to the East Mediterranean, between Turkey and Israel only. In the past, Mount Tabor Oak trees were felled for coal production and their hard wood was used for production of various tools. They are also used for extraction of materials for tanning leather. In Arab villages oak leaf and acorn infusions are used against hair shedding, for lowering blood pressure and for healing eye infections. The acorn is eaten after roasting. Its taste is bearable, but not praiseworthy. Medicines for eye infections, wounds, and respiratory tract and digestive tract problems are extracted from the galls. Trees of the Quercus (oak) genus are among the most important trees in the world. Some call the oak “King of the Trees”. The genus contains 450 species, 5 of which grow in Israel. Of these two grow only on Mount Hermon. Some oaks are quite tall, with broad crowns and are long-lived. Oak species are common as the dominant trees in deciduous forests of temperate and cold regions in the Northern Hemisphere, and in evergreen forests in Mediterranean regions. The Hebrew name is derived from Providence, and is often mentioned in the Bible as a symbol for strength, as a place of worship and as raw material for sculpting and for industry (oars). The leaves of all the species of this genus are dentate or emarginated. Most have leaves that are larger than those of the Israeli species. The flowers are tiny, green, not prominent, pollinated by wind. The flowers are single-sex, the trees are monoecious. The fruit contains a single large seed (acorn), enveloped in its lower part by a lignified cup-like structure called a cupule. The tree blooms in early spring, and its fruits ripen in the following autumn or in the autumn of the following year. Oaks are the most important source of wood that is heavy, hard and dense, strong and resistant to pressure. Its wood is used in art for sculpting statues and ornamentation, for furniture, construction, industry and for the production of coal. The Arabs of Israel used oak branches to make a shank for the plough, a yoke for the ox and a cane for the elderly. There is nothing like oak wood for improving the taste of wine. Materials for curing leather are extracted from the oak. The thick bark of a west Mediterranean species of oak is the source for the cork used for production of bottle stoppers. Different species of oak are used in folk medicine. The acorns of some species are eaten in times of need as “poor-men’s bread” after roasting. Oaks are also known as important ornamental trees. However, in Israel this use is limited. The oak has 2n=24 chromosomes. The different species are very similar to each other. Another difficulty in differentiating between the species is the great diversity in the shape of the leaf, the trunk and the fruit within populations of the same species.
https://www.wildflowers.co.il/english/plant.asp?ID=370
HONORATO, María Teresa et al. Composition and preferences regarding nest materials by cavity-nesting vertebrates in the Andean temperate forest of Chile. Bosque (Valdivia) [online]. 2016, vol.37, n.3, pp.485-492. ISSN 0717-9200. http://dx.doi.org/10.4067/S0717-92002016000300005. The composition and quality of nesting materials may influence the breeding success of cavity-nesting vertebrates, providing protection and optimal temperature to eggs and chicks. Between 2010 and 2013, we studied the composition and preferences regarding nest materials used by cavity-nesters in Andean temperate forests, southern Chile. We deployed 240 nest-boxes, obtaining data for 290 nests for three bird species (Aphrastura spinicauda, Troglodytes aedon and Tachycineta meyeni) and four mammals (Dromiciops gliroides, Rattus rattus, Oligoryzomys longicaudatus and Irenomys tarsalis). Aphrastura spinicauda (n = 170) and D. gliroides (n = 91) comprised 90 % of the nests. A. spinicauda nests were composed mainly of vine tendrils (44.2 %) and branches of trees and shrubs (25.7 %). Dromiciops gliroides used mostly leaves of trees and shrubs (72.9 %), and bryophytes (20.2 %). The predominant and preferred leaf in the nests of both species was from bamboo Chusquea species. Aphrastura spinicauda avoided the leaves of Lophozonia obliqua, whereas D. gliroides avoided vines. These results suggest a previously unknown role of Chusquea spp. in the breeding ecology of cavity-nesting forest vertebrates. The thick matted nests and the acidic pH of the Chusquea spp. leaves may provide protection from predators and have a biocidal effect on pathogens. Chusquea spp. may have an important inluence on the breeding success of cavity-nesters, although the benefits of using this nest material need to be confirmed. Palabras clave : Aphrastura spinicauda; bamboo; breeding; Dromiciops gliroides; resource selection.
https://scielo.conicyt.cl/scielo.php?script=sci_abstract&pid=S0717-92002016000300005&lng=es&nrm=iso&tlng=en
The United States Federal Trade Commission (“FTC”) has issued warning letters to 28 companies claiming to be certified participants in the Asia-Pacific Economic Cooperative (“APEC”) Cross-Border Privacy Rules (“CBPR”) system. This is an important reminder for companies, including Canadian companies, that the use of international certifications is something in which regulators take a keen interest. The APEC CBPR system provides a common standard for cross-border flows of personal information based on the APEC Privacy Framework. Companies that wish to self-certify as CBPR compliant must implement privacy policies and practices compliant with the CBPR program requirements and then obtain certification of this compliance from an APEC-recognized Accountability Agent. Once an organization has been certified for participation in the CBPR system, these privacy policies and practices will become binding as to that participant and will be enforceable by an appropriate authority, such as a regulator, to ensure compliance. Participating countries include the United States, Japan and Mexico. Canada joined in 2015, meaning CBPR-certified Canadian companies can freely transmit personal information to other self-certified companies in these jurisdictions (and vice-versa). It is anticipated that the system will expand to eventually encompass the remaining 16 APEC member economies. We are writing because your website indicates that you represent that you participate in the [APEC CBPR]. However, our records indicate that your organization has not taken the requisite steps to be able to claim participation in the APEC CBPR system, such as undergoing a review by an APEC-recognized Accountability Agent. A company that falsely claims APEC CBPR system participation may be subject to an enforcement action based on the FTC’s deception authority under Section 5 of the Federal Trade Commission Act (“FTC Act”). Indeed, we have brought many cases against companies that we allege, among other things, have falsely claimed to participate in international privacy program such as the APEC CBPR system, see generally https://www.ftc.gov/tips-advice/business-center/legalresources?type=case&field_consumer_protection_topics_tid=251. The FTC did not release the names of the organizations to which it sent letters. This gives the organizations a chance to demonstrate compliance and revise their websites and thereby avoid the reputational damage associated with being publicly cited by the regulator. However, the fact that the FTC publicized the issuance of the warning letters likely indicates that it views the problem of unsubstantiated certifications as an issue which needs to be addressed. 1. Regulators all over the world, including in Canada, are more closely scrutinizing self-certification. The FTC letter is part of a broader crackdown on APEC CBPR certifications. In May 2016, the FTC reached a settlement with Very Incognito Technologies, Inc., doing business as Vipvape, based on allegations that Vipvape represented on its website that it was APEC CBPR certified when, according to the complaint, it was not. The FTC’s action on the APEC CBPR self-certification program can be seen as part of a broader regulatory concern with deceptive or misleading attestations of compliance. False (or out of date) certifications were also an issue with the now-defunct US-EU Safe Harbor certification program, and in August of 2015, the FTC announced settlements with thirteen companies it charged had misled consumers by claiming they were certified members of the Safe Harbor framework. Companies which are part of self-certification programs should be watchful of regulatory actions and be prepared to respond to requests for information from their regulators. It would be prudent to expect regulators in other jurisdictions including Canada, the EU and Australia to be more aggressive in their investigation of self-certification systems in future. The best way for a company to avoid trouble is straightforward: do not falsely claim a certification your organization does not have (and ensure that any such certifications validly obtained have not expired). 2. Have your compliance monitored by a reputable organizations APEC CBPR sets out a certified process and ongoing requirements for becoming an “Accountability Agent” which can certify that a company is meeting standards required by APEC for cross-border flows of personal information. In order to become an Accountability Agent, an organization must apply first to the relevant authority where it intends to operate (such as the Office of the Privacy Commissioner in Canada or the FTC and Department of Commerce in the United States). Once the organization has obtained the approval of the relevant authority, its application is forwarded to the APEC Joint Oversight Panel for approval. The process takes time, and is detailed. Companies should be wary of organizations which claim to offer auditing and certification on the cheap. Consider asking questions about the would-be Accountability Agent’s experience with regulators in different jurisdictions, their technical capabilities, and if any organization which they certified has ever experienced a privacy breach or regulatory investigation. The bona fides of an Accountability Agent may also be confirmed online. 3. Retaining records of audits is important, but… Companies being assessed for compliance with an international privacy framework will be request by regulators to produce documentation of certification. No company wants to be in a situation where a regulator asks questions about their international certifications and the supporting documentation is unavailable, incomplete or out of date. A similar situation can arise if a company has entered into contracts in which it has represented that it has valid certifications - the counter party may ask for proof (either at the time of execution, or during the life of the contract). As a result, companies will want to ensure that documentation supporting its certifications is updated regularly, stored securely, and can be produced in response to a regulatory inquiry. However, retaining information about compliance with international privacy standards also comes with risk. Regulators are not the only ones interested in this information. A company’s privacy audit results can be valuable evidence to opposing counsel in future litigation. Companies should consider engaging their own counsel prior to undertaking an auditing or compliance process to ensure they are taking steps to protect privilege (if appropriate) and understand potential litigation risk. The recent FTC warning letters are an important reminder that regulators are interested in privacy self-certification programs. Prudent organizations should ensure their certifications are valid and up to date, and that they are prepared to respond to regulators if necessary. *Arie van Wijngaarden is a JD/MBA student in McCarthy Tetrault's Toronto office.
https://www.mccarthy.ca/en/insights/blogs/cyberlex/if-you-dont-got-it-dont-flaunt-it-ftc-issues-warnings-companies-claiming-apec-privacy-certification
Have you ever got lost in the wonderful shape of the cauliflower while preparing your Sunday roast? No? Well, fair enough. But you may be surprised to learn a study has found some interesting mathematical concepts hidden in plain sight in the spirals of a head of a common cauliflower. The Sunday roast staple has a unique 'self repeating' property, where a close examination, even with the help of a microscope would reveal that the florets are actually miniature versions of themselves, reports Mirror Online. The mathematical term for this is called 'property self-similarity' which is a feature of abstract geometrical objects called fractals. These fractals are seen in places around nature like branches on trees, where the same pattern repeats itself over and over. This is very evident in the Romanesco cauliflower (sometimes called the Romanesco broccoli because of its colour) with its very well defined shapes. If you look really closely, you’ll see endless spirals, which actually link the cauliflower to some plants – a topic that has been studied for a whopping 2,000 years. Here’s the maths part… For those who find themselves twiddling their thumbs one day, if you manage to count the spirals, there will be numbers somewhere along the Fibonacci sequence. This sequence is basically where the next number in the sequence is found by adding up the two numbers before it. On a bog standard cauliflower you can get from your local supermarket, you’re likely to see five spirals going clockwise, and eight going anticlockwise (or vice versa.) In simple terms, the Economic Times study knows now that for every plant, the main spiral is formed in microscopic scales. At this stage, it comprises spots, in which specific genes will grow into a branch, leaf, or flower. The genes here are actually interacting with each other in “gene networks”, where mathematical biologists rely on differential equations to write models of these gene networks and predict their behaviour.
https://wsbuzz.com/science/roast-dinner-veg-cauliflower-has-mathematical-concept-hidden-in-plain-sight/
Symbolism in Ancient China The Phoenix was the symbol of the Chinese Empress and was also thought to represent feminine grace and the sun. Thunderbird — Native American Mythology The is also thought to have loose connections to the Phoenix. Finally, a lesser known version of the story of the Phoenix claims that the Phoenix begins to show signs of age when it reaches the final years of its lifespan. When it is time for this, the bird will gather cinnamon and myrrh to construct its funeral pyre, though it is unknown if it consumes either of these materials before its death.
http://www.poconovacations.com/neqij44047.html
Share this... By guest author Kenneth Richard According to recently published scientific papers, the current sea level highstand, as well as the rate of glacier retreat and sea level change, are now significantly lower than they have been for much of the last 10,000 years — back when CO2 concentrations were stable and considerably lower (at about 265 ppm). A flurry of new papers show today’s sea level rise is slower than in the Holocene past. Photo Tiago Floreze, CC BY-SA 3.0. The most recent IPCC report (2013) indicates that sea levels have been rising at a rate of 1.7 mm/year, or 6.7 inches per century, since 1901 (through 2010). This rate occurred synchronously with an approx. 100 ppm increase in atmospheric CO2 levels. In contrast, scientists Hodgson et al., 2016 have determined that sea levels rose at rates of 1.2 to 4.8 meters per century (47 to 188 inches, or about 4 to 16 feet per century) between about 10,500 and 9,500 years ago near East Antarctica. This sea level rate change occurred while CO2 levels were stable to modestly declining *. In the paper: Rapid early Holocene sea-level rise in Prydz Bay, East Antarctica, the authors write: Prydz Bay is one of the largest embayments on the East Antarctic coast and it is the discharge point for approximately 16% of the East Antarctic Ice Sheet. […] The field data show rapid increases in rates of relative sea level rise of 12–48 mm/yr between 10,473 (or 9678) and 9411 cal yr BP [calendar years before present].” The recently published scientific literature also indicates that not only was the historical rate of sea level rise significantly higher than it has been since the 20th century began, glaciers and ice sheets continued to rapidly retreat during the late Holocene, or within the last few thousand years. During the Medieval Warm Period, for example, scientists Guglielmin et al., 2016 determined that glacier retreat rates in the Western Antarctic Peninsula were as high or higher than they have been in recent decades. In the publication here, the authors write: Here, we present evidence for glacial retreat corresponding to the MWP [Medieval Warm Period] and a subsequent LIA [Little Ice Age] advance at Rothera Point (67°34′S; 68°07′W) in Marguerite Bay, western Antarctic Peninsula. … Based on new radiocarbon dates, during the MWP, the rate of glacier retreat was 1.6 m yr−1, which is comparable with recently observed rates (~0.6 m per year between 1993 and 2011 and 1.4 m per year between 2005 and 2011).” Prior to the Medieval Warm Period, scientists Yokoyama et al., 2016 indicate that “the world’s largest ice shelf” collapsed due to a warming ocean and atmosphere, with ice shelf retreat rates of 100 km within a thousand years. In the publication Widespread collapse of the Ross Ice Shelf during the late Holocene, the authors write: The Ross Sea is a major drainage basin for the Antarctic Ice Sheet and contains the world’s largest ice shelf. … Breakup initiated around 5 ka [5,000 years ago], with the ice shelf reaching its current configuration ∼1.5 ka [1,500 years ago]. In the eastern Ross Sea, the ice shelf retreated up to 100 km in about a thousand years. … [I]ce-shelf breakup resulted from combined atmospheric warming and warm ocean currents impinging onto the continental shelf.” According to other scientists Bradley et al., 2016, the melt water from the Antarctic ice sheet continued to contribute up to 5.8 meters of sea level rise equivalent until about 1,000 years ago. In another recent paper here the authors found: …a slowdown in melting at ∼7 kyr BP associated with the final deglaciation of the Laurentide Ice Sheet, followed by a continued rise in ESL [Holocene ice volume equivalent sea level] until ∼1 kyr BP of ∼5.8 m associated with melting from the Antarctic Ice Sheet.” Due apparently to the high glacier-melt rates and warmer ocean temperatures (Rosenthal et al. [2013]** indicate that 0-700 m Pacific Ocean temperatures were still ~0.65° C warmer than present ~1,000 years ago), recently published scientific papers document that sea levels stood from 1 to 4 meters higher than now as recently as a few thousand years ago (see citations below). The big mystery These scientific conclusions beg the question: If CO2 is a primary determinant of changes in sea level, why is it that sea level highstands (and sea level rise and glacier melt rates) were significantly greater when CO2 concentrations were stable and low than they have been in recent decades? Publications to read: www.sciencedirect.com/science/article/pii/S0048969715311700 The configuration suggests surface inundation of the upper sediments by marine water during the mid-Holocene (c. 2–8 kyr BP) [2,000-8,000 years before present], when sea level was 1–2 m above today’s level. —– www.sciencedirect.com/science/article/pii/S0033589415000642 ….a [sea level] highstand at ~ 5000–3500 cal yr BP. The berms [raised land embankments] are presently at ~ + 6 m above [present] sea level, 2–3 m above the beach ridges. Human settlements were common on the ridge crests before and after the highstand. Regression to present-day sea level commenced after the highstand, which is when the sabkha began forming.” —– www.sciencedirect.com/science/article/pii/S0031018213004689 Highlights We present a sea level change curve for mid Holocene in Uruguay. Sea level reached 4 m amsl [above mean sea level today] between 6000 and 5500 yr BP [years before present]. [above mean sea level today] [years before present]. A rapid sea level fall to about 1 m amsl was inferred for 4700-4300 yr BP. A further sea level increase to about 3 m amsl [above mean sea level today]was inferred after 4300 yr BP —- * Epica Dome C ice core data [Antarctica] indicate that CO2 levels declined slightly from 268 ppm 10,458 years ago to 264 ppm 9,399 years ago. ** Rosenthal et al., 2013 http://science.sciencemag.org/content/342/6158/617.abstract We show that water masses linked to North Pacific and Antarctic intermediate waters were warmer by 2.1 ± 0.4°C and 1.5 ± 0.4°C, respectively, during the middle Holocene Thermal Maximum than over the past century. Both water masses were ~0.9°C warmer during the Medieval Warm period than during the Little Ice Age and ~0.65° warmer than in recent decades.”
Le Cocon is both a research team and a think tank. Research in “Le Cocon” team focuses on two main topics: multiscale evolution on one hand (i.e., studying the evolution of genetic systems while considering different levels -nucleotides, transposable elements, genes, genomes, microbiomes, organisms, populations, species, geography-), and environmental issues on the other hand. In both cases, we rely on modeling and data analysis, using a combination of statistics and computer science. Le Cocon is also a place to think about the responsibilities of research and researchers in the anthropocene era, and about the role of non-researcher citizens in orienting and conducting research. Multiscale evolution - We have a long history of working on gene transfers. We develop new methods to detect these events in complex systems involving more than two levels (host, symbiont and parasites for example) and - We use horizontal transfer detection to date species trees and to infer yet unknown biodiversity (extinct and unsampled) (Sthoriz (ANR, 2018)) . - We have a lasting interest into convergent genomic evolution (Convergenomics - ANR, 2015) - We question the usual way of testing bioinformatic methods (Evoluthon - ANR, 2019) - We study the interaction between human populations, their lifestyles, and their gut microbiota (Microregal - ANR, 2015). We are notably interested in identifying cases of host-microbe coevolution and in better understanding transmission dynamics. Environmental issues - We develop computational methods to support an agriculture that relies on ecosystemic relationships between crops, the soil, its microbiota, and wild plants and animals (Community Garden Book - Inria, 2019) - We develop statistical approaches to understand and predict crop yield variability with respect to meteorological conditions Research in the anthropocene - We participate to the science shop (UdL), the ethics platform (UdL), Labo1.5, the open science committee, Sciences Citoyennes, the shift project - We organize a series of seminars to help us think about the position of scientific research in the history of the anthropocene, and about the position of scientists in the future of the anthropocene. - We assemble committees of citizens to investigate to what extent scientific research can be democratized. Teaching and outreach - We teach at University of Lyon, University Lyon 1, INSA, Inria, ENS Lyon, we organize bioinformatics internships - We regularly participate in the Fête de la Science, have contributed videos in the public transportation system in Lyon, give conferences at Université Populaire and contribute articles in general public journals. - We develop the software Lifemap to explore the tree of life on computers and smartphones. Prospective students and postdocs are invited to apply, as we often welcome visitors for internships or research projects. Publications Display of 1 to 30 publications on 268 in total Ghost lineages highly influence the interpretation of introgression tests Relative time constraints improve molecular dating Bayesian investigation of SARS-CoV-2-related mortality in France Predicted effects of summer holidays and seasonality on the SARS-Cov-2 epidemic in France medRxiv : the preprint server for health sciences . Phylogenetic reconciliation Ghost lineages deceive introgression tests and call for a new null hypothesis The curious case of a hapless mathematical contribution to biology A Codon Model for Associating Phenotypic Traits with Altered Selective Patterns of Sequence Evolution Systematic Biology . 70 ( 3 ) : 608-622 Seaview Version 5: A Multiplatform Software for Multiple Sequence Alignment, Molecular Phylogenetic Analyses, and Tree Reconciliation Multiple Sequence Alignment . 2231 : 241-260 Pervasive selection biases inferences of the species tree L'informatique les pieds sur Terre Interstices . Other publicationsee the publication La fin d'un tout petit monde Binaire . Other publicationsee the publication Reconciling Gene trees with Species Trees Phylogenetics in the Genomic Era . : 3.2:1--3.2:23 DGINN, an automated and highly-flexible pipeline for the detection of genetic innovations on protein-coding genes Nucleic Acids Research . 48 ( 18 ) : e103-e103 DOI: 10.1093/nar/gkaa680 Genome Evolution: Mutation Is the Main Driver of Genome Size in Prokaryotes Current Biology - CB . 30 ( 19 ) : R1083-R1085 Genomic analysis of European Drosophila melanogaster populations reveals longitudinal structure, continent-wide selection, and previously unknown DNA viruses Molecular Biology and Evolution . 37 ( 9 ) : 2661-2678 Evolutionary superscaffolding and chromosome anchoring to improve Anopheles genome assemblies BMC Biology . 18 ( 1 ) : 1-20 Ancestral Genome Organization as a Diagnosis Tool for Phylogenomics Phylogenetics in the Genomic Era . : 2.5:1--2.5:19 Treerecs: an integrated phylogenetic tool, from sequences to reconciliations. Bioinformatics . 36 ( 18 ) : 4822-4824 Quand les branches de l’arbre du vivant s’entremêlent Pour la science . Sciences, Environnements et Sociétés Reportsee the publication CAARS: comparative assembly and annotation of RNA-Seq data Bioinformatics . 35 ( 13 ) : 2199-2207 Tracing Human Ancestral Migrations Using Symbiotic Bacteria Groupe des Méthodes Pluridisciplinaires Contribuant à l'Archéologie (GMPCA) . Conference papersee the publication Detecting adaptive convergent amino acid evolution Philosophical Transactions of the Royal Society B: Biological Sciences . 374 ( 1777 ) : 1-11 Gene tree reconciliation including transfers with replacement is NP-hard and FPT Journal of Combinatorial Optimization . 38 ( 2 ) : 502–544 Gene tree species tree reconciliation with gene conversion Journal of Mathematical Biology . 78 ( 6 ) : 1981–2014 GC-biased gene conversion conceals the prediction of the nearly neutral theory in avian genomes Genome Biology . 20 ( 1 ) L'arbre du vivant 101 secrets de l'adn . 978-2-271-12323-7 : 358 Tanglegrams Are Misleading for Visual Evaluation of Tree Congruence Molecular Biology and Evolution . 36 ( 1 ) : 174-176 Zombi: A phylogenetic simulator of trees, genomes and sequences that accounts for dead lineages Bioinformatics .
https://lbbe.univ-lyon1.fr/en/cocoon-group
8:30 a.m. to 1:30 p.m. Outside participants, click here to access the event information: education.stvincent.edu/teach-the-future-2021-engaging-our-future-teachers.html Saint Vincent undergraduate, graduate and faculty Register here to attend the morning session to listen to the PA Teacher of the Year, Mr. Joseph Welch, speaker event from 8:45-9:30 a.m. Feel free to stay and listen to a Breakout session presented by Mr. Welch from 9:40 to 10:30 a.m.: Innovative Strategies to Cultivate Creativity and Literacy Educators consistently explore new pathways to engage students when teaching. Throughout the last 15 months, innovation has undergone continued transformation as technology continues to become more accessible to teachers and learners. Within this session, let’s examine methods that we can use to enhance both student creativity as well as their literacy skills as we put students in positions to collaborate, innovate, and personalize their experience as young learners. From creating graphic novels, to leveraging music, to creating animations and documentaries we will discuss how everyone can create while still cultivating literacy skills. | | About Mr. Welch Joe Welch, an American History teacher from suburban Pittsburgh, Pennsylvania, currently serves as the 2020-21 Pennsylvania Teacher of the Year and was previously honored as 2019 National Middle Level Educator of the Year and Pennsylvania Social Studies Teacher of the Year. He is also recognized as a Gilder Lehrman Institute Master Teacher and was recognized as Gilder Lehrman's National History Teacher of the Year in 2018. An Apple Distinguished Educator and National Board Certified Teacher, Joe is a strong believer in bringing diverse stories, personal emotions, and community connections into his lessons as well as fostering excitement for quality and engaging educational opportunities.
http://education.stvincent.edu/upcoming-events.html
Are you interested in learning more about the history of people who lived in Europe between 500 and 1500 A.D.? Below you can find helpful information for your research or check out our Medieval Manuscript Digital Collection with over 5,600 items. Rare Books, Manuscripts, & Digital Collections Medieval Manuscripts The paleography (art of analyzing and reading handwriting) and calligraphy of Medieval books. Appreciating the history of Medieval books. Non-circulating Medieval Manuscript resources. Fiction that draws upon medieval themes.
https://libwww.freelibrary.org/explore/topic/medieval-manuscripts
This code sample shows how to setup a camera target and how to create a motion path for object animation. It shows how to manually manipulate coordinats to accurately setup key frames and tangents for the path. It also shows how to display the motion path tangents and curves to facilitate the achievement of a precise result. The code shows how to get the target out of line with the camera. The target here is a light that uses the same motion path as the camera with a slight advance. This code sample shows the same features as in code sample 07, but the motion path has been built with 3DCamerPathEditor tool available on http://www.ozone3d.net. The motion path shows the same parameters such as keyframes and tangents, but those values are automatically created by the 3DCamerPathEditor and then imported into the 3D scene. The camera target is a light and the path has been created in order to get a trajectory inside a winding tube 3D model (torus knot). This code sample shows how to achieve a simple Inverse Kinematic (IK). It shows how to declare different submeshes of a 3D model in order to access them to perform special actions. This is done through a LUA scripting code to generate a movement in the ground plane (2D calculus). This code shows how to perform character animation. It shows how to get a good result by setting a simple frame to frame animation. The animation is performed through the LUA scripting code. Bigguy 3D model comes from nVidia 9.1 SDK (Dynamic Ambient Occlusion Lighting demo). ThanX to nVidia! This code shows how to perform character animation. It shows how to get a good result by setting a keyframe animation using a linear interpolation. The animation is performed through the LUA scripting code. Page generated in 0.003119945526123 seconds.
http://www.ozone3d.net/repository_hyperion_cs_animation.php
This seminar was designed due to the consecutive changes in the Labor Law and is intended to make business related Laws more beneficial for both employers and employees. Local and Foreign companies face often difficulties with understanding updates and instructions in the law. This Seminar will be an introduction for local, foreign and international companies in Kurdistan region to the recent updates and the latest Labor laws. The Seminar will give your company knowledge about the existing labor law and compare it with the new Labor Law. As an HR professional, you are the contact person in your organization for questions about recruitment of staff, employment contracts explaining company regulations, taking holidays, dismissal etc. The answers can be found in labor law. Periodically freshen up your knowledge of labor law you will be familiar with of the latest legal developments. Participation Fee 450 USD per one participant. Topics covered in this Seminar 1. Main principles of Labor Law. 2. The responsibilities of employers and employees according to the Labor Law. 3. Working hours & holidays 4. Labor related issues and Labor court for sorting out the disputes. 5. The main difference / changes in the old & new law 6. Labor Law’s instructions for local and foreign companies and employees. 7. Wages 8. Questions and answers session Target audience HR professionals, salary specialists and staff members with HR in their tasks their knowledge of labor law would brush up and want to be informed of the current state of labor law. The seminar is also interesting for managers, local and foreign company owners, investors, and whoever interested in the new Labor Law.
http://www.whaservices.com/training/labor-law-seminar-n.html
Abstract We describe a specimen of the basal ornithuromorph Archaeorhynchus spathula from the Lower Cretaceous Jiufotang Formation with extensive soft tissue preservation. Although it is the fifth specimen to be described, unlike the others it preserves significant traces of the plumage, revealing a pintail morphology previously unrecognized among Mesozoic birds, but common in extant neornithines. In addition, this specimen preserves the probable remnants of the paired lungs, an identification supported by topographical and macro- and microscopic anatomical observations. The preserved morphology reveals a lung very similar to that of living birds. It indicates that pulmonary specializations such as exceedingly subdivided parenchyma that allow birds to achieve the oxygen acquisition capacity necessary to support powered flight were present in ornithuromorph birds 120 Mya. Among extant air breathing vertebrates, birds have structurally the most complex and functionally the most efficient respiratory system, which facilitates their highly energetically demanding form of locomotion, even in extremely oxygen-poor environments. Archaeorhynchus is commonly resolved as the most basal known ornithuromorph bird, capturing a stage of avian evolution in which skeletal indicators of respiration remain primitive yet the lung microstructure appears modern. This adds to growing evidence that many physiological modifications of soft tissue systems (e.g., digestive system and respiratory system) that characterize living birds and are key to their current success may have preceded the evolution of obvious skeletal adaptations traditionally tracked through the fossil record.
http://sourcedb.ivpp.cas.cn/yw/lwkyw/201811/t20181102_5153228.html